ASN: AS4242420257 Maintainer: SCARJIT-MNT Contact: ferdinand@linnenberg.dev
172.20.13.0/27- Main network
fd30:366:4000::/48- Main network
- IPv4: 172.20.13.1
- IPv6: fd30:366:4000::1
- WireGuard tunnel support
- BGP daemon (Bird2, FRRouting, etc.)
- Valid DN42 registry objects (mntner, person, AS, inetnum/inet6num)
- ROA objects registered in the DN42 registry for your prefixes
- Public IPv6:
2a0a:a543:d3f3:80:be24:11ff:fe5d:a0dc(dn42-router.linnenberg.dev via AAAA [prefered]) - WireGuard Public Key:
BsU2BEUpd6aqPqCAyU5kFakuOPRi8i5Ou6v6WJKXEXY= - WireGuard Port: 51820
- Contact me at ferdinand@linnenberg.dev
- Exchange information:
- Your ASN
- Your WireGuard public key
- Your WireGuard endpoint (IP:port)
- Tunnel IPs you'd like to use (link-local or private)
- Configure WireGuard tunnel
- Set up BGP session using tunnel IPs
- Test connectivity and route exchange
- Open peering policy - happy to peer with anyone in DN42
- ROA validation enabled
- IPv4 and IPv6 BGP sessions supported
- Multi-protocol BGP over IPv6 supported
Router: nephthys Platform: Proxmox VM running Ubuntu 25.10 Location: Germany BGP Daemon: Bird2 2.17.1
- ROA validation enabled - Only accepts routes with valid ROA entries
- Automatic ROA table updates (every 15 minutes via systemd timer)
- Route filtering with strict validation
- IPv4 and IPv6 support with MP-BGP
- WireGuard connection monitoring
Run make help to see available deployment commands.
WireGuard configuration files containing private keys are encrypted using git-crypt. To decrypt after cloning:
git-crypt unlockYou'll need the authorized GPG private key to decrypt the files.
- Registry: https://git.dn42.dev/dn42/registry
- DN42 Wiki: https://dn42.dev
- My Registry Objects: Search for SCARJIT-MNT in the registry