Recent comments in /f/coolgithubprojects
[deleted] t1_ir7p1kg wrote
StreamingPanda t1_ir7nizw wrote
Reply to Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
I'd be using this if it weren't so heavy (It needs 2 GB of RAM). Are there any lighter options?
Ranomier OP t1_ir7axz6 wrote
RicePrestigious t1_ir6gf4s wrote
Reply to comment by ExoWire in Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
Fair enough. Discord is really helpful though the dev is really active in there.
Ps, I like authelia too, just really dig authentik
ExoWire t1_ir6gbh3 wrote
Reply to comment by RicePrestigious in Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
Because the integration is more complicated compared to Authelia. Additionally, the docs were (I tried to setup 6-12 month ago) not easy to understand.
[deleted] t1_ir6129p wrote
cmcooper1980 t1_ir6043j wrote
Reply to Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
Authentik's Documentation Link: https://goauthentik.io/docs/
For visual learners on initial setup, checkout: Authentik Setup on YouTube
For additional assistance, join the Discord: https://goauthentik.io/discord
[deleted] t1_ir5y6on wrote
RicePrestigious t1_ir5svmq wrote
Reply to Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
Authentik is awesome -- I don't see it mentioned much in self-hosting communities but it absolutely should be because it's so powerful, pretty polished and just works really well for me.
JakeN9 OP t1_ir0u7yv wrote
Reply to comment by LeopardJockey in Finally finished my github.io portfolio, what does everyone think! by JakeN9
I thought it was cool!
JakeN9 OP t1_ir0u5p2 wrote
Reply to comment by Alundra828 in Finally finished my github.io portfolio, what does everyone think! by JakeN9
Hey good point, its not very professional, I do like the picture though, its from a Jay-Z video ;). I partly agree with the idea of skillbars being useless but I felt it represented my relate knowledge of each topic.
JakeN9 OP t1_ir0tyaz wrote
Reply to comment by Wladefant in Finally finished my github.io portfolio, what does everyone think! by JakeN9
Yep I noticed that, but it works perfectly on desktop, when I have the chance I will go back and update
JakeN9 OP t1_ir0tvxa wrote
Reply to comment by archgabriel33 in Finally finished my github.io portfolio, what does everyone think! by JakeN9
Well I've had interview offers from Samsung, prime video and government. I decided to take a job at a insurance company and currently acting as a lead developer for a few different projects.
dovholuknf OP t1_iqy6tka wrote
Reply to comment by cylindrical_ in OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
OpenZiti vs BoringProxy has some similarities for sure. The simplest OpenZiti deployment is similar to a boring proxy deployment. The main differences will be that the listening ports "on the network" are going to be from the OpenZiti edge-router which will authenticate before allowing any connection using a strong x509 identity (not a token) and then after that the same identity can be authorized to access one or more services. That's one killer difference to me. There are lots of other things OpenZiti is doing that boringproxy isn't trying to as well. I filed an issue to do a comparison to that some day https://github.com/openziti/ziti-doc/issues/176 thanks for the idea! :)
Boringproxy doesn't seem to me to purport to be a mesh network. OpenZiti is a mesh network (a zero trust mesh network). That means that all the components use mutual TLS (mTLS) to connect to one another. Each node has its own identity as well. We'll write it up soon, hopefully.
Thanks for the interest, I was terse here but I'd be happy to answer other questions if you have any.
-- EDIT: -- I totally forgot that OpenZiti is very different insofar as it's trying to get those zero trust principles into applications themselves. That means there's a bunch of SDKs you can use to embed into "your own" applications. I can't leave that out of any comparison - even if the comparison is terse!!! :)
cylindrical_ t1_iqy297d wrote
Reply to comment by dovholuknf in OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
I'd love to read it! My first thought when seeing OpenZiti was "hmm, how does this compare to boring proxy?" Then immediately realized that I might not know enough about the difference between a mesh net and a zero trust platform.
archgabriel33 t1_iqwy3fp wrote
23 years old with a 4 page CV? No one will read that.
cyberflunk t1_iqw84wr wrote
Reply to comment by dovholuknf in OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
Nice!
dovholuknf OP t1_iqvvv4r wrote
Reply to comment by cyberflunk in OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
100% agree! We just "need to get it done". It's been on our doc issue list for a while. https://github.com/openziti/ziti-doc/issues/74
A whole suite of comparisons is coming too and it's also in the same "we just need to get it done" bucket.
PhilipLGriffiths88 t1_iqvvigj wrote
Reply to comment by cyberflunk in OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
Here is one I am working on looking at Wireguard and OpenZiti (comments very appreciated):
Wireguard is a better VPN. It is more secure, easier to use and set up, and delivers much better performance than many other VPNs. Its design principles make it easy to set up full mesh networks of connected machines by being ‘default-open’. Wireguard is also fully open source and self-hosted. Wireguard creates P2P connections using UDP and STUN, so inbound firewall ports are not needed. Wireguard can be tricky to manage at scale due to key management and the large amount of P2P tunnels that need to be maintained, and UDP sometimes being blocked. For this reason, many companies have created their own SaaS implementations of Wireguard, including Tailscale, Netbird, Netmaker and more. These are a mixture of proprietary and open source.
OpenZiti can be a better VPN while being designed to do much more. Rather than connecting machines, it cares about connecting "services" with zero trust networking concepts, including least privilege, micro-segmentation, and attribute-based access (though you can also set up a whole CIDR if you want). OpenZiti also uses the embedded identity to build outbound-only connections into a mesh (think Cloudflare tunnels), so we can close all inbound ports. This can all be surmised as Wireguard being 'default-open' whereas ZT is 'default-closed'. Wireguard is normally combined with a firewall to deliver ACLs and network segmentation controls.
Whereas Wireguard uses UDP and hole punching, OpenZiti uses TCP and a mesh overlay (with the outbound only at source and destination). This is how Tailscale implements Wireguard to ensure it works easily in all situations. It also allows you to control the internet routing and provide higher redundancy, resiliency, and control for routing traffic according to policy (e.g., low latency or geo-restrictions). All of this is open-source and native to OpenZiti, not in Wireguard.
Due to OpenZiti's uses of identity in the endpoints and fabric for routing, you also get a private DNS and unique naming (e.g., send from IoT endpoint service to IoT server rather than from 192.xxx.xxx.xx to 100.xxx.xxx.xx). This also means we do not need to use floating or static IPs, easily handle overlapping, no need for port forwarding.
Finally, where it really differentiates is that with OpenZiti you can start with "network-based zero trust" (installing a router in private IP space) and progress to "host-based zero trust" (using an agent/tunneller); it also has a suite of SDKs to embed in apps themselves for "application-based zero trust". This allows it to run in clientless, serverless, confidential computing, unikernel and more. It also means an application does not even need to trust the underlying host network or know the port/IP.
P.S., Wireguard get a lot of well-deserved love! OpenZiti uses the Windows TUN (WinTun) that the Wireguard project made as (at least) part of our Windows tunneler. Thanks, Wireguard!
cyberflunk t1_iqvpvdp wrote
Reply to OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
I think it'd be good for this kind of application to explain the differences between a mesh network (like tailscale/headscale/etc) and a zero trust platform.
I find that it's confusing for most people,
I'd write it up, but I don't have a firm grasp on ZT to do it justice.
dovholuknf OP t1_iqvifdm wrote
Reply to OpenZiti - *everything* you need to implement your own secure, zero trust overlay network by dovholuknf
I am a dev on this project and I personally think that all applications will have zero trust principles baked into them soon enough, if not with OpenZiti then with some other SDK/overlay (but clearly I'm hoping OpenZiti is the choice). I just found this sub and thought that y'all might think this is a cool project. There's a lot to the project but I think it's really cool stuff - you might too. :)
Wladefant t1_iquybia wrote
Your class2 project on phone is broken
LeopardJockey t1_iqutqd2 wrote
Reply to comment by Alundra828 in Finally finished my github.io portfolio, what does everyone think! by JakeN9
> Your erm... Profile picture
Haha probably some big breasted anime girl let's see how bad it is ... oh for fucks sake.
[deleted] t1_ir7pmj4 wrote
Reply to comment by StreamingPanda in Authentik is an open-source Identity Provider focused on flexibility and versatility | https://goauthentik.io | OAuth, SAML, LDAP & ProxyAuth by Ranomier
[deleted]