NetBird - FOSS noconf Mesh VPN using Wireguard, alternative to ZeroTier, Tailscale, OmniEdge, Netmaker etc
-
- https://netbird.io/
- https://github.com/netbirdio/netbird (README.md is worth a read)
- https://github.com/netbirdio/dashboard
- https://netbird.io/docs/getting-started/self-hosting (Docker Compose)
- https://netbird.io/docs
- https://twitter.com/netbird
- https://alternativeto.net/software/netbird/about/
- https://alternativeto.net/software/netbird/
- https://forum.cloudron.io/topic/7560/omniedge-decentralised-noconf-mesh-vpn-using-wireguard-alternative-to-zerotier-tailscale-etc
- https://forum.cloudron.io/topic/7563/tailscale-decentralised-noconf-mesh-vpn-using-wireguard-alternative-to-zerotier-etc
- https://forum.cloudron.io/topic/7567/firezone-foss-noconf-mesh-vpn-using-wireguard-alternative-to-zerotier-tailscale-omniedge-netmaker-etc
- https://forum.cloudron.io/topic/7565/netmaker-foss-noconf-mesh-vpn-using-wireguard-alternative-to-zerotier-tailscale-omniedge-etc
Zero configuration VPNfor fast-moving teams
Quickly connect your computers, servers, cloud instances, and IoT devices into a secure private network. No configuration required.

Works with Keycloak, which @nj already packages for Cloudron.


@marcusquinn WHOA! This looks the best of all of them so far!
-
@marcusquinn WHOA! This looks the best of all of them so far!
@privsec Yeah, they all look so good, and actually, you can have them all running at the same time I think.
Added the link above, but a good place to get a better idea of how anything will be to live with is how good the Docs are: https://netbird.io/docs
-
@privsec Yeah, they all look so good, and actually, you can have them all running at the same time I think.
Added the link above, but a good place to get a better idea of how anything will be to live with is how good the Docs are: https://netbird.io/docs
@marcusquinn Wow, I like their docs and everything. I think Ill give this a go
-
NetBird author is here.
Thanks, @marcusquinn, for posting about NetBird!
Thank you, @privsec, for the kind feedback.
I see that there is quite an interest. Feel free to ask me any questions

@braginini Would you be open to helping package this for Cloudron?
-
N necrevistonnezr referenced this topic on
-
F fbartels referenced this topic on
-
NetBird author is here.
Thanks, @marcusquinn, for posting about NetBird!
Thank you, @privsec, for the kind feedback.
I see that there is quite an interest. Feel free to ask me any questions

-
Works with Keycloak too: https://netbird.io/docs/integrations/identity-providers/self-hosted/using-netbird-with-keycloak
-
G girish referenced this topic on
-
T timka referenced this topic on
-
M marcusquinn referenced this topic on
-
Revisited all of these alternatives.
Netbird is the clear winner for me. Has my recommendation!
-
1st draft packaging this, if anyone that know's more wants to test:
-
Update on the Cloudron NetBird package
The packaging scaffold at https://github.com/marcusquinn/cloudron-netbird-app is fairly complete -- it uses the combinednetbird-serverbinary behind an internal nginx that consolidates all the path-based routing (gRPC, WebSocket, REST API, dashboard) onto a single HTTP port for Cloudron's reverse proxy.
What works (in theory -- needs real-world testing):- Management API, Signal, Relay, STUN, and Dashboard all in one container
- Cloudron SSO via the OIDC addon
- Cloudron's built-in TURN server for NAT traversal relay
- PostgreSQL via Cloudron addon
- Backup/restore of all persistent state
The one feature that can't work on Cloudron: NetBird's Reverse Proxy (v0.65+)
This is NetBird's newer feature that exposes internal services on mesh peers to the public internet with automatic TLS. It requires Traefik with TLS passthrough -- the NetBird proxy container needs to terminate TLS itself. Cloudron's nginx terminates TLS before traffic reaches the app, so there's no way to pass through the raw TLS connection that NetBird's proxy needs.
I looked at whetheralpine/socat(TCP socket forwarder) could bridge this gap, but it can't -- the problem is Layer 7 (HTTP path routing, gRPC protocol handling, TLS termination order), not Layer 4 (TCP forwarding). socat only does port-to-port TCP forwarding and has no understanding of HTTP paths, gRPC, or WebSocket upgrade headers.
This doesn't affect the core VPN functionality at all -- peer-to-peer WireGuard tunnels, NAT traversal, access control, DNS, network routes, and the management dashboard all work fine without it. The reverse proxy is an optional add-on for publicly exposing internal services.
What's needed next:
- Testing on a real Cloudron instance (I haven't done this yet -- the packaging is based on docs and the combined container architecture)
- Verifying the internal nginx correctly handles the gRPC h2c proxying that Signal and Management need
- End-to-end OIDC flow testing with Cloudron SSO
- TURN relay testing for peers behind strict NAT
If anyone wants to help test, the repo has a full testing checklist in the README. Would be great to get this into the Cloudron App Store.
feedback welcome!