Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Go to file
Yury Gargay e37a337164
Add gosec linter (#1342)
This PR adds `gosec` linter with the following checks disabled:

- G102: Bind to all interfaces
- G107: Url provided to HTTP request as taint input
- G112: Potential slowloris attack
- G114: Use of net/http serve function that has no support for setting timeouts
- G204: Audit use of command execution
- G401: Detect the usage of DES, RC4, MD5 or SHA1
- G402: Look for bad TLS connection settings
- G404: Insecure random number source (rand)
- G501: Import blocklist: crypto/md5
- G505: Import blocklist: crypto/sha1

We have complaints related to the checks above. They have to be addressed separately.
2023-12-04 13:34:06 +01:00
.devcontainer Extend devcontainer with dind and go features (#1292) 2023-11-07 11:14:07 +01:00
.github Update signing pipelines to version 0.0.10 (#1329) 2023-11-24 14:27:40 +01:00
base62 Update GitHub Actions and Enhance golangci-lint (#1075) 2023-09-04 17:03:44 +02:00
client Add gosec linter (#1342) 2023-12-04 13:34:06 +01:00
dns Prepare regexps on compile time (#1327) 2023-11-27 13:01:00 +01:00
docs/media Update README.md (#524) 2022-10-22 16:19:16 +02:00
encryption fix some typo spotted with codespell (#1278) 2023-11-01 17:11:16 +01:00
formatter Mobile (#735) 2023-03-17 10:37:27 +01:00
iface Add gosec linter (#1342) 2023-12-04 13:34:06 +01:00
infrastructure_files Add codespell job (#1281) 2023-11-07 13:37:57 +01:00
management Add gosec linter (#1342) 2023-12-04 13:34:06 +01:00
release_files Add systemd .service files (#1316) (#1318) 2023-11-23 20:15:07 +01:00
route Implement SQLite Store using gorm and relational approach (#1065) 2023-10-12 15:42:36 +02:00
sharedsock Add gocritic linter (#1324) 2023-11-27 16:40:02 +01:00
signal Add gocritic linter (#1324) 2023-11-27 16:40:02 +01:00
util Add gocritic linter (#1324) 2023-11-27 16:40:02 +01:00
version Prepare regexps on compile time (#1327) 2023-11-27 13:01:00 +01:00
.gitattributes Run linter action on MacOS and Windows (#1198) 2023-10-07 21:45:46 +02:00
.gitignore Add basic support of devcontainer (#1280) 2023-11-06 11:22:39 +01:00
.golangci.yaml Add gosec linter (#1342) 2023-12-04 13:34:06 +01:00
.goreleaser_ui_darwin.yaml Add version info command to signal server (#739) 2023-03-15 07:54:51 +01:00
.goreleaser_ui.yaml Feature/update check (#1232) 2023-10-30 10:32:48 +01:00
.goreleaser.yaml Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
AUTHORS chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
CODE_OF_CONDUCT.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
CONTRIBUTING.md Add client UI shortcut links for standard users in Windows (#1323) 2023-11-21 20:02:16 +03:00
CONTRIBUTOR_LICENSE_AGREEMENT.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
go.mod Bump google.golang.org/grpc from 1.55.0 to 1.56.3 (#1252) 2023-11-03 14:45:50 +01:00
go.sum Bump google.golang.org/grpc from 1.55.0 to 1.56.3 (#1252) 2023-11-03 14:45:50 +01:00
LICENSE chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
README.md docs: change get started link (#1098) 2023-08-21 09:11:52 +02:00
SECURITY.md Add security policy file (#600) 2022-12-02 13:54:22 +01:00

🐣 New Release! Self-hosting in under 5 min. Learn more


Start using NetBird at netbird.io
See Documentation
Join our Slack channel


NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single platform, making it easy to create secure private networks for your organization or home.

Connect. NetBird creates a WireGuard-based overlay network that automatically connects your machines over an encrypted tunnel, leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Secure. NetBird enables secure remote access by applying granular access policies, while allowing you to manage them intuitively from a single place. Works universally on any infrastructure.

Secure peer-to-peer VPN with SSO and MFA in minutes

https://user-images.githubusercontent.com/700848/197345890-2e2cded5-7b7a-436f-a444-94e80dd24f46.mov

Key features

Connectivity Management Automation Platforms
  • - [x] Kernel WireGuard
  • - [x] Linux
  • - [x] Peer-to-peer connections
  • - [x] Auto peer discovery and configuration
  • - [x] Mac
  • - [x] Peer-to-peer encryption
  • - [x] Windows
  • - [x] Connection relay fallback
  • - [x] IdP groups sync with JWT
  • - [x] Android
  • - [ ] iOS
  • - [x] NAT traversal with BPF
  • - [x] Docker
  • - [x] OpenWRT
  • - [x] SSH access management

Quickstart with NetBird Cloud

Quickstart with self-hosted NetBird

This is the quickest way to try self-hosted NetBird. It should take around 5 minutes to get started if you already have a public domain and a VM. Follow the Advanced guide with a custom identity provider for installations with different IDPs.

Infrastructure requirements:

  • A Linux VM with at least 1CPU and 2GB of memory.
  • The VM should be publicly accessible on TCP ports 80 and 443 and UDP ports: 3478, 49152-65535.
  • Public domain name pointing to the VM.

Software requirements:

  • Docker installed on the VM with the docker compose plugin (Docker installation guide) or docker with docker-compose in version 2 or higher.
  • jq installed. In most distributions Usually available in the official repositories and can be installed with sudo apt install jq or sudo yum install jq
  • curl installed. Usually available in the official repositories and can be installed with sudo apt install curl or sudo yum install curl

Steps

  • Download and run the installation script:
export NETBIRD_DOMAIN=netbird.example.com; curl -fsSL https://github.com/netbirdio/netbird/releases/latest/download/getting-started-with-zitadel.sh | bash
  • Once finished, you can manage the resources via docker-compose

A bit on NetBird internals

  • Every machine in the network runs NetBird Agent (or Client) that manages WireGuard.
  • Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers).
  • NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
  • Connection candidates are discovered with a help of STUN servers.
  • Agents negotiate a connection through Signal Service passing p2p encrypted messages with candidates.
  • Sometimes the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT) and p2p connection isn't possible. When this occurs the system falls back to a relay server called TURN, and a secure WireGuard tunnel is established via the TURN server.

Coturn is the one that has been successfully used for STUN and TURN in NetBird setups.

See a complete architecture overview for details.

Community projects

Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

Support acknowledgement

In November 2022, NetBird joined the StartUpSecure program sponsored by The Federal Ministry of Education and Research of The Federal Republic of Germany. Together with CISPA Helmholtz Center for Information Security NetBird brings the security best practices and simplicity to private networking.

CISPA_Logo_BLACK_EN_RZ_RGB (1)

Testimonials

We use open-source technologies like WireGuard®, Pion ICE (WebRTC), Coturn, and Rosenpass. We very much appreciate the work these guys are doing and we'd greatly appreciate if you could support them in any way (e.g. giving a star or a contribution).

WireGuard and the WireGuard logo are registered trademarks of Jason A. Donenfeld.