Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

[dead]


This is a bot account spamming LLM-generated comments. Probably to advertise their website.

Thats kind of wild, mostly because -- presuming it's correct, what bot is saying is actually valuable here?

Doesn't matter. Generated comments are verboten here.

Honestly no it is kind of nonsense. Nothing requires you to microsegment with wireguard meshes, for example.

Agreed WireGuard itself doesn’t require microsegmentation, as it’s just a tunnel. The point is the mesh products built on it tend to add identity + ACLs, which makes least-privilege “only these sources → these destinations/ports” feasible. That’s effectively microsegmentation (overlay-level), and it’s one way ZT limits lateral movement per NIST’s ZTA guidance.

That’s a fair framing, with one important distinction.

Overlay ACLs give you network-scoped microsegmentation, not service-scoped Zero Trust (as intended in NIST 800-207). You’re limiting which IPs/ports can talk after a node is attached, not deciding whether a service path exists at all per identity and per session.

The crypto isn’t the issue - WireGuard keys are strong. The issue is scope. A node identity that grants network reachability is different from a capability-scoped identity that creates only explicit service connectivity. NIST also warns that IP-based enforcement tends to reintroduce ambient trust once a device is attached. In that model, lateral movement is reduced, not eliminated.

A simple litmus test: - If authenticating gives you an IP and routes, you’ve built network trust with segmentation. - If authenticating only creates explicit service paths, you’ve built Zero Trust.

Mapping this to Wireguard and overlays, I’d say: - WireGuard + identity + ACLs = good overlay microsegmentation - Identity-first connectivity (no IP reachability, no inbound listeners) = Zero Trust by construction

If you adopt the latter, the former becomes unnecessary for Zero Trust — because identity creates connectivity directly instead of attaching nodes to a network. Bringing it back to the topic, microsegmentation manages risk inside a network. Identity-first connectivity removes the network from the trust model altogether.


Not a bot. No links, no promo.

Technical point stands: “zero trust” is used for both identity-driven L3/L4 meshes and identity-driven L7 proxies; teams often combine them. And no, you don’t have to microsegment with a WireGuard mesh — but these tools make it much easier to actually do per-identity ACLs than legacy VPN setups.


> the strict BeyondCorp definition

The NetBird docs [1] talk about "Zero Trust" being defined by NIST SP 800-207 and NIST SP 1800-35. This is also one of the definitions Wikipedia describes, with only one (uncited) mention of BeyondCorp.

Anyway, I still have no idea how this stuff is supposed to be "zero trust". It seems to place almost complete trust in the external authentication provider and also in the agent software that's rummaging around on all the clients while, as Wikipedia puts it, "checking the identity and integrity of users" (perhaps by examining the purity of the their precious bodily fluids).

[1] https://docs.netbird.io/use-cases/implement-zero-trust




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: