netbird

Connect your devices into a single secure private WireGuard®-based mesh network with SSO/MFA and simple access controls.

BSD-3-CLAUSE License

Stars
8.7K
Committers
51

Bot releases are hidden (Show)

netbird - v0.22.4

Published by mlsmaycon about 1 year ago

This release brings Always-on VPN connectivity to the android app. To enable always for the NetBird app, you first need to go to your Network & Internet settings -> Advanced -> Check the gear icon for the NetBird app and enable always-on VPN.

A new dashboard version has been released with support for group management and quick group update for peers, users, and setup-keys.

Now you can edit groups for all resources from the main view:

You can remove groups that are not in use by other resources in the settings view:

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.22.3...v0.22.4

netbird - v0.22.3

Published by mlsmaycon about 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.22.2...v0.22.3

netbird - v0.22.2

Published by mlsmaycon about 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.22.1...v0.22.2

netbird - v0.22.1

Published by mlsmaycon about 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.22.0...v0.22.1

netbird - v0.22.0

Published by braginini about 1 year ago

In this release, we are adding support to the PKCE authentication flow for NetBird's client software. Most identity providers support this flow, effectively bringing SSO support to Azure AD and Google Workspace deployments. You can review the updated configuration for these providers at https://docs.netbird.io/selfhosted/identity-providers

Another highlight of this release is using eBPF to reduce the number of ports used in the proxy between the kernel Wireguard interface and our ICE agent for relayed connections. This is an initial step towards using more efficient resource utilization.

To use eBPF proxy in more restricted environments like docker containers or Nix OS, we need to add the following permissions: --cap-add=SYS_ADMIN and --cap-add=SYS_RESOURCE .
If client don't have these permissions, it will fallback to the previous proxy mode with one port listener per relay connection.

Lastly, a better DNS handling is included for file resolver and macOS DNS, now we are failing over to existing local DNS addresses when there is a connectivity issue.

Management

  • Add PKCE authorization flow support (#1012)

Client

  • Add eBPF proxy for relayed connections (#911)
  • Add PKCE authorization flow support (#1012)
  • Keep system nameservers as DNS fallback (#1036)

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.11...v0.22.0

netbird - v0.21.11

Published by mlsmaycon about 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.10...v0.21.11

netbird - v0.21.10

Published by mlsmaycon about 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.9...v0.21.10

netbird - v0.21.9

Published by mlsmaycon about 1 year ago

What's Changed

New Contributors

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.8...v0.21.9

netbird - v0.21.8

Published by braginini over 1 year ago

This release brings improvements to the Network Routes UI/UX simplifying the visualization and routes creation.

image

You can also add route from the peer details view

image

And easily configure network routes high availability

image

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.7...v0.21.8

netbird - v0.21.7

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.6...v0.21.7

netbird - v0.21.6

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.5...v0.21.6

netbird - v0.21.5

Published by mlsmaycon over 1 year ago

This release improves the network routes features, a new IDP provider, and bug fixes.

Before this release, if you had a local peer range like 192.168.0.0/16 and a network route with 192.168.0.0/24, the NetBird client (agent) wouldn't apply it to the as it couldn't verify if the existing range matched the incoming route. Now the agent validates that and is able to configure this route, it also checks if the peer's default gateway is not part of the incoming route, to avoid any disconnection.

Another highlight is the integration with Google Workspace IDP; Now, you can directly use Google's Oauth2 with our management system. See docs at https://docs.netbird.io/selfhosted/identity-providers#google-workspace

Changelog summary

Management

Client

  • Refactor check logic when adding routes (#945)
  • Reduce the peer status notifications (#956)
  • ACL firewall manager fix/improvement (#970)

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.4...v0.21.5

netbird - v0.21.4

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.3...v0.21.4

netbird - v0.21.3

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.2...v0.21.3

netbird - v0.21.2

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.1...v0.21.2

netbird - v0.21.1

Published by mlsmaycon over 1 year ago

What's Changed

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.21.0...v0.21.1

netbird - v0.21.0

Published by mlsmaycon over 1 year ago

Release Notes

The new version introduces source port and protocol Access control, integration with different Identity Providers, and refactored the Setup-keys dashboard screen. We are changing setup-keys' behavior by displaying them only at creation time.

In previous weeks we released a new version of our documentation website, which included our public API docs.

Source port and protocol access control

You can add access control rules based on the source port and protocol. This feature is useful when you want to access a specific port or protocol; for example, you can allow access to port 80 (HTTP) only from a specific group of peers.

Currently, directional rules (source to destination) are available only to UDP and TCP protocols.

The feature is available on all platforms, read more at https://docs.netbird.io/how-to/manage-network-access#managing-rules

Identity Providers

We have added better integration with various IDP providers, now you will have a map between user IDs and email address from your IDP of choice. This feature is useful when you want to manage an auto-grouping or role of a specific user.

Currently, we support the following IDPs:

  • Azure AD
  • Okta
  • Keycloak
  • Authentik
  • Zitadel
  • Auth0

See the documentation for more information.

Google support is in the works and will be available soon.

Setup-keys

New setup-key popup:

Display once setup-key:

New setup-keys view:

New Documentation website and API docs live

In case you missed it, we have released a new version of our documentation site (https://docs.netbird.io), which includes a new design, with dark mode support, search bar and our public API documentation (https://docs.netbird.io/api).

Happy hacking the API!

Changelog summary

Management

  • Refactor IdP Config Structure (#879)
  • Add Authentik IdP (#897)
  • Add Okta IdP (#859)
  • Support IDP manager configuration with configure.sh (#843)

Client

  • Add force relay conn env var for debug purpose (#904)
  • Fix connection listener (#777)
  • Feat firewall support (#805)
  • Feature/android route notification (#868)
  • Add selfhosted metrics for PATs and service users (#913)

Dashboard

Misc

  • Fix Github release dependency for MacOS (#908)
  • Added nginx template proxy (#867)

Big thanks to our new contributors

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.20.7...v0.21.0

netbird - v0.20.8

Published by mlsmaycon over 1 year ago

  • Prevent peer updates if the status is not changing from disconnected to connected and vice versa.
  • Fixed route score calculation, added tests and changed the log message
  • Fixed installer /usr/local/bin creation

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.20.7...v0.20.8

netbird - v0.20.7

Published by mlsmaycon over 1 year ago

Fix the wrong installer log path

Full Changelog: https://github.com/netbirdio/netbird/compare/v0.20.5...v0.20.7

netbird - v0.20.6

Published by mlsmaycon over 1 year ago