Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Go to file
Maycon Santos 8aa4f240c7
Add getting started script with Zitadel (#1005)
add getting started script with zitadel

limit tests for infrastructure file workflow

limit release workflow based on relevant files
2023-08-03 19:19:17 +02:00
.github Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
base62 move into separate package 2023-05-16 12:57:56 +02:00
client Handle conn store in thread safe way (#1047) 2023-08-03 18:24:23 +02:00
dns Add more activity events (#663) 2023-01-25 16:29:59 +01:00
docs/media Update README.md (#524) 2022-10-22 16:19:16 +02:00
encryption Fix slice bounds out of range in msg decryption (#768) 2023-03-29 10:40:31 +02:00
formatter Mobile (#735) 2023-03-17 10:37:27 +01:00
iface Wg ebpf proxy (#911) 2023-07-26 14:00:47 +02:00
infrastructure_files Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
management Update setup key auto_groups description (#1042) 2023-08-02 17:50:00 +02:00
release_files Add app restart to brew installer (#944) 2023-06-11 22:22:03 +02:00
route Use Peer.ID instead of Peer.Key as peer identifier (#664) 2023-02-03 10:33:28 +01:00
sharedsock Fix sharedsock build on android (#837) 2023-05-05 10:55:23 +02:00
signal Feature/android route notification (#868) 2023-05-31 18:25:24 +02:00
util move into separate package 2023-05-16 12:57:56 +02:00
version Add version info command to signal server (#739) 2023-03-15 07:54:51 +01:00
.gitignore extend gitignore to ignore multiple config files 2023-06-19 15:07:27 +02:00
.goreleaser_ui_darwin.yaml Add version info command to signal server (#739) 2023-03-15 07:54:51 +01:00
.goreleaser_ui.yaml Remove unused netbird UI dependencies (#1007) 2023-07-10 21:09:16 +02:00
.goreleaser.yaml Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
AUTHORS chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
CODE_OF_CONDUCT.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
CONTRIBUTING.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
CONTRIBUTOR_LICENSE_AGREEMENT.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
go.mod Wg ebpf proxy (#911) 2023-07-26 14:00:47 +02:00
go.sum Wg ebpf proxy (#911) 2023-07-26 14:00:47 +02:00
LICENSE chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
README.md Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
SECURITY.md Add security policy file (#600) 2022-12-02 13:54:22 +01:00

🐣 New Release! Peer expiration. Learn more


Start using NetBird at app.netbird.io
See Documentation
Join our Slack channel


NetBird is an open-source VPN management platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.

It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

NetBird uses NAT traversal techniques to automatically create an overlay peer-to-peer network connecting machines regardless of location (home, office, data center, container, cloud, or edge environments), unifying virtual private network management experience.

Key features:

  • x] Automatic IP allocation and network management with a Web UI ([separate repo](https://github.com/netbirdio/dashboard))
    
  • x] Automatic WireGuard peer (machine) discovery and configuration.
    
  • x] Encrypted peer-to-peer connections without a central VPN gateway.
    
  • x] Connection relay fallback in case a peer-to-peer connection is not possible.
    
  • x] Desktop client applications for Linux, MacOS, and Windows (systray).
    
  • x] Multiuser support - sharing network between multiple users.
    
  • x] SSO and MFA support. 
    
  • x] Multicloud and hybrid-cloud support.
    
  • x] Kernel WireGuard usage when possible.
    
  • x] Access Controls - groups & rules.
    
  • x] Remote SSH access without managing SSH keys.
    
  • x] Network Routes.  
    
  • x] Private DNS.
    
  • x] Network Activity Monitoring.
    
    

Coming soon:

  •  ] Mobile clients.
    
    

Secure peer-to-peer VPN with SSO and MFA in minutes

https://user-images.githubusercontent.com/700848/197345890-2e2cded5-7b7a-436f-a444-94e80dd24f46.mov

Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

Start using NetBird

A bit on NetBird internals

  • Every machine in the network runs NetBird Agent (or Client) that manages WireGuard.
  • Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers).
  • NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
  • Connection candidates are discovered with a help of STUN servers.
  • Agents negotiate a connection through Signal Service passing p2p encrypted messages with candidates.
  • Sometimes the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT) and p2p connection isn't possible. When this occurs the system falls back to a relay server called TURN, and a secure WireGuard tunnel is established via the TURN server.

Coturn is the one that has been successfully used for STUN and TURN in NetBird setups.

See a complete architecture overview for details.

Roadmap

Community projects

Support acknowledgement

In November 2022, NetBird joined the StartUpSecure program sponsored by The Federal Ministry of Education and Research of The Federal Republic of Germany. Together with CISPA Helmholtz Center for Information Security NetBird brings the security best practices and simplicity to private networking.

CISPA_Logo_BLACK_EN_RZ_RGB (1)

Testimonials

We use open-source technologies like WireGuard®, Pion ICE (WebRTC), and Coturn. We very much appreciate the work these guys are doing and we'd greatly appreciate if you could support them in any way (e.g. giving a star or a contribution).

WireGuard and the WireGuard logo are registered trademarks of Jason A. Donenfeld.