File:XPUltimate-Desktop.png and CollabVPN: Difference between pages

From Computernewb Wiki
(Difference between pages)
Jump to navigation Jump to search
(Uploaded with SimpleBatchUpload)
 
(Creation of CollabVPN project page)
 
Line 1: Line 1:
CollabVPN is a VPN provided to users who want to host CollabVMs/UserVMs but don't want to use their existing ISP/NSP as an exit.

This was created because many commercial VPN providers are not equipping users with enough global IPv6 addresses, resulting in an IPv4-only or IPv4-prefferred network.

=== Technical details ===

* It is currently hosted on a VPS at [https://www.urdn.com.ua/ Ukrainian Data Network] but there are plans to move it to her own ASN once she is an LIR at RIPE.

=== Requesting a Tunnel ===
It is possible to request a WireGuard tunnel from Julia ([[User:Julia|wiki]], [https://julias.zone/ website]) that you can connect to and tunnel your VMs over.

You need to include the following information when requesting a tunnel:

* Your WireGuard public key
* Your GPG public key (optional, but nice to have for extra security like WireGuard PSKs)
* How many /64 IPv6 subnets you need, aka how many bridges you want to tunnel.
* What firewall configuration you want:
** Restricted
*** Only outbound IPv6 and IPv4 connections are permitted.
*** Inbound connections are filtered and only responses/packets from tracked connections are let in.
** Exposed
*** Also inbound connections are let in on IPv6 and IPv4.
*** You can request to have a few IPv4 ports routed to you.
*** You can request to have subdomains on forkie.dev aswell as RDNS on IPv6.
*** Hosting WebServers is possible thanks to [https://github.com/AGWA/snid snid]. Simply tell users to host an HTTPS server on 443 with your subdomain and IPv4 connections from for example 192.0.2.0 will show up to come from the IPv6 NAT64 subnet of 64:ff9b:1:fffe:80:ff7f::/96, so it would be 64:ff9b:1:fffe:80:ff7f:192.0.2.0 aka 64:ff9b:1:fffe:80:ff7f:c000:200.

=== To Do ===

* Further technical details like blocked ports, assigned IPv6 blocks and IPv4 ports, endpoint of the WireGuard

Revision as of 15:09, 6 May 2024

CollabVPN is a VPN provided to users who want to host CollabVMs/UserVMs but don't want to use their existing ISP/NSP as an exit.

This was created because many commercial VPN providers are not equipping users with enough global IPv6 addresses, resulting in an IPv4-only or IPv4-prefferred network.

Technical details

  • It is currently hosted on a VPS at Ukrainian Data Network but there are plans to move it to her own ASN once she is an LIR at RIPE.

Requesting a Tunnel

It is possible to request a WireGuard tunnel from Julia (wiki, website) that you can connect to and tunnel your VMs over.

You need to include the following information when requesting a tunnel:

  • Your WireGuard public key
  • Your GPG public key (optional, but nice to have for extra security like WireGuard PSKs)
  • How many /64 IPv6 subnets you need, aka how many bridges you want to tunnel.
  • What firewall configuration you want:
    • Restricted
      • Only outbound IPv6 and IPv4 connections are permitted.
      • Inbound connections are filtered and only responses/packets from tracked connections are let in.
    • Exposed
      • Also inbound connections are let in on IPv6 and IPv4.
      • You can request to have a few IPv4 ports routed to you.
      • You can request to have subdomains on forkie.dev aswell as RDNS on IPv6.
      • Hosting WebServers is possible thanks to snid. Simply tell users to host an HTTPS server on 443 with your subdomain and IPv4 connections from for example 192.0.2.0 will show up to come from the IPv6 NAT64 subnet of 64:ff9b:1:fffe:80:ff7f::/96, so it would be 64:ff9b:1:fffe:80:ff7f:192.0.2.0 aka 64:ff9b:1:fffe:80:ff7f:c000:200.

To Do

  • Further technical details like blocked ports, assigned IPv6 blocks and IPv4 ports, endpoint of the WireGuard

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current02:34, 14 April 2024Thumbnail for version as of 02:34, 14 April 2024800 × 600 (318 KB)HolyNetworkAdapter (talk | contribs)Uploaded with SimpleBatchUpload

The following page uses this file: