TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Launch HN: Firezone (YC W22) – Zero-trust access platform built on WireGuard

115 点作者 jamilbk9 个月前
Hi HN! I&#x27;m Jamil Bou Kheir, founder of Firezone (<a href="https:&#x2F;&#x2F;www.firezone.dev">https:&#x2F;&#x2F;www.firezone.dev</a>), a remote access platform that is a replacement for legacy corporate VPNs. Built on WireGuard (a fast, modern VPN protocol), Firezone secures your team’s apps, networks and services using access policies synced with your identity provider. You deploy tiny, self-contained binaries into your infrastructure anywhere you need access, and your workforce uses our client apps to reach the resources they protect.<p>Here’s a demo: <a href="https:&#x2F;&#x2F;youtu.be&#x2F;QEv7dJwKMvo" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;QEv7dJwKMvo</a>.<p>Historically, the tool used to achieve this has been the corporate VPN. These work off a security model where you authenticate with the perimeter and gain access to the network behind it, which works when most workers are in office and resources on-prem. But as workers go remote and resources move to the cloud, the perimeter blurs, making it harder to secure.<p>I experienced this issue first-hand as a security engineer hunting for APT malware on Cisco&#x27;s intranet. Malware often landed first on remote employee laptops, then spread from there to critical internal systems. Firewalls were somewhat effective at solving this problem, but they were clunky—it could take months for Infosec to approve requests to allow your team’s app or services through.<p>When Covid forced everyone to work from home, even Cisco struggled to grapple with the increased demand on its VPN concentrators. The perimeter defense model meant that we had to VPN into the intranet to get anything done, and if the speeds were really bad, we couldn&#x27;t work that day.<p>One way to solve the above problems is to break up the single perimeter into many smaller ones, shifting them closer to the resources they protect. That way, compromising one perimeter does not gain you access to all others, and traffic is not bottlenecked through a single choke point. However, now you have many VPN tunnels instead of one, and most VPN protocols are too heavyweight for this.<p>If <i>Cisco</i> was facing these issues with remote access, I thought, others <i>must</i> be facing similar problems. So when WireGuard came along, I started Firezone.<p>WireGuard tunnels are so lightweight you can open thousands of them from an iPhone to whatever resources you need access to. Firezone builds on that and also handles NAT traversal, so you don’t need to change your firewall configuration to use it. Just deploy Gateways - small, statically-linked Linux binaries - where you need access, and Firezone’s homegrown STUN&#x2F;TURN layer (we call “snownet”) handles the rest. If you need more throughput, just deploy more Gateways, and load is balanced across all of them.<p>WireGuard keys are distributed to peers only when access to a particular resource is authorized, and private keys never leave the device’s memory where they were generated. If a Gateway goes offline, Firezone will migrate connections from it to healthy ones within about 10 seconds, without user intervention. We lean heavily on Elixir&#x2F;Phoenix and OTP’s awesome concurrency features to power all of this.<p>Firezone’s access control system is intentionally very simple. Policies define which user groups have access to which resources based on a default-deny system. More perimeters means more rules managing access to them, so we intentionally wanted to keep admins out of “ACL hell” as the number of controls grew.<p>One area we’re actively working to improve is our UI&#x2F;UX - Firezone is a product built by engineers, for engineers, and at times, it shows! Expect refinements to come in this area over the coming months.<p>I’d love for you to give Firezone a try! You can spin up a demo instance at <a href="https:&#x2F;&#x2F;app.firezone.dev&#x2F;try">https:&#x2F;&#x2F;app.firezone.dev&#x2F;try</a> without signing up, and download clients from <a href="https:&#x2F;&#x2F;www.firezone.dev&#x2F;kb&#x2F;client-apps">https:&#x2F;&#x2F;www.firezone.dev&#x2F;kb&#x2F;client-apps</a>. And if you’re curious to learn more about how Firezone works, see for yourself - we build in the open at <a href="https:&#x2F;&#x2F;www.github.com&#x2F;firezone&#x2F;firezone">https:&#x2F;&#x2F;www.github.com&#x2F;firezone&#x2F;firezone</a>.<p>Thanks for reading, and I look forward to your feedback!

17 条评论

jkelleyrtp9 个月前
Hey! I worked on WARP at Cloudflare. I believe Cisco has anyconnect and then there&#x27;s zscaler.<p>I&#x27;m curious how you guys are competing with the other folks in the space. WARP was&#x2F;is a really tough product to maintain (crossplatform networking is very difficult). CF was doing well with WARP mostly due to the distribution advantage. I imagine it&#x27;s harder for startups to break into the space.
评论 #41178421 未加载
评论 #41179856 未加载
评论 #41192637 未加载
评论 #41174868 未加载
gchamonlive9 个月前
At my last job, I implemented Firezone on AWS and it worked like a charm.<p>It was before the refactoring and the move to zero trust, so back then it was a simple admin panel. It was maybe mid 2022 I implemented it.<p>There was a terraform module I created for setting up the basic infrastructure, but there is no way the module supports the current state of the product. I guess it moved way quicker than I was able to follow LOL. The module was accepted in the Firezone group but later discontinued, for obvious reasons. I wish I had the time to contribute to the project supporting an official module for it, but I guess life happens to everyone haha<p>Good luck with the project! This is really good and very needed, the only other alternative being Tailscale, which is all closed source.
评论 #41183617 未加载
xyst9 个月前
Wow, a product that hasn’t shoehorned AI&#x2F;LLM into their offerings. Will be following.<p>Love that you are using rust!
igorguerrero9 个月前
We use it a work, didn&#x27;t know you guys were fresh in the biz, our dev ops guy switched us to you guys, I had no problem, I love that it uses wireguard, our previous provider was a PITA :)
jimmar9 个月前
In the spirit of constructive feedback, spend the time and effort to record your product demonstrations in a more professional environment. Or generate a fake background at a minimum.
评论 #41175350 未加载
评论 #41177660 未加载
评论 #41175282 未加载
评论 #41181317 未加载
cedws9 个月前
I&#x27;m a big fan of Tailscale but it&#x27;s unfortunate that it&#x27;s proprietary, so it&#x27;s really nice to see an open source alternative. The commercial pricing also looks very reasonable. Wishing your product much success.
评论 #41178764 未加载
评论 #41176126 未加载
评论 #41175047 未加载
评论 #41180820 未加载
nmadden9 个月前
I don’t really get the threat model of these “zero trust” appliances and how they are really different from a VPN. Can someone explain it to me? It still looks very much like a perimeter.
评论 #41174838 未加载
评论 #41183561 未加载
mwest2179 个月前
How does this compare with e.g. Tailscale?
评论 #41173684 未加载
评论 #41177706 未加载
phil-martin9 个月前
One of the pain points I’ve experienced with configuration of traditional VPNs is when devices physically connect to different parts of the network when staff travel between home and different offices.<p>For a small example, when working from home, we want to connect to SMB shares over the vpn, with regular traffic going over the regular LAN interface of the computer. When the same person comes into the main office, just use the LAN. The simplest solution is to teach users to make sure they turn their VPN off when in the office, but that’s a super easy step to forget.<p>Could Firezone help managing these quality-of-life details for end users?
评论 #41175018 未加载
computershit9 个月前
Impressive work, congrats on the launch! Aside from the OSS perspective, how would you compare your service to Twingate?
评论 #41173982 未加载
ochronus9 个月前
It&#x27;s really exciting to see this space bloom! Congrats on the launch!
chetanbhasin9 个月前
Since you&#x27;re directly competing with Tailscale, you have to compare the websites. The landing pages and documentation are waaay nicer, IMHO.<p>I see the difference though. Tailscale goes with &quot;secure this and that.&quot; It appears to attract people who don&#x27;t already use a VPN, while you compare it straight to a VPN, which may be more enterprise crowd.<p>I&#x27;m not sure what your exact market is, but for a young startup at the very least, Tailscale marketing and UX appears a lot nicer.
aos9 个月前
Congrats on the launch! Will definitely have to check it out. I see you’re using Phoenix&#x2F;Liveview for the control plane. :-) How has that been working for you?
评论 #41178065 未加载
taekwondo1239 个月前
The concern I have with these types of solutions (meaning Tailscale, Firezone, etc.), is that I need to trust the provider not to mess up or maliciously exchange keys with rouge devices. Is this the case with Firezone as well?<p>I see that tailscale addresses this now somewhat: <a href="https:&#x2F;&#x2F;tailscale.com&#x2F;kb&#x2F;1226&#x2F;tailnet-lock" rel="nofollow">https:&#x2F;&#x2F;tailscale.com&#x2F;kb&#x2F;1226&#x2F;tailnet-lock</a>
评论 #41181596 未加载
评论 #41180148 未加载
评论 #41184674 未加载
somepleb9 个月前
Awesome to see so many solutions in this space and the rapid development. Do you plan to add mesh networking?
altdataseller9 个月前
Not a comment on the actual product but did you use a specific template or stack on the app you show in the demo?
评论 #41176891 未加载
aborsy9 个月前
Tailscale does these things, and does them very well. We have been pretty happy with it.