Cjdns is a network protocol and its implementation, with which you can create a scalable, secure and easy to configure network. A network can work both over an Internet connection and directly between routers. [2]
| cjdns | |
|---|---|
| Type of | network protocol |
| Author | Caleb James DeLisle |
| Developers | Community |
| Written on | C (C) |
| operating system | Linux , Illumos , OS X , FreeBSD |
| Interface languages | English |
| First edition | January 23, 2012 |
| Hardware platform | x86 , amd64 , MIPS , ARM , PowerPC |
| Latest version | |
| condition | Active |
| License | GPLv3 |
| Site | github.com/cjdelisle/cjd... |
Content
Interface
The network protocol runs through a network tunnel (TUN). Programs can run on this network provided that they support IPv6. After installing the necessary software, traffic is automatically redirected to this network, which avoids additional program settings. An IPv6 address is generated for the user on the network, which refers to the private part of IPv6 addresses, which means that no conflicts with real IPv6 addresses will occur. When connecting via regular Internet, you need to find an existing network node and find out its address and key. When connecting a router-router, everything happens on its own.
Routing
Traffic routing is provided using a system similar to Kademlia DHT, more precisely, the route catalog is constantly updated due to the fact that the network configuration can change, thus, the network supports the optimal load through all nodes and selects the shortest path for traffic.
Security
The network is private - traffic cannot be decrypted by anyone except the host to which it must be delivered. The network is not anonymous [3] - the purpose of its creation was not to make an I2P / Tor clone, but to make a new Internet. Thus, using tracing, you can find out the chain of hosts and find out your IPv4 address; Obviously, when connecting to a router-router type, this problem will disappear and the network will also become anonymous.
Development
The testing phase is currently underway. Everyone can go to the Git repository and download the source code. The cjdns protocol is available on most UNIX-like systems, such as Linux ( Debian , Ubuntu , etc.), Mac OS X , FreeBSD, and Illumos . There is support for architectures such as x86, x86-64, PowerPC, MIPS, and ARMv6 ( Raspberry Pi ). All this makes it easy to get started on old or new equipment. The protocol can be integrated into the popular OpenWRT firmware for routers.
Hyperboria
Hyperboria is an experimental decentralized network created by testers and cjdns developers to test the protocol. It was created so that any data, when transmitted via the Internet, is securely encrypted (without providing anonymity [3] ), and the speed of access to it strives to the maximum possible. To implement an independent decentralized DNS , a module was developed based on the Nxt cryptographic platform alias system [4] .
See also
- Yggdrasil
Notes
- ↑ Release 20.3 - 2019.
- ↑ Our network cannot be defeated (inaccessible link) . rabkor.ru (08.28.2014). Date of treatment September 2, 2014. Archived on October 3, 2014.
- ↑ 1 2 Chip Magazine 11/2013, p. 53
- ↑ NxtHypeDns . github.com. Date of treatment September 2, 2014.