Netbird – Open Source Zero Trust Networking
319 points
4 hours ago
| 29 comments
| netbird.io
| HN
geoctl
1 hour ago
[-]
(Shamless plug) I am also working on a similar FOSS, self-hosted project called Octelium https://github.com/octelium/octelium that you might find interesting if you are interested in this space. Octelium is, however, more of a generic/unified zero trust secure access platform that can operate as a remote access VPN, a ZTNA platform, API/AI/MCP gateway, a PaaS, an ngrok-alternative and a homelab infrastructure. It provides unified client-based as well as clientless access for both humans and workloads; dynamic identity-based secretless access (e.g. access to HTTP/gRPC/k8s upstreams without sharing API keys and access tokens, SSH without distributing passwords/private keys, postgres/MySQL databases without sharing passwords, etc.); dynamic L7-aware, identity-based access control ABAC via CEL and OPA as well as dynamic routing to upstreams via policy-as-code; native Passkey login/WebAuthn/TOTP MFA and support for OIDC/SAML IdPs, OpenTelemetry-native L7-aware visibility and auditing; clientless access via OAuth2 for workloads, WireGuard and QUIC tunneling with dual-stack and automatic private DNS, including in rootless mode; passwordless SSH'ing into containers and IoT without SSH servers; deploying and securing access to containers; declarative k8s-like management with horizontal scalability among other features. You can read more in the README if you're interested.
reply
nszceta
47 minutes ago
[-]
It took me too long to understand the difference between the two so I'll leave it here for others. Octelium operates on OSI Layer 7 and Tailscale operates on OSI Layer 3 and 4.
reply
geoctl
42 minutes ago
[-]
Well, yes, Octelium is technically a VPN from a layer-3 perspective since it uses WireGuard/QUIC tunneling, but the tunnel doesn't directly terminate to the destination like in VPNs but instead to an identity-aware proxy that does authentication and L7-aware authorization on a per-request basis with policy-as-code via CEL/OPA. From an architecture perspective, I assume it's closer to ZTNAs such as Cloudflare Access and Teleport than to traditional VPNs, even though it operates as one for the clien-based access mode. However, unlike VPNs, it does provide clientless/BeyondCorp access too as it's intended to operate as a more generic/unified access platform (e.g. API/AI/MCP gateway, ngrok-alternative, PaaS-like platform, etc.) rather than just a VPN.
reply
CubsFan1060
36 minutes ago
[-]
I've been keeping my eye on this one, it's very interesting.

Feel free to ignore this, but, what's your long term plan here? I see you have Enterprise plans (especially that allow different licenses). From what I can tell you're the only contributor, but, I assume that if you accepted contributions there'd be a CLA?

reply
geoctl
9 minutes ago
[-]
Thank you, I haven't accepted any contributions so far primarily because of this reason but things might change in the future. As mentioned in the README and docs, Octelium is designed specifically for self-hosting so the commercial side of the project is simply confined to commercial AGPLv3-alternative licensing, support, and other very enterprise-y/customized features such as SCIM, SIEM to specific providers, etc...
reply
mittermayr
2 hours ago
[-]
I can only recommend giving headscale a try. It's free, works extremely well, and can be used with the official Tailscale clients. Was super easy to set up.

https://headscale.net/stable/

reply
markonen
44 minutes ago
[-]
Apparently they've deprecated Postgres support and now only recommend sqlite as the storage backend. I have nothing against sqlite but to me this looks like Tailscale actively signaling what they think the expected use of headscale is.
reply
ghrl
34 minutes ago
[-]
https://headscale.net/stable/about/faq/#scaling-how-many-cli...

> Scaling / How many clients does Headscale support? > It depends. As often stated, Headscale is not enterprise software and our focus is homelabbers and self-hosters. Of course, we do not prevent people from using it in a commercial/professional setting and often get questions about scaling. > Please note that when Headscale is developed, performance is not part of the consideration as the main audience is considered to be users with a modest amount of devices. We focus on correctness and feature parity with Tailscale SaaS over time. [...] > Headscale calculates a map of all nodes that need to talk to each other, creating this "world map" requires a lot of CPU time. When an event that requires changes to this map happens, the whole "world" is recalculated, and a new "world map" is created for every node in the network. [...] > Headscale will start to struggle when [there are] e.g. many nodes with frequent changes will cause the resource usage to remain constantly high. In the worst case scenario, the queue of nodes waiting for their map will grow to a point where Headscale never will be able to catch up, and nodes will never learn about the current state of the world.

I find that quite interesting and it is one of the reasons I've not really considered trying out Headscale myself.

reply
TheCraiggers
4 minutes ago
[-]
Why? Makes perfect sense to me. Designing a product with a specific use case in mind is good. When you've got the limited resources of am open source volunteer project, trying to solve every problem is a recipe for burnout. If it can even be done.
reply
athrowaway3z
41 minutes ago
[-]
I dont understand what these two have to do with anything? The db-use is almost trivial, and SQLite can be embedded. Why would we want wasted effort and configuration complexity on supporting postgres?
reply
flammafex
27 minutes ago
[-]
You wouldn't have to "waste effort" or deal with "configuration complexity." You see, we have LLMs that CODE now. Maybe you have heard of Claude?
reply
prmoustache
21 minutes ago
[-]
With that kind of logic you wouldn't need headscale and would just ask your favorite LLM to write a similar tool for your with your own requirements and nothing else.
reply
flammafex
1 minute ago
[-]
No, not really necessary to extrapolate the logic any further. You have deemed a very specific and focused task as "wasted effort." So the logic leads to putting in the effort you do not find "wasteful" and outsource the remainder to the LLM do this very specific thing.
reply
tucnak
1 minute ago
[-]
Yeah, Headscale say explicitly that they're a "toy." I didn't get a homelab full of datacentre-grade equipment because I want to use toy, poorly-scaling solutions with vastly incomplete feature sets, but for the exact opposite reason.

On a different note; the HN obsession with SQLite these days is getting a bit tiresome.

reply
db04
1 hour ago
[-]
Is Headscale suitable for production use?
reply
tucnak
21 seconds ago
[-]
No, it's only viable if your whole network is, like, five devices.
reply
regisso
1 hour ago
[-]
I recommend it the NetBird team is transparent and easy to reach. I switched from Tailscale a while ago (2y), went fully self-hosted, and upgrades across versions have been smooth, which tells me they care about the self-hosted, not just their cloud offering.
reply
aaronds
2 hours ago
[-]
A bit lower level than most things discussed here but on the topic of overlay networks, I’ve used nebula for years and can recommend it

https://github.com/slackhq/nebula

reply
ysleepy
1 hour ago
[-]
I've used it for some time, it feels very much like it is in maintenance mode.

You manage a PKI and have to distribute the keys yourself, no auth/login etc.

it's much better than wireguard, not requiring O(N) config changes to add a node, and allowing peoxy nodes etc.

iirc key revocation and so on are not easy.

reply
c0balt
47 minutes ago
[-]
Nebula does not require O(n) config changes for adding a node.

O(n) is only required for:

- active revocation of a certificate (requires adding the CA fingerprint to the config file)

- adding/removing a lighthouses (hub for publishing IPs for p2p) or relay (for going over p2p)

- CA rotation

reply
eddyg
1 hour ago
[-]
+1 on Nebula. I don’t know why it doesn’t get mentioned more as an overlay network option.
reply
sreekanth850
1 hour ago
[-]
it his much complex to setup then wireguard based?
reply
prmoustache
18 minutes ago
[-]
It is the easiest to setup and understand really. There are no users, just hosts and their keys.

What it doesn't offer is a gui or tool to handle copying/installing/revocating keys so you trade super easy setup for a handful of nodes to management overhead if you are scaling up and down regularly.

reply
gonzalohm
8 minutes ago
[-]
What's the advantage over running plain wireguard?
reply
edentrey
2 hours ago
[-]
Tailscale is the only non-self-hosted part of my setup now and this has bugged me since. I use a custom Nameserver rule to point all my subdomains to a Caddy container sitting on my Tailnet. Caddy handles the SSL and routes everything to the right containers. I skipped Tailscale Funnel on purpose; since these are just family services, I’d rather keep them locked behind the VPN than open them up to the web. This project looks promising as a replacement for my current setup and for its digital sovereignity of self hosting the server. I'm looking to manage several embedded devices remotely via Tailscale, but I've hit a major roadblock: the 90-day maximum expiration for Auth Keys. Constantly renewing these tokens is a significant maintenance burden, so I'm searching for a more permanent, 'set-and-forget' solution for my remote hardware.
reply
tass
2 hours ago
[-]
Tailscale allows you to disable the expiration time - I do this for my gateways.

My other simplifier is having everything at home get a .home dns name, and telling Tailscale to route all these via tailnet.

reply
edentrey
2 hours ago
[-]
can you please tell me how to disable expiration time? I see auth keys have an Expiration which says it "Must be between 1 and 90 days." I do use a custom domain name as well with a Nameservers rule to have all my services reachable as subdomains of my custom domain.
reply
aidos
2 hours ago
[-]
You can create an oauth client that can generate keys as you need them.

https://tailscale.com/kb/1215/oauth-clients#generating-long-...

reply
matthewmacleod
2 hours ago
[-]
There is some confusion here because while you can disable node key expiration, you can’t disable auth key expiration. But that’s less of a problem than it seems - auth keys are only useful for adding new nodes, so long expiry times are probably not necessary outside of some specific use-cases.

Edit: in fact from your original post it sounds like you’re trying to avoid re-issuing auth keys to embedded devices. You don’t need to do this; auth keys should ideally be single-use and are only required to add the node to the network. Once the device is registered, it does not need them any more - there is a per-device key. You can then choose to disable key expiration for that device.

reply
k_bx
1 hour ago
[-]
I want my CI containers created per branch/PR to have their own Tailscale domain, so logging them in is useful via non-expiring key. Only good option I've seen previously is to notify every 90 days when key expires.
reply
matthewmacleod
40 minutes ago
[-]
The best way to do that is using an OAuth client. These don't expire, and grant scoped access to the Tailscale API. You use this to generate access keys for the devices that need to authenticate to the network.

We use this for debugging access to CI builds, among other things – when a particular build parameter is set, then the CI build will use an OAuth key to request an ephemeral, single-use access key from the Tailscale API, then use that to create a node that engineers can SSH into.

Access keys ideally should be short-lived and single-use where possible. https://tailscale.com/kb/1215/oauth-clients#generating-long-... has details on this flow.

reply
tecleandor
2 hours ago
[-]
You can manually disable key expiration for hosts in Tailscale, and I think you can do it with tags too...

https://tailscale.com/kb/1028/key-expiry#disabling-key-expir...

reply
katdork
2 hours ago
[-]
The word "auth keys" meant nothing to you, I guess: https://tailscale.com/kb/1085/auth-keys
reply
matthewmacleod
2 hours ago
[-]
What would be your use-case for auth keys with long expiry times? Auth keys are only required for registering new nodes.
reply
stingraycharles
1 hour ago
[-]
When managing your infrastructure as code, it’s quite common to deploy new instances for upgrades etc. Having these keys expire after 3 months is a big pain. Eg doing a routine update by rebuilding an AMI.

I don’t understand how they can have such a strategy, and then not having any decent way to programmatically allocate new keys.

reply
matthewmacleod
33 minutes ago
[-]
Yeah, that's a common workflow. It's easy to programatically allocate those keys using the OAuth workflow though – there's even a CLI utility to do it (https://tailscale.com/kb/1215/oauth-clients#get-authkey-util...)

This can all be automated using e.g. the Terraform Tailscale provider, which takes the OAuth id/secret and can then issue keys as needed for the infrastructure you are deploying.

reply
inapis
2 hours ago
[-]
Use tag-based node authentication. Login as a user and then switch the device to use a tag. I just recently did that and retained the usual 6 months expiry. I can also disable key expiry completely.
reply
atmosx
2 hours ago
[-]
Headscale is a self hosted drop-in control plane replacement that has been pretty stable for us.
reply
sigio
36 minutes ago
[-]
I've head Netbird running for the last few months... In general it works quite well, but it would keep messing with my dns-resolving, and I couldn't find the setting to stop it inserting itself into my resolv.conf.

During the last few weeks I've removed netbird from all my systems (about 12), mostly because of issues on laptops where resolving or networking would break after they moved to a different network/location.

reply
usagisushi
17 minutes ago
[-]
Just for future reference, you can disable DNS management for specific groups [0].

You can find the option under "DNS > DNS Settings > Disable DNS management for these groups". Netbird will stop modifying the resolv.conf on those groups.

[0] https://docs.netbird.io/manage/dns#4-dns-management-modes

reply
no_time
2 hours ago
[-]
F-droid inclusion seems to be stalled https://gitlab.com/fdroid/rfp/-/issues/2688

Having it in F-droid, vetted by their policies is kind of my benchmark for "software that is guaranteed to be not crapware."

That being said I'm rooting for the devs, having an alternative for tailscale+headscale would be nice, because as it stands it's kind of dependant on the goodwill of a for profit company (finite).

reply
Borealid
1 hour ago
[-]
https://codeberg.org/bg443/JetBird appears to use the same core library (and is just a different Android frontend wrapper).
reply
micw
1 hour ago
[-]
I recently brought my first app to F-Droid. It was not friction free, but I was able to do it within a few weeks. Seems they put not much effort into this, e.g. the basic check marks are not even checked...
reply
gnufx
45 minutes ago
[-]
I've looked without success for external audit reports of either Tailscale and Netbird, like Mullvad gets. While I don't approve of the sort of auditor box-ticking we get at work, it would be reassuring to see a report from a proper security consultancy.
reply
pranaysy
1 hour ago
[-]
Long-time ZeroTier user here. Recently switched to NetBird (self-hosted on a Hetzner VPS) and it’s been seamless so far. DNS functionality is excellent (something ZeroTier lacked), and the access-control model is very well designed. It’s easy to understand what’s going on and to grant one-off access when needed. Only real and very minor gripe is the Android app: I wish it were on F-Droid and a bit more robust, as it sometimes drops when roaming. Nevertheless, congratulations on a fabulous piece of software! I hope it keeps improving :)
reply
braginini
2 hours ago
[-]
reply
alturp
58 minutes ago
[-]
Always my problem with Tailscale and similar solutions is that I already run VPNs in my personal devices and especially with android devices, I need to switch between two VPNs, which I find a friction that I do not want. Does anybody know a solution to this?
reply
ksynwa
54 minutes ago
[-]
Tailscale has some integration with Mullvad. If you have a Mullvad subscription you can use their servers as exit nodes without dropping your Tailscale connection: https://tailscale.com/kb/1258/mullvad-exit-nodes

Outside of the particular combination of Mullvad and Tailscale I don't think there is any other way apart from switching between the two.

reply
mlrtime
54 minutes ago
[-]
Not elegant or performant but:

You could have a exit node that is setup only for that vpn that advertises it's routes. So connecting to tailscale gives you access to that network.

reply
junon
1 hour ago
[-]
We just evaluated this the other day and we were pretty impressed by it. We were looking for something we could self host for wireguard config but tbh we might just pay for the managed solution.
reply
lwde
3 hours ago
[-]
But it's missing a tailscale funnel like feature, right? That's one of the main features that I use for some home assistant instances.
reply
gnyman
1 hour ago
[-]
Please be aware that when you use tailscale funnel you announce to the whole world that your service exists (through certificate transparency), and you will get scanned immediately. If you don't believe me just put up a simple http server and watch the scanning request come in within seconds of running `tailscale funnel`.

Do not expose anything without authentication.

And absolutely do not expose a folder with something like `python -m http.server -b 0.0.0.0 8080` if you have .git in it, someone will help themselves to it immediately.

If you are aware of this, funnel works fine and is not insecure.

Tailscale IMHO failing in educating people about this danger. They do mention in on the docs, but I think it should be a big red warning when you start it, because people clearly does not realise this.

I took a quick look a while ago and watching just part of the CT firehose, I found 35 .git folders in 30 minutes.

No idea if there was anything sensitive I just did a HEAD check against `.git/index` if I recall.

https://infosec.exchange/@gnyman/115571998182819369

reply
m_santos
1 hour ago
[-]
We are developing a similar feature and is scheduled to be available really soon. We've discussed some details in our public slack. Any feedback there will be helpful.
reply
ethangk
3 hours ago
[-]
Out of curiosity, why? I use TS for all my homelab bits (including my HA instance), but connect to TS before opening the HA app. Is it just a case of making it easier/ possible to connect if you’re on another VPN? Are you not concerned with having something from your local network open to the internet?
reply
m_santos
1 hour ago
[-]
Besides the use cases listed, we see this as an opportunity for homelabers and organizations to add authentication with access control to already exposed services.
reply
Galanwe
3 hours ago
[-]
I use funnels for things like Vaultwarden, that are secure enough to be exposed on internet, and would be cumbersome if behind the tailnet.

I use serve for everything else, just for the clean SSL termination for things that should stay within the telnet, like *arr stacks, immich, etc.

reply
ethangk
3 hours ago
[-]
Ah neat, that makes sense. Thanks.

Do you have anything that’ll trigger a notification if there’s suspicious traffic on your local network? I may be overly paranoid about exposing things on my local network to the internet.

reply
Galanwe
2 hours ago
[-]
Not really, but these stuff are in an isolated DMZ vlan, so theres not much to escalate to.

I fancy a bit upgrading to a smarter router like unify's with integrated firewall and stuff like like though.

reply
edentrey
2 hours ago
[-]
After a decade with KeePass, I’ve finally moved to Vaultwarden. I’ll admit, self-hosting such a critical service still feels a bit scary, but the seamless syncing across all my devices is a huge upgrade. To balance the risk, I keep it tucked safely behind Tailscale for that extra peace of mind.
reply
Galanwe
3 hours ago
[-]
Agree, I use funnels and serves a lot as well. Very useful for homelabers.
reply
speedgoose
2 hours ago
[-]
I replaced Teleport by a bunch of various tools, and I had to chose between tailscale/headscale and netbird for the network connectivity. I’m pleased with netbird so far.

I had some weird bugs on a few old servers during the transition, and the support was helpful even though I am a small customer. We eventually switched to user space wireguard on those servers.

reply
RedShift1
2 hours ago
[-]
I'm really missing something like Cisco DMVPN. A VPN mesh between different routers where all routers have a connection to each other, so that all traffic doesn't have to pass through the hub. And that runs on a router, because all these solutions only run on a regular computer with a complete OS.
reply
rwky
2 hours ago
[-]
Check https://tinc-vpn.org/ it may run on your router if you're running openwrt or similar
reply
usagisushi
1 hour ago
[-]
Netbird's flexibility with IdPs is really nice. I recently switched mine to Pocket ID. Overall, it's perfectly sufficient and lightweight for homelab use.
reply
m_santos
1 hour ago
[-]
Thanks for your feedback. I have a question: What do you think about the number of containers in our quick start deployment? Was that a concern?
reply
usagisushi
30 minutes ago
[-]
You’re from the dev team, right? Thanks for the amazing OSS!

Regarding the containers, AFAIK it's 5 for the core setup (dashboard/signal/management/relay/coturn) plus Traefik in my case. It feels like a bit much, but the services are almost stateless and not resource intensive even on my little VPS. The setup script (bash + envsubst) is so straightforward and thanks to good documentation, I’ve never found the setup confusing. (I use Renovate to keep things updated, but I’d love to know if there's a recommended update path.)

A couple of minor things I noticed: 1. the dashboard image isn't on ghcr.io. 2. the generated compose.yaml contains hardcoded values. It could be even better if it referenced values from a .env file instead.

By the way, are there any ways to support NetBird other than GitHub Sponsors?

reply
hollow-moe
2 hours ago
[-]
I'm currently comparing it with pangolin and headscale for my small scale company infrastructure access. Been running headscale for my own setup for a while but maybe netbird or pangolin might be better for real production.
reply
usagisushi
1 hour ago
[-]
Pangolin recently added desktop clients for win/mac/linux[0] and the Private Resource feature (similar to Netbird's Network Routes/DNS), so it's starting to overlap with Netbird more and more.

That said, it seems focused on client-to-site (newt) connections, and I don't see support for client-to-client connections like Netbird’s SSH access. Also, their Private Resources don't seem to support TLS termination yet. (Correct me if I’m wrong!)

In my case, I have a k3s cluster running on Netbird with a Traefik ingress for TLS termination inside my home network. Thanks to netbird's P2P nature, traffic stays entirely local as long as I'm on my home WiFi. (I suppose one could achieve the same with a Netbird + Caddy + DNS-01 setup, too.)

[0] https://docs.pangolin.net/manage/clients/understanding-clien...

reply
edentrey
2 hours ago
[-]
I am in the same position but currently using Tailscale and realize how important and critical it has become for my whole family infrastructure. A self-hosted solution which allowed me to use Nameservers and TLS termination as I currently do would be awesome.
reply
Benedicht
3 hours ago
[-]
Using it self hosted for almost a year now, no issues, just works for me.
reply
braginini
2 hours ago
[-]
That is awesome!
reply
FloatArtifact
3 hours ago
[-]
If the VPN connection would stay connected despite having it set up that way in the web UI.. It would be a good product.

Still haven't figured out how to do Termux on Android with netbird ssh yet.

reply
edentrey
2 hours ago
[-]
can you please elaborate on this? I use termux on android with tailscale and it works flawless, is it not possible on Netbird?
reply
sunshine-o
1 hour ago
[-]
For someone who want to setup a private network between host/devices, I feel the dilemma is always:

1. Trust a third party like Tailscale by giving them the key to your kingdom, but everything is incredibly easy and secure.

2. Self-host but need at least one host with a fixed IP address and an open port on the Internet. What requires a set of security skills and constant monitoring. That includes headscale, selhosted netbird, zerotier or a private yggdrasil mesh.

reply
abcd_f
1 hour ago
[-]
You can conceal that open port with some form of port knocking. Though this does reinforce your "easy" point.

Also, if it's an UDP port, then using a protocol that expects first client packet to be pre-authenticated and not emitting any response otherwise gets you pretty damn close to having this port closed.

reply
CommanderData
42 minutes ago
[-]
When I look at these zero trust solutions need 80/443 for what seems some type of bootstrapping

Better it happens using the same approach wireguard takes (udp/stateless). Though I'm not sure if there's more than just bootstrap taking place, maybe constant routing updates etc

reply
shtrophic
1 hour ago
[-]
Last time I checked it couldn't do ipv6... in 2026?
reply
niemandhier
1 hour ago
[-]
Could be intentional: German privacy advocates really like that the limited ipv4 pool forces reusing IPs and prevents accidental imprinting a practically static address on a device.
reply
fc417fc802
1 hour ago
[-]
Can't do IPv6 internally or externally? Internally there should be zero need for ~infinite addresses. Externally though I certainly hope all software is capable of operating via IPv6 at this point because otherwise it will only be increasingly broken.
reply
sunshine-o
1 hour ago
[-]
Makes a lot of sense.

But self-hosting still require at least a public domain name [0], so here goes your privacy right?

- [0] https://docs.netbird.io/selfhosted/selfhosted-quickstart#inf...

reply
fc417fc802
1 hour ago
[-]
> The VM must be publicly accessible on TCP ports 80 and 443, and UDP port 3478.

> A public domain name that resolves to the VM’s public IP address.

Since it already uses DNS it's disappointing that it hardcodes ports instead of using SRV records. IMO anything that can use SRV records should. It makes for a more robust internet.

reply
sigio
32 minutes ago
[-]
The number of products that actually use SRV records is surprisingly low (besides some mailservers and kerberos)
reply
moonlightbandit
1 hour ago
[-]
IPv6 is coming soon to NetBird.
reply
oaiey
3 hours ago
[-]
Sweet. Alternatives are always something good.
reply
vlovich123
2 hours ago
[-]
How does this compare with Defguard? Also European but seems more featureful maybe?
reply
braginini
2 hours ago
[-]
Defguard as of my knowledge is a traditional VPN with a central gateway. NetBird is an overlay network with a full mesh capabilities. Though you can set it up in a gateway-like style with NetBird Networks but without opening ports and with HA out of the box: https://docs.netbird.io/manage/networks
reply
CommanderData
46 minutes ago
[-]
Most of the self-hosted zero trust solutions require opening 80/443. It would be nice if they could adopt Wireguards approach of using UDP only, and only responding if the request is valid.

Maybe it's possible without modification to Netbird to setup a staging network.

reply
BoredPositron
2 hours ago
[-]
Missing some technical bits to be a true contender for me but I bet they are getting there. That said I've seen so many shadcn based scam sites that my brain starts associating shadcn with scams.
reply
braginini
2 hours ago
[-]
For example? Curious what is missing
reply
BoredPositron
2 hours ago
[-]
It funnels and lets encrypt certs for me and I am really not a fan of the android client.
reply
braginini
2 hours ago
[-]
Got you. We are on it. One feature that is coming very soon is a reverse proxy .Similar to cloudflare tunnels. With auth, TLs, etc. Would it suffice?
reply
oriettaxx
1 hour ago
[-]
+1 from me.

In general I would keep an eye on the path CF is following with warp: which is great, but since they are so big and in fast evolution, it is a bit of a mess (their doc is outdated and changes too frequently) not to count (literally) their support (free version, and our company's opinion only, of course) since on warp it is totally useless.

reply
braginini
1 hour ago
[-]
Roger that!
reply
m_santos
1 hour ago
[-]
Would love to learn more around your android experience
reply
BoredPositron
54 minutes ago
[-]
Battery usage is like 10% higher than with tailscale over a day.
reply
ZoomZoomZoom
1 hour ago
[-]
Tailscale is great and headscale is an important step to gain trust. However, headscale is useless without the clients, and Tailscale geoblock installing clients where they can. If the platform requires jailbreak for installing user-chosen software, as is the case with iOS, then it all becomes useless.

Open (preferably free software) clients without idiotic restrictions could be one of the main advantages for any competing solution. Does Netbird provide them?

reply
nixosbestos
1 hour ago
[-]
Why would Tailscale seek to limit access to their clients, other than where required by law?

The Android client, at least is FOSS. It's hardly Tailscale's fault that people buy iOS devices.

reply
ZoomZoomZoom
1 hour ago
[-]
I don't care why. They do nothing to circumvent this so they are not a reliable solution for those who have network participants using the restricted platforms.

There could be a million reasons, but not a technical one — "headscale client", for example, could exist in current hostile app stores, but there isn't one.

reply
thenaturalist
3 hours ago
[-]
Besides the solid product, Misha & Maycon are just great and friendly people to work with.
reply
braginini
2 hours ago
[-]
love it! :)
reply
estsauver
3 hours ago
[-]
There's also https://pangolin.net/ which is kind of similar, and I believe a YC company.
reply
braginini
2 hours ago
[-]
Not quite similar tho. Pangolin is a reverse proxy, NetBird is p2p mesh for internal resources remote access
reply
OtomotO
3 hours ago
[-]
Does that have ties to the US? If so it's not playing in the same ballpark.

US citizens may not be aware, but due to POTUS "made and maintained in Europe" is becoming more and more important to EU.

reply
edentrey
2 hours ago
[-]
I see Pangolin has a Self-Host Community Edition, doesn't that already give something over digital sovereignity for EU users? I am considering both for a migration from Tailscale, any suggestion on their differences?
reply
moonlightbandit
1 hour ago
[-]
They solve different problems.

For a Tailscale migration, NetBird is the direct swap. Pangolin won't give you device-to-device connectivity.

On EU sovereignty: NetBird is Germany-based and explicitly positions itself as a European alternative. Self-hosted gives full control with no callbacks to their servers. Pangolin is US/YC-backed, so while self-hosting gives you control of the data plane, the project itself is American.

Also, NetBird has a reverse proxy feature coming this quarter, which would cover the Pangolin use case within the same platform.

reply