dn42
dn42[lower-alpha 1] is a decentralized peer-to-peer network built using VPNs and software/hardware BGP routers.[1][2][3][4]
While other darknets try to establish anonymity for their participants, that is not what dn42 aims for. It is a network to explore routing technologies used in the Internet and tries to establish direct non-NAT-ed connections between the members.
The network is not fully meshed. dn42 uses mostly tunnels instead of physical links between the individual networks. Each participant is connected to one or more other participants.[5][6] Over the VPN or the physical links, BGP is used for inter AS routing. While OSPF is the most commonly used protocol for intra AS routing, each participant is free to choose any other IGP, like Babel, inside their AS.[7]
History
The DN42 project grew out of the popular PeerIX project started by HardForum members in mid-2009. The PeerIX project, while small in initial numbers grew to over 50 active members with a backlog of 100 requests to join the network. Ultimately the project was unable to meet the demand of user scale and eventually deprecated (though many of the core member team still have their networks online.)[8]
The founding members of the DN42 project tried to unsuccessfully rekindle the PeerIX project(through the private google group) and instead formed their own IPv6 only network, successfully scaling it to the size it is today.
Technical setup
Address space
Network address space for IPv4 consists of private subnets: 172.20.0.0/14 is the main subnet.[9] Note that other private address ranges may also be announced in dn42, as the network is interconnected with other similar projects. Most notably, ChaosVPN uses 172.31.0.0/16 and parts of 10.0.0.0/8,[10] Freifunk IC-VPN uses 10.0.0.0/8 [11] and NeoNetwork uses 10.127.0.0/16.[12]
For IPv6, Unique Local Address (ULA, the IPv6 equivalent of private address range) (fd00::/8)[9] are used. Please note that IPv6 addresses within this range are also utilized by other networks, such as NeoNetwork employing fd10:127::/32[12] and CRXN utilizing segments of fd00::/8.[13]
AS numbers
In order to use BGP, even in a private environment, autonomous system numbers are needed. dn42 uses several private or reserved AS number ranges, including 64512 to 64855 and 76100 to 76199.[14] Since June 2014, dn42 is now using a new private range, 4242420000 to 4242429999,[15] part of larger private range defined by RFC 6996.
BGP routers
While some participants use hardware routers, most participants use general purpose servers or virtual machines to lower their cost. The most commonly used BGP implementations used in dn42 are BIRD and FRR, but some participants use OpenBGPD, XORP, GoBGP or the implementation of JunOS or Cisco IOS.[16]
DN42 TLD
Websites and services hosted on the Dn42 network often use the dn42 top-level domain. The dn42 tld is not an official IANA top-level domain, but it is handled through the dn42 registry. Internal anycast servers for dn42 are found at 172.20.0.53, 172.23.0.53, and fd42:d42:d42:54::1, fd42:d42:d42:53::1.
Registry
To ensure uniform administration of IP addresses and domains, there is also a registry in dn42, as in Clearnet. This is based on Git[17] in dn42 and therefore also offers the option of storing these in a decentralized manner. Furthermore, all changes can be clearly traced back to an author. To make a change in the dn42 (e.g. a registration[18]), a pull request is created with the corresponding change. One of the registry maintainers then looks at this, validates it (including syntactically) and also verifies it (checking the authorization and signature). A participant must be authorized to make a change. This is verified by a signature using a GPG or SSH key.[19]
Interconnections
The dn42 maintains a number of links to similar projects:[20]
Name | v4 | v6 | TLD |
---|---|---|---|
NeoNetwork | X | X | .neo |
Freifunk IC-VPN | X | X | Various |
ChaosVPN | X | X | .hack |
CRXN[21] | X | .crxn |
Certificate Authority
The dn42 has its own (unofficial) Certificate Authority (CA).[22] This can be used to issue TLS certificates, for example for HTTPS. Ownership can be verified with ACME, as with Let's Encrypt.
In addition, the NeoNetwork also operates its own CA for the .neo TLD and the associated network area.[23] The ChaosVPN, IC-VPN and the CRXN do not have a CA. In order to prevent the CA from issuing certificates for Clearnet addresses, name constraints[24] are used which limit the name validity range of the CA. This means that the CA cannot be used for Clearnet addresses.
Services
The following is a selection of services in the dn42:
Service | v4 | v6 | DNS |
---|---|---|---|
Basic "What is my IP service"-Service | 172.20.0.81 | fd42:d42:d42:81::1 | http://myip.dn42/ |
dn42 wiki | 172.23.0.80 | fd42:d42:d42:80::1 | https://wiki.dn42/ / https://internal.dn42/ |
Internal dn42 IRC | irc.dn42 | ||
Global Route Collector | 172.20.129.4 | fd42:4242:2601:ac12::1 | 172.20.129.4 |
Notes
- ↑ Abbreviation of Decentralized network 42
References
- ↑ "Home". https://dn42.dev/Home.
- ↑ Tian, Lan. "DN42 Experimental Network: Intro and Registration (Updated 2022-12)" (in en). https://lantian.pub/en/article/modify-website/dn42-experimental-network-2020.lantian.
- ↑ "Prelude: Connecting to the DN42 Overlay Network". https://www.jamieweb.net/blog/bgp-routing-security-prelude-connecting-to-the-dn42-overlay-network/.
- ↑ Usman (2021-11-22). "DN42 Part 1: Connecting to the DN42 BGP Mesh" (in en). https://blog.usman.network/posts/dn42-bgp/.
- ↑ "DN42 Network Map". nixnode. http://map.nixnodes.net. Retrieved 19 April 2021.
- ↑ "DN42 Network Infos (with map)". Strategic Explorations. https://bgp42.strexp.net. Retrieved 19 April 2021.
- ↑ "Multiple servers on dn42: iBGP and IGPs | jlu5". https://jlu5.com/blog/dn42-multiple-servers-ibgp-igps.
- ↑ "PeerIX - Official thread" (in en-US). https://hardforum.com/threads/peerix-official-thread.1440954/.
- ↑ 9.0 9.1 "dn42 address space". https://dn42.dev/services/Whois#Address-space. Retrieved 19 April 2021.
- ↑ "ChaosVPN IP ranges". http://wiki.hamburg.ccc.de/ChaosVPN:IPRanges. Retrieved 19 April 2021.
- ↑ "ICVPN IP ranges". https://github.com/freifunk/icvpn-meta. Retrieved 19 April 2021.
- ↑ 12.0 12.1 "NeoNetwork Github Repo". https://github.com/NeoCloud/NeoNetwork.
- ↑ "Prefix allocation and registration - CRXN". https://deavmi.assigned.network/projects/crxn/getting-started/registration/#generating-a-prefix-allocation.
- ↑ "Frequently Asked Questions". https://dn42.dev/FAQ#frequently-asked-questions_why-are-you-using-asn-in-the-76100-76199-range. Retrieved 19 April 2021.
- ↑ "AS numbers". https://dn42.dev/Services/Whois#AS-numbers. Retrieved 19 April 2021.
- ↑ "What BGP daemon should I use?". https://dn42.dev/FAQ#frequently-asked-questions_what-bgp-daemon-should-i-use. Retrieved 22 April 2018.
- ↑ "FAQ". https://dn42.dev/FAQ.md#does-the-registry-use-monotone-or-git.
- ↑ "Getting-Started". https://dn42.dev/howto/Getting-Started.
- ↑ "Registry-Authentication". https://dn42.dev/howto/Registry-Authentication.md.
- ↑ "Interconnections". https://dn42.dev/internal/Interconnections.md.
- ↑ Velloza Kildaire, Tristan B. (2023-01-31). "Announcing the CRXNxDN42 inter-connect!". https://deavmi.assigned.network/blog/announcing-crxn-dn42-interconnect/.
- ↑ "Certificate-Authority". https://dn42.dev/services/Certificate-Authority.md.
- ↑ "NeoNetwork/ca/neonetwork.crt at master · NeoCloud/NeoNetwork" (in en). https://github.com/NeoCloud/NeoNetwork/blob/master/ca/neonetwork.crt.
- ↑ "Certificate-Authority". https://dn42.dev/services/Certificate-Authority.md#testing-constraints.
External links
Original source: https://en.wikipedia.org/wiki/Dn42.
Read more |