dn42.dev
Open in
urlscan Pro
2606:4700:3037::ac43:939d
Public Scan
Submitted URL: https://ckhan.dana-team.com/
Effective URL: https://dn42.dev/Home
Submission: On May 29 via api from US — Scanned from DE
Effective URL: https://dn42.dev/Home
Submission: On May 29 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /gollum/search
<form class="search-form" action="/gollum/search" method="get" id="search-form">
<input type="text" class="form-control input-block" name="q" id="search-query" placeholder="Search" aria-label="Search site" autocomplete="off">
</form>
Name: rename — POST /gollum/rename/Home.md
<form name="rename" method="POST" action="/gollum/rename/Home.md">
<input type="hidden" name="rename">
<input type="hidden" name="message">
</form>
Text Content
☰ CURRENT PAGE Home History MAIN MENU Home Overview Latest Changes Home Overview Latest Changes History HOME ABOUT DN42 dn42 is a big dynamic VPN, which employs Internet technologies (BGP, whois database, DNS, etc). Participants connect to each other using network tunnels (GRE, OpenVPN, WireGuard, Tinc, IPsec) and exchange routes thanks to the Border Gateway Protocol. Network addresses are assigned in the 172.20.0.0/14 range and private AS numbers are used (see registry) as well as IPv6 addresses from the ULA-Range (fd00::/8) - see FAQ. A number of services are provided on the network: see internal (only available from within dn42). Also, dn42 is interconnected with other networks, such as ChaosVPN or some Freifunk networks. Still have questions? We have FAQs listed. WHY DN42? dn42 can be used to learn networking and to connect private networks, such as hackerspaces or community networks. But above all, experimenting with routing in dn42 is fun! EXPERIMENT WITH ROUTING TECHNOLOGY Participating in dn42 is primarily useful for learning routing technologies such as BGP, using a reasonably large network (> 1500 AS, > 1700 prefixes). Since dn42 is very similar to the Internet, it can be used as a hands-on testing ground for new ideas, or simply to learn real networking stuff that you probably can't do on the Internet (BGP multihoming, transit). The biggest advantage when compared to the Internet: if you break something in the network, you won't have any big network operator yelling angrily at you. CONNECT HACKERSPACES dn42 is also a great way to connect hacker spaces in a secure way, so that they can provide services to each other. Have you ever wanted to SSH on your Raspberry Pi hosted at your local hacker space and had trouble doing so because of NAT? If your hacker space was using dn42, it could have been much easier. Nowadays, most end-user networks use NAT to squeeze all those nifty computing devices behind a single public IPv4 address. This makes it difficult to provide services directly from a machine behind the NAT. Besides, you might want to provide some services to other hackerspaces, but not to anybody on the Internet. dn42 solves this problem. By addressing your network in dn42, your devices can communicate with all other participants in a transparent way, without resorting to this ugly thing called NAT. Of course, this doesn't mean that you have to fully open your network to dn42: similarly to IPv6, you can still use a firewall (but you could, for instance, allow incoming TCP 22 and TCP 80 from dn42 by default). If your hackerspace is actually using dn42 to provide some services, please let us know! (on this wiki or on the mailing list). It's very rewarding when the network is actually used for something :) JOIN OR CONTACT US dn42 is operated by a group of volunteers. There is no central authority which controls or impersonates the network. Take a look at the contact page to see how to collaborate or contact us. The Getting started page helps you to get your first node inside the network. EXTERNAL RESOURCES ABOUT DN42 * Wikipedia about dn42 * Lecture on 26c3 * Lecture on GPN8 * nobody about dn42 * Lecture on mrmcd0x8 * dn42-category in hackerspaces.org wiki * pentaradio24 – german podcast * dn42 in your browser * dn42 in your terminal PARTICIPANT GROUPS * SpaceBoyz * CCC Aachen (German) * CCC Bremen (German) * CCC Darmstadt (German) * CCC Dresden (German) * CCC Düsseldorf (German) * CCC Munich (German) * Chaostreff Chemnitz (German) * /dev/nulll * freifunk (German) * NoName e.V. Heidelberg (German) * raumzeitlabor/hackerspace rhein-neckar (German) * Hackerspace Brussels (HSB) * [hsmr] / Hackspace Marburg (German) * Whitespace (0x20) * Revelation Space (Dutch) * SNE group * smrsh * Breizh-Entropy (French) * Fédération FDN (French) * Le LOOP (French) * Hackerspace Bielefeld (German) * fixmix Technologies Ltd * Strategic Explorations Ltd * perchnet (VPS donated by Evolution Host) ABOUT THIS WIKI This wiki is the main reference about dn42. It is available in read-only mode from the Internet here or here or here or here or here or here or here (v6 only) and for editing from within dn42, at https://wiki.dn42 - https required for editing. DN42 LOGO An svg of the DN42 Logo is available here. * Home * Getting Started * Registry Authentication * Address Space * BGP communities * FAQ * How-To * Wireguard * Openvpn * IPsec With Public Keys * Tinc * GRE on FreeBSD * GRE on OpenBSD * IPv6 Multicast (PIM-SM) * SSM Multicast * MPLS * Bird2 * FRRouting * OpenBGPD * Mikrotik RouterOS * EdgeRouter * Static routes on Windows * Universal Network Requirements * VyOS * NixOS * Services * IRC * Whois registry * DNS * IX Collection * Public DNS * Looking Glasses * Automatic Peering * Repository Mirrors * Distributed Wiki * Certificate Authority * Route Collector * Internal * Internal services * Interconnections * APIs * Show and Tell * Historical services * Historical * Bird 1 * Quagga * External Tools * Paste Board * Git Repositories -------------------------------------------------------------------------------- Hosted by: BURBLE-MNT, GRMML-MNT, XUU-MNT, JAN-MNT, LARE-MNT, SARU-MNT, ANDROW-MNT, MARK22K-MNT Accessible via: dn42, dn42.dev, dn42.eu, wiki.dn42.us, dn42.de (IPv6-only), dn42.cc (wiki-ng), dn42.wiki, dn42.pp.ua, dn42.obl.ong When was this page last modified?