cjdns
An encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing.
Top Related Projects
An experiment in scalable routing as an encrypted IPv6 overlay network
Distributed private networking
libp2p implementation in Go
Dendrite is a second-generation Matrix homeserver written in Go!
Quick Overview
CJDNS is an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. It aims to create a secure, decentralized internet infrastructure that is resistant to censorship and provides better privacy than traditional networks.
Pros
- Provides end-to-end encryption for all network traffic
- Decentralized architecture enhances network resilience and censorship resistance
- Automatically configures routing and addressing, simplifying network setup
- Supports IPv6, allowing for a vast number of unique addresses
Cons
- Relatively complex to set up and configure compared to traditional networks
- Limited adoption and smaller user base compared to mainstream internet protocols
- May have performance overhead due to encryption and routing mechanisms
- Requires technical knowledge to fully understand and implement effectively
Getting Started
To get started with CJDNS, follow these steps:
-
Clone the repository:
git clone https://github.com/cjdelisle/cjdns.git
-
Build CJDNS:
cd cjdns ./do
-
Generate a configuration file:
./cjdroute --genconf > cjdroute.conf
-
Edit the configuration file to add peers or configure network settings.
-
Run CJDNS:
sudo ./cjdroute < cjdroute.conf
For more detailed instructions and advanced configuration options, refer to the project's documentation on GitHub.
Competitor Comparisons
An experiment in scalable routing as an encrypted IPv6 overlay network
Pros of Yggdrasil
- Written in Go, which offers better performance and easier cross-platform compilation
- Uses a more scalable routing algorithm based on a distributed hash table (DHT)
- Supports IPv6 out of the box, making it more future-proof
Cons of Yggdrasil
- Younger project with a smaller community and less battle-testing
- Lacks some of the advanced features and tools available in CJDNS
Code Comparison
CJDNS (C):
struct Address_ipv6 {
uint8_t bytes[16];
};
static inline uint64_t Address_ipv6_getPrefix_be(struct Address_ipv6* addr)
{
uint64_t prefix;
Bits_memcpy(&prefix, addr->bytes, 8);
return Endian_bigEndianToHost64(prefix);
}
Yggdrasil (Go):
type address struct {
key keyBytes
subnet uint64
}
func (a *address) getPrefix() uint64 {
return a.subnet
}
The code snippets show how each project handles IPv6 addressing. CJDNS uses a C struct with explicit byte manipulation, while Yggdrasil uses a more abstract Go struct with a simpler method for getting the prefix.
Distributed private networking
Pros of Meshbird
- Written in Go, which offers better performance and easier deployment compared to CJDNS's C implementation
- Simpler setup process with fewer configuration steps
- Supports both IPv4 and IPv6 networks out of the box
Cons of Meshbird
- Less mature project with fewer contributors and updates
- Limited documentation and community support
- Lacks some advanced features present in CJDNS, such as end-to-end encryption
Code Comparison
CJDNS (C):
struct Address* addr = Address_parse("fc00::");
if (addr) {
// Handle valid address
Address_free(addr);
}
Meshbird (Go):
addr, err := net.ResolveIPAddr("ip", "fc00::")
if err == nil {
// Handle valid address
}
Both projects aim to create decentralized mesh networks, but they differ in implementation languages and features. CJDNS offers more advanced security features and has a larger community, while Meshbird provides a simpler setup process and potentially better performance due to its Go implementation. The code comparison shows the difference in address parsing between the two projects, highlighting the language-specific approaches.
libp2p implementation in Go
Pros of go-libp2p
- More modular and flexible architecture, allowing for easier customization and integration
- Broader ecosystem support and active development community
- Better documentation and examples for developers
Cons of go-libp2p
- Higher complexity due to its modular nature, which may increase the learning curve
- Potentially larger resource footprint compared to the more focused cjdns
Code Comparison
go-libp2p:
host, err := libp2p.New(
libp2p.ListenAddrStrings("/ip4/0.0.0.0/tcp/0"),
libp2p.Identity(priv),
)
cjdns:
struct Sockaddr_storage addr;
int addrLen = sizeof(struct Sockaddr_storage);
Sockaddr_parse("0.0.0.0:0", &addr, &addrLen);
int sock = Udp_bind(&addr, &addrLen);
go-libp2p provides a higher-level abstraction for creating a network host, while cjdns requires more low-level socket programming. This reflects the different design philosophies of the two projects, with go-libp2p focusing on ease of use and flexibility, and cjdns prioritizing performance and efficiency in its networking stack.
Dendrite is a second-generation Matrix homeserver written in Go!
Pros of Dendrite
- Written in Go, offering better performance and easier deployment compared to Python-based alternatives
- Designed specifically for Matrix protocol, providing native support for Matrix features
- More active development and larger community support
Cons of Dendrite
- Less mature project, potentially less stable than established alternatives
- Focused solely on Matrix, limiting its use for other decentralized network applications
- Steeper learning curve for developers not familiar with Matrix protocol
Code Comparison
Dendrite (Go):
func (r *InternalAPIServer) QueryDevices(
ctx context.Context,
req *api.QueryDevicesRequest,
) (*api.QueryDevicesResponse, error) {
devices, err := r.DB.DeviceDatabase.GetDevicesByLocalpart(ctx, req.UserID)
if err != nil {
return nil, err
}
return &api.QueryDevicesResponse{Devices: devices}, nil
}
CJDNS (C):
static int genAddress(uint8_t addressOut[16],
uint8_t privateKey[32],
uint64_t* publicKeyOutPacked)
{
uint8_t publicKey[32];
if (crypto_scalarmult_curve25519_base(publicKey, privateKey)) {
return -1;
}
Address_forPublicKey(addressOut, publicKey);
if (publicKeyOutPacked) {
*publicKeyOutPacked = publicKey[0];
*publicKeyOutPacked |= ((uint64_t)publicKey[1]) << 8;
*publicKeyOutPacked |= ((uint64_t)publicKey[2]) << 16;
*publicKeyOutPacked |= ((uint64_t)publicKey[3]) << 24;
}
return 0;
}
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
cjdns
Ð ÑÑÑÐºÐ°Ñ Ð²ÐµÑÑÐ¸Ñ Hrvatski Svenska Îλληνικά Deutsch ç¹é«ä¸æ ç®ä½ä¸æ Español Français Português brasileiro
Networking Reinvented
Cjdns implements an encrypted IPv6 network using public-key cryptography for address allocation and a distributed hash table for routing. This provides near-zero-configuration networking, and prevents many of the security and scalability issues that plague existing networks.
Testimonials
23:26 <@jercos> well, cjdns is now officially more reliable than the open
internet for getting to my cheaper VPSes :|
12:52 < mariner> so i don't know if it's been done before, and i assume it's
obvious, but I think it's neat. Currently on hype from an
airplane
00:36 < tester> man sites take so long to load on i2p
00:36 < tester> i value speed over anonymity any day
<DuoNoxSol> it's notably more reliable than the normal internet
09:46 < Kubuxu> I so love cjdns code base
<whyrusleeping> my internet is way better now.
<whyrusleeping> thanks
<whyrusleeping> i'm really upset and sad that its better
<whyrusleeping> but also quite happy
21:01 <@grewalsat> this is amazing. with my workpalce speedtest.net results I get around 6+mb speed, and with my cjdns-gate as vpn network I'm getting like 11-15mb download speed in speedtest.net
21:01 <@grewalsat> :P
21:01 <@grewalsat> plus, access anything! :D
<davidar> Yeah, I have to admit I sort of avoided hypeirc because of stuff like that
Community
Documentation
Advanced configuration:
Thank you for your time and interest,
The cjdns developers.
How to install cjdns
These instructions are for Linux distributions and macOS. They should be informative enough for use on other distributions - just don't expect them to work verbatim. If you want to know what operating system's base is go here.
Option 1: Using cjdns.sh
If you're on Linux with an amd64 processor (if you don't know your processor, it's amd64), you can install cjdns pre-built binaries using cjdns.sh. See: https://github.com/cjdelisle/cjdns.sh for more information.
Option 2: Build from source
In order to compile cjdns, you must have:
- Rust
- NodeJS (used for building the C code)
- GCC or Clang C compiler
- Make (used for compiling one of the Rust dependencies)
- Git (to checkout this repository)
0. Install dependencies
Debian-based distro:
sudo apt-get install nodejs git build-essential
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
Redhat-based distro:
sudo dnf install nodejs git
sudo dnf install @development-tools
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
MacOS:
Check that you have clang activated:
xcode-select --install
Install with Homebrew:
brew install node git make
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
1. Retrieve cjdns from GitHub
Clone the repository from GitHub and change to the source directory:
git clone https://github.com/cjdelisle/cjdns.git cjdns
cd cjdns
2. Build
./do
Look for Build completed successfully, type ./cjdroute to begin setup.
, then
proceed below:
Setup
Run cjdroute without options for HELP:
./cjdroute
0. Make sure you've got the stuff.
If you're on macOS, skip this step.
LANG=C cat /dev/net/tun
If it says: cat: /dev/net/tun: File descriptor in bad state
Good!
If it says: cat: /dev/net/tun: No such file or directory
, create it using:
sudo mkdir -p /dev/net &&
sudo mknod /dev/net/tun c 10 200 &&
sudo chmod 0666 /dev/net/tun
Then cat /dev/net/tun
again.
If it says: cat: /dev/net/tun: Permission denied
You're probably using a VPS
based on the OpenVZ virtualization platform. Ask your provider to enable the
TUN/TAP device - this is standard protocol so they should know exactly what you
need.
1. Generate a new configuration file
./cjdroute --genconf | sudo tee -a /etc/cjdroute.conf
Protect your conf file!
A lost conf file means you lost your password and connections and anyone who connected to you will no longer be able to connect. A compromised conf file means that other people can impersonate you on the network.
2. Secure your system - check for listening services
Once your node is running, you're now a newly minted IPv6 host. Your operating system may automatically reconfigure network services to use this new address. If this is not what you intend, you should check to see that you are not offering more services than you intended to. ;)
See doc/network-services.md for instructions.
3. Start it up!
sudo ./cjdroute < /etc/cjdroute.conf
If you want to have your logs written to a file:
sudo ./cjdroute < /etc/cjdroute.conf > cjdroute.log
To stop cjdns:
sudo killall cjdroute
If you are having problems use killall cjdroute
to return to sanity. Use
pgrep cjdroute
or top
to see if it running.
NOTE!
This starts cjdns as the root user so it can configure your system without concern for permissions. To start cjdns as a non-root user, see doc/non-root-user.md.
Custom peering
By default, cjdns will reach out to a DNS seeder to find peers and will automatically connect to them. This of course exposes the fact that you're running cjdns to the operators of these nodes.
If you're planning on running a "clandestine" cjdns node, find the dnsSeeds
section of the configuration and comment it out. Then take the peering
credentials of a node you would like to connect to and add them to the
UDPInterface
/ connectTo
section of the cjdroute.conf.
See doc/peering.md
Admin interface
When cjdroute is up and running, the admin interface will be available at
udp://localhost:11234
(this can be changed in the cjdroute.conf
configuration file). See doc/admin-api.md for more
information about the admin interface. There are several tools in contrib/
that can interact with it.
You can access the admin API with:
Reporting issues
- Don't report in this repo, please instead report it at https://github.com/hyperboria/bugs/issues
- Get on IRC and talk to somebody
- What will happen is either
- Someone feels like fixing it
- You feel like fixing it
- Nobody cares about it and it will be forgotten for a while and maybe someone will hit it later and fix it or else it will get wiped away in a refactoring
- Nobody can fix it at the moment but it is considered worth remembering because it has great significance to the way the code is developed, in this case it needs to be explained in technical terms by someone with strong familiarity with the code. They will make a pull request to the docs/bugs directory.
Security
Security issues should be reported on IRC the same as other bugs. We don't have a closed group of people with special knowledge so that means the default security reporting method is full disclosure.
See: security_specification.md to see if a possible security issue is really a security issue.
Top Related Projects
An experiment in scalable routing as an encrypted IPv6 overlay network
Distributed private networking
libp2p implementation in Go
Dendrite is a second-generation Matrix homeserver written in Go!
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot