geniousphp/autowire: Automatically configure Wireguard interfaces in
distributed system. It supports Consul as backend.
https://github.com/geniousphp/autowire
- This project is at an early stage development and is not production
ready even though we're running it in our production.
- zero configuration: automatically configure WireGuard. If you're
running a Consul cluster and willing to configure WireGuard as VPN
solution
- Autowire leverages distributed locking of Consul to ensure that
picked IP address is not used by any other WireGuard peer. This method
is described in the leader election guide.
- Autowire to automatically reconfigure WireGuard Peers when nodes
join or leave the Consul cluster
- Autowire uses Consul KV to store WireGuard interface and Peers configurations.
from
https://twitter.com/RealGophersShip/status/1085924076101734400
Built with Go @RealGophersShip
geniousphp/autowire (0.1.2): Automatically configure Wireguard
interfaces in distributed system. It supports Consul as backend
---
Gawen/WireHub: Simple, small, peer-to-peer, decentralized, extensible VPN
https://github.com/Gawen/WireHub
WireHub (in a shell, wh) is a simple, small, peer-to-peer,
decentralized, extensible VPN. It uses WireGuard tunnels and provides
distributed peer discovery & routing capabilities, NAT trasversal,
extendable name resolving, ...
It is written in C and Lua and is <10KLOC.
⚠️ Not ready for production! This is still a work-in-progress. It
still requires some work to be clean and secure. The current code is
provided for testing only.
Features
Simple network description: the minimal configuration of a network is
a list of the public key, private IP and hostname for each member.
Cryptographic network addresses: the network address of a peer is - or
derived from - a Curve25519 public key.
Decentralized discovery: WireHub peers form a Kademilia DHT network
which is the by-default discovery mechanism to find new peers. Sybil
attack is mitigated with a configurable Proof-of-Work parameter;
Peer-to-Peer and relayed communication: WireHub goes through NATs,
using UPnP IGD to map new ports on compatible routers, or using UDP
Hole Punching techniques. If a P2P communication cannot be
established, network traffic is relayed through trusted relayed
servers or peers from the community of WireHub nodes.
from
Frank Denis @jedisct1 23 Dec 2018
https://twitter.com/jedisct1/status/1076616635748925440
WireHub is a simple, small, peer-to-peer, decentralized, extensible
VPN. It uses WireGuard tunnels and provides distributed peer discovery
& routing capabilities, NAT traversal, flexible name resolution, and
more.