What does HackerNews think of innernet?

A private network system that uses WireGuard under the hood.

Language: Rust

In the self-hosted space, I've been really enjoying playing around with decentralized encrypted overlay mesh networks like Nebula. Here's the current list of my faves (all Wireguard based).

Open-source projects not-quite-prod-ready:

- WebMesh: Golang, decentralized nodes https://github.com/webmeshproj

- InnerNet: Rust, with subnet ACLs https://github.com/tonarino/innernet

- Wesher: Golang, simple mesh with pre-shared key https://github.com/costela/wesher

- Wiresmith: Rust, auto-configs clients into a mesh https://github.com/svenstaro/wiresmith

Open source projects with company-backed SaaS offerings:

- Netbird: Golang, full-fledged solution (desktop clients, DNS, SSO, STUN/TURN, etc) https://github.com/netbirdio/netbird

- Netmaker: Golang, full-fledge solution https://github.com/gravitl/netmaker

Honorable mention:

- SuperHighway84 - more of a Usenet-inspired darknet, but I love the concept + the author's personal website: https://github.com/mrusme/superhighway84 https://xn--gckvb8fzb.com/superhighway84

Make something wireguard-related. It's the boring sort of secure networking infrastructure that vast numbers businesses need.

How about paid-for, closed-source innernet clients for Windows, Android, MacOS, iPadOS, iOS? Which install super-smoothly? https://github.com/tonarino/innernet

Innernet is also in this space. Also rust, but using wiregaurd.

https://github.com/tonarino/innernet

Or why not the open source tool innernet? https://github.com/tonarino/innernet
I wonder if this might improve over a more modern transport, if you were using an IPSec VPN.

Wireguard is enabling us to re-think what's possible over a VPN. Here's an example of what I mean. The network stack is based on Wireguard, with https://github.com/tonarino/innernet providing the topology and identity provisioning. https://tonari.no/

As long as their server is closed source (which manages the actual key exchange) I won't use tailscale.

A good alternative is: https://github.com/tonarino/innernet

I'm not affiliated with Tonarino. But sure its interesting: https://tonari.no/

While not apples-to-apples and less polished, we're slowly building up https://github.com/tonarino/innernet as a fully open-source (and self-hosted) alternative to things like Tailscale. It controls vanilla WireGuard under the hood (kernel or userspace implementations), and is lower level (no graphical interfaces yet), though, but depending on your needs it might still fit :).
Nice! I was just building a similar (but more specialized) tool for https://aenac.dev

There's a few offerings in this space, some geared toward edge, some toward orgs. For example:

- tailscale https://tailscale.com/download

- Innernet https://github.com/tonarino/innernet

- wiretrustee https://wiretrustee.com/

Care to differentiate from those above?

As silly and astonishing as it is, I've heard from some (mostly American) ISPs that a static IPv6 subnet is either not available for consumers or costs extra.

Yes, that's right, some ISPs rotate IPv6 subnets, negating many things IPv6 was invented for in the first place.

Tailscale, Nebula or any of the automagical VPN solutions you can run yourself (like Innernet, https://github.com/tonarino/innernet) will probably negate the issue as long as you can reach some server with a static IP.

I've looked into replacing my personal WireGuard setup with an innernet [0] managed network. You can throw it onto a generic VPS and make managing WireGuard peers super easy.

It's not unlike Tailscale and nebula (that others already mentioned) but I think it deserves to be mentioned.

[0]: https://github.com/tonarino/innernet

You might want to consider innernet. It's still got a central server, but it's self-hosted and similarly easy to deploy. Check it out here: https://github.com/tonarino/innernet
Similar to Tailscale is the Innernet project, which has similar goals but is fully open source (also built on Wireguard). I've heard that set-up is a bit more painful, but for those who are interested in FOSS or self-hosting, it might be worth looking into.

[1] https://github.com/tonarino/innernet

I’ve been begrudgingly using Tailscale because it’s so damn simple, but hate that I have to authenticate through Google. I recently noticed they’ve added a “sign in with GitHub option,” but I don’t see any easy way to migrate my account (and nodes). Many of the clients are PiHoles I’ve sent off to my family as gifts, so physical access is a PITA. The only way I’ve found to reliably clear the Tailscale settings is to `apt purge Tailscale`, which would cause me to lose Tailscale SSH access. Looking at the hassle of the remote reinstall- I’m thinking to SSH in with Tailscale, then establish a reverse SSH tunnel to maintain remote access - I think I may finally give Innernet [0] a go.

[0] https://github.com/tonarino/innernet

I've never used it myself, but a sister comment mentioned related projects working with wireguard and innernet seems to be exactly that use case from a casual glance. You can specify full cidr rules, so it should be possible to prohibit connections between nodes by segmenting the IPs

https://github.com/tonarino/innernet

There are easier options around if all you wish is ssh access to your servers though. Personally I'd recommend gravitational teleport, mainly because the name is so hilarious

https://goteleport.com/

Innernet is an open source alternative to tailscale https://github.com/tonarino/innernet . Since this feature was so easy I imagine someone could pretty easily add it as a PR