March 18, 2026
Tunnels, tokens & trust issues
A ngrok-style secure tunnel server written in Rust and Open Source
Rust tunnel challenger sparks cheers—and side-eye over paywalls
TLDR: Rustunnel launches as an open-source, Rust-built way to share local apps through secure public links, with self-hosting and early-access tokens for a hosted service. Devs cheer the ngrok alternative after reliability gripes, but debate trust, monetization, and whether it can stay open without a future paywall pivot.
Move over, ngrok—the community just found a shiny new tunnel toy. Meet rustunnel, an open-source, Rust-built way to share your local app with a public link. It supports encrypted connections, a slick dashboard, and nerdy metrics, and you can self-host or try a token-gated hosted server while it’s in early access.
But the real action wasn’t the feature list—it was the comments. One developer dropped a bomb: their vendor banned ngrok URLs as “too unreliable,” accusing the once-beloved service of chasing enterprise AI dreams and leaving devs hanging. Cue the cheering section and quips like “ngrok? more like ng-nope,” while others shouted Rust to the rescue.
Then the vibe shifted to trust. A wary voice warned they’ve been burned by projects that start open and go proprietary, asking the classic: will this stay free and transparent? Another questioned the plan: is this just a DIY ngrok for tinkerers, or a true competitor—and how will it make money without breaking hearts later?
The maintainer chimed in with a friendly invite—grab a token via GitHub issues and kick the tires—earning points for openness. But the crowd’s mood is clear: excitement meets side-eye. Devs want a dependable tunnel tool again, without the paywall plot twist.
Key Points
- •rustunnel is an open-source, Rust-based tunneling server that exposes local services via encrypted WebSocket connections with TLS termination.
- •It supports HTTP and TCP proxying, offers a live dashboard, Prometheus metrics, audit logging, and a REST API.
- •A managed edge server is available at edge.rustunnel.com (Helsinki), requiring manually issued auth tokens via GitHub during early access.
- •Architecture includes ports 80 (HTTP redirect), 443 (HTTPS to yamux streams), 4040 (control-plane WebSocket), 8443 (dashboard/API), 9090 (Prometheus), and 20000+ (TCP tunnels).
- •Production deployment targets Ubuntu 22.04+ with systemd and PEM TLS certificates (Let’s Encrypt recommended), with Docker and detailed setup guides provided; tests require PostgreSQL.