top | item 37287155

Netbirdio/netbird: Connect devices into a single private WireGuard mesh network

202 points| rcarmo | 2 years ago |github.com

36 comments

order
[+] thejosh|2 years ago|reply
Fantastic! Love seeing more work like this go into Wireguard.

I've been using headscale (self-hosted tailscale) for personal use, but having only one machine not running Linux on the network is a bit silly, as Tailscale is userspace, and Wireguard uses very little CPU on Linux.

[+] j45|2 years ago|reply
I recently switched to Tailscale, and it was magic.

It's very easy to recommend it to any non-tech user as well who wants to "connect to home". Well worth paying for in those cases.

But, Tailscale had so much magic, that I didn't want to be solely dependant on it, remembering how Docker is turning out.

Finding Headscale was a great discovery, and nice that the Tailscale clients already maintained can connect to a separate open-source project that lets you run your own server.

[+] animeshjain|2 years ago|reply
can you please explain, why do you need a non-Linux machine on the network?
[+] tarasglek|2 years ago|reply
I was having weird perf issues on openwrt with tailscaled being in the network path.

With netbird + direct mode, netbird is only there during connection [re-]establishment. I get much better throughput/latency with netbird on both embedded openwrt and desktop platforms.

But yeah, this netbird thing is seriously buggy. For any sort of multi-user setups, I always recommend tailscale, it's much more robust.

[+] braginini|2 years ago|reply
Hey!

Thank you for the feedback! Could you please elaborate on the issues that you are facing? We have quite a few multi-user cases both on the managed and self-hosted version with no issues.

Thank you!

[+] wilhil|2 years ago|reply
We are/were an early adopter.

It's very promising, but, seriously buggy as of now - DNS keeps randomly dropping/leaking unreliably which was causing us issues and random drops to private resources along with a few other issues.

I think we switched to tailscale (I don't look after that side)... it's still a cool solution and think we will be looking at it again in the future.

[+] fer|2 years ago|reply
> DNS keeps randomly dropping/leaking

tbh, I always assumed it wasn't implemented yet; it never worked for me

[+] yolo4553|2 years ago|reply
The demo video shows only IPv4, a quick search on the readme does not mention IPv6 at all. The website is served (at least to me) only via IPv4.

Is IPv6 supported? Does the controlplane work on IPv6 only networks=

[+] MayeulC|2 years ago|reply
Related, from a few days ago: netmaker https://news.ycombinator.com/item?id=37142388

The top comment also mentions a few alternatives. Personally, I use raw wireguard for one-off 1:1 links between servers, headscale+tailscale between some of my devices, and I've toyed with yggdrasil to obtain a roaming public IP, as well as LAN-first connectivity.

[+] webcoon|2 years ago|reply
This looks awesome! I use a paid VPN mesh service called Tailscale to build k8s clusters which can span across cloud and home setups, but was always frustrated that the Tailscale server component is closed source. Netbird seems to do pretty much the same thing, so maybe I can switch over to it once it's stable enough.
[+] methou|2 years ago|reply
I was kinda expecting some ecmp based on the name (bird). Routing in mesh networking can be somewhat very .... Fun
[+] fpinna83|2 years ago|reply
Amazing Worked very well to access my k8s private cluster
[+] nvllsvm|2 years ago|reply
Looks promising, but the Android app is closed source. Hard pass until it's source code is released under a FOSS license and buildable+usable without analytics nor prioprietary libraries.

https://github.com/netbirdio/netbird/issues/1109

[+] braginini|2 years ago|reply
Maintainer here.

NetBird is one of these p2p private networking solutions that is truly open-source. Actually, I haven't seen any comparable yet.

We haven't yet published the Android code simply because we have coding standards to meet before we open the code to the public. This is mainly about the code structure and tests. We are working on it.

We are a tiny team of engineers with a vision to make private networking simple and secure, which is challenging. Therefore, we should prioritize some things over others. But we are getting there! With your support :)

[+] j45|2 years ago|reply
It's still encouraging to see this space get active development. Hopefully all the clients can be freely available.