FAQ.md
... ...
@@ -1,7 +1,3 @@
1
-# Frequently Asked Questions
2
-
3
-[[_TOC_]]
4
-
5 1
6 2
### How do I connect to DN42?
7 3
Home.md
... ...
@@ -4,7 +4,7 @@ dn42 is a big dynamic [VPN](http://en.wikipedia.org/wiki/Virtual_private_network
4 4
5 5
A number of services are provided on the network: see [internal](/internal/Internal-Services) (only available from within dn42). Also, dn42 is interconnected with other networks, such as [ChaosVPN](http://wiki.hamburg.ccc.de/ChaosVPN) or some [Freifunk](http://en.wikipedia.org/wiki/Freifunk) networks.
6 6
7
-Still have questions? We have [[FAQs|FAQ]] listed.
7
+Still have questions? We have [FAQs](/FAQ) listed.
8 8
9 9
## Why dn42?
10 10
... ...
@@ -30,9 +30,9 @@ If your hackerspace is actually using dn42 to provide some services, please let
30 30
31 31
## Join or Contact us
32 32
33
-dn42 is operated by a group of volunteers. There is no central authority which controls or impersonates the network. Take a look at the [[contact]] page to see how to collaborate or contact us.
33
+dn42 is operated by a group of volunteers. There is no central authority which controls or impersonates the network. Take a look at the [contact](/contact) page to see how to collaborate or contact us.
34 34
35
-The [[Getting started|howto/Getting-Started]] page helps you to get your first node inside the network.
35
+The [Getting started](/howto/Getting-Started) page helps you to get your first node inside the network.
36 36
37 37
## External resources about dn42
38 38
_Sidebar.md
... ...
@@ -1,49 +1,49 @@
1 1
<div class='toc-title'>Site Links</div>
2 2
3
- * [[Home]]
4
- * [[Getting Started|howto/Getting-Started]]
5
- * [[Registry Authentication|howto/Registry-Authentication]]
6
- * [[Address Space|howto/Address-Space]]
7
- * [[FAQ|/FAQ]]
3
+ * [Home](/Home)
4
+ * [Getting Started](/howto/Getting-Started)
5
+ * [Registry Authentication](/howto/Registry-Authentication)
6
+ * [Address Space](/howto/Address-Space)
7
+ * [FAQ](//FAQ)
8 8
9 9
* How-To
10
- * [[Wireguard|howto/wireguard]]
11
- * [[Openvpn|howto/openvpn]]
12
- * [[IPsec With Public Keys|howto/IPsec-with-PublicKeys]]
13
- * [[Tinc|howto/tinc]]
14
- * [[GRE on FreeBSD|howto/GRE-on-FreeBSD]]
15
- * [[GRE on OpenBSD|howto/GRE-on-OpenBSD]]
16
- * [[IPv6 Multicast (PIM-SM)|howto/IPv6-Multicast]]
17
- * [[Bird|howto/Bird]] / [[Bird2|howto/Bird2]]
18
- * [[Quagga|howto/Quagga]]
19
- * [[OpenBGPD|howto/OpenBGPD]]
20
- * [[Mikrotik RouterOS|howto/mikrotik]]
21
- * [[EdgeRouter|howto/EdgeOS-Config]]
22
- * [[Static routes on Windows|howto/Static-routes-on-Windows]]
23
- * [[Universal Network Requirements|howto/networksettings]]
24
- * [[VyOS|howto/vyos]]
10
+ * [Wireguard](/howto/wireguard)
11
+ * [Openvpn](/howto/openvpn)
12
+ * [IPsec With Public Keys](/howto/IPsec-with-PublicKeys)
13
+ * [Tinc](/howto/tinc)
14
+ * [GRE on FreeBSD](/howto/GRE-on-FreeBSD)
15
+ * [GRE on OpenBSD](/howto/GRE-on-OpenBSD)
16
+ * [IPv6 Multicast (PIM-SM)](/howto/IPv6-Multicast)
17
+ * [Bird](/howto/Bird) / [Bird2](/howto/Bird2)
18
+ * [Quagga](/howto/Quagga)
19
+ * [OpenBGPD](/howto/OpenBGPD)
20
+ * [Mikrotik RouterOS](/howto/mikrotik)
21
+ * [EdgeRouter](/howto/EdgeOS-Config)
22
+ * [Static routes on Windows](/howto/Static-routes-on-Windows)
23
+ * [Universal Network Requirements](/howto/networksettings)
24
+ * [VyOS](/howto/vyos)
25 25
26 26
* Services
27
- * [[IRC|services/IRC]]
28
- * [[Whois registry|services/Whois]]
29
- * [[DNS|services/DNS]]
30
- * [[Public DNS|services/Clearnet-Domains]]
31
- * [[Looking Glasses|services/Looking-Glasses]]
32
- * [[Repository Mirrors|services/Repository-Mirrors]]
33
- * [[Distributed Wiki|services/Distributed-Wiki]]
34
- * [[Certificate Authority|services/Certificate-Authority]]
35
- * [[Route Collector|services/Route-Collector]]
27
+ * [IRC](/services/IRC)
28
+ * [Whois registry](/services/Whois)
29
+ * [DNS](/services/DNS)
30
+ * [Public DNS](/services/Clearnet-Domains)
31
+ * [Looking Glasses](/services/Looking-Glasses)
32
+ * [Repository Mirrors](/services/Repository-Mirrors)
33
+ * [Distributed Wiki](/services/Distributed-Wiki)
34
+ * [Certificate Authority](/services/Certificate-Authority)
35
+ * [Route Collector](/services/Route-Collector)
36 36
37 37
* Internal
38
- * [[Internal services|internal/Internal-Services]]
39
- * [[Interconnections|internal/Interconnections]]
40
- * [[APIs|internal/APIs]]
41
- * [[Historical services|internal/Historical-Services]]
38
+ * [Internal services](/internal/Internal-Services)
39
+ * [Interconnections](/internal/Interconnections)
40
+ * [APIs](/internal/APIs)
41
+ * [Historical services](/internal/Historical-Services)
42 42
43 43
* External Tools
44
- * [[Paste Board|https://paste.dn42.us]]
45
- * [[Git Repositories|https://git.dn42.dev]]
44
+ * [Paste Board](/https://paste.dn42.us)
45
+ * [Git Repositories](/https://git.dn42.dev)
46 46
47 47
--------------
48 48
49
-[[_TOC_]]
50 49
\ No newline at end of file
50
+[[_TOC_]]
contact.md
... ...
@@ -2,7 +2,7 @@
2 2
3 3
Members of the dn42 network mostly communicate via IRC or the mailing list.
4 4
5
-If you would like to contact an individual network operator, you will find contact information in the [[Whois]] registry.
5
+If you would like to contact an individual network operator, you will find contact information in the [Whois](/Whois) registry.
6 6
7 7
## Mailing list
8 8
... ...
@@ -15,7 +15,7 @@ If you would like to contact an individual network operator, you will find conta
15 15
16 16
Channel #dn42 in [hackint](http://www.hackint.eu/)
17 17
18
-See [[IRC]] too.
18
+See [IRC](/IRC) too.
19 19
20 20
## Twitter
21 21
howto/EdgeOS-Config.md
... ...
@@ -11,8 +11,8 @@ This document describes some possibilities for connecting to dn42 using an Ubiqu
11 11
12 12
## First Steps
13 13
14
-1. Create the required objects in the Registry - see [[Getting started]]
15
-2. Find a peer - ask nicely in [[IRC]]!
14
+1. Create the required objects in the Registry - see [Getting Started](/Getting-Started)
15
+2. Find a peer - ask nicely in [IRC](/IRC)!
16 16
3. Get the following details:
17 17
* Tunnel configuration (OpenVPN, IPsec, QuickTun)
18 18
* AS numbers
howto/Edgeos-Config-Example-number-2.md
... ...
@@ -14,9 +14,9 @@ Also thanx to drathir for his patience and support
14 14
15 15
* Basic EdgeOS knowledge is required
16 16
17
-1) you need to create all required fields in the registry --> look at [[Getting started]] page
17
+1) you need to create all required fields in the registry --> look at [Getting Started](/Getting-Started) page
18 18
19
-2) get a peer --> ask nice @ [[IRC]]
19
+2) get a peer --> ask nice @ [IRC](/IRC)
20 20
21 21
3) You need following data from the peer
22 22
howto/OpenWRT.md
... ...
@@ -80,4 +80,4 @@ You have to use this patch: https://dev.openwrt.org/changeset/35484 (monkeypatch
80 80
81 81
## DNS
82 82
83
-See [[DNS Configuration|/services/dns/Configuration]]. This will use the anycast dn42 DNS server to resolve `dn42` and relevant reverse domains.
84 83
\ No newline at end of file
84
+See [DNS Configuration](/services/dns/Configuration). This will use the anycast dn42 DNS server to resolve `dn42` and relevant reverse domains.
85 85
\ No newline at end of file
howto/ROA-slash-RPKI.md
... ...
@@ -1,5 +1,3 @@
1
-[[_TOC_]]
2
-
3 1
4 2
## What is ROA?
5 3
internal/Internal-Services.md
... ...
@@ -6,12 +6,12 @@ You are asked to show some creativity in terms of network usage and content. ;)
6 6
7 7
## CA
8 8
9
-xuu is maintaining an [[certificate authority|/services/Certificate-Authority]] for internal services.
9
+xuu is maintaining an [certificate authority](/services/Certificate-Authority) for internal services.
10 10
11 11
zotan is maintaining an (experimental, but working) [ACME server](https://acme.dn42) (with accompanying CA), compatible with any LetsEncrypt client like Certbot, Dehydrated or Caddy.
12 12
13 13
## Network-related
14
- * See [[Looking Glasses|/services/Looking-Glasses]] for more network diagnostic tools
14
+ * See [Looking Glasses](/services/Looking-Glasses) for more network diagnostic tools
15 15
* Realtime network map: [map.dn42](http://map.dn42/) (DN42) or [map42.0x7f.cc](https://map42.0x7f.cc) (IANA) _(Note: This is a direct copy of nixnodes map with some fixes and new functions since original map is no longer get maintained. This map is currently using MRT dump from GRC as source. We will pull new dumps from GRC every 15 minutes.)_
16 16
* Network Information Service: [info.nia.dn42](http://info.nia.dn42) (DN42) or [bgp42.strexp.net](https://bgp42.strexp.net) (IANA). Main functions including _network information_, _network map (from map.dn42, require WebGL)_, _network ranking (based on centrality)_, _ROA alerting_ and _path finder_.
17 17
* Yet Another WIP network map: [map.jerry.dn42](https://map.jerry.dn42/) (via DN42) or [map.meson.cc](https://map.meson.cc) (via clearnet) _(uses MRT dump as source, updated every 30 minutes.)_
... ...
@@ -101,7 +101,7 @@ Some [Advanced Direct Connect](https://en.wikipedia.org/wiki/Advanced_Direct_Con
101 101
102 102
### Tor
103 103
104
-Entry points to the Tor network are available on dn42. See [[Tor|internal/services/Tor]] for more details.
104
+Entry points to the Tor network are available on dn42. See [Tor](/internal/services/Tor) for more details.
105 105
106 106
### Telegram
107 107
services/DNS.md
... ...
@@ -48,22 +48,22 @@ search dn42
48 48
49 49
There are multiple top level domains (TLDs) associated with DN42, its affiliated networks and for reverse DNS that must
50 50
be configured in order to run your own resolver. The registry is the authoritative source of active TLDs, but see also
51
-this page [[dns/External-DNS|/services/dns/External-DNS]] in the wiki.
51
+this page [dns/External-DNS](/services/dns/External-DNS) in the wiki.
52 52
53 53
### Split horizon DNS
54 54
55 55
In this configuration, you run your own, caching resolver but forward DN42 related queries (with recursion bit set)
56
-to the anycast service. Example configurations for different recursor implementations are included in the [[dns/Configuration|/services/dns/Configuration]] page.
56
+to the anycast service. Example configurations for different recursor implementations are included in the [dns/Configuration](/services/dns/Configuration) page.
57 57
58 58
### Full recursion
59 59
60 60
Authoritative DNS for DN42 is provided by the *.delegation-servers.dn42 servers, see the DNS architecture here
61
-[[New DNS|New-DNS]] Delegations servers have full support for DNSSEC.
61
+[New DNS](/New-DNS) Delegations servers have full support for DNSSEC.
62 62
63 63
## Further Information
64 64
65
-* [[dns/Configuration|/services/dns/Configuration]] - Forwarder configuration examples
66
-* [[New DNS|New-DNS]] - current architecture
67
-* [[dns/External-DNS|/services/dns/External-DNS]] - external DNS zones from interconnected networks
68
-* [[Old Hierarchical DNS|Old-Hierarchical-DNS]] - deprecated
69
-* [[Original DNS (deprecated)|Original-DNS-(deprecated)]] - deprecated
65
+* [dns/Configuration](/services/dns/Configuration) - Forwarder configuration examples
66
+* [New DNS](/New-DNS) - current architecture
67
+* [dns/External-DNS](/services/dns/External-DNS) - external DNS zones from interconnected networks
68
+* [Old Hierarchical DNS](/Old-Hierarchical-DNS) - deprecated
69
+* [Original DNS (deprecated)](/Original-DNS-(deprecated)) - deprecated
services/Distributed-Wiki.md
... ...
@@ -1,5 +1,5 @@
1 1
The idea is to deploy mirrors across dn42 using [anycast](https://en.wikipedia.org/wiki/Anycast) addressing (BGP), thus providing redundancy, load-balancing and improved access times to the wiki. Sites are powered by [gollum](https://github.com/gollum/gollum) which has no native SSL support, so Nginx acts as a reverse proxy and handles the encryption.
2
-The local webserver is monitored with a simple [[shell script|Distributed-Wiki#exabgp_watchdog-script]] working [[in conjunction|Distributed-Wiki#exabgp]] with [ExaBGP](https://github.com/Exa-Networks/exabgp), announcing/withdrawing the assigned route if the service is up/down.
2
+The local webserver is monitored with a simple [shell script](/Distributed-Wiki#exabgp_watchdog-script) working [in conjunction](/Distributed-Wiki#exabgp) with [ExaBGP](https://github.com/Exa-Networks/exabgp), announcing/withdrawing the assigned route if the service is up/down.
3 3
4 4
## Prerequisites
5 5
services/New-DNS.md
... ...
@@ -1,10 +1,10 @@
1
-After frequent issues with the [[Old Hierarchical DNS|Old-Hierarchical-DNS]] system in early 2018, work has started to build a new and more reliable DNS system. The main goals are:
1
+After frequent issues with the [Old Hierarchical DNS](/Old-Hierarchical-DNS) system in early 2018, work has started to build a new and more reliable DNS system. The main goals are:
2 2
* Reliability and Consistency to avoid debugging very obscure issues that are also hard to reproduce.
3 3
* Low maintenance burden on operators.
4 4
* Proper DNSSEC support for everything.
5 5
6 6
# End Users
7
-It is **strongly recommended** to run your own resolver for security and privacy reasons. Setting it up and maintaining it should be easy, see [[services/dns/Configuration|services/dns/Configuration]].
7
+It is **strongly recommended** to run your own resolver for security and privacy reasons. Setting it up and maintaining it should be easy, see [services/dns/Configuration](/services/dns/Configuration).
8 8
9 9
If running your own resolver is not possible or undesirable, you can choose one or more instances from [dns/recursive-servers.dn42 in the registry](https://git.dn42.us/dn42/registry/src/master/data/dns/recursive-servers.dn42). Please make sure you fully understand the consequences and fully trust these operators.
10 10
... ...
@@ -25,9 +25,9 @@ These are simple authoritative servers for the dn42 zone, rDNS and a few DNS inf
25 25
These instances do not serve any clients. They poll the registry regularly and rebuild and resign (DNSSEC) the zones as needed. If any zone changes, all *.delegation-servers.dn42 instances are notified ([RFC1996](https://tools.ietf.org/html/rfc1996)) which then load the new zone data over AXFR ([RFC5936](https://tools.ietf.org/html/rfc5936)). The pool of masters is intentionally kept very small because of its much higher coordination needs and also the lacking support of a multi-master mode in many authoritative server implementations. The masters are only reachable over dedicated IPv6 assignments which are set up in a way that any master operator can hijack the address of a problematic master without having to wait for its operator to fix something.
26 26
27 27
# Running your own instances
28
-* If you want to run your own instances, make sure you are subscribed to the [[mailinglist|/contact]]. It is also strongly recommended to join #dn42-dns@hackint. All changes are announced to the mailinglist but IRC makes debugging sessions much easier.
28
+* If you want to run your own instances, make sure you are subscribed to the [mailinglist](//contact). It is also strongly recommended to join #dn42-dns@hackint. All changes are announced to the mailinglist but IRC makes debugging sessions much easier.
29 29
* Choose the implementation(s) you want to use. It should support at least AXFR+NOTIFY (*.delegation-servers.dn42) or DNSSEC (*.recursive-servers.dn42).
30
-* Check if [[TODO|TODO]] already has configuration snippets for your implementation.
30
+* Check if [TODO](/TODO) already has configuration snippets for your implementation.
31 31
* If yes, download it from there and include it in the main configuration.
32 32
* If not, then join us in #dn42-dns@hackint so we can add it together.
33 33
* Verify that everything works:
... ...
@@ -47,6 +47,6 @@ The set of valid KSKs can be found in the registry.
47 47
48 48
# See also
49 49
50
-* [[DNS Quick Start|DNS]]
51
-* [[Old Hierarchical DNS|Old-Hierarchical-DNS]]
52
-* [[Original DNS (deprecated)|Original-DNS-(deprecated)]]
53 50
\ No newline at end of file
51
+* [DNS Quick Start](/DNS)
52
+* [Old Hierarchical DNS](/Old-Hierarchical-DNS)
53
+* [Original DNS (deprecated)](/Original-DNS-(deprecated))
54 54
\ No newline at end of file
services/Old-Hierarchical-DNS.md
... ...
@@ -1,4 +1,4 @@
1
-This information is now **deprecated**. Please check [[New DNS]] for the current architecture.
1
+This information is now **deprecated**. Please check [New DNS](/New DNS) for the current architecture.
2 2
3 3
***
4 4
services/Original-DNS-(deprecated).md
... ...
@@ -1,11 +1,11 @@
1 1
# Original DNS (deprecated)
2
-This information is now **deprecated**. Please check [[New DNS]] for the current architecture.
2
+This information is now **deprecated**. Please check [New DNS](/New DNS) for the current architecture.
3 3
4 4
***
5 5
6 6
*(tl;dr)* We have a TLD for dn42, which is `.dn42`. The anycast resolver for `.dn42` runs on `172.20.0.53` and `fd42:d42:d42:54::1`.
7 7
8
-**DNS is build from [[whois database|services/Whois]]. So please edit your DNS-records there.**
8
+**DNS is build from [whois database](/services/Whois). So please edit your DNS-records there.**
9 9
10 10
## Using the DNS service
11 11
... ...
@@ -19,11 +19,11 @@ To do this, just use `172.20.0.53` or `fd42:d42:d42:54::1` as your resolver, for
19 19
20 20
### Forwarding `.dn42` queries to the anycast resolver
21 21
22
-If you run your own resolver (`unbound`, `dnsmasq`, `bind`), you can configure it to forward dn42 queries to the anycast DNS resolver. See [[DNS forwarder configuration|services/dns/Configuration]].
22
+If you run your own resolver (`unbound`, `dnsmasq`, `bind`), you can configure it to forward dn42 queries to the anycast DNS resolver. See [DNS forwarder configuration](/services/dns/Configuration).
23 23
24 24
### Recursive resolver
25 25
26
-You may also want to configure your resolver to recursively resolve dn42 domains. For this, you need to find authoritative DNS servers for the `dn42` zone (and for the reverse zones). See [[services/dns/Recursive DNS resolver]].
26
+You may also want to configure your resolver to recursively resolve dn42 domains. For this, you need to find authoritative DNS servers for the `dn42` zone (and for the reverse zones). See [services/dns/Recursive DNS resolver](/services/dns/Recursive DNS resolver).
27 27
28 28
### Building the dn42 zones from the registry
29 29
... ...
@@ -31,16 +31,16 @@ Finally, you may want to host your own authoritative DNS server for the `dn42` z
31 31
32 32
## Register a `.dn42` domain name
33 33
34
-The root zone for `dn42.` is built from the [[whois registry|services/Whois]]. If you want to register a domain name, you need to add it to the registry (of course, you also need one or two authoritative nameservers).
34
+The root zone for `dn42.` is built from the [whois registry](/services/Whois). If you want to register a domain name, you need to add it to the registry (of course, you also need one or two authoritative nameservers).
35 35
36 36
## DNS services for other networks
37 37
38
-Other networks are interconnected with dn42 (ChaosVPN, Freifunk, etc). Some of them also provide DNS service, you can configure your resolver to use it. See [[External DNS]].
38
+Other networks are interconnected with dn42 (ChaosVPN, Freifunk, etc). Some of them also provide DNS service, you can configure your resolver to use it. See [External DNS](/External DNS).
39 39
40 40
## Providing DNS services
41 41
42
-See [[Providing Anycast DNS]].
42
+See [Providing Anycast DNS](/Providing Anycast DNS).
43 43
44
-## [[Old Hierarchical DNS]]
44
+## [Old Hierarchical DNS](/Old Hierarchical DNS)
45 45
46 46
This is a new effort to build a DNS system that mirrors how DNS was designed to work in clearnet.
47 47
\ No newline at end of file
services/Route-Collector.md
... ...
@@ -4,7 +4,7 @@ The Global Route Collector (GRC) provides a real time view of routing and peerin
4 4
5 5
Technically the GRC is a [bird](https://bird.network.cz/) instance that anyone can peer with, it imports all routes whilst exporting none and provides a number of interfaces for querying the route data.
6 6
7
-Data from the GRC is used to generate some of the DN42 Maps (see the [[Internal Services|/internal/Internal-Services]] page).
7
+Data from the GRC is used to generate some of the DN42 Maps (see the [Internal Services](//internal/Internal-Services) page).
8 8
9 9
## Peering with the collector
10 10
services/Whois.md
... ...
@@ -32,7 +32,7 @@ Note that currently, most AS are using one of the legacy ASN range (and will pro
32 32
33 33
## DNS zones
34 34
35
-dn42 uses the `dn42.` TLD, which is not present in the root DNS zone of the ICANN-net. For details, see [[DNS]].
35
+dn42 uses the `dn42.` TLD, which is not present in the root DNS zone of the ICANN-net. For details, see [DNS](/DNS).
36 36
37 37
Note that other TLDs should also be usable from dn42, most notably from Freifunk and ChaosVPN. A tentative list is available at [External DNS](/services/dns/External-DNS).
38 38
... ...
@@ -75,7 +75,7 @@ The idea comes from the guys at cymru.com, who provide this service for the Inte
75 75
76 76
# Software
77 77
78
- * [[lglass|internal/lglass]] is a python implementation for working with the registry. It features a whois server, tools to manipulate the data (DNS zone generation, etc).
78
+ * [lglass](/internal/lglass) is a python implementation for working with the registry. It features a whois server, tools to manipulate the data (DNS zone generation, etc).
79 79
* [whois42d](https://github.com/dn42/whois42d) written in golang, lightweight/fast, whois server with support for all registry objects, type filtering and systemd socket activation.
80 80
81 81
# Whois daemons
services/dns/External-DNS.md
... ...
@@ -31,4 +31,4 @@ NeoNetwork zone files can be found here: https://github.com/NeoCloud/NeoNetwork/
31 31
32 32
## Configuration
33 33
34
-See [[DNS forwarding configuration|/services/dns/Configuration]].
35 34
\ No newline at end of file
35
+See [DNS forwarding configuration](/services/dns/Configuration).
36 36
\ No newline at end of file
services/dns/Providing-Anycast-DNS.md
... ...
@@ -10,7 +10,7 @@ Configuration requirements for all members of the anycast group are:
10 10
* listen on a unicast IP too for testing/debugging reasons
11 11
* with bind, please use ```minimal-responses yes;``` (goes into ```options```/```view```)
12 12
13
-It is _really_ good to hang around in [[IRC]] to get things sorted out, if something doesn't work. Letting some people test your DNS behavior before joining the anycast-group is considered best practice - better safe than sorry.
13
+It is _really_ good to hang around in [IRC](/IRC) to get things sorted out, if something doesn't work. Letting some people test your DNS behavior before joining the anycast-group is considered best practice - better safe than sorry.
14 14
15 15
* **IP:** 172.23.0.53
16 16
* **Announciation Subnet:** 172.23.0.53/32
services/dns/Recursive-DNS-resolver.md
... ...
@@ -1,6 +1,6 @@
1 1
If you want to run your own recursive DNS server, you must find upstream servers that are authoritative for the dn42 zones.
2 2
3
-You may use some servers listed in the [[table of anycast servers|Providing-Anycast-DNS#Persons-providing-anycast-DNS]], or just use `172.22.119.160` and `172.22.119.163` (ns{1,2}.fritz.dn42).
3
+You may use some servers listed in the [table of anycast servers](/Providing-Anycast-DNS#Persons-providing-anycast-DNS), or just use `172.22.119.160` and `172.22.119.163` (ns{1,2}.fritz.dn42).
4 4
5 5
## Configuration
6 6