SaaSHub helps you find the best software and product alternatives Learn more →
Nebula Alternatives
Similar projects and alternatives to Nebula
-
-
headscale
An open source, self-hosted implementation of the Tailscale control server
-
InfluxDB
Access the most powerful time series database as a service. Ingest, store, & analyze all types of time series data in a fully-managed, purpose-built database. Keep data forever with low-cost storage and superior data compression.
-
-
Netmaker
Netmaker makes networks with WireGuard. Netmaker automates fast, secure, and distributed virtual networks.
-
-
-
netbird
Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
-
SonarLint
Clean code begins in your IDE with SonarLint. Up your coding game and discover issues early. SonarLint is a free plugin that helps you find & fix bugs and security issues from the moment you start writing code. Install from your favorite IDE marketplace today.
-
yggdrasil-go
An experiment in scalable routing as an encrypted IPv6 overlay network
-
firezone
Open-source VPN server and egress firewall for Linux built on WireGuard. Firezone is easy to set up (all dependencies are bundled thanks to Chef Omnibus), secure, performant, and self hostable.
-
-
-
-
-
vaultwarden
Unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs
-
-
-
cjdns
An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
-
-
WireGuardMeshes
A text repo to feature-track all the WireGuard mesh software
-
garage
(Mirror) S3-compatible object store for small self-hosted geo-distributed deployments. Main repo: https://git.deuxfleurs.fr/Deuxfleurs/garage (by deuxfleurs-org)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Nebula reviews and mentions
-
Learning Azure - any practical use cases?
Deploy a Nebula server and connect your nodes to it
-
Alternatives to ZeroTier and TailScale?
I havent been able to try it out but nebula i think made by the slack Team seems to be another Option. https://github.com/slackhq/nebula
-
Globally Distributed Elixir over Tailscale
I believe this is is very similar to the intended use case of Nebula. Might be easier if you're interested in a bare-bones and totally self-hosted option. https://github.com/slackhq/nebula
Nebula implemented Relay support (1) last year although it is marked experimental.
-
How NAT traversal works
there's also Nebula! https://github.com/slackhq/nebula
-
Best Mesh VPN
Nebula, Nebula seems like a great option, using a faster than wireguard protocol, and it supports most of the clients that I would need. But it seems slightly more complicated to set up and it is geared more towards commercial use cases. I also don't know the state of DNS in it (and how experimental it seems), I have PiHole running on the server and would like to be able to use it outside the network.
-
Most used selfhosted services in 2022?
ZeroTier (https://github.com/zerotier) for a not self-hosted SDN/mesh and Nebula (https://github.com/slackhq/nebula) for a self-hosted SDN/mesh.
-
Tailscale/golink: A private shortlink service for tailnets
nebula[0] may be interesting; you can allow list connectivity for specific groups, all burned into the cert used to join the network. It uses some NAT hole punching orchestration to accomplish connectivity between hosts without opening ports.
The main painful thing I've found has been cert management. PKI, as usual, is not a solved problem.
I've managed to do some fun stuff using salt + nebula on the hobby side.
- Simple, useful apps that you self-host?
-
Passwordless Authentication – Access Your Bitwarden Web Vault Without a Password
>I've been meaning to look into this with wireguard, but I'm having trouble searching for/finding how to do this. Is "bastion host" what I'd want? Also is there a way to ensure the VPS cannot access the network as well, and just tunnels it essentially?
First, yes a search phrase like that should get you the right terms, though there isn't anything inherently special about it. If multiple systems are connected to one system with wireguard giving them all access to a given subnet is straight forward. As far as the VPS, it can indeed access that subnet too, since it's acting as part of the subnet, but you can use normal firewall rules on the far side internally to control what can talk to what and how. And in this kind of specific instance the WG is more about controller public facing surface area, the Bitwarden/Vaultwarden traffic in flight is itself encrypted.
Second though, having said all that I think if you worried about the VPS bit (or even if not) you should take a look at the Nebula SDN [0, 1] instead. It's built on the Noise encryption framework as well. There, the fixed IP node (the "Lighthouse") primarily acts to let other nodes know their mutual addresses, and they then attempt to form a direct link with no bouncing through a bastion, it's a real mesh. This generally works even if both are NAT'd, and if not it's transparent fallback and still encrypted between them. Depending on distance between nodes this can be a lot lower latency as well. With Nebula you establish an internal CA (super easy built-in tool for it) and that doesn't (and absolutely shouldn't) live on the lighthouse.
I'm fortunate enough to have fixed IPs available to me at home and office and have tended to use WG a lot just because it's had more advanced support and performance in constrained environments for me (kernel support in Linux and now BSDs). Nebula has been super slick though and I've been using it more and more. It makes all this really easy.
----
0: https://github.com/slackhq/nebula
1: https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-o... (note 3 years old, there are now Android/iOS clients as well and things are further refined)
-
A note from our sponsor - #<SponsorshipServiceOld:0x00007f160d380ca0>
www.saashub.com | 22 Mar 2023
Stats
slackhq/nebula is an open source project licensed under MIT License which is an OSI approved license.