dn42 is a big dynamic VPN, which employs Internet technologies (BGP, whois database, DNS, etc). Participants connect to each other using network tunnels (GRE, OpenVPN, WireGuard, Tinc, IPsec) and exchange routes thanks to the Border Gateway Protocol. Network addresses are assigned in the
172.20.0.0/14 range and private AS numbers are used (see registry) as well as IPv6 addresses from the ULA-Range (
fd00::/8) - see FAQ.
Still have questions? We have FAQs listed.
dn42 can be used to learn networking and to connect private networks, such as hackerspaces or community networks. But above all, experimenting with routing in dn42 is fun!
Participating in dn42 is primarily useful for learning routing technologies such as BGP, using a reasonably large network (> 1500 AS, > 1700 prefixes).
Since dn42 is very similar to the Internet, it can be used as a hands-on testing ground for new ideas, or simply to learn real networking stuff that you probably can't do on the Internet (BGP multihoming, transit). The biggest advantage when compared to the Internet: if you break something in the network, you won't have any big network operator yelling angrily at you.
dn42 is also a great way to connect hacker spaces in a secure way, so that they can provide services to each other.
Have you ever wanted to SSH on your Raspberry Pi hosted at your local hacker space and had trouble doing so because of NAT? If your hacker space was using dn42, it could have been much easier.
Nowadays, most end-user networks use NAT to squeeze all those nifty computing devices behind a single public IPv4 address. This makes it difficult to provide services directly from a machine behind the NAT. Besides, you might want to provide some services to other hackerspaces, but not to anybody on the Internet.
dn42 solves this problem. By addressing your network in dn42, your devices can communicate with all other participants in a transparent way, without resorting to this ugly thing called NAT. Of course, this doesn't mean that you have to fully open your network to dn42: similarly to IPv6, you can still use a firewall (but you could, for instance, allow incoming TCP 22 and TCP 80 from dn42 by default).
If your hackerspace is actually using dn42 to provide some services, please let us know! (on this wiki or on the mailing list). It's very rewarding when the network is actually used for something :)
dn42 is operated by a group of volunteers. There is no central authority which controls or impersonates the network. Take a look at the contact page to see how to collaborate or contact us.
The Getting started page helps you to get your first node inside the network.
- Wikipedia about dn42
- Lecture on 26c3
- Lecture on GPN8
- nobody about dn42
- Lecture on mrmcd0x8
- dn42-category in hackerspaces.org wiki
- pentaradio24 – german podcast
- dn42 in your browser
- CCC Aachen
- CCC Bremen
- CCC Darmstadt
- CCC Dresden
- CCC Düsseldorf
- CCC Munich
- Chaostreff Chemnitz
- NoName e.V. Heidelberg
- raumzeitlabor/hackerspace rhein-neckar
- Hackerspace Brussels (HSB)
- [hsmr] / Hackspace Marburg
- Whitespace (0x20)
- Revelation Space
- SNE group
- Hackspace Jena e.V.
- Fédération FDN
- Le LOOP
- Hackerspace Bielefeld
- fixmix Technologies Ltd
- Strategic Explorations Ltd
This wiki is the main reference about dn42. It is available in read-only mode from the Internet here or here or here or here or here (v6 only), tor and i2p and for editing from within dn42, at https://wiki.dn42 - https required for editing.
An svg of the DN42 Logo is available here.