Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Go to file
2022-05-26 10:09:11 +02:00
.github/workflows Update MacOS and Windows installers (#325) 2022-05-25 19:41:03 +02:00
client Rename Wiretrustee in logs and be log output friendly on startup (#327) 2022-05-26 10:09:11 +02:00
docs Rebrand client cli (#320) 2022-05-22 18:53:47 +02:00
encryption Rename module to netbirdio/netbird (#288) 2022-03-26 12:08:54 +01:00
iface Get Device Authorization Flow information from management (#308) 2022-05-08 11:04:57 +02:00
infrastructure_files Rebrand client cli (#320) 2022-05-22 18:53:47 +02:00
management Versioning of UI and grpc-agent for passing version (#324) 2022-05-25 23:25:02 +02:00
release_files Update MacOS and Windows installers (#325) 2022-05-25 19:41:03 +02:00
signal Rebrand client cli (#320) 2022-05-22 18:53:47 +02:00
util Rename module to netbirdio/netbird (#288) 2022-03-26 12:08:54 +01:00
.gitignore Add Settings window to Agent UI 2022-04-15 17:30:12 +02:00
.goreleaser_ui_darwin.yaml Renaming project builds and including new Icons (#318) 2022-05-21 18:42:56 +02:00
.goreleaser.yaml Versioning of UI and grpc-agent for passing version (#324) 2022-05-25 23:25:02 +02:00
AUTHORS chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
CODE_OF_CONDUCT.md Conduct (#205) 2022-01-26 09:33:16 +01:00
go.mod Client Login via device authorization flow (#309) 2022-05-12 11:17:24 +02:00
go.sum Client Login via device authorization flow (#309) 2022-05-12 11:17:24 +02:00
LICENSE chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
README.md Update MacOS and Windows installers (#325) 2022-05-25 19:41:03 +02:00

Big News! Wiretrustee becomes Netbird. Learn more


Start using Netbird at app.netbird.io
See Documentation
Join our Slack channel


Netbird is an open-source VPN platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.

It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Netbird automates Wireguard-based networks, offering a management layer with:

  • Centralized Peer IP management with a UI dashboard.
  • Encrypted peer-to-peer connections without a centralized VPN gateway.
  • Automatic Peer discovery and configuration.
  • UDP hole punching to establish peer-to-peer connections behind NAT, firewall, and without a public static IP.
  • Connection relay fallback in case a peer-to-peer connection is not possible.
  • Multitenancy (coming soon).
  • Client application SSO with MFA (coming soon).
  • Access Controls (coming soon).
  • Activity Monitoring (coming soon).
  • Private DNS (coming soon)

Secure peer-to-peer VPN in minutes

Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

Hosted version: https://app.netbird.io/.

UI Dashboard Repo

A bit on Netbird internals

  • Netbird features a Management Service that offers peer IP management and network updates distribution (e.g. when a new peer joins the network).
  • Netbird uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between devices.
  • Peers negotiate connection through Signal Service.
  • Signal Service uses public Wireguard keys to route messages between peers. Contents of the messages sent between peers through the signaling server are encrypted with Wireguard keys, making it impossible to inspect them.
  • Occasionally, the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT). When this occurs the system falls back to the relay server (TURN), and a secure Wireguard tunnel is established via the TURN server. Coturn is the one that has been successfully used for STUN and TURN in Netbird setups.

Product Roadmap

Client Installation

Linux

APT/Debian

  1. Add the repository:
    sudo apt-get update
    sudo apt-get install ca-certificates curl gnupg -y
    curl -L https://pkgs.wiretrustee.com/debian/public.key | sudo apt-key add -
    echo 'deb https://pkgs.wiretrustee.com/debian stable main' | sudo tee /etc/apt/sources.list.d/wiretrustee.list
    
  2. Update APT's cache
    sudo apt-get update
    
  3. Install the package
    # for CLI only
    sudo apt-get install netbird
    # for GUI package
    sudo apt-get install netbird-ui
    

RPM/Red hat

  1. Add the repository:
    cat <<EOF | sudo tee /etc/yum.repos.d/wiretrustee.repo
    [Wiretrustee]
    name=Wiretrustee
    baseurl=https://pkgs.wiretrustee.com/yum/
    enabled=1
    gpgcheck=0
    gpgkey=https://pkgs.wiretrustee.com/yum/repodata/repomd.xml.key
    repo_gpgcheck=1
    EOF
    
  2. Install the package
    # for CLI only
    sudo yum install netbird
    # for GUI package
    sudo yum install netbird-ui
    

MACOS

Homebrew install

  1. Download and install homebrew at https://brew.sh/
  2. If wiretrustee was previously installed with homebrew, you will need to run:
# Stop and uninstall daemon service:
sudo wiretrustee service stop
sudo wiretrustee service uninstall 
# unlik the app
brew unlink wiretrustee

netbird will copy any existing configuration from the Wiretrustee's default configuration paths to the new Netbird's default location

  1. Install the client
# for CLI only
brew install netbirdio/tap/netbird
# for GUI package
brew install --cask netbirdio/tap/netbird-ui
  1. If you are install CLI only, you need to install and start the client daemon service:
sudo netbird service install
sudo netbird service start

Installation from binary (CLI only)

  1. Checkout Netbird releases
  2. Download the latest release (Switch VERSION to the latest):
curl -o ./netbird_<VERSION>_darwin_amd64.tar.gz https://github.com/netbirdio/netbird/releases/download/v<VERSION>/wiretrustee_<VERSION>_darwin_amd64.tar.gz
  1. Decompress
tar xcf ./netbird_<VERSION>_darwin_amd64.tar.gz
sudo mv netbird /usr/bin/netbird
chmod +x /usr/bin/netbird

After that you may need to add /usr/bin in your PATH environment variable:

export PATH=$PATH:/usr/bin
  1. Install and run the service
sudo netbird service install
sudo netbird service start

Windows

  1. Checkout Netbird releases
  2. Download the latest Windows release installer netbird_installer_<VERSION>_windows_amd64.exe (Switch VERSION to the latest):
  3. Proceed with installation steps
  4. This will install the client in the C:\Program Files\Netbird and add the client service
  5. After installing, you can follow the Client Configuration steps.

To uninstall the client and service, you can use Add/Remove programs

Client Configuration

If you installed the UI client, you can launch it and click on Connect

It will open your browser, and you will be prompt for email and password

Simply run:

  netbird up

It will open your browser, and you will be prompt for email and password

Check connection status:

  netbird status

In case you are activating a server peer, you can use a setup-key as described in the steps below:

  1. Login to the Management Service. You need to have a setup key in hand (see ).

For all systems:

netbird up --setup-key <SETUP KEY>

For Docker, you can run with the following command:

docker run --network host --privileged --rm -d -e NB_SETUP_KEY=<SETUP KEY> -v netbird-client:/etc/netbird netbirdio/netbird:<TAG>

TAG > 0.6.0 version

Alternatively, if you are hosting your own Management Service provide --management-url property pointing to your Management Service:

sudo netbird up --setup-key <SETUP KEY> --management-url http://localhost:33073

You could also omit the --setup-key property. In this case, the tool will prompt for the key.

  1. Check connection status:
  netbird status
  1. Check your IP: For MACOS you will just start the service:
sudo ifconfig utun100

For Linux systems:

ip addr show wt0

For Windows systems:

netsh interface ip show config name="wt0"
  1. Repeat on other machines.

Troubleshooting

  1. If you are using self-hosted version and haven't specified --management-url, the client app will use the default URL which is https://api.wiretrustee.com:33073.

  2. If you have specified a wrong --management-url (e.g., just by mistake when self-hosting) to override it you can do the following:

    netbird down
    netbird up --management-url https://<CORRECT HOST:PORT>/
    

    To override it see solution #1 above.

Running Dashboard, Management, Signal and Coturn

See Self-Hosting Guide

WireGuard is a registered trademark of Jason A. Donenfeld.