Project ideas from Hacker News discussions.

Year of the IPv6 Overlay Network

📝 Discussion Summary (Click to expand)

Top Themes from thediscussion

  1. Nebula’s simplicity and onboarding model – many users prefer Nebula for its easy client‑side login (e.g., Google OAuth) and straightforward server‑side handling, seeing it as a cleaner alternative to Tailscale+Headscale.

    “I adore Nebula and half wish I had chosen it instead of Tailscale+Headscale… The biggest downside I’ve found to Tailscale is their ‘network shenanigans’ with firewall rules and route tables on Linux.” – linsomniac

  2. Tailscale pain points – recurring complaints about firewall/routing breakage, WSL networking glitches, and DNS instability that force restarts or reboots.

    “breaks wsl mirrored network to the point a reboot is needed” and “break dns randomly on a Debian system to the point I have a watchdog timer systemd unit to restart tailscaled.” – baq

  3. IPv6 addressing and DNS integration debates – users discuss the trade‑offs between SLAAC and DHCPv6, the lack of native DNS updates for IPv6, and the human‑readability of IPv6 addresses.

    “Other than the long names and lack of DNS integration, it's really a great thing.” – unethical_ban

These themes capture the most frequent topics: Nebula’s perceived advantages, concrete drawbacks of Tailscale, and the broader IPv6/DNS conversation.


🚀 Project Ideas

NebulaConnect OAuth Client

Summary

  • A lightweight Nebula client that authenticates users via Google OAuth (Gmail) and automatically provisions short‑lived certificates tied to their Nebula identity.
  • Eliminates manual key exchange and simplifies onboarding for users who want “grab the client and login with Gmail” experience.

Details

Key Value
Target Audience Nebula users, homelab admins, developers who currently use Tailscale/Headscale and want Gmail‑based login + auto‑cert renewal
Core Feature OAuth login, automatic certificate issuance & rotation, integration with WeEncrypt host‑key storage
Tech Stack Go (Nebula SDK), Google Identity Platform API, Smallstep ACME server (Let’s Encrypt‑style), Electron for UI
Difficulty Medium
Monetization Revenue-ready: subscription $7/mo per user

Notes

  • Directly addresses linsomniac’s comment: “the one thing about headscale that I really like is how easy it is for users to just grab the client and then login using their gmail account”. - Quote from discussion: “I could even imagine a fairly easy to build workstation client that would require end‑users to login to get their refreshed certs once they expire, like we do with Tailscale+Headscale.” - Would delight HN participants looking for a zero‑config, OAuth‑driven Nebula client.

NebulaPort Auto‑Onboard Daemon

Summary

  • A daemon that discovers roaming devices behind NAT and publishes their public endpoint via reversible DNS entries, enabling portable laptops to join a Nebula network without static reverse‑DNS setup.
  • Provides seamless “unboard a portable laptop onto Nebula” functionality.

Details

Key Value
Target Audience Mobile workers, field engineers, homelab users with laptops that move between networks
Core Feature Automatic public‑IP discovery, dynamic reverse‑DNS registration, Nebula identity enrollment
Tech Stack Python (asyncio), gRPC, Cloudflare Workers API for DNS updates, Nebula client library
Difficulty High
Monetization Hobby

Notes- Tackles tarasglek’s uncertainty: “how you would unboard a portable laptop onto Nebula using reverse DNS”.

  • Aligns with rmunn’s desire for a smoother onboarding experience beyond static networks.
  • Potential for discussion on HN as a practical solution to the “reverse DNS” bottleneck.

WeEncrypt Cert Automation Gateway

Summary- An API‑driven service that issues and rotates short‑lived TLS/SSH certificates for Nebula participants, integrating tightly with WeEncrypt’s host‑key store.

  • Provides a Let’s Encrypt‑style workflow for automated cert lifecycle management.

Details

Key Value
Target Audience DevOps teams, server admins using Nebula/WeEncrypt who need automated cert issuance and renewal
Core Feature ACME‑compatible short‑lived cert generation, binding to Nebula host public keys, RESTful issuance endpoint
Tech Stack Go (ACME server), SQLite for state, Docker Compose, OpenSSH certificate signer
Difficulty Medium
Monetization Revenue-ready: usage‑based $0.01 per cert rotation

Notes

  • Solves baq’s pain: “breaks dns randomly on a Debian system” – by abstracting cert management away from manual routing tables.
  • Matches linsomniac’s plan to “add Nebula support to WeEncrypt for automated handing out of the certs”. - Directly quoted from the thread: “I could even imagine a fairly easy to build workstation client that would require end‑users to login to get their refreshed certs once they expire”.

Read Later