by carride on 10/13/23, 3:12 PM with 39 comments
by lenova on 10/13/23, 9:38 PM
Open-source projects not-quite-prod-ready:
- WebMesh: Golang, decentralized nodes https://github.com/webmeshproj
- InnerNet: Rust, with subnet ACLs https://github.com/tonarino/innernet
- Wesher: Golang, simple mesh with pre-shared key https://github.com/costela/wesher
- Wiresmith: Rust, auto-configs clients into a mesh https://github.com/svenstaro/wiresmith
Open source projects with company-backed SaaS offerings:
- Netbird: Golang, full-fledged solution (desktop clients, DNS, SSO, STUN/TURN, etc) https://github.com/netbirdio/netbird
- Netmaker: Golang, full-fledge solution https://github.com/gravitl/netmaker
Honorable mention:
- SuperHighway84 - more of a Usenet-inspired darknet, but I love the concept + the author's personal website: https://github.com/mrusme/superhighway84 https://xn--gckvb8fzb.com/superhighway84
by dave78 on 10/13/23, 3:59 PM
Tailscale gets most of the attention on HN, and I'm sure that it's a wonderful product too, but Nebula is a nice, simple, "do one thing well" product.
by apitman on 10/13/23, 7:51 PM
I certainly have my gripes about the closed nature of Slack itself, in particular using a closed protocol when the model is clearly "federated" between multiple servers internally. That said, the contribution of something on the scale and quality of Nebula back to the open source community is hard to argue with.
[0]: https://github.com/anderspitman/awesome-tunneling#overlay-ne...
by jdoss on 10/13/23, 7:13 PM
They added in tag support [1] a few months ago which I have yet to try out but it looks very promising. The defined.net API [2] is very easy to use for host management and I am able to auto enroll new hosts and remove them after I deprovision them.
I also made a GitHub Action [3] which I use to allow for my Actions to communicate with resources on my overlay network.
[1] https://docs.defined.net/guides/creating-firewalls-using-rol...
by rhuber on 10/13/23, 3:58 PM
Thanks for sharing this on HN! I'll keep an eye on the comments and try to answer questions that come up.
by linsomniac on 10/14/23, 1:07 AM
I'll be honest: If I could do it again, I'd use Nebula. The primary issues I have are that Tailscale has a lot of magic which I can see some cases it being nice, but it does make some of the routing and firewalling I'm doing on machines, and in particular the thing where it sets up Tailscale routes to network routes as higher priority than local interfaces leads to problems in my environment.
The other thing is just Headscale itself, it works quite well but does have some rough edges. It's entirely too easy to kill your whole mesh by flubbing an ACL, and currently restarting headscale to pick up ACL changes is taking 3-5 minutes.
I do, however, really prefer the Tailscale ACLs over Nebula's.
One thing that led me to Tailscale was the ability for it to relay around network routing problems, and it looks like Nebula has added that since I started. Around the time I was evaluating Nebula vs. Tailscale we had a ~1 day network routing issue where some of my users were blackhole routed in Comcast, and Tailscale just worked around it.
by FL410 on 10/13/23, 4:21 PM
by jiveturkey on 10/14/23, 1:05 AM
by woleium on 10/13/23, 7:02 PM
by BatgnomeDwarf on 10/14/23, 1:52 AM