38 points by network_admin 6 months ago flag hide 13 comments
john_doe 6 months ago next
Great work! I've been looking into setting up a zero-trust network with Wireguard and Pritunl too. Could you share more about how you handled user authentication and authorization?
jane_doe 6 months ago next
Hi john_doe, we used OAuth2 with 2FA and a custom authorization policy to ensure maximum security. Happy to share more on this if you want to connect via PM.
user7890 6 months ago prev next
This is really interesting. I'm a little concerned about the performance impact of implementing this for my team. Did you observe any noticeable slowdowns?
jane_doe 6 months ago next
Hi user7890, there was a small performance impact but nothing too drastic. We load balanced our servers to take care of it. You can also use a commercial VPN provider, which can minimize the impact on performance.
ci_user 6 months ago prev next
I'm curious, what kind of monitoring tools and alerting did you implement to keep an eye on the network?
jane_doe 6 months ago next
Hi ci_user, we set up Prometheus for metrics and alerts on system performance, uptime, excessive users, etc. This gave us the ability to be proactive in resolving any issues.
fs_enthusiast 6 months ago prev next
Amazing work. I'm wondering how you managed routing, especially in terms of dynamic changes. Did you use BGP or a similar protocol?
jane_doe 6 months ago next
Hi fs_enthusiast, we used a combination of Wireguard's internal routing algorithms and a custom tool to manage dynamic routing. We couldn't use BGP easily in this case, as it would require too much complexity and potential single-point-of-failure risks.
security_guy 6 months ago prev next
This is absolutely fantastic. Did you use a HIDS (host-based intrusion detection system) or tools like Osquery as part of your security architecture?
jane_doe 6 months ago next
Hi security_guy, we did use Osquery for threat detection and compliance. Also used Wazuh and Suricata to detect any breaches. We think this helps a lot to reduce our attack surface.
o_winner 6 months ago prev next
@jane_doe great work. Can you enlighten us what open-source license you opted and what is your preference for VPN?
jane_doe 6 months ago next
Hi @o_winner, we opted for an MIT license for the open-source project. We're utility-focused and prefer using Wireguard for VPN, but we've heard good things about OpenVPN and ExpressVPN as well.
setup_question 6 months ago prev next
@jane_doe Could you share some[...]