wgsd
Nebula
Our great sponsors
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wgsd
-
Mesh VPN - WireGuard admin
if your looking at setting up coredns aswell then i would highly suggest checking out wgsd https://github.com/jwhited/wgsd
- DNS System for storing WireGuard IPs
-
CVE-2022-41924 – tailscaled can be used to remotely execute code
https://github.com/jwhited/wgsd does NAT traversal with Wireguard, but you need to operate a CoreDNS server to do it.
More info on how it works: https://www.jordanwhited.com/posts/wireguard-endpoint-discov...
-
For CGNAT peers - is there an alternative which is open source and as simple to use as Tailscale?
Another one which looks promising is wgsd, a dns like plugin to discover peer's endpoints that sit behind a NAT. For me this is part of the solution, however not a complete one, as my client devices are also on Android and Android TV.
-
Wireguard with holepunching and DNS
that guide is literally someone promoting their CoreDNS plugin, so I'm confused as to what you mean: https://github.com/jwhited/wgsd
- Wiretrustee: WireGuard-Based Mesh Network
-
traceroute between two clients, server is always in the middle
If they are behind a NAT that you can't do port-forwarding on then you may need to run some additional software like https://github.com/jwhited/wgsd so 10.10.0.2 and 10.10.0.3 know where to look for each other by asking 10.10.0.1
-
Yet Another Mesh Overlay Tool
Our current implementation just has the nodes configured with PersistentKeepAlive by default, which works well enough for our small setup. In future iterations our plan is to incorporate another service. Our inclination is to use WGSD: https://github.com/jwhited/wgsd
Nebula
-
JIT WireGuard
(I am a Nebula maintainer.) We recently merged support for gVisor-based services, although it's very new, and I don't know of much experimentation that's been done with it yet: https://github.com/slackhq/nebula/pull/965
-
Ask HN: What Underrated Open Source Project Deserves More Recognition?
Nebula, originally from Slack[0].
Wireguard rightly gets a lot of attention, but Nebula is a really simple and easy to deploy mesh network that is often overlooked.
It does lack a management GUI and that stuff is very much DIY.
[0] https://github.com/slackhq/nebula
-
Nebula is Not the Fastest Mesh VPN (But neither are any of the others)
Fair enough about the android mobile client... My use case only involves meshing linux appliances across various networks so we only need the nebula core binaries which are under MIT license
https://github.com/slackhq/nebula/blob/master/LICENSE
-
Nebula is an open-source and free-to-use modern C++ game engine
That's not at all confusing with Slack's Nebula. https://github.com/slackhq/nebula
-
A word of caution about Tailscale
Sounds like a bunch of your pain points are just related to needing an online CA or ICA. But, looking through the Nebula docs I don't know that it supports things like CRL addresses where you could host the CRL, or OCSP responders. Someone got support for an OCSP responder but never submitted a PR with completed code: https://github.com/slackhq/nebula/issues/72
-
Free Tech Tools and Resources - Multi-clock Display, Networking Tools, Digital Forensics & More
Nebula is a scalable, cross-platform overlay networking tool focused on performance, simplicity, and security. This portable tool is equally adapted for linking a small number of computers or scaling to connect tens of thousands. It integrates encryption, security groups, certificates, and tunneling into a powerful, cohesive connectivity solution. Thanks for the recommendation go to jmeador42.
-
Would we still create Nebula today?
Replying to my own comment as I can no longer edit it:
The folks over at Slack had an interesting discussion regarding the the "battle of the VPNs" article published by Netmaker I sourced in my parent comment:
https://github.com/slackhq/nebula/discussions/911
-
Tailscale vs. Narrowlink
Interesting. I thought recognized the logo, apparently seems to be a commercial support offering of https://github.com/slackhq/nebula and they support the "nebula" iOS app. I had been using for nebula/defined in the past.
-
Which overlay network?
Nebula: Is super easy to get running. It uses an interesting angle, working on the service and not just the device level. Unfortunately their NAT support seems to be still quite problematic and I am not going to maintain all those forwarded ports manually. There is a PR to support PCP but even if that ever gets applied I am not sure how well that will play with older routers. While it should be battle proven at slack, the community seems to be not that active. It still has the in-house tool that just got released.
-
Most efficient way to reliably get a message to every server in a network?
The catch is that I want this to be reliable and fault tolerant, so if some of the game servers in the network go down, the remaining online servers should still always be able to receive broadcasts from any other online server. The servers can also be in multiple geographic locations and I am planning on using a mesh overlay network like Nebula to connect them. Essentially each pair of online servers will likely have a secure link between them that goes directly through the underlying network.
What are some alternatives?
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
ZeroTier - A Smart Ethernet Switch for Earth
headscale - An open source, self-hosted implementation of the Tailscale control server
innernet - A private network system that uses WireGuard under the hood.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
tinc - a VPN daemon
cjdns - An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
wireproxy - Wireguard client that exposes itself as a socks5 proxy
yggdrasil-go - An experiment in scalable routing as an encrypted IPv6 overlay network