Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.
Go to file
Hugo Hakim Damer 8b0398c0db
Add support for IPv6 networks (on Linux clients) (#1459)
* Feat add basic support for IPv6 networks

Newly generated networks automatically generate an IPv6 prefix of size
64 within the ULA address range, devices obtain a randomly generated
address within this prefix.

Currently, this is Linux only and does not yet support all features
(routes currently cause an error).

* Fix firewall configuration for IPv6 networks

* Fix routing configuration for IPv6 networks

* Feat provide info on IPv6 support for specific client to mgmt server

* Feat allow configuration of IPv6 support through API, improve stability

* Feat add IPv6 support to new firewall implementation

* Fix peer list item response not containing IPv6 address

* Fix nftables breaking on IPv6 address change

* Fix build issues for non-linux systems

* Fix intermittent disconnections when IPv6 is enabled

* Fix test issues and make some minor revisions

* Fix some more testing issues

* Fix more CI issues due to IPv6

* Fix more testing issues

* Add inheritance of IPv6 enablement status from groups

* Fix IPv6 events not having associated messages

* Address first review comments regarding IPv6 support

* Fix IPv6 table being created even when IPv6 is disabled

Also improved stability of IPv6 route and firewall handling on client side

* Fix IPv6 routes not being removed

* Fix DNS IPv6 issues, limit IPv6 nameservers to IPv6 peers

* Improve code for IPv6 DNS server selection, add AAAA custom records

* Ensure IPv6 routes can only exist for IPv6 routing peers

* Fix IPv6 network generation randomness

* Fix a bunch of compilation issues and test failures

* Replace method calls that are unavailable in Go 1.21

* Fix nil dereference in cleanUpDefaultForwardRules6

* Fix nil pointer dereference when persisting IPv6 network in sqlite

* Clean up of client-side code changes for IPv6

* Fix nil dereference in rule mangling and compilation issues

* Add a bunch of client-side test cases for IPv6

* Fix IPv6 tests running on unsupported environments

* Fix import cycle in tests

* Add missing method SupportsIPv6() for windows

* Require IPv6 default route for IPv6 tests

* Fix panics in routemanager tests on non-linux

* Fix some more route manager tests concerning IPv6

* Add some final client-side tests

* Add IPv6 tests for management code, small fixes

* Fix linting issues

* Fix small test suite issues

* Fix linter issues and builds on macOS and Windows again

* fix builds for iOS because of IPv6 breakage
2024-08-13 17:26:27 +02:00
.devcontainer Update contribution and readme file (#1447) 2024-01-08 15:41:22 +01:00
.github Implement experimental PostgreSQL store (#1939) 2024-05-16 19:28:37 +03:00
base62 Update GitHub Actions and Enhance golangci-lint (#1075) 2023-09-04 17:03:44 +02:00
client Add support for IPv6 networks (on Linux clients) (#1459) 2024-08-13 17:26:27 +02:00
dns Prepare regexps on compile time (#1327) 2023-11-27 13:01:00 +01:00
docs/media Update README.md (#524) 2022-10-22 16:19:16 +02:00
encryption Fix data dir creation permissions (#1503) 2024-01-29 14:21:45 +01:00
formatter Mobile (#735) 2023-03-17 10:37:27 +01:00
iface Add support for IPv6 networks (on Linux clients) (#1459) 2024-08-13 17:26:27 +02:00
infrastructure_files Add log-level to the management's docker service command (#1820) 2024-04-09 21:00:43 +02:00
management Add support for IPv6 networks (on Linux clients) (#1459) 2024-08-13 17:26:27 +02:00
release_files Add installer support for Synology (#1984) 2024-05-15 19:03:49 +03:00
route Refactor Route IDs (#1891) 2024-05-06 14:47:49 +02:00
sharedsock Revert "Rollback new routing functionality (#1805)" (#1813) 2024-04-08 18:56:52 +02:00
signal Monitor network changes and restart engine on detection (#1904) 2024-05-07 18:50:34 +02:00
util Feature/exit node Android (#1916) 2024-05-07 12:28:30 +02:00
version Prepare regexps on compile time (#1327) 2023-11-27 13:01:00 +01:00
.gitattributes Run linter action on MacOS and Windows (#1198) 2023-10-07 21:45:46 +02:00
.gitignore Add initial support of device posture checks (#1540) 2024-02-20 09:59:56 +01:00
.golangci.yaml Upgrade gRPC and OpenTelemetry packages for compatibility (#2003) 2024-05-27 08:39:18 +02:00
.goreleaser_ui_darwin.yaml Add version info command to signal server (#739) 2023-03-15 07:54:51 +01:00
.goreleaser_ui.yaml Combine update-available and connected/disconnected tray icon states (#1615) 2024-02-26 23:28:33 +01:00
.goreleaser.yaml Add getting started script with Zitadel (#1005) 2023-08-03 19:19:17 +02:00
AUTHORS chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
CODE_OF_CONDUCT.md Update CODE_OF_CONDUCT.md (#2048) 2024-05-24 17:29:14 +02:00
CONTRIBUTING.md Extend netbird status command to include health information (#1471) 2024-01-22 12:20:24 +01:00
CONTRIBUTOR_LICENSE_AGREEMENT.md Add contribution guide (#595) 2022-12-02 13:31:31 +01:00
go.mod Upgrade gRPC and OpenTelemetry packages for compatibility (#2003) 2024-05-27 08:39:18 +02:00
go.sum Upgrade gRPC and OpenTelemetry packages for compatibility (#2003) 2024-05-27 08:39:18 +02:00
LICENSE chore: update license and AUTHORS 2022-01-19 16:22:40 +01:00
README.md Add new intro image 2024-04-22 11:00:52 +02:00
SECURITY.md Add security policy file (#600) 2022-12-02 13:54:22 +01:00

🐣 New Release! Device Posture Checks. Learn more


Start using NetBird at netbird.io
See Documentation
Join our Slack channel


NetBird combines a configuration-free peer-to-peer private network and a centralized access control system in a single platform, making it easy to create secure private networks for your organization or home.

Connect. NetBird creates a WireGuard-based overlay network that automatically connects your machines over an encrypted tunnel, leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Secure. NetBird enables secure remote access by applying granular access policies while allowing you to manage them intuitively from a single place. Works universally on any infrastructure.

Open-Source Network Security in a Single Platform

netbird_2

Key features

Connectivity Management Security Automation Platforms
  • - [x] Kernel WireGuard
  • - [x] Linux
  • - [x] Peer-to-peer connections
  • - [x] Auto peer discovery and configuration
  • - [x] Mac
  • - [x] Connection relay fallback
  • - [x] Windows
  • - [x] IdP groups sync with JWT
  • - [x] Android
  • - [x] NAT traversal with BPF
  • - [x] Peer-to-peer encryption
  • - [x] iOS
  • - [x] OpenWRT
  • - [x] Periodic re-authentication
    • - [x] Docker

    Quickstart with NetBird Cloud

    Quickstart with self-hosted NetBird

    This is the quickest way to try self-hosted NetBird. It should take around 5 minutes to get started if you already have a public domain and a VM. Follow the Advanced guide with a custom identity provider for installations with different IDPs.

    Infrastructure requirements:

    • A Linux VM with at least 1CPU and 2GB of memory.
    • The VM should be publicly accessible on TCP ports 80 and 443 and UDP ports: 3478, 49152-65535.
    • Public domain name pointing to the VM.

    Software requirements:

    • Docker installed on the VM with the docker-compose plugin (Docker installation guide) or docker with docker-compose in version 2 or higher.
    • jq installed. In most distributions Usually available in the official repositories and can be installed with sudo apt install jq or sudo yum install jq
    • curl installed. Usually available in the official repositories and can be installed with sudo apt install curl or sudo yum install curl

    Steps

    • Download and run the installation script:
    export NETBIRD_DOMAIN=netbird.example.com; curl -fsSL https://github.com/netbirdio/netbird/releases/latest/download/getting-started-with-zitadel.sh | bash
    
    • Once finished, you can manage the resources via docker-compose

    A bit on NetBird internals

    • Every machine in the network runs NetBird Agent (or Client) that manages WireGuard.
    • Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers).
    • NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
    • Connection candidates are discovered with the help of STUN servers.
    • Agents negotiate a connection through Signal Service passing p2p encrypted messages with candidates.
    • Sometimes the NAT traversal is unsuccessful due to strict NATs (e.g. mobile carrier-grade NAT) and a p2p connection isn't possible. When this occurs the system falls back to a relay server called TURN, and a secure WireGuard tunnel is established via the TURN server.

    Coturn is the one that has been successfully used for STUN and TURN in NetBird setups.

    See a complete architecture overview for details.

    Community projects

    Note: The main branch may be in an unstable or even broken state during development. For stable versions, see releases.

    Support acknowledgement

    In November 2022, NetBird joined the StartUpSecure program sponsored by The Federal Ministry of Education and Research of The Federal Republic of Germany. Together with CISPA Helmholtz Center for Information Security NetBird brings the security best practices and simplicity to private networking.

    CISPA_Logo_BLACK_EN_RZ_RGB (1)

    Testimonials

    We use open-source technologies like WireGuard®, Pion ICE (WebRTC), Coturn, and Rosenpass. We very much appreciate the work these guys are doing and we'd greatly appreciate if you could support them in any way (e.g., by giving a star or a contribution).

    WireGuard and the WireGuard logo are registered trademarks of Jason A. Donenfeld.