Peering Information

I'm willing to peer over Wireguard (preferred) or OpenVPN.

Happy peering! 😘

OpenVPN Options

comp-lzo
cipher aes-256-cbc
auth sha512

Nodes

yul1

Public IPv4
198.100.148.137
DN42 IPv4
172.20.138.2
Tunnel IPv6
fe80::2e41
Location
Beauharnois, QC, CA
Bandwidth
100Mbps
WG Public Key
Yn0YIqO2qx/azWFuP1tMMyJlDcmr8Sg/hHxQDpy4eVQ=

sna1

Public
sna1.naive.network (floating)
DN42 IPv4
172.20.138.3
Tunnel IPv6
fe80::2e41
Location
Irvine, CA, US
Bandwidth
100Mbps
WG Public Key
jCV1u+I2Z56I2mARZaQD8GttHxGQ54u2hWfOC7rcaDc=
Notes
Available to peer at YAIX LAX

can1

Public IPv4
111.230.247.178
DN42 IPv4
172.20.138.4
Tunnel IPv6
fe80::2e41
Location
Guangzhou, GD, CN
Bandwidth
1Mbps
WG Public Key
Il9SwDXnxuwhtL9HQT91oVi4SNKOH9nL/v2QmuJN6To=
Notes
Peerings added case by case

chs1

Public IPv4
35.185.12.11
DN42 IPv4
172.20.138.6
Tunnel IPv6
fe80::2e41
Location
Berkeley County, SC, US
Bandwidth
100Mbps
WG Public Key
nu5XkSjLCEQkiaXj4JWSUQrO3gstTiMGNAQmt+ubyHc=

lhr1

Public IPv4
95.179.225.177
DN42 IPv4
172.20.138.7
Tunnel IPv6
fe80::2e41
Location
London, UK
Bandwidth
100Mbps
WG Public Key
uqA+X3OaPuwrjq8znJjvHxPgMPCJw/bryBpUx8FwSUE=

fra1

Public IPv4
185.133.208.221
DN42 IPv4
172.20.138.30
Tunnel IPv6
fe80::2e41
Location
Frankfurt, DE
Bandwidth
100Mbps
WG Public Key
GMEnVQ5CjbZT80pZGHfRDsjy+HT6SiMdOSkuYQ7Q3U4=

dfw1

Public IPv4
161.129.153.137
DN42 IPv4
172.20.138.31
Tunnel IPv6
fe80::2e41
Location
Dallas, TX, US
Bandwidth
100Mbps
WG Public Key
AuIyViyb7e0FKovi/buOOpYtSm6UkBiUraImwjsKO1Q=

sea1

Public IPv4
104.192.102.248
DN42 IPv4
172.20.138.32
Tunnel IPv6
fe80::2e41
Location
Seattle, WA, US
Bandwidth
100Mbps
WG Public Key
PTXB5I/wE+b1Mi7aByot/Lu0XfYZR/St0UxgoQ2KhA0=

Firewall

My routers have a firewall in place filtering inbound packets. Sometimes you might get ICMP Host Prohibited or Admin Prohibited when trying to send a packet through my AS. Possible reasons include:

Abuse

Email dn42+abuse@zhaofeng.li or PM zhaofeng on Hackint, with the following information:

Services

DNS

172.20.138.53 / fd42:1926:817:a::53

Currently unicast.

DNS sinkhole information

To block advertisements and tracking, a domain blacklist is in use. Queries against blocked clearnet domains will return 0.0.0.0. Most hosts on the blacklist come from StevenBlack's Unified Hosts.

My IPs

A simple tool that shows your clearnet and dn42 IPs.

https://ip.naive.network

MTProxy

A dn42-accessible MTProxy server. Finally you can chat with only dn42 connectivity!

https://t.me/proxy?server=172.20.138.19&port=6667&secret=5bd3794d0fe2e00b985ffdac3fd17128

Arch Linux mirror

An HTTP-only Arch Linux (x86_64) mirror. Updated every hour.

Server = http://mirrors.zhaofeng.dn42/archlinux/$repo/os/$arch

Mobile Hotspot

This will come in handy in case you ever meet me in person.

SSID
/bin/meow
Verify Domain
wlan.naive.network
EAP Method
PEAP
Identity
dnguest
Password
fd42:1926:817::/48