wgsd
headscale-ui
wgsd | headscale-ui | |
---|---|---|
8 | 13 | |
765 | 1,463 | |
- | 8.1% | |
2.8 | 6.0 | |
4 months ago | 2 months ago | |
Go | Svelte | |
MIT License | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wgsd
-
Mesh VPN - WireGuard admin
if your looking at setting up coredns aswell then i would highly suggest checking out wgsd https://github.com/jwhited/wgsd
- DNS System for storing WireGuard IPs
-
CVE-2022-41924 – tailscaled can be used to remotely execute code
https://github.com/jwhited/wgsd does NAT traversal with Wireguard, but you need to operate a CoreDNS server to do it.
More info on how it works: https://www.jordanwhited.com/posts/wireguard-endpoint-discov...
-
For CGNAT peers - is there an alternative which is open source and as simple to use as Tailscale?
Another one which looks promising is wgsd, a dns like plugin to discover peer's endpoints that sit behind a NAT. For me this is part of the solution, however not a complete one, as my client devices are also on Android and Android TV.
-
Wireguard with holepunching and DNS
that guide is literally someone promoting their CoreDNS plugin, so I'm confused as to what you mean: https://github.com/jwhited/wgsd
- Wiretrustee: WireGuard-Based Mesh Network
-
traceroute between two clients, server is always in the middle
If they are behind a NAT that you can't do port-forwarding on then you may need to run some additional software like https://github.com/jwhited/wgsd so 10.10.0.2 and 10.10.0.3 know where to look for each other by asking 10.10.0.1
-
Yet Another Mesh Overlay Tool
Our current implementation just has the nodes configured with PersistentKeepAlive by default, which works well enough for our small setup. In future iterations our plan is to incorporate another service. Our inclination is to use WGSD: https://github.com/jwhited/wgsd
headscale-ui
-
Has anyone setup a headscale-ui server ?
However, I'm encountering significant challenges when it comes to setting up a seemingly simple static website for the UI.
-
Make your own VPN with Fly.io, tailscale and GitHub
I've been running wireguard on my own for a few years. I like it, but wish there was a better GUI.
I tried installing headscale. I didn't feel like I got the immediate rush of "cool, I have the baseline thing working" without reading the docs. And, I needed to use this for a GUI: https://github.com/gurucomputing/headscale-ui. I love the command line and am happy to use that, but I'm unsure if there is a benefit to headscale over wireguard if I'm doing that.
I just read this article on tailscale vs. openziti and it mentioned netmaker (a YC company). I tried installing it, but out of the box, "DNS" did not seem to work correctly.
Is anyone here a power user that also benefits from a full fledged GUI? Is tailscale the only option there? I prefer to self-host whenever I can, despite loving tailscale and the people behind it.
-
Self-hosted Tailscale alternative?
There's also gurucomputing/headscale-ui which I've used personally. It's been adequate, though the lack of native arm64 builds until recently has put me off a bit.
- [Self Hosted] Headscale-UI ist jetzt in der Beta!
- The Case Against Automatic Dependency Updates
-
Milliner, a self-hosted Headscale Management WEB-UI. This time with Screenshots!
How does this compare to headscale-ui?
-
Mesh VPN - WireGuard admin
Headscale's ui is fine (well ish, I'd like headscale to write an API for ACLs). I might be biased though because I wrote it.
-
Completely failing with headscale and headscale-webui
Have you tried https://github.com/gurucomputing/headscale-ui ?
-
Take your local development experience to the next level with Dev Containers
My Dev container is here: https://github.com/gurucomputing/headscale-ui/blob/master/documentation/development.md
-
Create Wireguard VPN with Netmaker
I threw my hat into the headscale crowd instead (to the point of writing a UI for it) but I'll have to give netmaker another spin soon.
What are some alternatives?
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
sslh - Applicative Protocol Multiplexer (e.g. share SSH and HTTPS on the same port)
headscale - An open source, self-hosted implementation of the Tailscale control server
innernet - A private network system that uses WireGuard under the hood.
website - Gitpod website and documentation
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
skeleton - A fully featured UI toolkit for Svelte + Tailwind. [Moved to: https://github.com/skeletonlabs/skeleton]
cjdns - An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
swyxkit - An opinionated blog starter for SvelteKit + Tailwind + Netlify. Refreshed for SvelteKit 1.0!
wireproxy - Wireguard client that exposes itself as a socks5 proxy
wg-easy - The easiest way to run WireGuard VPN + Web-based Admin UI.