.github/workflows | ||
client | ||
docs | ||
encryption | ||
iface | ||
infrastructure_files | ||
management | ||
release_files | ||
signal | ||
util | ||
.gitignore | ||
.goreleaser_ui_darwin.yaml | ||
.goreleaser.yaml | ||
AUTHORS | ||
CODE_OF_CONDUCT.md | ||
go.mod | ||
go.sum | ||
LICENSE | ||
README.md |
🐣 New release! Seamless Access Controls. Learn more
Start using NetBird at app.netbird.io
See Documentation
Join our Slack channel
NetBird is an open-source VPN management platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.
It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.
NetBird creates an overlay peer-to-peer network connecting machines automatically regardless of their location (home, office, datacenter, container, cloud or edge environments) unifying virtual private network management experience.
Key features:
-
x] Automatic IP allocation and network management with a Web UI ([separate repo](https://github.com/netbirdio/dashboard))
-
x] Automatic WireGuard peer (machine) discovery and configuration.
-
x] Encrypted peer-to-peer connections without a central VPN gateway.
-
x] Connection relay fallback in case a peer-to-peer connection is not possible.
-
x] Desktop client applications for Linux, MacOS, and Windows (systray).
-
x] Multiuser support - sharing network between multiple users.
-
x] SSO and MFA support.
-
x] Multicloud and hybrid-cloud support.
-
x] Kernel WireGuard usage when possible.
-
x] Access Controls - groups & rules.
Coming soon:
-
] Private DNS.
-
] Mobile clients.
-
] Network Activity Monitoring.
Secure peer-to-peer VPN with SSO and MFA in minutes
Note: The main
branch may be in an unstable or even broken state during development.
For stable versions, see releases.
Start using NetBird
- Hosted version: https://app.netbird.io/.
- See our documentation for Quickstart Guide.
- If you are looking to self-host NetBird, check our Self-Hosting Guide.
- Step-by-step Installation Guide for different platforms.
- Web UI repository.
- 5 min demo video on YouTube.
A bit on NetBird internals
- Every machine in the network runs NetBird Agent (or Client) that manages WireGuard.
- Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers).
- NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
- Connection candidates are discovered with a help of STUN servers.
- Agents negotiate a connection through Signal Service passing p2p encrypted messages with candidates.
- Sometimes the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT) and p2p connection isn't possible. When this occurs the system falls back to a relay server called TURN, and a secure WireGuard tunnel is established via the TURN server.
Coturn is the one that has been successfully used for STUN and TURN in NetBird setups.
See a complete architecture overview for details.
Roadmap
Community projects
Testimonials
We use open-source technologies like WireGuard®, Pion ICE (WebRTC), and Coturn. We very much appreciate the work these guys are doing and we'd greatly appreciate if you could support them in any way (e.g. giving a star or a contribution).
Legal
WireGuard is a registered trademark of Jason A. Donenfeld.
Contribution
You have a working Go environment
Clone the project into your preferred path. We recommend just cloning into the GOPATH.
mkdir -p $GOPATH/src/github.com/netbirdio
cd $GOPATH/src/github.com/netbirdio
git clone git@github.com:netbirdio/netbird.git
cd netbird
go build ./...
Sidenote
libayatana-appindicator3-dev
might be needed for developing
the client-ui ui on debian based distros.
Sidenote
The command won't produce a binary, but only check for working builds.
If you want to produce a binary, you need to cd
into the specific subproject and use go build
.
To run the tests run
go test -exec sudo ./...
The tests need to be executed with sudo permissions, as our integration tests need to create network interfaces.
For further information about contributing to the Netbird project, please refer to our documentation.