tinc
mullvadvpn-app
tinc | mullvadvpn-app | |
---|---|---|
19 | 199 | |
1,849 | 4,511 | |
- | 4.1% | |
5.6 | 10.0 | |
about 1 month ago | about 21 hours ago | |
C | Rust | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
tinc
-
Would we still create Nebula today?
But both Nebula and tinc max out at around 1 Gbit/s on my Hetzner servers, thus not using most of my 10 Gbit/s connectivity. This is because they cap out at 100% of 1 CPU. The Nebula issue about that was closed due to "inactivity" [2].
I also observed that when Nebula operates at 100% CPU usage, you get lots of package loss. This causes software that expects reasonable timings on ~0.2ms links to fail (e.g. consensus software like Consul, or Ceph). This in turn led to flakiness / intermittent outages.
I had to resolve to move the big data pushing softwares like Ceph outside of the VPN to get 10 Gbit/s speed for those, and to avoid downtimes due to the packet loss.
Such software like Ceph has its own encryption, but I don't trust it, and that mistrust was recently proven right again [3].
So I'm currently looking to move the Ceph into WireGuard.
Summary: For small-data use, tinc and Nebula are fine, but if you start to push real data, they break.
[1]: https://github.com/gsliepen/tinc/issues/218
[2]: https://github.com/slackhq/nebula/issues/637
[3]: https://github.com/google/security-research/security/advisor...
- Which overlay network?
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
-
Tunneling to Synology NAS without opening ports.
Two other options are Tinc https://tinc-vpn.org/ or Nebula https://www.defined.net/nebula/
-
Port Forward Security & Alternatives
And there is Tinc; the OG overlay network. I don't have experience with this. Seemed a bit of a pain to setup. https://tinc-vpn.org
-
WireGuard multihop available in the Mullvad app
For what its worth I have used the open source Tinc VPN [1] for mesh multihop routing for ages. It is nowhere near as fast as Wireguard but I could envision Tinc incorporating support for Wireguard if the author were so inclined. Like you mentioned Tinc does not mesh with other VPN's AFAIK.
[1] - https://tinc-vpn.org/
-
You may not need Cloudflare Tunnel. Linux is fine
This is actually very simple in concept and is just as simple or even simpler to do with tinc (https://tinc-vpn.org).
Since I can use tinc in bridge mode, I can run tinc on the upstream server and on a local machine which then provides access to several physical machines without running extra software on each of those machines, which is particularly useful for machines that are resource limited, like my Macintosh LC II and LC III+:
http://elsie.zia.io/
It'd be nice if it weren't so difficult to get public addresses.
-
Tinc Is Not Catan
I clicked expected some broken analogy between https://tinc-vpn.org/ and the Catan board game, but instead it is a Catan implementation. Fair enough.
-
Graphviz: Open-source graph visualization software
will generate a real-time network graph using the Graphviz DOT language. It's a cool feature that I find quite useful.
[0] https://tinc-vpn.org/
mullvadvpn-app
-
A New Chapter for Mozilla
* Mozilla VPN: wrapper around https://mullvad.net/ (and had security issues: https://www.techradar.com/news/security-audit-finds-major-is...)
-
Pirating on Mac extremely slow
hey there, after doing some research it seems like the conclusion is your vpn. Nord VPN has a lack of port forwarding, while other vpns have port forwarding (proton, mullvad). that is most likely interrupting your speed. also, apparently nord does keep some sort of logs if your interested in that. i would recommend cancelling nord and getting something else like proton or mullvad (i would recommend proton more) if you really want to download movies/shows. another option for you (if you dont want to switch) is to find your movie on websites that don't require a vpn (aka not torrenting) but you can if you want to. you can use this for that, they have tons of movies and shows. or just use a streaming site off of the megathread.
- Help With Routing
- New Mullvad release v. 2023.5 (for desktop only)
-
Why does the Mullvad installer need 500mb and access to my downloads folder?
The 500 MiB thing is because the frontend is an Electron app. That's sadly how it is with Electron. The UI can of course be re-written into a language/framework that produces way smaller programs, but it's not currently really worth the tradeoff. Most people are not that constrained in disk or internet speeds. https://github.com/mullvad/mullvadvpn-app/issues/1572
The downloads folder access thing is because Apple made it so. If you run an installer from the downloads folder it will need access to the downloads folder. This has nothing to do with Mullvad, but is a permission check macOS puts on all software. The Mullvad VPN app has no code for doing anything in the Downloads folder specifically.
-
Unlimited Kagi searches for $10 per month
Requiring an account for search is a deal breaker. They say they need it for payment, but mullvad[0] does just fine without an account as well.
[0]: https://mullvad.net/
-
Finally got Mullvad working in Silverblue
From this post: https://github.com/mullvad/mullvadvpn-app/issues/1570
-
Why is there still no official support for openSUSE?
I don't understand why the .rpm package of Mullvad VPN still only officially supports Fedora. This issue on GitHub has been open for almost three years now and there is even someone else trying to help you making the necessary changes to support openSUSE in this PR. I kinda agree with cornfeedhobo's sentiment that the necessary changes to make it work on openSUSE are being gated. I'm a paying user for quite some years already and made the switch to openSUSE and I'd really like to continue using Mullvad VPN there without having to force install the .rpm package and thus living with a lot of uncertainty about how well it will run.
- Is there any reason why there isnt a "Connect to fastest server" option?
-
mullvad marked as malicious by virustotal?? I mary's says it's a trojan
It's just a false-positive. If you're still wary, feel free to review the source code of the app and you can even build it yourself: https://github.com/mullvad/mullvadvpn-app/
What are some alternatives?
OpenVPN - OpenVPN is an open source VPN daemon
Matsuri - Matsuri (茉莉) / V2Ray / universal proxy toolchain for Android / Fork of SagerNet
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
nextdns - NextDNS CLI client (DoH Proxy)
ZeroTier - A Smart Ethernet Switch for Earth
tracker-control-android - TrackerControl Android: monitor and control trackers and ads.
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
SurfShark-VPN-GUI - GUI for connecting to the SurfShark VPN
tailscale - The easiest, most secure way to use WireGuard and 2FA.
boringtun - Userspace WireGuard® Implementation in Rust
headscale - An open source, self-hosted implementation of the Tailscale control server
Simple-YouTube-Age-Restriction-Bypass - A simple browser extension to bypass YouTube's age verification, disable content warnings and watch age restricted videos without having to sign in!