Show HN: Pangolin: Open-source identity-based VPN (Twingate/Zscaler alternative)
81 points| miloschwartz | 14 days ago |github.com
It’s different than existing approaches: mesh VPNs (Tailscale, ZeroTier, etc.) create flat overlay networks where ACL and IP space management becomes complex at scale and every device can talk to every other device, while corporate ZTNA solutions (Zscaler, Cato, Netskope etc.) are closed-source and add latency by forcing traffic through a central server.
Pangolin takes a resource-centric approach. You deploy lightweight connectors that bridge to specific resources (private web apps, SSH, databases, CIDR ranges). Admins delegate resource-access to specific users and roles. It uses WireGuard with NAT hole-punching for peer-to-peer connections and traffic goes directly between the user and connector instead of through a central server. It supports native clients (Mac/Windows/Linux/iOS/Android) plus identity-aware, browser-based access when a client isn’t required.
Pangolin has a cloud and is optionally self-hosted. The Community Edition is AGPLv3. The Enterprise Edition is also open-source under the commercial license which enables free personal/small business use.
Everything, from the server to the clients, is fully open-source and you can even self-host the whole stack. We’d love to hear what you think and I'm happy to answer any questions!
apitman|14 days ago
Pangolin has quickly risen almost to the top since being released. It's very well loved by /r/selfhosted.
miloschwartz|14 days ago
oschwartz10612|14 days ago
mrbluecoat|14 days ago
Cluelessidoit|11 days ago
mrsssnake|14 days ago
Open Source can be pair or commercial. But the license of these software Enterprise Edition, called "Fossorial Commercial License", is not Open Source. You tell who and how can use the software after the share/sell and call it Open Source.
The main site also advertises "Self Host: Enterprise Edition" as being "100% Open Source" which is simply not true and false advertising.
miloschwartz|14 days ago
Ms-J|14 days ago
tamimio|14 days ago
maxibenner|14 days ago
lurking_swe|12 days ago
Last time i looked into it i saw zero information in the docs about network performance and what to expect. Which was surprising.
jackhalford|14 days ago
ottah|13 days ago
jackhalford|14 days ago
Also weren’t some feature gated behind the cloud version? An appeal for this to replace cloudflare tunnels and tailscale funnel is the _fully_ opensource aspect
miloschwartz|14 days ago
The tunneled reverse proxy aspect comes in handy when trying to expose internal apps on a network behind a hard NAT where ports can't be opened and a public IP address isn't available (like CGNAT).
Pangolin is also a VPN like Tailscale/Twingate/etc, so you can access non http resources via a direct connection via WireGuard and NAT traversal.
gz5|14 days ago
These are differentiating from most VPN and zero trust:
+ fully self-hostable open source
+ avoid ACL complexity (default closed architecture)
+ sovereign identity-based
OpenZiti is similar in those – how do you compare and contrast the two since very few others share those differentiators (I am an OZ maintainer)?
unknown|14 days ago
[deleted]
sureglymop|13 days ago
oschwartz10612|13 days ago
jauntywundrkind|14 days ago
oschwartz10612|14 days ago
vasilzhigilei|14 days ago
miloschwartz|14 days ago
RIMR|11 days ago
Tailscale has LONG used Pangolins as a mascot (https://tailscale.com/blog/network-pangolins). They even run a "Pangolin Enthusiast" website (https://tailandscales.com/) that is essentially a demo site for their tutorials. This is an animal with a tail and scales! The branding is very good.
You clearly chose this name to deliberately create brand confusion with Tailscale, and to derail some of their marketing and community branding in your favor. That's scummy behavior by developers who don't have anything to offer but a copy of someone else's work.
If am going to choose between Tailscale, and a project opportunistically attempting to impersonate Tailscale, why would I ever choose the scummy impersonator?
LtdJorge|14 days ago
miloschwartz|14 days ago
cranberryturkey|10 days ago
The NAT hole-punching with WireGuard for P2P connections is interesting. Do you handle cases where both sides are behind symmetric NATs? That's historically been the hardest case for hole-punching, and most solutions end up falling back to relay servers anyway (which defeats the purpose of avoiding centralized traffic).
Also curious about the connector deployment model — is it one connector per resource, or can a single connector bridge multiple resources in the same network segment?