ziti-doc
n2n
ziti-doc | n2n | |
---|---|---|
23 | 10 | |
34 | 5,886 | |
- | 1.0% | |
9.5 | 8.2 | |
2 days ago | about 1 month ago | |
HTML | C | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ziti-doc
-
OpenZiti - *everything* you need to implement your own secure, zero trust overlay network
OpenZiti vs BoringProxy has some similarities for sure. The simplest OpenZiti deployment is similar to a boring proxy deployment. The main differences will be that the listening ports "on the network" are going to be from the OpenZiti edge-router which will authenticate before allowing any connection using a strong x509 identity (not a token) and then after that the same identity can be authorized to access one or more services. That's one killer difference to me. There are lots of other things OpenZiti is doing that boringproxy isn't trying to as well. I filed an issue to do a comparison to that some day https://github.com/openziti/ziti-doc/issues/176 thanks for the idea! :)
-
Site-to-Site IPsec VPN with dynamic public address at remote site
Use our open source solution, OpenZiti, and host/manage it all yourself - https://openziti.github.io/
-
Extrovert Wednesday - Telling the World about OpenZiti
You can definitely read more about what OpenZiti is over on the docs page if you're looking for more info about the project https://openziti.github.io/
-
How bad it is ? Security of self-hosted server
If you're interested in it, you can find it over at github - https://openziti.github.io. It's one more thing to setup and maintain so maybe that's a dealbreaker but since this is selfhosted - maybe not ;)
-
How to setup OpenZiti on an OpenWRT device as an alternative to VPNs / private APNs
If you want to go fully open source and self-hosted, use an OpenZiti quickstart - https://openziti.github.io/ - while ignoring steps 1, 2, 3, and 5 ... i.e., step 4 is where you deploy an OpenZiti tunneler on an OpenWRT box.
-
Alternative to manual IP exposing
I not long ago discovered OpenZiti, and to be honest I fell in love with it. I also have a dinamic IP, and I have even some other cases wheren from my place some IoT devices need to find my laptop wherever I may go (I travel a lot).
-
How we use and Secure SaltStack
https://openziti.github.io/ - gives a good intro
-
Help making an Ansible collections
More details: What I'm trying to do is setup a Zero Trust Host Access on my Kubernetes cluster using OpenZiti. Ziti has 4 binaries (controller, router, tunneler and admin console), configuring all these to work together is kinda complex, that's why I thought about making custom modules.
-
Recommended solution secure that will allow my assistant to access a vm in my Azure environment
Probably overkill for your need, but you can give access to your VM without requiring a bastion or VPN, only outbound ports on a NAT gateway using opensource OpenZiti - https://openziti.github.io/. The user would load a client on their device and get access only the the specific resources you define (IP, DNS, port etc). This also means you don't need to assign the IP of the users home (added benefit they can access when not at home).
-
Gaming on the go: How I game remotely and keep my firewall “Perfect Dark”
Create the identity for the Hosting workstation. You can assign as many attributes as you want. Openziti works with an "attribute-enabled role-based access control (ARBAC) model. So, if you have used hashtags, you’re probably familiarized with it.
n2n
-
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
n2n - - Built on nodes and supernodes. GPL-3.0 license. Written in C.
-
n2n: build a private network over the Internet
Repository in Github: n2n
-
Cloud fare tunnels are still the best thing to use when hosting from home?
Check out n2n.
-
How to implement simple remote admin for few OpenWrt routers?
n2n - seems easy and maintained, but need to manually compile own binary
- OmniEdge – an Open source P2P layer 2 VPN infrastructure based on n2n protocol
-
OmniEdge VPN
Apparently it's "based on n2n", so basically they've put a UI on top of this https://github.com/ntop/n2n, made by ntop by the looks of it.
-
Show HN: Weron – A Peer-to-Peer VPN Based on WebRTC Written in Go
> Is what makes this a "P2P" VPN [...] that it supports the group/"community" network behavior?
More or less! Compared to say OpenVPN there is no central server that all traffic is routed through (unless you choose to activate TURN of course, see the `--force-relay` flag), so hosting it is much cheaper as the only public part of the infrastructure is the part that exchanges the candidates ^^ Its pretty close to how n2n[1] does it, but has proper NAT hole punching support due to the WebRTC backend.
> When you do that, are you building a full-connected overlay network [...]
Yes! Its a full mesh; it seems to scale pretty well to a fairly large number of nodes, although I haven't tested it with more than ~100 peers in a single community yet. If the overhead of maintaining all of the connections is too much or peering between nodes in an issue, TURN can help to connect those peers with the rest of the mesh. Orchid looks interesting!
[1] https://github.com/ntop/n2n
-
Needing help finding a direction: Sharing a whole HDD p2p.
Not sure if n2n would work for your setup. Apparently, there's a gui now. I haven't tried it on windows.
-
How to convert your character to NPC mercenaries?
/skin/edge.exe - This is part of the n2n VPN setup which can be found here: https://github.com/ntop/n2n
-
How to SSH into computers over the internet for maintenance?
Otherwise my plan is to use n2n so I don't need to setup a vpn server and n2n also takes care of the nat firewall. I want to wrap everything up into two shell scrips, one to install the required software, configure everything and start the session and of course one to shut everything down again.
What are some alternatives?
ZeroTier - A Smart Ethernet Switch for Earth
AdGuard-WireGuard-Unbound-Cloudflare - The ultimate self-hosted network security guide ─ Protection | Privacy | Performance for your network 24/7 Accessible anywhere [Moved to: https://github.com/trinib/AdGuard-WireGuard-Unbound-DNScrypt]
parsec-sdk - Low latency, peer-to-peer, interactive streaming.
boundary-reference-architecture - Example reference architecture for a high availability Boundary deployment on AWS.
OpenVPN - OpenVPN is an open source VPN daemon
docker-adguard-unbound-wireguard - This solution is a combination of WireGuard, AdGuard Home, and Unbound in a docker-compose project with the intent of enabling users to quickly and easily create and deploy a personally managed full or split-tunnel WireGuard VPN with ad blocking capabilities (via AdGuard), and DNS caching with additional privacy options (via Unbound).
SoftEther - Cross-platform multi-protocol VPN software. Pull requests are welcome. The stable version is available at https://github.com/SoftEtherVPN/SoftEtherVPN_Stable.
Nebula - A scalable overlay networking tool with a focus on performance, simplicity and security
gon2n - Go bindings, management daemons and CLIs for n2n edges and supernodes.
ziti - The parent project for OpenZiti. Here you will find the executables for a fully zero trust, application embedded, programmable network @OpenZiti
weron - Overlay networks based on WebRTC.