Encrypted, decentralized peer-to-peer networking with automatic NAT traversal, mesh DNS, and zero-trust routing all written in Go.
IKpsk2 handshake with ChaCha20-Poly1305 encryption. Mutual authentication and forward secrecy built in.
Direct peer connections with coordinator-assisted discovery. WebSocket relay fallback when NAT won't budge.
Automatic NAT traversal, mesh DNS resolution, and policy-based packet filtering across all nodes.
TunnelMesh turns any collection of nodes into a fully-routed, encrypted mesh. Deploy on bare metal, cloud VMs, containers — or all three at once.
| Name | Mesh IP | Latency | Throughput | Status |
|---|---|---|---|---|
| node-nyc-1 | 100.64.0.2 | 1.2ms | 940 Mbps | online |
| node-ams-1 | 100.64.0.3 | 18.4ms | 620 Mbps | online |
| node-sgp-1 | 100.64.0.4 | 82.1ms | 310 Mbps | online |
| laptop-dev | 100.64.0.9 | — | — | offline |
| Port | Proto | Action | From Peer | Expires |
|---|---|---|---|---|
| 22 | TCP | allow | any | — |
| 443 | TCP | allow | any | — |
| 8080 | TCP | allow | any | 2h 14m |
| * | UDP | deny | any | — |
Every coordinator ships with a fully-featured object store — no separate infrastructure required. Store, version, and replicate files across the entire mesh with standard S3 semantics.
gpu-01, gpu-02, gpu-03mesh-vlan-42s3://ml-sandbox/imagenet-v2Epoch 12 converged — loss 0.0312, accuracy 96.1%. See metrics.csv for full breakdown.
| Name | Address | Transport | Latency | Throughput | Status |
|---|---|---|---|---|---|
| gpu-01 | 100.64.0.2 | UDP | 1.2ms | 940 Mbps | online |
| gpu-02 | 100.64.0.3 | UDP | 2.4ms | 880 Mbps | online |
| coordinator | 100.64.0.1 | SSH | 0.8ms | — | online |
TunnelMesh's web dashboard goes beyond network ops. A built-in markdown editor and dataframe viewer let researchers document experiments and inspect results without leaving the secure mesh boundary.
Write and publish experiment notes, runbooks, and model cards directly inside the mesh — served from S3, never exposed externally.
Inspect Parquet and CSV files stored in S3 straight from the dashboard. Filter, sort, and share slices with RBAC-controlled links.
Route GPU cluster traffic over the mesh for fully isolated training runs. No cloud egress, no data leakage, full audit trail.
SSH key-based identity. Every peer cryptographically proves who they are via Noise IKpsk2 before any data flows.
UDP hole-punching with PCP, NAT-PMP, and UPnP port mapping. Automatic relay fallback over WebSocket.
Automatic DNS resolution for all mesh peers. Reach any node by name — no /etc/hosts hacks required.
Built-in S3-compatible store with replication, versioning, deduplication, and RBAC across the mesh.
Auto port-forwarding rules when containers start. Real-time stats, container control via web UI.
Prometheus metrics, Grafana dashboards, Loki log aggregation — built in from the ground up, not bolted on.
Deploy your first encrypted mesh network in minutes. Open source, self-hosted.