yggdrasil-go
innernet
yggdrasil-go | innernet | |
---|---|---|
23 | 60 | |
3,342 | 4,837 | |
1.6% | 0.8% | |
8.5 | 6.3 | |
about 1 month ago | 10 days ago | |
Go | Rust | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
yggdrasil-go
-
Tinc, a GPLv2 mesh routing VPN
> The next version will make it much simpler to deploy isolated networks by using TLS roots to prevent accidental peerings.
Is that PR #1038 [1]? Any info on how to use that feature and whether it works over multicast as well?
I noticed this PR uses SHA-1 for matching fingerprints. SHA-1 has been broken for 13 years now. Is it possible to use something more secure?
> It's also worth noting that Yggdrasil doesn't have the equivalent of "peer exchange" — only directly connected peers would ever find out your public IP address. Yggdrasil will not form new peerings automatically, with the single exception being multicast-discovered nodes on the same LAN.
Right, my worry is that by having a server with a public IPv4 address and Yggdrasil running on an open port (so that my other nodes can connect to it) will allow someone to connect to it (either on purpose or accidentally) and cause my traffic to route over their node(s) and/or the public mesh.
Thanks!
[1] https://github.com/yggdrasil-network/yggdrasil-go/pull/1038
- Yggdrasil
- Release Version 0.4.7 · yggdrasil-network/yggdrasil-go · GitHub
-
Tailscale/golink: A private shortlink service for tailnets
From a purely networking perspective, there are far better solutions than tailscale.
Have a look at full mesh VPNs like:
https://github.com/cjdelisle/cjdns
https://github.com/yggdrasil-network/yggdrasil-go
https://github.com/gsliepen/tinc
https://github.com/costela/wesher
These build actual mesh networks where every node is equal and can serve as a router for other nodes to resolve difficult network topologies (where some nodes might not be connected to the internet, but do have connections to other nodes with an internet connection).
Sending data through multiple routers is also possible. They also deal with nodes disappearing and change routes accordingly.
tailscale (and similar solutions like netbird) still use a bunch of "proxy servers" for that. You can set them up on intermediate nodes, but that have to be dealt with manually (and you get two kinds of nodes).
-
The Iran Firewall: A preliminary report
The only real solution long-term is completely peer-to-peer ad-hoc networking that doesn't depend on BGP.
A few projects are in similar territory but none I've seen are working at the layer of bypassing BGP. Many are just acting as an overlay; which works to an extent. https://github.com/yggdrasil-network/yggdrasil-go
It's probably begging for a different model of the "internet" and where data lives.
My requirements:
1. Offline-first applications that sync via a pub/sub DHT of trusted peers. More details here but basically allows bypassing BGP.
-
Make the Internet Yours Again With an Instant Mesh Network
It seems like you can limit connections to your node with AllowedPublicKeys (ref).
- Was war vor 15 Jahren möglich, aber wäre heute undenkbar?
-
[Fanatical] Mindustry - 24 Hour Star Deal (83% off - $1.00 / £0.79 / €0.79)
at least on the official discord the recommended way if you don’t want to play on a public server is using yggdrasil
- Multiplayer Between Steam Owner/Non-Steam Owners
innernet
- Would we still create Nebula today?
- Ask HN: How would you raise $600k for a boring software co?
-
Tailscale increased free plan user limit form 1 to 3 and device cap to 100 also... unlimited subnets
Innernet is a barebone alternative. https://github.com/tonarino/innernet
-
Tips & Tricks for Productivity with Android E-Ink Devices (Obsidian, Syncthing, Weylus, RustDesk, Termux, KDE Connect, ZeroTier)
Very relatable! At first, I struggled for days trying to make Netmaker or Innernet functional for my personal home server (Raspberry Pi behind multiple routers). But then I stumbled upon ZeroTier, and everything worked seamlessly within a couple of hours. Tailscale was actually the next one on my list because I heard many positive things about it over at r/selfhosted (especially about headscale). However, I did not end up testing it after ZeroTier worked.
- Globally distributed Elixir over Tailscale
-
Dynamic configuration for allowed IPs
Not if you are running wireguard without any management client/server like Netmaker or innernet or any of the many others like them.
-
What free VPS alternatives are good to use?
I use the GCP free instance as my innernet coordination server (Wireguard mesh vpn). Which is extremely low traffic.
-
Tailscale Funnel
Or why not the open source tool innernet? https://github.com/tonarino/innernet
-
Ask HN: Working in a VR Headset
I wonder if this might improve over a more modern transport, if you were using an IPSec VPN.
Wireguard is enabling us to re-think what's possible over a VPN. Here's an example of what I mean. The network stack is based on Wireguard, with https://github.com/tonarino/innernet providing the topology and identity provisioning.
-
Planning to make a video on cool Rust apps focused on the end user. Make recommendations!
Virtual Private Network: Innernet, MASQ
What are some alternatives?
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
Netmaker - Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
cjdns - An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
tailscale - The easiest, most secure way to use WireGuard and 2FA.
mesh-networking - :globe_with_meridians: LEGO blocks for networking, a Python library to help create and test flexible network topologies across real and simulated physical links.
headscale - An open source, self-hosted implementation of the Tailscale control server
PJON - PJON (Padded Jittering Operative Network) is an experimental, arduino-compatible, multi-master, multi-media network protocol.
ZeroTier - A Smart Ethernet Switch for Earth
pinecone - Peer-to-peer overlay routing for the Matrix ecosystem
netbird - Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
frp - A fast reverse proxy to help you expose a local server behind a NAT or firewall to the internet.