netbird/README.md

205 lines
9.6 KiB
Markdown
Raw Normal View History

2021-05-06 13:53:58 +02:00
# Wiretrustee
A WireGuard®-based mesh network that connects your devices into a single private network.
2021-08-20 13:24:54 +02:00
**Note**: The `main` branch may be in an *unstable or even broken state* during development. For stable versions, see [releases](https://github.com/wiretrustee/wiretrustee/releases).
2021-08-20 13:23:57 +02:00
2021-09-12 20:38:26 +02:00
Hosted demo version:
[https://beta.wiretrustee.com/](https://beta.wiretrustee.com/peers).
The number of peers is limited to 15.
2021-09-03 11:18:45 +02:00
2021-09-13 08:50:15 +02:00
Please don't use the hosted demonstration version for production purposes. We appreciate your usage of the demonstration version and will love to hear your feedback, please reach out via Issue or [Slack](https://wiretrustee.slack.com/).
2021-09-03 11:18:17 +02:00
2021-09-03 15:33:49 +02:00
[UI Dashboard Repo](https://github.com/wiretrustee/wiretrustee-dashboard)
2021-05-06 13:57:21 +02:00
### Why using Wiretrustee?
2021-05-06 13:53:58 +02:00
2021-05-06 14:40:51 +02:00
* Connect multiple devices to each other via a secure peer-to-peer Wireguard VPN tunnel. At home, the office, or anywhere else.
* No need to open ports and expose public IPs on the device, routers etc.
* Uses Kernel Wireguard module if available.
* Automatic network change detection. When a new peer joins the network others are notified and keys are exchanged automatically.
2021-05-06 14:40:51 +02:00
* Automatically reconnects in case of network failures or switches.
2021-05-06 13:57:21 +02:00
* Automatic NAT traversal.
2021-05-06 14:40:51 +02:00
* Relay server fallback in case of an unsuccessful peer-to-peer connection.
2021-05-06 13:57:21 +02:00
* Private key never leaves your device.
* Automatic IP address management.
* Intuitive UI Dashboard.
2021-05-06 13:57:21 +02:00
* Works on ARM devices (e.g. Raspberry Pi).
* Open-source (including Management Service)
### Secure peer-to-peer VPN in minutes
![animation](docs/media/peers.gif)
2021-05-06 13:53:58 +02:00
2021-05-06 13:57:21 +02:00
### A bit on Wiretrustee internals
* Wiretrustee features a Management Service that offers peer IP management and network updates distribution (e.g. when new peer joins the network).
2021-05-06 14:40:51 +02:00
* Wiretrustee uses WebRTC ICE implemented in [pion/ice library](https://github.com/pion/ice) to discover connection candidates when establishing a peer-to-peer connection between devices.
* Peers negotiate connection through [Signal Service](signal/).
* Signal Service uses public Wireguard keys to route messages between peers.
Contents of the messages sent between peers through the signaling server are encrypted with Wireguard keys, making it impossible to inspect them.
2021-05-15 08:58:59 +02:00
* Occasionally, the NAT-traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT).
When this occurs the system falls back to relay server (TURN), and a secure Wireguard tunnel is established via TURN server.
2021-05-06 13:53:58 +02:00
[Coturn](https://github.com/coturn/coturn) is the one that has been successfully used for STUN and TURN in Wiretrustee setups.
2021-05-06 13:57:21 +02:00
2021-06-02 21:30:19 +02:00
### Product Roadmap
2021-06-02 21:31:37 +02:00
- [Public Roadmap](https://github.com/wiretrustee/wiretrustee/projects/2)
2021-06-02 21:30:19 +02:00
- [Public Roadmap Progress Tracking](https://github.com/wiretrustee/wiretrustee/projects/1)
### Getting started
2021-09-22 14:18:48 +02:00
See [Docs](docs/README.md) for managed and self-hosting guides.
### Client Installation
#### Linux
2021-05-06 14:40:51 +02:00
1. Checkout Wiretrustee [releases](https://github.com/wiretrustee/wiretrustee/releases)
2021-05-30 12:35:18 +02:00
2. Download the latest release (**Switch VERSION to the latest**):
**Debian packages**
2021-05-06 13:53:58 +02:00
```shell
wget https://github.com/wiretrustee/wiretrustee/releases/download/v<VERSION>/wiretrustee_<VERSION>_linux_amd64.deb
2021-05-06 13:53:58 +02:00
```
3. Install the package
```shell
sudo dpkg -i wiretrustee_<VERSION>_linux_amd64.deb
```
**Fedora/Centos packages**
```shell
wget https://github.com/wiretrustee/wiretrustee/releases/download/v<VERSION>/wiretrustee_<VERSION>_linux_amd64.rpm
```
3. Install the package
```shell
sudo rpm -i wiretrustee_<VERSION>_linux_amd64.rpm
```
#### MACOS
**Brew install**
1. Download and install Brew at https://brew.sh/
2. Install the client
```shell
brew install wiretrustee/client/wiretrustee
```
2021-09-06 16:12:57 +02:00
**Installation from binary**
1. Checkout Wiretrustee [releases](https://github.com/wiretrustee/wiretrustee/releases/latest)
2021-05-30 12:35:18 +02:00
2. Download the latest release (**Switch VERSION to the latest**):
```shell
curl -o ./wiretrustee_<VERSION>_darwin_amd64.tar.gz https://github.com/wiretrustee/wiretrustee/releases/download/v<VERSION>/wiretrustee_<VERSION>_darwin_amd64.tar.gz
```
3. Decompress
```shell
tar xcf ./wiretrustee_<VERSION>_darwin_amd64.tar.gz
sudo mv wiretrusee /usr/local/bin/wiretrustee
chmod +x /usr/local/bin/wiretrustee
2021-05-06 13:53:58 +02:00
```
After that you may need to add /usr/local/bin in your MAC's PATH environment variable:
````shell
export PATH=$PATH:/usr/local/bin
````
2021-06-23 01:38:44 +02:00
#### Windows
1. Checkout Wiretrustee [releases](https://github.com/wiretrustee/wiretrustee/releases/latest)
2. Download the latest Windows release installer ```wiretrustee_installer_<VERSION>_windows_amd64.exe``` (**Switch VERSION to the latest**):
3. Proceed with installation steps
4. This will install the client in the C:\\Program Files\\Wiretrustee and add the client service
5. After installing you can follow the [Client Configuration](#Client-Configuration) steps.
> To uninstall the client and service, you can use Add/Remove programs
2021-06-23 01:38:44 +02:00
### Client Configuration
1. Login to the Management Service. You need to have a `setup key` in hand (see ).
2021-06-23 01:38:44 +02:00
For **Unix** systems:
2021-05-06 13:53:58 +02:00
```shell
sudo wiretrustee login --setup-key <SETUP KEY>
2021-05-06 13:53:58 +02:00
```
2021-06-23 01:38:44 +02:00
For **Windows** systems:
```shell
.\wiretrustee.exe login --setup-key <SETUP KEY>
2021-06-23 01:38:44 +02:00
```
2021-05-06 13:53:58 +02:00
Alternatively, if you are hosting your own Management Service provide `--management-url` property pointing to your Management Service:
```shell
sudo wiretrustee login --setup-key <SETUP KEY> --management-url https://localhost:33073
2021-05-06 13:53:58 +02:00
```
You could also omit `--setup-key` property. In this case the tool will prompt it the key.
2. Start Wiretrustee:
For **MACOS** you will just start the service:
````shell
sudo wiretrustee up
# or
sudo wiretrustee up & # to run it in background
````
For **Linux** systems:
```shell
sudo systemctl restart wiretrustee.service
sudo systemctl status wiretrustee.service
```
2021-06-23 01:38:44 +02:00
For **Windows** systems:
```shell
.\wiretrustee.exe service start
```
> You may need to run Powershell as Administrator
3. Check your IP:
For **MACOS** you will just start the service:
````shell
sudo ipconfig getifaddr utun100
````
For **Linux** systems:
```shell
ip addr show wt0
```
For **Windows** systems:
```shell
netsh interface ip show config name="wt0"
```
4. Repeat on other machines.
2021-09-13 07:58:52 +02:00
### Running Dashboard, Management, Signal and Coturn
2021-09-07 10:38:07 +02:00
Wiretrustee uses [Auth0](https://auth0.com) for user authentication and authorization, therefore you will need to create a free account
2021-09-13 07:58:52 +02:00
and configure Auth0 variables in the compose file (dashboard) and in the management config file.
2021-09-13 08:06:28 +02:00
We chose Auth0 to "outsource" the user management part of our platform because we believe that implementing a proper user auth is not a trivial task and requires significant amount of time to make it right. We focused on connectivity instead.
It is worth mentioning that dependency to Auth0 is the only one that cannot be self-hosted.
Configuring Wiretrustee Auth0 integration:
- check [How to run](https://github.com/wiretrustee/wiretrustee-dashboard#how-to-run) to obtain Auth0 environment variables for UI Dashboard
2021-09-13 07:58:52 +02:00
- set these variables in the [environment section of the docker-compose file](https://github.com/wiretrustee/wiretrustee/blob/main/infrastructure_files/docker-compose.yml)
- check [Auth0 Golang API Guide](https://auth0.com/docs/quickstart/backend/golang) to obtain ```AuthIssuer```, ```AuthAudience```, and ```AuthKeysLocation```
- set these properties in the [management config files](https://github.com/wiretrustee/wiretrustee/blob/main/infrastructure_files/management.json#L33)
2021-09-07 10:38:07 +02:00
2021-09-13 07:58:52 +02:00
Under infrastructure_files we have a docker-compose example to run Dashboard, Wiretrustee Management and Signal services, plus an instance of [Coturn](https://github.com/coturn/coturn), it also provides a turnserver.conf file as a simple example of Coturn configuration.
2021-05-30 12:35:18 +02:00
You can edit the turnserver.conf file and change its Realm setting (defaults to wiretrustee.com) to your own domain and user setting (defaults to username1:password1) to **proper credentials**.
The example is set to use the official images from Wiretrustee and Coturn, you can find our documentation to run the signal server in docker in [Running the Signal service](#running-the-signal-service), the management in [Management](./management/README.md), and the Coturn official documentation [here](https://hub.docker.com/r/coturn/coturn).
2021-05-30 09:29:30 +02:00
> Run Coturn at your own risk, we are just providing an example, be sure to follow security best practices and to configure proper credentials as this service can be exploited and you may face large data transfer charges.
Also, if you have an SSL certificate for Coturn, you can modify the docker-compose.yml file to point to its files in your host machine, then switch the domainname to your own SSL domain. If you don't already have an SSL certificate, you can follow [Certbot's](https://certbot.eff.org/docs/intro.html) official documentation
to generate one from [Lets Encrypt](https://letsencrypt.org/), or, we found that the example provided by [BigBlueButton](https://docs.bigbluebutton.org/2.2/setup-turn-server.html#generating-tls-certificates) covers the basics to configure Coturn with Let's Encrypt certs.
> The Wiretrustee Management service can generate and maintain the certificates automatically, all you need to do is run the servicein a host with a public IP, configure a valid DNS record pointing to that IP and uncomment the 443 ports and command lines in the docker-compose.yml file.
Simple docker-composer execution:
````shell
cd infrastructure_files
docker-compose up -d
````
You can check logs by running:
````shell
cd infrastructure_files
docker-compose logs signal
docker-compose logs management
docker-compose logs coturn
````
If you need to stop the services, run the following:
````shell
cd infrastructure_files
docker-compose down
````
2021-06-02 21:30:19 +02:00
### Legal
[WireGuard](https://wireguard.com/) is a registered trademark of Jason A. Donenfeld.