# cjdns Русская версия Readme: [README_RU.md](README_RU.md) #### *Networking Reinvented* Cjdns implements an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. This provides near-zero-configuration networking, and prevents many of the security and scalability issues that plague existing networks. [![Build Status](https://travis-ci.org/cjdelisle/cjdns.png?branch=master)](https://travis-ci.org/cjdelisle/cjdns) [![tip for next commit](https://tip4commit.com/projects/941.svg)](https://tip4commit.com/github/cjdelisle/cjdns) ## With built-in security and auto-configuration, everybody can own part of the network The Internet gives everyone incredible power of expression that was once reserved for those wealthy enough to own a radio station or newspaper. Still, the Internet's aging protocols have inherent limitations which make them unfavorable toward a network owned by the people. Recent revelations over governments reading our emails have triggered public outcry but few stop to imagine the implications of an unsecured mesh network, in such a network *everybody* could read your email. Competition in Internet Access markets worldwide has withered, dominated by a few businesses who charge outrageous rates and have not materially increased Internet speed since crushing the dial-up providers. Most agree that more market diversity is necessary, but if the handful of ISPs we have now cannot be trusted to handle our data, there is no reason to expect that the next generation of Internet Service Providers would either. The problem of trust extends beyond private correspondence. The very fabric of the Internet can be torn apart by a malicious ISP or even an honest mistake. On April 8th, 2010, an employee at China Telecom misconfigured a router - causing widespread Internet outages lasting up to fifteen minutes. As world governments continue pushing to filter websites, there is an ever increasing risk of back-and-forth retaliatory filtration eventually leaving entire nations isolated and breeding the hate and intolerance which the Internet promised to end. Cjdns was designed with the understanding that for the Internet to continue existing without borders, authority over its processes must be decentralized. This isn't, and can't be, just a dream - the future of the open Internet is at stake. ## Security When you receive a packet of information from the Internet, it seems logical to assume that it was meant for you - that it came from the computer which it says it came from and that nobody else has read or modified it on the way. While many popular software applications are designed around these assumptions, the existing Internet does not guarantee any of them and a number of network security exploits come from the cases where these assumptions break down. Cjdns guarantees confidentiality, authenticity and integrity of data by using modern cryptography in a non-intrusive way. Information transmitted over a cjdns network can't be altered or read en-route. While you can create multiple identities, it's practically impossible to impersonate other nodes on the network and since a node's IPv6 address is the fingerprint of its key, man-in-the-middle attacks are not possible. ## Simplicity Traditional networks require manual configuration of IP addresses. For one to get these addresses one must join an Internet Registry and file a lengthy application. Cjdns nodes generate their own addresses along with their keys. When two nodes find each other, they connect. When many nodes find one another, they form a network. General network architecture is of course needed to avoid bottlenecks but once the nodes are put in the right places, they will discover their roles in the network. ## Scalability Cjdns is built around the bold and unproven assumption that a non-hierarchical network can scale. Cjdns uses a [distributed hash table][] to spread the load of routing among a number of nodes, rather than requiring every node know the exact location of every other node. At the bottom layer, packets are tagged with the exact route they should take, think of it like driving directions. At the upper layer the nodes maintain and test routes to other nodes who have numerically similar IPv6 addresses to their own. Forwarding is achieved by sending a packet to physically nearby nodes who have destinations numerically close to the target address. ## Testimonials 23:26 <@jercos> well, cjdns is now officially more reliable than the open internet for getting to my cheaper VPSes :| 12:52 < mariner> so i don't know if it's been done before, and i assume it's obvious, but I think it's neat. Currently on hype from an airplane 00:36 < tester> man sites take so long to load on i2p 00:36 < tester> i value speed over anonymity any day it's notably more reliable than the normal internet even though it really really shouldn't be seeing as the connections are largely over the normal internet ## How close is it to complete? [Hyperboria][] is the largest cjdns network, with hundreds of active nodes around the world. Cjdns has been tested on x86, amd64, ARMv5, ARMv7, MIPS, and PowerPC. It's [continually tested][buildbots] on Linux, FreeBSD, OS X, and Illumos systems. The protocols and algorithms are experimental and subject to change. To minimize the harm to the network, please update your cjdns nodes often. ### You can help! We are in need of some buildbots on more obscure systems and architectures. If you would like to donate one, you could mail it, or you could administer it and provide remote shell access. Please email `buildbot@seattlemesh.net` if you'd like to help out. ## How does routing work? In a cjdns network, a packet goes to a router and the router labels the packet with directions to the router best able to handle it. That is, a router which is physically nearby and has an address numerically close to the destination address of the packet. The directions are added to the packet to allow it to go through a number of routers with minimal handling, *a verifiable form of source routing*. They just read the label and bounce the packet wherever the next bits in the label tell them to. Routers have a responsibility to "keep in touch" with other routers that are physically close by and numerically near to their address. The router engine is a modified implementation of the [Kademlia][] distributed hash table. ## Community * irc://irc.efnet.org/#cjdns ([web client][IRC Web]) * [Hyperboria][] * [Project Meshnet][] * [/r/darknetplan][] * [#cjdns on Twitter][] ## Documentation * [Cjdns Whitepaper](doc/Whitepaper.md) * [Cjdns on Wikipedia][] Advanced configuration: * [Setup a cjdns NAT gateway for your LAN](doc/nat-gateway.md) * [Install cjdns on OpenIndiana](doc/open-indiana.md) Thank you for your time and interest, The cjdns developers. -------------------------------------------------------------------------------- ## How to install cjdns These instructions are for Debian-based Linux distributions and OS X. They should be informative enough for use on other distributions - just don't expect them to work verbatim. ### 0. Install dependencies On both platforms, installing [Node.js](http://nodejs.org/), although preferable, is not strictly necessary. If Node.js is unavailable or an unacceptable version, it will be downloaded and installed in the source tree. #### Debian-based distro: sudo apt-get install nodejs git build-essential #### OS X: On OS X, you must install the Command Line Developer Tools. If you already have a recent version of Xcode (>= OS X 10.9 and >= Xcode 5.0.1), run the following command: xcode-select --install If Xcode is not installed, you can either install it through the App Store and run the command above, or make a free Apple Developer account here: [https://developer.apple.com/downloads/index.action](https://developer.apple.com/downloads/index.action). Then sign in, search for Command Line Tools, and install the latest package compatible with your version of OS X. If you encounter issues, there is a thorough [stackoverflow post](http://stackoverflow.com/a/9329325) on installing the Command Line Tools. You must also install git and Node.js. There are a few options. If you use [Homebrew](http://brew.sh/): brew install git nodejs If you use [Macports](https://www.macports.org/): sudo port install git-core nodejs Or if you use neither and would like to install the binaries from their websites: - Node.js: [http://nodejs.org/download/](http://nodejs.org/download/) - git: [http://git-scm.com/download](http://git-scm.com/download) #### OpenBSD: Sadly, OpenBSD is a bit experimental right now. pkg_add git node gcc gmake bash Select version gcc-4.8.1p2 or more recent. ### 1. Retrieve cjdns from GitHub Clone the repository from GitHub and change to the source directory: git clone https://github.com/cjdelisle/cjdns.git cjdns cd cjdns ### 2. Build ./do Look for `Build completed successfully, type ./cjdroute to begin setup.`, then proceed below: -------------------------------------------------------------------------------- ## Setup Run cjdroute without options for HELP: ./cjdroute ### 0. Make sure you've got the stuff. cat /dev/net/tun If it says: `cat: /dev/net/tun: File descriptor in bad state` Good! If it says: `cat: /dev/net/tun: No such file or directory`, create it using: sudo mkdir /dev/net && sudo mknod /dev/net/tun c 10 200 && sudo chmod 0666 /dev/net/tun Then `cat /dev/net/tun` again. If it says: `cat: /dev/net/tun: Permission denied` You're probably using a VPS based on the OpenVZ virtualization platform. Ask your provider to enable the TUN/TAP device - this is standard protocol so they should know exactly what you need. If you're on OS X, don't worry about this step. ### 1. Generate a new configuration file ./cjdroute --genconf >> cjdroute.conf **Protect your conf file!** A lost conf file means you lost your password and connections and anyone who connected to you will no longer be able to connect. A compromised conf file means that other people can impersonate you on the network. To set generate a conf file with permissions set so that only your user can read it and write to it: (umask 077 && ./cjdroute --genconf > cjdroute.conf) ### 2. Find a friend To get into an existing network (e.g. Hyperboria), you need to connect to someone who is already in the network. This is required for a number of reasons: 1. It helps prevent abuse because bad people will be less likely to abuse a system after they were, in an act of human kindness, given access to that system. 2. This is not intended to overlay The Old Internet, it is intended to replace it. Each connection will in due time be replaced by a wire, a fiber optic cable, or a wireless network connection. 3. In any case of a disagreement, there will be a "chain of friends" linking the people involved so there will already be a basis for coming to a resolution. To find a friend, get out there and join our [community](#community). Also, have a look at the [Project Meshnet Map][] to find peers near you (note: scroll the map right, not left; the markers don't repeat). ### 3. Connect your node to your friend's node **To initiate the connection OUTbound** In your conf file, you will see: ``` javascript // Nodes to connect to. "connectTo": { // Add connection credentials here to join the network // Ask somebody who is already connected. } ``` A conf file with multiple friend-nodes, setup OUTbound, should look like: ``` javascript // Nodes to connect to. "connectTo": { //friend_1 (IPv4: 0.1.2.3; IPv6 fcaa:5bac:66e4:713:cb00:e446:c317:fc39) "0.1.2.3:45678": { "password": "thisIsNotARealConnection_1", "publicKey": "thisIsJustForAnExampleDoNotUseThisInYourConfFile_1.k" } //friend_2 (IPv4: 5.1.2.3; IPv6 fcbb:5bac:66e4:713:cb00:e446:c317:fc39) "5.1.2.3:5678": { "password": "thisIsNotARealConnection_2", "publicKey": "thisIsJustForAnExampleDoNotUseThisInYourConfFile_2.k" } } ``` You can add as many connections as you want to the `connectTo` attribute, following JSON syntax. **To allow your friend to initiate the connection INbound** In your conf file, you will see: ``` javascript "authorizedPasswords": [ // A unique string which is known to the client and server. {"password": "thisisauniquestring_001"} // More passwords should look like this. // {"password": "thisisauniquestring_002"} // {"password": "thisisauniquestring_003"} // {"password": "thisisauniquestring_004"} ... // "your.external.ip.goes.here:45678":{"password": "thisisauniquestring_001","publicKey":thisisauniqueKEY_001.k"} ], ``` A conf file with multiple friend-nodes, setup INbound, should look like: ``` javascript "authorizedPasswords": [ // A unique string which is known to the client and server. {"password": "thisisauniquestring_001"} // More passwords should look like this. //friend_3 (IPv4: 0.1.2.3; IPv6 fcaa:5bac:66e4:713:cb00:e446:c317:fc39) {"password": "thisisauniquestring_002"} //friend_4 (IPv4: 5.1.2.3; IPv6 fcbb:5bac:66e4:713:cb00:e446:c317:fc39) {"password": "thisisauniquestring_003"} // {"password": "thisisauniquestring_004"} ... // "your.external.ip.goes.here:45678":{"password": "thisisauniquestring_001","publicKey":thisisauniqueKEY_001.k"} ], ``` You need to give friend_3 (who is making the INbound connection) the following 4 items: 1. Your external IPv4 2. The port found in your conf file here: `// Bind to this port. "bind": "0.0.0.0:yourportnumberishere",` 3. Their unique password that you uncommented or created: "password": "thisisauniquestring_002" 4. Your public key: "publicKey":thisisauniqueKEY_001.k" Please note that you and your friend can *initiate* a connection either outbound (from YOU --> FRIEND) or inbound (from FRIEND --> YOU) but traffic flows both ways once the connection is established. See [doc/configure.md](doc/configure.md) for more details on configuration, including how to peer with other cjdns nodes over ethernet and wifi. ### 4. Secure your system - check for listening services Once your node is running, you're now a newly minted IPv6 host. Your operating system may automatically reconfigure network services to use this new address. If this is not what you intend, you should check to see that you are not offering more services then you intended to. ;) See [doc/network-services.md](doc/network-services.md) for instructions. ### 5. Start it up! sudo ./cjdroute < cjdroute.conf If you want to have your logs written to a file: sudo ./cjdroute < cjdroute.conf > cjdroute.log To stop cjdns: sudo killall cjdroute If you are having problems use `killall cjdroute` to return to sanity. Use `pgrep cjdroute` or `top` to see if it running. **Note:** this starts cjdns as the root user so it can configure your system without concern for permissions. To start cjdns as a non-root user, see [doc/non-root-user.md](doc/non-root-user.md). ### 6. Get in IRC Welcome to the network! You're now a network administrator. There are responsibilities which come with being a network administrator which include being available in case there is something wrong with your equipment. You should stay on [IRC](#community) so that people can reach you. ## Admin interface When cjdnroute is up and running, the admin interface will be available at `udp://localhost:11234` (this can be changed in the cjdroute.conf configuration file). See [admin/README.md](admin/README.md) for more information about the admin interface. There are several tools in `contrib/` that can interact with it. You can access the admin API with: * the **Python library**; see [contrib/python/README.md](contrib/python/README.md). * the **Perl library**, maintained by Mikey; see [contrib/perl/CJDNS/README](contrib/perl/CJDNS/README). [IRC Web]: http://chat.efnet.org/irc.cgi?chan=%23cjdns [Hyperboria]: http://hyperboria.net [Project Meshnet]: https://projectmeshnet.org [/r/darknetplan]: http://www.reddit.com/r/darknetplan [#cjdns on Twitter]: https://twitter.com/hashtag/hyperboria [Project Meshnet Map]: http://map.projectmeshnet.org [Buildbots]: https://buildbot.meshwith.me/cjdns/waterfall [Cjdns on Wikipedia]: https://en.wikipedia.org/wiki/Cjdns [Distributed Hash Table]: https://en.wikipedia.org/wiki/Distributed_hash_table [Beyond Pain]: https://lists.torproject.org/pipermail/tor-dev/2012-October/004063.html [Kademlia]: https://en.wikipedia.org/wiki/Kademlia [Tor]: https://www.torproject.org [I2P]: http://www.i2p2.de [Freenet]: https://freenetproject.org