wireguard-go
dendrite
wireguard-go | dendrite | |
---|---|---|
14 | 42 | |
2,729 | 5,404 | |
2.5% | 1.3% | |
6.3 | 9.0 | |
about 1 month ago | 6 days ago | |
Go | Go | |
MIT License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
wireguard-go
-
Writing highly scalable backends in UDP
Would you accept https://github.com/WireGuard/wireguard-go/blob/master/tun/ne... as a solution? =)
-
WireGuard client that exposes itself as a HTTP/SOCKS5 proxy
Maybe https://github.com/cloudflare/boringtun or https://github.com/WireGuard/wireguard-go ?
-
The Tailscale Universal Docker Mod
It's likely just `tailscale serve https / `.
https://github.com/tailscale/tailscale/blob/main/ipn/serve.g...
And they also support direct embedding:
https://tailscale.dev/blog/embedded-funnel
I think this is built on the wireguard-go + gvisor mashup, that allows you to do this with just Wireguard:
https://github.com/WireGuard/wireguard-go/tree/master/tun/ne...
One of my favorite applications of this is this little tool that turns Wireguard VPNs into SOCKS5 proxies (which you can selectively enable in your browser)
https://pkg.go.dev/github.com/octeep/wireproxy
-
Speed tests for Tailscale, Wireguard and Zerotier
They added this pull-request to wireguard-go and i assume they have already included it in their new version.
-
Show HN: Wiretap – Transparent WireGuard proxy server without root
Vanilla WireGuard doesn't provide a way to run a peer in userspace that can proxy traffic between another peer and an endpoint such as a web server because you need to be privileged to do thinks like work with raw packets. However, https://github.com/WireGuard/wireguard-go is a userspace implementation of WireGuard and has recently incorporated Google's userspace networking stack. This project uses these two userspace tools to "fake" a privileged WireGuard peer that proxies TCP, UDP, and (a small subset of) ICMP. It was written as a pentesting/red team utility for my team but it can also serve as a general makeshift VPN when you don't have privileges on a box you want to proxy through.
-
How to program a vpn (for fun)
How "scratch" do you want to go from? Do you want to write your own virtual network driver, or do you want to use an existing driver like Wintun? Either way learning about Wintun would be a good start. Then there's the protocol, regardless of what language you learn, the wireguard-go implementation is a very good example of how to implement a secure protocol with modern language.
-
Wireguard not working on Xen virtualization
https://github.com/cloudflare/boringtun https://github.com/WireGuard/wireguard-go
-
Show HN: Onetun, a cross-platform WireGuard port-forwarder
wireguard-go (the official userspace impl in golang) can do this since several months back. It uses gVisor's netstack as a tcp/udp provider to forward connections to its peer.
Here's a demonstration of both a http-client and a http-server running over wireguard (a poor man's QUIC): https://github.com/WireGuard/wireguard-go/tree/master/tun/ne...
fly.io wrote about such setups not long ago too: https://news.ycombinator.com/item?id=26315695
And tailscale.com uses a similar setup (with netstack) on non-Linux/xBSD platforms: https://news.ycombinator.com/item?id=28261683
-
Userspace WireGuard for armv7-linux-gnueabi
I think you can try wireguard-go,
-
Netaddr.ip: a new IP address type for Go
> The story begins in April 2019 with 89476f8cb5 in which David Crawshaw, aware of all these problems, created an IP type like:
It's in a PR here: https://github.com/WireGuard/wireguard-go/pull/11/files
Which mentions:
> Typically throughout WireGuard, we've used [4]byte for v4 and [16]byte for v6, considering the Go standard library's choice of v6-mapped-v4 to be a mistake.
It actually looks useful, there's something similar in wgtypes, and I wanted to use it recently [0] but that package unfortunately doesn't expose a way to write it out to a string/buffer, so I ended up almost replicating it.
[0] https://github.com/OJFord/terraform-provider-wireguard/blob/...
(There's a lot of ways of presenting/parsing/constructing the same config options there! I'm sure if I were more fluent in Go there's some more succinct way.)
dendrite
- The Tailscale Universal Docker Mod
- Conduit: Simple, fast and reliable chat server powered by matrix
-
Databag – tiny self-hosted federated messenger for the decentralized web
Matrix already has key-based identity in the works at https://github.com/matrix-org/matrix-spec-proposals/blob/keg... (and implemented in Dendrite at https://github.com/matrix-org/dendrite/pulls?q=is%3Apr+is%3A...). Matrix is set up to let folks go wild and change fundamentals like this; basically every Matrix Spec Change (MSC) is a small fork, which then gets merged into the main spec if it can be proven to work well in the wild.
-
What's the easiest way to use Matrix and add matrix-bridges for Messenger, Instagram, and Telegram etc.
I really hope that Dendrite is getting more traction and maybe there's an OIDC solution for Matrix one day.
-
Can Dendrite run on Kubernetes?
Yes there is an official helm chart. https://github.com/matrix-org/dendrite/releases/tag/helm-dendrite-0.11.2
- suggestions on a self-hosted messaging server with end-to-end encryption for a small family
-
Have any of you used a decentralized messenger before?
This is what the Matrix team is developing Dendrite for. To have a feature-complete yet small server software. But it's still in beta.
-
Matrix 2.0 — Matthew Hodgson talks about Rust in Element client, Rust SDK, IETF MLS, MIMI and more
Pinecone, which is an experimental overlay routing protocol used by P2P Matrix. It and Dendrite are extremely important to P2P Matrix.
-
How to generate keys for program like Dendrite
So I want to setup an instance of Dendrite, a matrix home server. I have a docker-compose set, the yaml file in the correct directory, but I do not understand how to generate the key files. the dockerhub states that I should use this:
-
How should I set up a private chat server/client for my family ?
Dendrite, meanwhile, can be found here. They say it's in beta. I think it's a late Alpha. Dendrite's primary mode is "Monolith"; this will have many of the same scalability/balancing options that Synapse does. However the true benefit to Dendrite as I see it is the "polylith" mode where workers can swap around which worker is the master without any interruption of service. I do not think that Dendrite polylith works yet, but I might be wrong. I'll be looking at running it on a test server in January to see if it's time to upgrade from Synapse (and time to invest in 4-6 SBCs to keep three here and send 3 to 3 of my buddies to make my Matrix even more reliable).
What are some alternatives?
boringtun - Userspace WireGuard® Implementation in Rust
Synapse - Synapse: Matrix homeserver written in Python/Twisted.
set - Package set is a small wrapper around the official reflect package that facilitates loose type conversion and assignment into native Go types.
synapse-admin - Admin console for synapse Matrix homeserver
wireguard-install - WireGuard VPN installer for Linux servers
conduit
goja - ECMAScript/JavaScript engine in pure Go
matrix-docker-ansible-deploy - 🐳 Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker
go - The Go programming language
Telegram-FOSS - Unofficial, FOSS-friendly fork of the original Telegram client for Android
onetun - User space WireGuard port-forward in Rust
Ligase - Ligase is a Golang-based implementation of Matrix homeserver, powered by finogeeks https://www.finogeeks.com/Finchat