super
docker-wireguard
super | docker-wireguard | |
---|---|---|
10 | 46 | |
94 | 2,623 | |
- | 2.8% | |
8.7 | 8.2 | |
5 days ago | 5 days ago | |
JavaScript | Dockerfile | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
super
-
PiVPN v4.6.0: The End
You can give us a try, https://github.com/spr-networks/super, http://supernetworks.org/. Wireguard is well integrated. We also have a tailscale plugin, and more vpn plugins on the way
-
You shouldn't run NSA-grade Wi-Fi at home
Somewhat related -- with the project I work on, https://github.com/spr-networks/super, we do support wireguard peers (and also support combining that wireguard identity with a wifi peer identity as well).
Devices are provisioned by assigning or generating a wireguard keypair in the API.
Next the peers are routed together by policy and by default can't access one another. There's support for bidirectional network groups or one-way firewall rules with NAT.
One are of improvement is multicast support with wireguard, it's doable, just not ready yet.
-
Securely Chaining Wi-Fi Routers (2022)
golang-based SPR is open-source and can be run on RPi: https://github.com/spr-networks/super
> An unspoofable device identity is established with a MAC address and Per-Device Passphrase for WiFi (or a VPN Public Key for Remote Devices). From there, each device gets its own /30 subnet to exist on. Hardening and strict firewall rules block network spoofing and impersonation, and routing rules redefine connectivity between devices and to the internet.
- Building a freedom-friendly WiFi pocket-router (2021)
- Secure Programmable Router
-
Raspberry Pi 4 Showcase: A Secure Programmable Router
The other thing we've been tasked to work on is load balancing across uplink interfaces, and we're happy for more feedback for how the feature should work. That's tracked under here https://github.com/spr-networks/super/issues/134. We will likely use the fwmark capabilities (which we already use for redirecting traffic to site-to-site vpn connections)
- Upgrade to next-level WiFi with an open-source, secure programmable router
- SPR: Open Source, Secure Programmable Routers
- Show HN: Supernetworks' Secure Programmable Router
-
MacStealer allow for WiFi client isolation bypasses (CVE-2022-47522)
Yes -- except for limited wireguard support, usability for multicast is mostly solved. SPR services mDNS and Zeroconf/SSDP with a udp proxy[1].
[1] https://github.com/spr-networks/super/blob/main/multicast_ud...
docker-wireguard
-
PiVPN v4.6.0: The End
It’s probably better to just use the wireguard docker container setup instructions now: https://github.com/linuxserver/docker-wireguard?tab=readme-o...
- WireGuard NAS to NAS connection using Raspberry Pi (pivpn) - how to set up a client?
-
WireGuard in container. UFW blocking access to services running on host?
I'm running linuxserver/docker-wireguard in Docker via docker-compose. It works great and I can access anything on my LAN via IP or DNS from my phone.
-
Docker Wireguard
I'm trying to set up a Wireguard VPN server on an 2020 M1 Mac Mini running Fedora Asahi server through Docker.
-
This would have made my life so much easier in the beginning....
You can add one to the docker compose file and then route other containers (especially qbittorrent) through it by setting network-mode. Read about it here: https://github.com/linuxserver/docker-wireguard
- [Self Hosted] VPN Mullvad pour les conteneurs Docker
-
WireGuard connected but no DNS
I checked /etc/sysctl.conf on the pi itself, and all lines are commented. Same on the docker container when I exec -it into it. https://github.com/linuxserver/docker-wireguard is the container I use
-
Wireguard on host or in Docker container?
FWIW there is https://github.com/linuxserver/docker-wireguard/tree/alpine, which does just that really. It's a little more complicated because it still supports all the peer config envs, etc. but it's much smaller than the normal image because it doesn't have support for compiling and enabling the kernel module.
-
Anyone setup wireguard and wireguard UI in a single docker-compose?
- I am using the linuxserver wireguard docker container: https://github.com/linuxserver/docker-wireguard
-
Remote dashboard and statistics?
- deploy a VPN (I suggest that you have a look to docker WireGuard which I personnaly use)
What are some alternatives?
macstealer
docker-surfshark - Docker container with OpenVPN client preconfigured for SurfShark
router7 - router7 is a small home internet router completely written in Go. It is implemented as a gokrazy appliance.
pivpn - The Simplest VPN installer, designed for Raspberry Pi
homelab - Monorepo for my homelab configuration 🏡
nordvpn - NordVpn Docker Client
outline-apps - Outline Client and Manager, developed by Jigsaw. Outline Manager makes it easy to create your own VPN server. Outline Client lets you share access to your VPN with anyone in your network, giving them access to the free and open internet.
wstunnel - Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available
shadowsocks-rust - A Rust port of shadowsocks
libreelec-addons
openvpn-client
docker-qbittorrent