subspace
headscale
Our great sponsors
subspace | headscale | |
---|---|---|
8 | 220 | |
2,511 | 18,892 | |
- | - | |
0.0 | 9.1 | |
over 1 year ago | 6 days ago | |
HTML | Go | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
subspace
-
Which vpn server setup do you use? Container / no Container, GUI / CLI?
When I look into vpn servers, I find easy installers, which directly work on linux (e.g. angristan/wireguard-install) or also vpns, which operate from docker (like kylemanna/docker-openvpn). Then there are options, where multiple things are included, like firezone or this. I am not so sure how well they integrate with my reverse proxy and some seem to be much more complicated than others.
-
Free (as in both) front-end web GUI for an OpenVPN (and/or maybe Wireguard) server, that's suitable for a small business?
https://github.com/subspacecloud/subspace (2.2k GitHub stars, last updated February 9th)
-
Self Hosted GUI to monitor and administer wireguard peers
Subspace
-
Wg-access-server: An all-in-one WireGuard VPN solution with a web UI
That is nice to see, I was looking at subspace last week and the last commit to https://github.com/subspacecloud/subspace had led me to believe it had withered and died, I was guessing due to the primary backing company having died?
So it is quite nice to see that it is living on as a fork.
- Netmaker 0.7 - Very Fast Linux Server Networking over WireGuard and Other Things
-
Pritunl alternative
Another UI-enabled alternative for WireGuard is Subspace. And another simple-as-hell option for managing VPN profiles (with OpenVPN and WG compatibility, but no web interface) could be running PiVPN on any Ubuntu/Debian host.
headscale
-
Russia has started indiscriminately blocking all OpenVPN/WireGuard connections
You can always use headscale. https://github.com/juanfont/headscale
-
Securely Accessing Private AWS Resources from GitHub Actions with TailScale
One more thing, you can host Tailscale Control Server yourself if you want, which is a plus.
-
A word of caution about Tailscale
https://github.com/juanfont/headscale not to mention but Tailscale has a very good culture, I’m sure they would give notice if they pull the rug. There are also many alternatives such as Zerotier and more are showing up every day and open source options.
-
Connecting several hundreds IoT (raspberry pi's) devices with a VPN
How about self-hosted Tailscale, known as Headscale
-
Mullvad on Tailscale: Privately browse the web
An issue has been created to implement this feature in Headscale:
https://github.com/juanfont/headscale/issues/1545
Headscale is a FOSS replacement for Tailscale's closed source coordination server.
You can run your own "head scale" control server and use their clients with it: https://github.com/juanfont/headscale
Requires a lot more setup, but it is an option. I've been self-hosting headscale for some time and it is quite stable.
-
Netbirdio/netbird: Connect devices into a single private WireGuard mesh network
There's an alternative to tailscale service called headscale https://github.com/juanfont/headscale (CLI only server compatible with official tailscale clients)
-
NetMaker: Connect Everything with a WireGuard VPN
It isn't official, but headscale exists: https://github.com/juanfont/headscale
-
Admin-Friendly Mesh VPN with WireGuard?
After browsing through, I've noticed that three options seem to be gaining traction: Netmaker, wg-easy, and headscale. I'm curious to know if these solutions are interchangeable, and if there are specific reasons to choose one over the others. I'd also like to understand if they are complete stacks, meaning, once set up, could I easily replace one admin GUI with another, or would I need to tear down and rebuild the VPN?
What are some alternatives?
tailscale - The easiest, most secure way to use WireGuard and 2FA.
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
zero-ui - ZeroUI - ZeroTier Controller Web UI - is a web user interface for a self-hosted ZeroTier network controller.
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
ZeroTier - A Smart Ethernet Switch for Earth
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
firezone - Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
innernet - A private network system that uses WireGuard under the hood.
docker-cloudflare-ddns - A small amd64/ARM/ARM64 Docker image that allows you to use CloudFlare as a DDNS / DynDNS Provider.
cloudflared - Cloudflare Tunnel client (formerly Argo Tunnel)
WGDashboard - Simplest dashboard for WireGuard VPN written in Python w/ Flask
Pritunl-Fake-API - This neat script provides a little fake API to unlock all premium/enterprise/enterprise+ (here called ultimate) features of your own Pritunl VPN server. A mirror of https://gitlab.simonmicro.de/simonmicro/pritunl-fake-api