wesher
yggdrasil-go
wesher | yggdrasil-go | |
---|---|---|
10 | 23 | |
891 | 3,342 | |
- | 1.6% | |
6.1 | 8.5 | |
17 days ago | about 2 months ago | |
Go | Go | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wesher
-
Would we still create Nebula today?
https://github.com/costela/wesher
Wiresmith: Rust, auto-configs clients into a mesh
-
Does a fully featured WireGuard-protocol based corporate VPN software exist?
Maybe take a look at Wesher https://github.com/costela/wesher
-
Mesh of multiple wg tunnels
I run a Wireguard mesh network with Wesher, and I am pretty sure that there are other projects to automate this. Is there a reason not to use them?
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
- Wie würdet ihr derzeit ein persistentes VPN-"Mesh" für ~20 Geräte bauen?
-
How to add new client to wireguard in VPS without getting public IP changed on the client?
There are two factors at play here. The client's public IP actually depends on the gateway they use on accessing the internet. You can disable routing and your clients will keep their public IP and general internet access won't go through the VPS. However, if you want the traffic between "clients" also skip the VPS, then you want a mesh network. wesher and wg-meshconf can help you on configuring them.
-
Anyone using WireGuard for production as SDN?
Have you considered https://github.com/costela/wesher or does this not fit your use case?
-
internal naming conventionds
I use Hashicorp Consul and Hashicorp Nomad for service discovery and task scheduling respectively, with wesher for my internal private management network that Consul, Nomad, etc run on to protect the management interfaces. Fabio bridges the gap between the wesher wireguard VPN and the rest of my home network.
-
Building a Mesh VPN Tool for the Community
How does your solution compare to wesher?
-
Wireguard Mesh Network Options
How does it compare to https://github.com/costela/wesher?
yggdrasil-go
-
Tinc, a GPLv2 mesh routing VPN
> The next version will make it much simpler to deploy isolated networks by using TLS roots to prevent accidental peerings.
Is that PR #1038 [1]? Any info on how to use that feature and whether it works over multicast as well?
I noticed this PR uses SHA-1 for matching fingerprints. SHA-1 has been broken for 13 years now. Is it possible to use something more secure?
> It's also worth noting that Yggdrasil doesn't have the equivalent of "peer exchange" — only directly connected peers would ever find out your public IP address. Yggdrasil will not form new peerings automatically, with the single exception being multicast-discovered nodes on the same LAN.
Right, my worry is that by having a server with a public IPv4 address and Yggdrasil running on an open port (so that my other nodes can connect to it) will allow someone to connect to it (either on purpose or accidentally) and cause my traffic to route over their node(s) and/or the public mesh.
Thanks!
[1] https://github.com/yggdrasil-network/yggdrasil-go/pull/1038
- Yggdrasil
- Release Version 0.4.7 · yggdrasil-network/yggdrasil-go · GitHub
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
-
The Iran Firewall: A preliminary report
The only real solution long-term is completely peer-to-peer ad-hoc networking that doesn't depend on BGP.
A few projects are in similar territory but none I've seen are working at the layer of bypassing BGP. Many are just acting as an overlay; which works to an extent. https://github.com/yggdrasil-network/yggdrasil-go
It's probably begging for a different model of the "internet" and where data lives.
My requirements:
1. Offline-first applications that sync via a pub/sub DHT of trusted peers. More details here but basically allows bypassing BGP.
-
Make the Internet Yours Again With an Instant Mesh Network
It seems like you can limit connections to your node with AllowedPublicKeys (ref).
- Was war vor 15 Jahren möglich, aber wäre heute undenkbar?
-
[Fanatical] Mindustry - 24 Hour Star Deal (83% off - $1.00 / £0.79 / €0.79)
at least on the official discord the recommended way if you don’t want to play on a public server is using yggdrasil
- Multiplayer Between Steam Owner/Non-Steam Owners
What are some alternatives?
wg-meshconf - WireGuard full mesh configuration generator.
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
ergo - An actor-based Framework with network transparency for creating event-driven architecture in Golang. Inspired by Erlang. Zero dependencies.
cjdns - An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
wireguard-vanity-keygen - WireGuard vanity key generator
mesh-networking - :globe_with_meridians: LEGO blocks for networking, a Python library to help create and test flexible network topologies across real and simulated physical links.
wiresteward - Wireguard peer manager
PJON - PJON (Padded Jittering Operative Network) is an experimental, arduino-compatible, multi-master, multi-media network protocol.
kilo - Kilo is a multi-cloud network overlay built on WireGuard and designed for Kubernetes (k8s + wg = kg)
pinecone - Peer-to-peer overlay routing for the Matrix ecosystem
drago - ☁️ Securely connect anything with WireGuard® and manage all your networks from a single place.
ZeroTier - A Smart Ethernet Switch for Earth