clan-core/docs/site/getting-started/mesh-vpn.md

98 lines
3.4 KiB
Markdown
Raw Normal View History

2024-05-10 20:59:45 +00:00
# Mesh VPN
2023-09-29 15:36:29 +00:00
This guide provides detailed instructions for configuring
[ZeroTier VPN](https://zerotier.com) within Clan. Follow the
outlined steps to set up a machine as a VPN controller (`<CONTROLLER>`) and to
include a new machine into the VPN.
2024-04-26 09:07:33 +00:00
## Concept
By default all machines within one clan are connected via a chosen network technology.
```{.no-copy}
2024-04-26 09:07:33 +00:00
Clan
Node A
<-> (zerotier / mycelium / ...)
Node B
```
If you select multiple network technologies at the same time. e.g. (zerotier + yggdrassil)
You must choose one of them as primary network and the machines are always connected via the primary network.
## 1. Set-Up the VPN Controller
2023-09-29 15:36:29 +00:00
The VPN controller is initially essential for providing configuration to new
peers. Once addresses are allocated, the controller's continuous operation is not essential.
2023-09-29 15:36:29 +00:00
1. **Designate a Machine**: Label a machine as the VPN controller in the clan,
referred to as `<CONTROLLER>` henceforth in this guide.
2024-04-26 09:20:43 +00:00
2. **Add Configuration**: Input the following configuration to the NixOS
2023-09-29 15:36:29 +00:00
configuration of the controller machine:
```nix
clan.networking.zerotier.controller = {
enable = true;
public = true;
};
```
2024-04-26 09:20:43 +00:00
3. **Update the Controller Machine**: Execute the following:
2024-04-10 16:40:07 +00:00
```bash
clan machines update <CONTROLLER>
2023-09-29 15:36:29 +00:00
```
Your machine is now operational as the VPN controller.
2024-04-26 09:07:33 +00:00
## 2. Add Machines to the VPN
2023-09-29 15:36:29 +00:00
To introduce a new machine to the VPN, adhere to the following steps:
1. **Update Configuration**: On the new machine, incorporate the following to its
2023-09-29 15:36:29 +00:00
configuration, substituting `<CONTROLLER>` with the controller machine name:
```nix
{ config, ... }: {
2024-06-17 10:42:28 +00:00
clan.networking.zerotier.networkId = builtins.readFile (config.clan.core.clanDir + "/machines/<CONTROLLER>/facts/zerotier-network-id");
2023-09-29 15:36:29 +00:00
}
```
1. **Update the New Machine**: Execute:
2024-04-10 16:40:07 +00:00
```bash
2023-09-29 15:36:29 +00:00
$ clan machines update <NEW_MACHINE>
```
Replace `<NEW_MACHINE>` with the designated new machine name.
2024-04-26 09:20:43 +00:00
!!! Note "For Private Networks"
1. **Retrieve the ZeroTier ID**: On the `new_machine`, execute:
```bash
$ sudo zerotier-cli info
```
Example Output:
```{.console, .no-copy}
200 info d2c71971db 1.12.1 OFFLINE
```
, where `d2c71971db` is the ZeroTier ID.
2. **Authorize the New Machine on the Controller**: On the controller machine,
execute:
```bash
$ sudo zerotier-members allow <ID>
```
Substitute `<ID>` with the ZeroTier ID obtained previously.
2. **Verify Connection**: On the `new_machine`, re-execute:
2024-04-10 16:40:07 +00:00
```bash
2023-09-29 15:36:29 +00:00
$ sudo zerotier-cli info
```
The status should now be "ONLINE":
```{.console, .no-copy}
200 info d2c71971db 1.12.1 ONLINE
```
2024-04-14 13:18:16 +00:00
!!! success "Congratulations!"
The new machine is now part of the VPN, and the ZeroTier
configuration on NixOS within the Clan project is complete.
2023-09-29 15:36:29 +00:00
2024-04-26 09:07:33 +00:00
## Further
2024-04-17 16:26:37 +00:00
2024-04-26 09:07:33 +00:00
Currently you can only use **Zerotier** as networking technology because this is the first network stack we aim to support.
2024-04-17 16:26:37 +00:00
In the future we plan to add additional network technologies like tinc, head/tailscale, yggdrassil and mycelium.
2024-04-26 09:07:33 +00:00
We chose zerotier because in our tests it was a straight forwards solution to bootstrap.
It allows you to selfhost a controller and the controller doesn't need to be globally reachable.
Which made it a good fit for starting the project.