A Smart Ethernet Switch for Earth

zerotier.com

#network #mesh #nebula #tailscale #softnetwork #vpn #cpp

Adam Ierymenko a548c7ea71 Merge pull request #2482 from zerotier/otel há 2 dias atrás
.github 6667c57e89 add 'apt update' to validation action, as prior runs have started failing due to a stale package cache há 3 semanas atrás
artwork 298e1d5a74 Added 90x90 AppIcon há 6 anos atrás
attic 307befa892 Rename C25519.* to ECC.* há 10 meses atrás
ci 2115b18ae3 new drone bits há 2 anos atrás
controller 307c4ed4b6 network/member deletes work now há 3 semanas atrás
debian b7a6e106fd Version increments. há 9 meses atrás
doc 448df73a35 Fix minor spelling errors in docs há 1 ano atrás
ext a548c7ea71 Merge pull request #2482 from zerotier/otel há 2 dias atrás
include 16dd3fd7af Windows build fixes from clang-format, disable for Windows include order há 4 semanas atrás
java e32fecd16d Thread might actually be detached, so need to handle that há 1 ano atrás
node 7473d1942d Merge changes from dev há 4 semanas atrás
osdep 69de477d0b Merge branch 'dev' into dev-extosdep há 1 mês atrás
pkg 2f3ea8882b Merge branch 'dev' into ChrisCarini/addArchToSynologyDSM7 há 1 ano atrás
rule-compiler 1982071d46 1.14.0 version bump for Linux and macOS, date update. há 1 ano atrás
rustybits 67e8f344ac Rust warning removal, clippy allows, update library versions. há 3 semanas atrás
service a548c7ea71 Merge pull request #2482 from zerotier/otel há 2 dias atrás
tcp-proxy ba2a4a605c clang-format há 1 mês atrás
windows b12bc59b57 Update incllude path for Windows builds to include otel api headers há 3 semanas atrás
.clang-format 63fd2cbaeb Add ZeroTier standard .clang-format -- Keeping tabs for 1.X line. Mostly based on LLVM format. há 4 anos atrás
.clangd 7647c8e8d1 Rename ECC key and signature size defines to be generic. há 10 meses atrás
.dockerignore c9f942f79b can now build centos8 docker container with Redis support há 5 anos atrás
.gitattributes 6cfdd5b2c1 force eol=crlf for driver .inf files há 4 anos atrás
.gitignore 815c20c822 windows installer changes: add auto-startup shortcut for UI and auto-restart backend on failure há 2 semanas atrás
CMakeLists.txt 12c621c230 Removed build flag in CMake script há 7 anos atrás
COPYING 9e4ce68444 clean out some stuff há 10 meses atrás
Dockerfile.ci a9942ca412 more RELEASE-NOTES há 3 anos atrás
Dockerfile.release e1c72e6d51 add `make docker-release` command & update dockerfile há 10 meses atrás
LICENSE.txt a71e0bf551 Merge branch 'dev' into 1.14.0 há 1 ano atrás
Makefile ba2a4a605c clang-format há 1 mês atrás
OFFICIAL-RELEASE-STEPS.md 9e4ce68444 clean out some stuff há 10 meses atrás
README.docker.md f2521c8536 Allow setting local.conf content from Docker environment variable há 4 meses atrás
README.md 280cc77e23 Update README.md minimal compilers há 1 ano atrás
RELEASE-NOTES.md b7a6e106fd Version increments. há 9 meses atrás
SECURITY.md e59790b401 Update security readme. há 1 ano atrás
cycle_controllers.sh 0da2efa633 add application_name to pgbouncer connectio string há 6 anos atrás
entrypoint.sh.release f2521c8536 Allow setting local.conf content from Docker environment variable há 4 meses atrás
make-bsd.mk 8e6e4ede6d Add prometheus metrics for Central controllers (#1969) há 2 anos atrás
make-linux.mk 4aea588eef fixes for otel in non-controller build há 3 semanas atrás
make-mac.mk 7f835b414a include the otel header-only part directly for ease of use há 3 semanas atrás
make-netbsd.mk 18c9dc8a06 fix RTF_MULTICAST and g++ -w há 8 anos atrás
objects.mk 3f19712178 inheritence mess cleanup há 3 semanas atrás
one.cpp e22c80dce6 Merge branch 'dev' into dev-extosdep há 4 semanas atrás
selftest.cpp 8b77ef538a self test fixes há 1 mês atrás
update_controllers.sh 3d21f0a91f update docker registry used há 6 anos atrás
version.h 2c2574e182 instantiate and configure otel for controllers há 3 semanas atrás
windows-clean.bat 38058450ce Revise Windows build to VS2022. há 3 anos atrás
zerotier-cli-completion.bash c92e030a4b Create a bash completion script. há 5 anos atrás
zerotier-one.spec b7a6e106fd Version increments. há 9 meses atrás

README.docker.md

ZeroTier One in a container!

NOTE: Most of this information pertains to the docker image only. For more information about ZeroTier, check out the repository: here or the commercial website.

ZeroTier is a smart programmable Ethernet switch for planet Earth. It allows all networked devices, VMs, containers, and applications to communicate as if they all reside in the same physical data center or cloud region.

This is accomplished by combining a cryptographically addressed and secure peer to peer network (termed VL1) with an Ethernet emulation layer somewhat similar to VXLAN (termed VL2). Our VL2 Ethernet virtualization layer includes advanced enterprise SDN features like fine grained access control rules for network micro-segmentation and security monitoring.

All ZeroTier traffic is encrypted end-to-end using secret keys that only you control. Most traffic flows peer to peer, though we offer free (but slow) relaying for users who cannot establish peer to peer connections.

The goals and design principles of ZeroTier are inspired by among other things the original Google BeyondCorp paper and the Jericho Forum with its notion of "deperimeterization."

Visit ZeroTier's site for more information and pre-built binary packages. Apps for Android and iOS are available for free in the Google Play and Apple app stores.

ZeroTier is licensed under the BSL version 1.1. See LICENSE.txt and the ZeroTier pricing page for details. ZeroTier is free to use internally in businesses and academic institutions and for non-commercial purposes. Certain types of commercial use such as building closed-source apps and devices based on ZeroTier or offering ZeroTier network controllers and network management as a SaaS service require a commercial license.

A small amount of third party code is also included in ZeroTier and is not subject to our BSL license. See AUTHORS.md for a list of third party code, where it is included, and the licenses that apply to it. All of the third party code in ZeroTier is liberally licensed (MIT, BSD, Apache, public domain, etc.).

Building the docker image

Due to the network being a substrate for most applications and not an application unto itself, it makes sense that many people would want to build their own image based on our formula.

The image is based on debian:buster.

The Dockerfile.release file contains build instructions for building the described image in the rest of the README. The build is multi-arch and multi-release capable.

These build arguments power the build:

  • PACKAGE_BASEURL: The base URL of the package repository to fetch from. (default: https://download.zerotier.com/debian/buster/pool/main/z/zerotier-one/)
  • ARCH: The architecture of the package, in debian format. Must match your image arch. (default: amd64)
  • VERSION: REQUIRED the version of ZeroTier to fetch.

You can build this image like so:

docker build -f Dockerfile.release -t mybuild --build-arg VERSION=1.6.5 .

Using the docker image

The entrypoint.sh in the docker image is a little different; zerotier will be spawned in the background and the "main process" is actually just a sleeping shell script. This allows zerotier-one to gracefully terminate in some situations largely unique to docker.

The zerotier/zerotier image requires the CAP_NET_ADMIN capability and the /dev/net/tun device must be forwarded to it.

To join a network, simply supply it on the command-line; you can supply multiple networks.

docker run --name myzerotier --rm --cap-add NET_ADMIN --device /dev/net/tun zerotier/zerotier:latest abcdefdeadbeef00

Once joining all the networks you have provided, it will sleep until terminated. Note that in ZeroTier, joining a network does not necessarily mean you have an IP or can do anything, really. You will want to probe the control socket:

docker exec myzerotier zerotier-cli listnetworks

To ensure you have a network available before trying to listen on it. Without pre-configuring the identity, this usually means going to the central admin panel and clicking the checkmark against your zerotier identity.

Environment Variables

You can control a few settings including the identity used and the authtoken used to interact with the control socket (which you can forward and access through localhost:9993).

  • ZEROTIER_JOIN_NETWORKS: additional way to set networks to join.
  • ZEROTIER_API_SECRET: replaces the authtoken.secret before booting and allows you to manage the control socket's authentication key.
  • ZEROTIER_IDENTITY_PUBLIC: the identity.public file for zerotier-one. Use zerotier-idtool to generate one of these for you.
  • ZEROTIER_IDENTITY_SECRET: the identity.secret file for zerotier-one. Use zerotier-idtool to generate one of these for you.
  • ZEROTIER_LOCAL_CONF: Sets the the local.conf file content for zerotier-one

Tips

  • Forwarding port <dockerip>:9993 to somewhere outside is probably a good idea for highly trafficked services.
  • Forwarding localhost:9993 to a control network where you can drive it remotely might be a good idea, just be sure to set your authtoken properly through environment variables.
  • Pre-generating your identities could be much simpler to do via our terraform plugin