<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.cursedsilicon.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ilostmybagel</id>
	<title>Cursed Silicons Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.cursedsilicon.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ilostmybagel"/>
	<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/wiki/Special:Contributions/Ilostmybagel"/>
	<updated>2026-05-06T12:33:16Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.1</generator>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=187</id>
		<title>CGHMN-IP-Allocations</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=187"/>
		<updated>2025-05-18T03:10:02Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: /* Members&amp;#039; Networks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== IP Address Allocations in the CGHMN Network ===&lt;br /&gt;
This page documents any IP addresses that are allocated statically to routers, subnets and members.&lt;br /&gt;
&lt;br /&gt;
=== Networks on the CGHMN side ===&lt;br /&gt;
This is a list of all networks active on the CGHMN server side.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Network Name&lt;br /&gt;
!VLAN&lt;br /&gt;
!Subnet&lt;br /&gt;
!Router IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Core Services&lt;br /&gt;
|4&lt;br /&gt;
|172.23.4.0/22&lt;br /&gt;
|172.23.4.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Servers&lt;br /&gt;
|8&lt;br /&gt;
|172.23.8.0/22&lt;br /&gt;
|172.23.8.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Global LAN&lt;br /&gt;
|256&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|No IP traffic, no assigned IP addresses&lt;br /&gt;
|-&lt;br /&gt;
|Wireguard Members Tunnel&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.0/22&lt;br /&gt;
|100.89.128.0&lt;br /&gt;
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Members&#039; Networks ===&lt;br /&gt;
This list contains the subnets that are assigned to member routers on the  network. Members receive one &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt; network from the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; block, in first-come-first-serve sequential order per default.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Connection Name&lt;br /&gt;
!Tunnel IP&lt;br /&gt;
!Routed Subnet(s)&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|CursedSilicon&lt;br /&gt;
|AR300 Router&lt;br /&gt;
|100.89.128.1&lt;br /&gt;
|100.96.1.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.2&lt;br /&gt;
|100.96.2.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|OPNsense box and PPPoE server&lt;br /&gt;
|100.89.128.3&lt;br /&gt;
|100.96.3.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|PC VPN tunnel&lt;br /&gt;
|100.89.128.4&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Hadn69&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.5&lt;br /&gt;
|100.96.5.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Dell PowerEdge R620&lt;br /&gt;
|100.89.128.6&lt;br /&gt;
|100.96.6.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Theothertom&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.7&lt;br /&gt;
|100.96.7.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Raspberry Pi&lt;br /&gt;
|100.89.128.8&lt;br /&gt;
|100.96.8.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Loganius&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.9&lt;br /&gt;
|100.96.9.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|GothPanda&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.10&lt;br /&gt;
|100.96.10.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|ch0ccyra1n&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.11&lt;br /&gt;
|100.96.11.0/24&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member-Delegated (Sub-) Domains ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Domain&lt;br /&gt;
!Nameserver&lt;br /&gt;
!Nameserver IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
|coyote.retro&lt;br /&gt;
|a.ns.coyote.retro&lt;br /&gt;
|100.96.2.53&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|snep.retro&lt;br /&gt;
|ns1.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
|lily.retro&lt;br /&gt;
|ns1.lily.retro&lt;br /&gt;
|100.96.6.250&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Loganius&lt;br /&gt;
|loganius.retro&lt;br /&gt;
|loganius-win2k3.loganius.retro&lt;br /&gt;
|100.96.9.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|theothertom&lt;br /&gt;
|theothertom.retro&lt;br /&gt;
|north-foreland.theothertom.retro&lt;br /&gt;
|100.96.7.12&lt;br /&gt;
|`&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member Servers hosted on the CGHMN side ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!VM/CT ID&lt;br /&gt;
!Server Name&lt;br /&gt;
!Server IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|10811&lt;br /&gt;
|srv01.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
|118&lt;br /&gt;
|junko.coyote.retro&lt;br /&gt;
|172.23.3.173&lt;br /&gt;
|Network diagnostics&lt;br /&gt;
|}&lt;br /&gt;
[[Category:Compu-Global-Hyper-Mega-Net]]&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=Signup&amp;diff=171</id>
		<title>Signup</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=Signup&amp;diff=171"/>
		<updated>2025-05-11T02:36:13Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Compu-Global-Hyper-Mega-Net]]&lt;br /&gt;
So! You want to be a member of CompuGlobalHyperMegaNet?&lt;br /&gt;
&lt;br /&gt;
Excellent! Here&#039;s how you sign up&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Firstly you&#039;ll need to join the [https://discord.gg/TnpSG2P677 Cursed Silicon Discord].  &lt;br /&gt;
&lt;br /&gt;
Ping one of our Mod staff and request access to the &#039;&#039;&#039;#compu-global-hyper-mega-net&#039;&#039;&#039; channel&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After you&#039;ve been granted access to the channel, @compu-global-hyper-mega-net and let us know what you&#039;d like to build or run. A few helpful specifics &lt;br /&gt;
&lt;br /&gt;
* Do you have Systems Admin/Network Admin skills? Do you need help with the stuff you&#039;d like to run?&lt;br /&gt;
&lt;br /&gt;
* Are you volunteering as a single user or are you participating as part of a group?&lt;br /&gt;
* Are you intending to use CGHMN&#039;s hosting, or do you want to simply attach your own retro hardware to the network?&lt;br /&gt;
* What are the best ways we can contact you (usually just in case anything breaks) &lt;br /&gt;
&lt;br /&gt;
Once that&#039;s all sorted we&#039;ll help you get your project off the ground and running on the network as best we can. &lt;br /&gt;
&lt;br /&gt;
Once it&#039;s up and running though please keep in mind &#039;&#039;&#039;you will be responsible for maintaining it&#039;&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=How_to_Get_Connected&amp;diff=170</id>
		<title>How to Get Connected</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=How_to_Get_Connected&amp;diff=170"/>
		<updated>2025-05-11T02:33:31Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Compu-Global-Hyper-Mega-Net]]&lt;br /&gt;
This is a quick and dirty &amp;quot;how do I get on CGHMN&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Right now since the service is in &amp;quot;closed beta&amp;quot; these steps are a bit vague and manual. But over time as we figure out what works we&#039;ll add more connection methods and better documentation&lt;br /&gt;
&lt;br /&gt;
Right now to get connected you effectively need three things, hardware wise:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[File:CGHMN.png|thumb|319x319px|Example CGHMN Router Setup using a GL-AR300M and basic network switch]]&lt;br /&gt;
&lt;br /&gt;
=== Hardware requirements ===&lt;br /&gt;
To connect your retro machine(s) to the CGHMN, you&#039;ll need the following:&lt;br /&gt;
*&#039;&#039;&#039;An Ethernet connection on your retro device(s) of choice, with a TCP/IP (v4) stack for now! TrumpetWinSock, Microsoft TCP/IP, whatever. It all works.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Something with the ability to run Wireguard and forward IPv4 packets at the minimum and, for any non-IP packets, &amp;lt;code&amp;gt;gretap&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;nftables&amp;lt;/code&amp;gt;. Personally we recommend something running OpenWRT, like the [https://www.gl-inet.com/products/gl-ar300m GL-AR300M] which we have successfully tested to work. We&#039;re currently working on a pre-built image for some select routers to make the setup easier for new members. A script to configure already existing OpenWRT instances can be found below.&#039;&#039;&#039;&lt;br /&gt;
* Alternatively, you can also run the CGHMN routing on any standard Linux box which has at least one Ethernet port and either a second one or WiFi for internet connectivity. &amp;lt;s&amp;gt;A basic script to set up a Linux machine as a router is posted below&amp;lt;/s&amp;gt; (TODO!).&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Optionally: A simple network switch, in case you want to add multiple machines to the network. You plug one end into the CGHMN Router box and then your clients can all access CGHMN. Super easy!&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
On the right is an example of what a CGHMN router setup could look like.&lt;br /&gt;
&lt;br /&gt;
=== Get connected - With OpenWRT ===&lt;br /&gt;
If you chose to go with an OpenWRT compatible router or want to run OpenWRT on typical x86 hardware/in a VM, you can follow these steps to get yourself connected to the CGHMN:&lt;br /&gt;
&lt;br /&gt;
# Update your OpenWRT install to the latest version to ensure all required packages are available and compatible.&lt;br /&gt;
# Download [https://raw.githubusercontent.com/jonasluehrig/cghmn-get-connected/refs/heads/main/openwrt/setup-cghmn.sh this script from GitHub] to your OpenWRT router via SSH&lt;br /&gt;
# Run the following commands on the router:&lt;br /&gt;
## &amp;lt;code&amp;gt;ash setup-cghmn.sh install-pkgs&amp;lt;/code&amp;gt;&lt;br /&gt;
## &amp;lt;code&amp;gt;ash setup-cghmn.sh init&amp;lt;/code&amp;gt;&lt;br /&gt;
## You will be asked what network port you&#039;d like to use for the Retro LAN. This is where you will plug in your retro machines to be part of the CGHMN. Choose a port that is not assigned to any OpenWRT interface like &#039;&#039;&#039;lan&#039;&#039;&#039; or &#039;&#039;&#039;wan&#039;&#039;&#039; or which not already part of a bridge and enter the Linux interface name, e.g. &amp;lt;code&amp;gt;eth1&amp;lt;/code&amp;gt;, then press &amp;lt;code&amp;gt;[Enter]&amp;lt;/code&amp;gt; to continue. If your router only has two ports and you&#039;re using one for WAN, then you first have to [https://openwrt.org/docs/guide-user/luci/luci.secure#allow_access_from_internet enable the web UI and SSH access via the &#039;&#039;&#039;wan&#039;&#039;&#039; OpenWRT interface], remove the entire &#039;&#039;&#039;lan&#039;&#039;&#039; OpenWRT interface to free the network port and continue the setup over the IP address your router got on its WAN side. If you only have a single Ethernet port, you&#039;re running on a router setup we can&#039;t really recommend, however you can configure VLANs and use a managed switch to both get a WAN DHCP address for internet access and have a separate VLAN for the Retro LAN bridge over a single port. This is commonly referred to as &amp;quot;[[wikipedia:Router_on_a_stick|router on a stick]]&amp;quot;. Just enter the VLAN interface name here if you choose to go that route.&lt;br /&gt;
# Now you will be given some information on the console, including a Wireguard public key. Send one of the CGHMN admins (currently CursedSilicon and Snep) that key so we can add your router to our Wireguard server.&lt;br /&gt;
# In return, you will receive a tunnel IPv4 address (&amp;lt;code&amp;gt;100.89.128.x/32&amp;lt;/code&amp;gt;) and a routed IPv4 subnet (&amp;lt;code&amp;gt;100.96.x.0/24&amp;lt;/code&amp;gt;) from us. These will be needed on the third and final step of the setup script:&lt;br /&gt;
## &amp;lt;code&amp;gt;ash setup-cghmn.sh set-tunnel-ip&amp;lt;/code&amp;gt;&lt;br /&gt;
# Once the script completed successfully, reboot the router to ensure all interfaces are up properly. After the reboot, your retro devices should receive an IP address in your routed IPv4 subnet on the Retro LAN port you chose above and be able to communicate with other machines on the CGHMN network.&lt;br /&gt;
&lt;br /&gt;
=== Get Connected - Manually (Linux, Wireguard only, GRETAP follows shortly) ===&lt;br /&gt;
In case you want to setup a connection into the network manually, here are the required steps and information you should be needing:&lt;br /&gt;
&lt;br /&gt;
* Generate a Wireguard private key and public key, this command writes a fresh Wireguard private key to &amp;lt;code&amp;gt;private-key&amp;lt;/code&amp;gt; and the corresponsing public key to &amp;lt;code&amp;gt;public-key&amp;lt;/code&amp;gt;:&lt;br /&gt;
&lt;br /&gt;
 $ wg genkey | tee private-key | wg pubkey &amp;gt; public-key&lt;br /&gt;
&lt;br /&gt;
* NEVER share your private key, even with us! It should never be required outside of your own Wireguard setup!&lt;br /&gt;
* You will, however, need to share your public key with us. Send CursedSilicon or Snep on the Discord or via IRC a message including the public key and we&#039;ll add you to the tunnel.&lt;br /&gt;
* In return, you&#039;ll get two IP addresses from us: Your tunnel IP address, with which your router talks to our router, and a routed subnet, from which you can assign IPs to your own machines so they can talk to other CGHMN member devices on the network without NAT in the way.&lt;br /&gt;
* Next, you&#039;ll need to fill a Wireguard configuration file with the two IP addresses, like below:&lt;br /&gt;
&lt;br /&gt;
 [Interface]&lt;br /&gt;
 PrivateKey = &amp;lt;Your private key goes here&amp;gt;&lt;br /&gt;
 Address = &amp;lt;Your tunnel IP address goes here&amp;gt;/32&lt;br /&gt;
 DNS = 100.89.128.0&lt;br /&gt;
 MTU = 1420&lt;br /&gt;
 &lt;br /&gt;
 [Peer]&lt;br /&gt;
 PublicKey = k/QiJIbMakMKgTCHVt8/D+8k4DzRVM6U33F3gMZfRUg=&lt;br /&gt;
 Endpoint = wg-admin.cursedsilicon.net:42070&lt;br /&gt;
 AllowedIPs = 172.23.0.0/16, 100.89.128.0/22, 100.96.0.0/13&lt;br /&gt;
 PersistentKeepalive = 15&lt;br /&gt;
&lt;br /&gt;
* Save this file as &amp;lt;code&amp;gt;wg-cghmn.conf&amp;lt;/code&amp;gt;, for example.&lt;br /&gt;
* Then, run &amp;lt;code&amp;gt;wg-quick up ./wg-cghmn.conf&amp;lt;/code&amp;gt;, perhaps requiring &amp;lt;code&amp;gt;doas&amp;lt;/code&amp;gt;/&amp;lt;code&amp;gt;sudo&amp;lt;/code&amp;gt;, to bring the tunnel up and connect to the network!&lt;br /&gt;
&lt;br /&gt;
This should bring whatever system you&#039;ve set the tunnel up on onto the network and is now reachable for other members on the network, as long as the firewall on your device is congfigured accordingly, of course.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;#&amp;lt;/nowiki&amp;gt;TODO: Add example of routed subnet configuration, perhaps on a different Wiki site&lt;br /&gt;
&lt;br /&gt;
=== Get connected - Server Side, the Admins Guide ===&lt;br /&gt;
[[File:Example Configuration for new Wireguard Peer on Core Router.png|thumb|Example Configuration for new Wireguard Peer on Core Router]]&lt;br /&gt;
To get a member onto the network, they will send an admin of the project their randomly generated Wireguard key during the setup via the OpenWRT script. Here are the steps that admin will have to follow to get them up and running on the server side:&lt;br /&gt;
&lt;br /&gt;
# Log in on the [https://router.core.cghmn:8443 Core Router] over an existing CGHMN network link&lt;br /&gt;
# Navigate to VPN -&amp;gt; Wireguard -&amp;gt; Peer Generator&lt;br /&gt;
# You will be asked to enter some data for the new peer, enter the following: &lt;br /&gt;
## &#039;&#039;&#039;Instance:&#039;&#039;&#039; &amp;lt;code&amp;gt;WG_Member&amp;lt;/code&amp;gt;   &lt;br /&gt;
## &#039;&#039;&#039;Endpoint:&#039;&#039;&#039; &amp;lt;code&amp;gt;wg-admin.cursedsilicon.net:42070&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Name:&#039;&#039;&#039; &amp;lt;code&amp;gt;member.&#039;&#039;&amp;lt;Nickname of the new member&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Public Key:&#039;&#039;&#039; &amp;lt;code&amp;gt;&#039;&#039;&amp;lt;their Wireguard public key they&#039;ve sent over&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Private Key:&#039;&#039;&#039; &amp;lt;code&amp;gt;&#039;&#039;&amp;lt;blank&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Address:&#039;&#039;&#039; &#039;&#039;&amp;lt;code&amp;gt;&amp;lt;Next highest IP from 100.89.128.0/22, this is their tunnel IP and is auto-filled&amp;gt;&amp;lt;/code&amp;gt;&#039;&#039;&lt;br /&gt;
## &#039;&#039;&#039;Pre-Shared Key:&#039;&#039;&#039; &amp;lt;code&amp;gt;&#039;&#039;&amp;lt;blank&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Allowed IPs:&#039;&#039;&#039; &amp;lt;code&amp;gt;&#039;&#039;&amp;lt;the same as Address&amp;gt;&#039;&#039;, &#039;&#039;&amp;lt;their routed subnet, [[How to Get Connected#But wait, what even is their routed subnet?|see below]]&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
## &#039;&#039;&#039;Keepalive interval:&#039;&#039;&#039; &#039;&#039;&amp;lt;code&amp;gt;&amp;lt;blank&amp;gt;&amp;lt;/code&amp;gt;&#039;&#039;&lt;br /&gt;
## &#039;&#039;&#039;DNS Servers:&#039;&#039;&#039; &amp;lt;code&amp;gt;&#039;&#039;&amp;lt;default value&amp;gt;&#039;&#039;&amp;lt;/code&amp;gt;&lt;br /&gt;
# Hit the &amp;quot;Store and generate next&amp;quot; button&lt;br /&gt;
# Navigate to VPN -&amp;gt; Wireguard -&amp;gt; Instances&lt;br /&gt;
# Hit the &amp;quot;Apply&amp;quot; button&lt;br /&gt;
# Do either one of these steps, depending on if you can SSH into the GRETAP endpoint container:&lt;br /&gt;
## SSH into the CGHMN Proxmox Server and enter the command &amp;lt;code&amp;gt;pct enter 10403&amp;lt;/code&amp;gt;&lt;br /&gt;
## SSH directly into the GRETAP endpoint (formerly VXLAN endpoint) container with &amp;lt;code&amp;gt;ssh root@172.23.4.103&amp;lt;/code&amp;gt;&lt;br /&gt;
# From there, run the following command: &amp;lt;code&amp;gt;bash /opt/vxlan-scripts/create-vxlan-interface.sh &amp;lt;member-tunnel-ip&amp;gt; &amp;lt;member-name&amp;gt;&amp;lt;/code&amp;gt; where you replace &amp;lt;code&amp;gt;&amp;lt;member-tunnel-ip&amp;gt;&amp;lt;/code&amp;gt; with the IP tunnel address of the member as it was set above in the &#039;&#039;&#039;Address&#039;&#039;&#039; field, without the &amp;lt;code&amp;gt;/32&amp;lt;/code&amp;gt; CIDR subnet mask, and replace the &amp;lt;code&amp;gt;&amp;lt;member-name&amp;gt;&amp;lt;/code&amp;gt; with the same value you&#039;ve entered above in the &#039;&#039;&#039;Name&#039;&#039;&#039; field. For example, like this: &amp;lt;code&amp;gt;bash /opt/vxlan-scripts/create-vxlan-interface.sh 100.89.128.6 member.snep.test&amp;lt;/code&amp;gt; This will create a GRETAP (and for legacy purposes, a VXLAN) interface and bring them up automagically. &#039;&#039;Ignore the fact it still says &amp;quot;VXLAN&amp;quot; everywhere, it does both.&#039;&#039;&lt;br /&gt;
# Now you can send the member their Wireguard Tunnel IP and their routed subnet over and they can finish their client-side setup according to the mini-tutorial above.&lt;br /&gt;
# Rember to add the member and their tunnel and subnet IPs to the [[CGHMN-IP-Allocations|IP allocations page]] :)&lt;br /&gt;
&lt;br /&gt;
==== But wait, what even &#039;&#039;is&#039;&#039; their routed subnet? ====&lt;br /&gt;
Each members routed subnet comes per default from the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; IPv4 block and has a &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt; mask. This subnet is their &amp;quot;Retro LAN&amp;quot;, to which all their retro computers are hooked into via the router of their choosing. By default, NAT is enabled on the routers, so it wouldn&#039;t make a difference which subnet is used on the remote end for the retro machines. However, if someone wants to host servers in the CGHMN and doesn&#039;t want to do port forwading, they can disable NAT and let other membres directly connect to their machines via this routed subnet.&lt;br /&gt;
&lt;br /&gt;
To get the routed subnet of a member, take the number from the last octet of the Wireguard tunnel IP of a member, say &amp;lt;code&amp;gt;100.89.128.&#039;&#039;&#039;6&#039;&#039;&#039;&amp;lt;/code&amp;gt;, and put it into the third octet of the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; IP block and replace the &amp;lt;code&amp;gt;/13&amp;lt;/code&amp;gt; with &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt;, so you get &amp;lt;code&amp;gt;100.96.&#039;&#039;&#039;6&#039;&#039;&#039;.0/24&amp;lt;/code&amp;gt;. That is their routed subnet, simple as that!&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN_1.0&amp;diff=169</id>
		<title>CGHMN 1.0</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN_1.0&amp;diff=169"/>
		<updated>2025-05-11T02:33:13Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Compu-Global-Hyper-Mega-Net]]&lt;br /&gt;
== Tracking sheet for &amp;quot;what would we want in a general 1.0 release&amp;quot; ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Let&#039;s break these down by user just to keep division of labor easy&lt;br /&gt;
&lt;br /&gt;
=== CursedSilicon suggestions ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The main blocker currently is access to reliable fiber at /dev/hack. Gaining that should give us ample bandwidth to start allowing broader user access to the network generally&lt;br /&gt;
&lt;br /&gt;
Maybe invite a selection of &amp;quot;retro networking&amp;quot; youtube folks (TheSerialPort, ClabRetro, etc) to help tire kick things? Serena also suggested federation of retro network service providers, so this could be a useful step.&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN-Demo-Network&amp;diff=168</id>
		<title>CGHMN-Demo-Network</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN-Demo-Network&amp;diff=168"/>
		<updated>2025-05-11T02:33:01Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Compu-Global-Hyper-Mega-Net]]&lt;br /&gt;
=== Demo Network for the Interim Computer Festival ===&lt;br /&gt;
This page documents the quickly set up demo network to show off the CGHMN network at the [https://sdf.org/icf/ SDF&#039;s Interim Computer Festival] taking place between March 22nd and 23rd. Consider this a sort-of draft, an experimental first version, a test on what might work and what doesn&#039;t.&lt;br /&gt;
&lt;br /&gt;
Currently, the basics are up and running on the CGHMN Proxmox hypervisor living in the [https://devhack.net/ /dev/hack Hackerspace] in Seattle. These include a router and Wireguard endpoint through an OPNsense VM, a VXLAN tunnel endpoint container with some custom scripts to make deploying new member tunnel easier and two containers running a basic authoritative BIND DNS server for &amp;lt;code&amp;gt;.cghmn&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;.retro&amp;lt;/code&amp;gt; and one hosting a custom, internal Certificate Authority for those domains.&lt;br /&gt;
&lt;br /&gt;
=== Changes to the network layout ===&lt;br /&gt;
Since this page was written, there have been quite a lot of discussions about how and what we might change going forward, after the initial test of the network at the ICF was a success. The biggest change, so far, has been the idea to move away from VXLANs to GRETAP tunnels for the Layer 2 and non-IP Layer 3 traffic. This is mostly due to the fact that VXLANs, by their RFC definition, MAY NOT fragment packets coming into the VTEP (aka. a VXLAN tunnel endpoint) and packets flowing out of a VTEP MAY be reassembled if fragmented, but don&#039;t necessarily have to. In addition to this, the IP packets generated by the VXLAN tunnels have the Don&#039;t Fragment bit set, so those packets may also not be fragmented. This means that the underlying transport of the VXLAN tunnels, here Wireguard, would have to open a path that allows 1500 byte frames through its tunnel, which would make the tunnel packets themselves quite large at ~1600 bytes, which would then be fragmented by whatever routers are in between the client router and the CGHMN router. Turns out, that&#039;s quite inefficient. &lt;br /&gt;
&lt;br /&gt;
GRETAP tunnels, on the other hand, have the two flags &amp;lt;code&amp;gt;ignore-df&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;nopmtudisc&amp;lt;/code&amp;gt;, which together with &amp;lt;code&amp;gt;ttl 255&amp;lt;/code&amp;gt; create a tunnel over IP, which can carry &#039;&#039;and fragment&#039;&#039; 1500 byte Ethernet frames over a smaller underlying transport, still Wireguard in this case. This was a massive boost not only in speed under certain circumstances, like running this all on a small travel router with a weak MIPS CPU, but also reliability, as less dropped packets could be observed and MTU blackholes finally not happening in our testing.&lt;br /&gt;
&lt;br /&gt;
To bring up a GRETAP tunnel within the network to the CGHMN central router, use the following commands on a Linux box:&amp;lt;blockquote&amp;gt;&amp;lt;code&amp;gt;ip link add gretap-cghmn type gretap remote 172.23.4.103 dev wg0 ignore-df nopmtudisc ttl 255&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ip link set gretap-cghmn master br0 mtu 1500&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;ip link set gretap-cghmn up&amp;lt;/code&amp;gt;&amp;lt;/blockquote&amp;gt;Where &amp;lt;code&amp;gt;wg0&amp;lt;/code&amp;gt; is your CGHMN Wireguard tunnel and &amp;lt;code&amp;gt;br0&amp;lt;/code&amp;gt; is the bridge you&#039;d want to bridge the GRETAP tunnel to.&lt;br /&gt;
&lt;br /&gt;
However, to improve performance more and make the network a little more reliable, there was another idea for a change: Sending routable IP traffic not over the Layher 2 tunnel, but rather routing it directly through the Wireguard tunnel, which already is a straight Layer 3 path to the CGHMN core router. This is possible due to the nftables &amp;lt;code&amp;gt;bridge&amp;lt;/code&amp;gt; filter table, which can match and filter packets on bridge interfaces, incuding what &amp;quot;bridge port&amp;quot; they come in and go out of. This means we can filter IP traffic from leaving the retro LAN bridge, to which you&#039;d connect your retro machines via a phyiscal LAN port, by creating a filter that says &amp;quot;Block all traffic on bridge &amp;lt;code&amp;gt;br-retrolan&amp;lt;/code&amp;gt; which leaves through a GRETAP interface&amp;quot; and &amp;quot;Block all traffic on bridge &amp;lt;code&amp;gt;br-retrolan&amp;lt;/code&amp;gt; which comes in on a GRETAP interface&amp;quot;. Now, you can assign the router a static IP address on the bridge, so it can talk to your retro machines, enable DHCP and NAT and route IP traffic from your machines straight to the CGHMN via Wireguard. In the future, this shall be extended to work without NAT on the client side, so that every member has a small subnet, /24 for example, which is routed to the Wireugard tunnel client IP. This also means that the VLAN1 described in the next section might not need an IP address in the future so that the VLAN1 is purely non-IP traffic at least from the CGHMN side of things.&lt;br /&gt;
&lt;br /&gt;
Yet another idea mentioned was the ability to span tunnels directly between members, even without going through the CGHMN core network in the first place. This can be accomplished by creating another GRETAP interface whose &amp;lt;code&amp;gt;remote&amp;lt;/code&amp;gt; IP argument points to the IP of another members router, either through the existing CGHMN Wireguard tunnel or through a separate tunnel that you span between you and the other member. This GRETAP interface is then bridged to the &amp;lt;code&amp;gt;br-retrolan&amp;lt;/code&amp;gt; bridge and with a couple of (perhaps default) bridge firewall rules, you and the other member should be able to communicate directly! Of course, this also means we&#039;d have to implement some sort of loopback protection not just on the member router side (the default bridge firewall rules mentioned in the last sentence), but also on the core router side. so this idea is not yet fully implemented for testing.&lt;br /&gt;
&lt;br /&gt;
IP Allocations within the network are now kept track of [[CGHMN-IP-Allocations|in this Wiki page]], though the IPs listed there might not be applied in the current configuration yet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Network Layout ===&lt;br /&gt;
This section describes the network layout currently set up for the CGHMN demo network, none of which is necessarily permanent and already set in stone. I (Snep) made some assumptions about domain names, IP addresses, firewall rules and general design ideas to get something up and running for the computer festival based on info from the many chats and discussions on the Cursed Silicon Discord&#039;s CGHMN channel (See [[Signup]] for more details). So, please feel free to give input on things you&#039;d like to see changed or added!&lt;br /&gt;
&lt;br /&gt;
On the Proxmox host, all VLANs mentioned below are available tagged on the bridge &amp;lt;code&amp;gt;brcghmn&amp;lt;/code&amp;gt;, with exception of VLAN1, which is untagged and the default network when a new container or VM is added to this bridge.&lt;br /&gt;
&lt;br /&gt;
For servers and retro clients, the subnet &amp;lt;code&amp;gt;172.23.0.0/16&amp;lt;/code&amp;gt; is currently in place, divided into smaller subnets, and might be subject to change later down the line. For Wireguard clients, the &amp;lt;code&amp;gt;100.89.128.0/22&amp;lt;/code&amp;gt; subnet out of the CGNAT block is used and again, might change later.&lt;br /&gt;
&lt;br /&gt;
Below is a further breakdown of VLANs existing in this CGHMN demo network:&lt;br /&gt;
&lt;br /&gt;
==== VLAN 1 - The Global LAN (172.23.0.0/22) ====&lt;br /&gt;
This network is our layer 2 bridged network to all members who wish to participate and is intended to be used for retro computers to directly communicate with each other even across the globe. This is accomplished by spanning a VXLAN tunnel across a Wireguard connection from the CGHMN server infrastructure to each members&#039; router endpoint, which can be any OpenWRT compatible device that contains the packages for VXLANs and Wireguard. The idea is to bridge on of at least two available interfaces from said router to the VXLAN network and thus directly bridge any connected retro machines to VLAN1. All members will be in the same L2 broadcast domain, meaning even non-IP protocols that are able to run over Ethernet should be able to communicate with each other from all over the world.&lt;br /&gt;
&lt;br /&gt;
Machines on this network are able to connect to all hosts on the Server VLAN (see below), the firewall for DNS, NTP and ICMP queries and to the root DNS and CA servers for DNS queries and HTTP access to the CA web server. They may also query DNS lookups at the legacy DNS server at &amp;lt;code&amp;gt;172.23.0.104&amp;lt;/code&amp;gt;. They are not, however, able to communicate with any hosts on the internet, the /dev/hack network or any of the other existing VLANs aside from specific exceptions.&lt;br /&gt;
&lt;br /&gt;
Addresses are handed out via DHCP by the router in the range &amp;lt;code&amp;gt;172.23.1.1-172.23.3.254&amp;lt;/code&amp;gt;, the range &amp;lt;code&amp;gt;172.23.1.11-172.23.1.255&amp;lt;/code&amp;gt; is reserved for static hosts. The search domain for this network is &amp;lt;code&amp;gt;clients.retro&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== VLAN 4 - Core Services (172.23.4.0/22) ====&lt;br /&gt;
This VLAN in intended for core internal services, like the root DNS server, VXLAN endpoint and our custom Certificate Authority. The Proxmox host also has an IP address in this subnet (&amp;lt;code&amp;gt;172.23.4.11&amp;lt;/code&amp;gt;), it does not however have any routes to the rest of this CGHMN demo infrastructure and thus can only be accessed from clients in the Core Services subnet. &lt;br /&gt;
&lt;br /&gt;
Hosts in this subnet may currently access the internet, the router for DNS, NTP and ICMP queries, query DNS lookups at the legacy DNS server at &amp;lt;code&amp;gt;172.23.4.104&amp;lt;/code&amp;gt; and the VXLAN endpoint may send UDP datagrams to anyone at port &amp;lt;code&amp;gt;4789&amp;lt;/code&amp;gt; for VXLAN tunnel replies, any other internal connections are prohibited.&lt;br /&gt;
&lt;br /&gt;
Addresses are handed out via DHCP by the router in the range &amp;lt;code&amp;gt;172.23.7.1-172.23.7.254&amp;lt;/code&amp;gt;, the range &amp;lt;code&amp;gt;172.23.4.11-172.23.6.255&amp;lt;/code&amp;gt; is reserved for static hosts. The search domain for this network is &amp;lt;code&amp;gt;core.cghmn&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== VLAN 8 - Servers (172.23.8.0/22) ====&lt;br /&gt;
This VLAN will contain all servers hosted and managed by members, which can be any (retro) service that works across an IP router. For anything that requires direct layer 2 access or the same broadcast domain as the client machines, it is advised to host said server in the Global LAN network. This is the only VLAN clients from the bridged Global LAN network may access freely, so members should be wary about what ports they open up for anyone outside of localhost. Another option is to run a tiny router instance based on OpenWRT in front of your server which will act as a basic firewall and NAT router behind which one can run their servers.&lt;br /&gt;
&lt;br /&gt;
Hosts in this subnet may not access the internet inherently, however a firewall rule is in place that allows specific servers internet access, it is still uncertain if this will make it to the final CGHMN or if this subnet is also supposed to be entirely sealed off from the public internet. During a few chats on the Discord server, the idea of hosting local package mirrors of popular distros and projects was mentioned so that both modern and retro systems won&#039;t need to connect to internet servers for package installations and upgrades. Hosts may access the router for DNS, NTP and ICMP queries and query DNS lookups at the legacy DNS server at &amp;lt;code&amp;gt;172.23.4.104&amp;lt;/code&amp;gt;, other internal connections are prohibited.&lt;br /&gt;
&lt;br /&gt;
Addresses are handed out via DHCP by the router in the range &amp;lt;code&amp;gt;172.23.11.1-172.23.11.254&amp;lt;/code&amp;gt;, the range &amp;lt;code&amp;gt;172.23.8.11-172.23.10.255&amp;lt;/code&amp;gt; is reserved for static hosts. The search domain for this network is &amp;lt;code&amp;gt;hosting.retro&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
==== VLAN 12 - DMZ (172.23.12.0/22) ====&lt;br /&gt;
Currently not in use.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Containers and VMs ===&lt;br /&gt;
Containers and VMs on the Proxmox host are currently assigned in the 10000 ID range to keep clear of existing VMs.&lt;br /&gt;
&lt;br /&gt;
There is one VM and three containers at the time of writing this:&lt;br /&gt;
&lt;br /&gt;
==== VM 10001 (demo-chhmn-router) ====&lt;br /&gt;
This is the OPNsense VM running as the primary router, firewall, DHCP server and Wireguard endpoint for the demo network. Its login credentials are currently in the paws of Snep, as I&#039;m still unsure where any passwords for the CGHMN are going to be stored safely and with proper access rights.&lt;br /&gt;
&lt;br /&gt;
The router has the first IP in any of the available demo network subnets and responds to IPv4 and IPv4 ICMP packets, DNS queries to its local Unbound resolver and NTP sync requests to the built-in NTP server.&lt;br /&gt;
&lt;br /&gt;
Unbound currently resolves all requests it cannot resolve locally recursively against the internet root servers and returns those replies to clients, this may be subject to change as we potentially plan on sealing the network off more. It is configured to forward all requests with a TLD of &amp;lt;code&amp;gt;.cghmn&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;.retro&amp;lt;/code&amp;gt; to the internal DNS root server.&lt;br /&gt;
&lt;br /&gt;
The Wireguard endpoint servers as the connection into the CGHMN from the outside internet on &amp;lt;code&amp;gt;66.170.190.194:42070&amp;lt;/code&amp;gt; for anyone that wishes to parttake the network. See [[Signup]] for more details on how to join.&lt;br /&gt;
&lt;br /&gt;
==== Container 10401 (demo-cghmn-root-dns, VLAN4, 172.23.4.101) ====&lt;br /&gt;
This container, based on the absolutely tiny-footprinted Alpine image, hosts the BIND-based root DNS server for the internal CGHMN domains &amp;lt;code&amp;gt;.retro&amp;lt;/code&amp;gt; and &amp;lt;code&amp;gt;.cghmn&amp;lt;/code&amp;gt; together with the reverse DNS zone for the 172.23.0.0 network. It lives in the Core Services subnet and is reachable on port 53 for DNS queries from every other internal subnet. Zones are configured in the zone files under &amp;lt;code&amp;gt;/etc/bind/zones&amp;lt;/code&amp;gt; and loaded by the zone blocks in the &amp;lt;code&amp;gt;/etc/named.conf&amp;lt;/code&amp;gt; file.&lt;br /&gt;
&lt;br /&gt;
Currently, there is no root password set, console access works either via key-based SSH or by entering &amp;lt;code&amp;gt;pct enter 10401&amp;lt;/code&amp;gt; on the Proxmox host console.&lt;br /&gt;
&lt;br /&gt;
==== Container 10402 (demo-cghmn-ca, VLAN4, 172.23.4.102) ====&lt;br /&gt;
This container, also based on Alpine, is hosting the custom Certificate Authority based on OpenSSL created and self-signed certificate files. It is currently constructed in a Root CA -&amp;gt; Intermediate CA -&amp;gt; Server Certificates structure, where the CA signed certificates of the intermediate CA, which then signs all certificates requested for servers and clients on the network. Clients thus should only need to install the CA certificate into their trusted keychain to have valid TLS connections to servers using certificates signed by this internal CA.&lt;br /&gt;
&lt;br /&gt;
Clients can access a web server on &amp;lt;code&amp;gt;certs.cghmn:80&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;172.23.4.102:80&amp;lt;/code&amp;gt; via plain HTTP to download the root CA and intermediate CA certificate files for installation on their retro machines. Note: This is not meant to be secure. When you add this root CA, we could pretend to be any server on the internet under any domain and any system that has the root CA or intermediate CA certificate installed will trust it. Don&#039;t add this on machines you would have personal data on or that you would let onto the public internet!&lt;br /&gt;
&lt;br /&gt;
The /root directory of this container contains a script called &amp;lt;code&amp;gt;create-and-sign-server-csr.sh&amp;lt;/code&amp;gt; that, when run without any arguments, will ask a few questions on the command line and generate a signed TLS certificate in the root directory for the specified DNS names to make deployment of new TLS certificates a little easier. This requires the password of the private key of the intermediate CA, which again is currently stored in Sneps password manager but of course will be copied to a safe location to store passwords once available for the CGHMN.&lt;br /&gt;
&lt;br /&gt;
Currently, there is no root password set, console access works either via key-based SSH or by entering &amp;lt;code&amp;gt;pct enter 10402&amp;lt;/code&amp;gt; on the Proxmox host console.&lt;br /&gt;
&lt;br /&gt;
==== Container 10403 (demo-cghmn-vxlan-endpoint, VLAN4, 172.23.4.103) ====&lt;br /&gt;
This container, another Alpine instance, connects all the VXLAN clients together under one virtual Linux bridge and is constructed with a couple if-up/if-down scripts and a Bash script to create new tunnels at &amp;lt;code&amp;gt;/opt/vxlan-scripts/create-vxlan-interface.sh&amp;lt;/code&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
This script, when called like for example so: &amp;lt;code&amp;gt;create-vxlan-interface.sh 100.89.128.90&amp;lt;/code&amp;gt; will do the following:&lt;br /&gt;
&lt;br /&gt;
# Find the first unused VXLAN ID&lt;br /&gt;
# Output the VXLAN ID for configuring a new VXLAN tunnel on the client side&lt;br /&gt;
# Add an interface configuration to &amp;lt;code&amp;gt;/etc/vxlan-interfaces/&amp;lt;/code&amp;gt; which is sourced by ifupdown&lt;br /&gt;
# Bring up that new VXLAN interface, which bridges it to the Global LAN bridge&lt;br /&gt;
&lt;br /&gt;
after which the client with IP 100.89.128.90 can connect a VXLAN tunnel with the newly added VXLAN ID to their router and join the network.&lt;br /&gt;
&lt;br /&gt;
This is still a very manual process, though one which will probably become more streamlined in the future of the CGHMN network, perhaps with some APIs and/or custom OpenWRT web interface *wink wink*.&lt;br /&gt;
&lt;br /&gt;
This container is only reachable by the firewall itself and by the clients connecting their VXLAN bridge to port 4789 from the Wireguard tunnel, as it doesn&#039;t do any routing or hosting of services directly aside from the VXLAN endpoint.&lt;br /&gt;
&lt;br /&gt;
Currently, there is no root password set, console access works either via key-based SSH or by entering &amp;lt;code&amp;gt;pct enter 10403&amp;lt;/code&amp;gt; on the Proxmox host onsole.&lt;br /&gt;
&lt;br /&gt;
==== Container 10404 (demo-cghmn-legacy-dns, VLAN4, 172.23.4.104) ====&lt;br /&gt;
This container, based on Alpine, runs a dnsmasq instance configured to look up certain DNS overrides either in the hosts file at &amp;lt;code&amp;gt;/etc/cghmn-dns-overrides&amp;lt;/code&amp;gt; or by including a dnsmasq configuration file from &amp;lt;code&amp;gt;/etc/dnsmasq-cghmn.d/*.conf&amp;lt;/code&amp;gt;. Any other requests it cannot resolve locally are forwarded to the Unbound DNS resolver running on the OPNsense router VM. This setup is used to create DNS overrides for existing domains to make old software, which is hardcoded to specific DNS entries, work again with custom servers hosted internally. &lt;br /&gt;
&lt;br /&gt;
Currently, there is no root password set, console access works either via key-based SSH or by entering &amp;lt;code&amp;gt;pct enter 10404&amp;lt;/code&amp;gt; on the Proxmox host console.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Proposed Organization of IDs and IPs ===&lt;br /&gt;
My (Sneps) idea behind Proxmox container and VM IDs are as follows:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;101xx - 103xx&#039;&#039;&#039; are for Containers and VMs in the bridged layer 2 network, so any hosts that members want to run in the bridged network directly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;104xx - 107xx&#039;&#039;&#039; are for Containers and VMs in the Core Services VLAN4, so anything that is necessary for the operation of the CGHMN network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;108xx - 111xx&#039;&#039;&#039; are for Containers and VMs in the Servers VLAN8, so anything that members would choose to host on the CGHMN Proxmox.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For IPs, I left the first 10 IPs in each subnet reserved for things like routers, for example (perhaps a second router and a virtual IP for failover down the line?).&lt;br /&gt;
&lt;br /&gt;
After that, the first half of the subnet (see above under Network Layout for the actual start and end of this range) is supposed to be reserved for any hosts that are set up with a fully static IP. This is entirely outside of the DHCP range to avoid any conflicts. That DHCP range then starts with the second half of the subnet and goes up to the last available host IP of each subnet.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Other Notes ===&lt;br /&gt;
&lt;br /&gt;
* Currently, the advertised DNS server via DHCP is the included Unbound Server on the OPNsense instance. If we want to completely seal off clients and servers from the rest of the internet, we could directly point the clients towards our root DNS server for all requests.&lt;br /&gt;
* Currently, the OPNsense router does DHCP as it already has an IP in each VLAN and comes with a solid DHCP server that can also support failover out of the box (ISC DHCP). I (Snep) chose this route over a standalone DHCP server to avoid having a second container/VM in each subnet that solely does DHCP or DHCP proxying, mainly to keep the setup and maintenance work as low as possible.&lt;br /&gt;
* A customized OpenWRT image for the Gl.iNet MT300n and AR300n are currently being built and tested, which includes required packages and UCI configurations out of the box to make joining the network perhaps a little bit easier. Will update this page or create a new one and link to it once a working image exists!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Reserved static IPs ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;VLAN1, 172.23.0.11:&#039;&#039;&#039; WIREGUARD-EXTERNAL (CursedSilicon)&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=Compu-Global-Hyper-Mega-Net&amp;diff=167</id>
		<title>Compu-Global-Hyper-Mega-Net</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=Compu-Global-Hyper-Mega-Net&amp;diff=167"/>
		<updated>2025-05-11T02:32:20Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Compu-Global-Hyper-Mega-Net]]&lt;br /&gt;
=== Preamble ===&lt;br /&gt;
Compu-Global-Hyper-Mega-Net (hereby shortened to &#039;&#039;&#039;&#039;&#039;CGHMN&#039;&#039;&#039;&#039;&#039; for easier reference) originally started as me making good on a promise to use a Cisco AS5300 I acquired years ago to make a Dial-Up internet provider. Over time while working on the project and watching other YouTubers work on their own ISP projects it became clear that many of them are happy to set up the hardware, there was very little interest (or ability) to make it usable to other folks, or to have anything fun or useful to &amp;quot;do&amp;quot; with it (beyond the novelty of browsing a few vintage websites such as FrogFinder)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CGHMN (its name [https://www.youtube.com/watch?v=9STeegpxSb0 borrowing from a Simpsons joke, naturally]) is another one of my &amp;quot;biting off far more than I can possibly chew&amp;quot; projects. Intended to be an intersection point between art, shitpost, rejection of &amp;quot;internet modernity&amp;quot;, refuge for the nostalgic and a communal home for projects of a specifically retro computing bent.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CGHMN is currently in its embryonic stages as I step through the trial-by-fire of the reality of setting up 1990&#039;s era telecommunications infrastructure in a way that is both functional and not inconvenient for myself or others in the space it is physically housed in.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
An eventual goal is to provide &amp;quot;open&amp;quot; access to an era of the web that has been not so much &amp;quot;lost&amp;quot; as &#039;&#039;obliterated&#039;&#039; by capitalism. A space that can mimic &amp;quot;the vibe&amp;quot; of the late 1990&#039;s internet through faithful reconstruction or mimicry of the hardware and software stacks that powered it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Mechanisms will be implemented to discourage (but not outright prevent) &amp;quot;modern systems&amp;quot; from accessing the network where possible, both for the security of users on the network and to try and further the &amp;quot;vibe&amp;quot; of using period-accurate hardware and software. Using IRC and playing StarCraft on Windows 11 simply isn&#039;t as &amp;quot;fun&amp;quot; for us!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A longer term goal includes providing democratized access for users to begin submitting their own projects and content ala [[wikipedia:GeoCities|Geocities]] and setting up federated networking with other retro computing users, similar to GlobalTalk but with a larger scope of features and functionality&lt;br /&gt;
=== So what&#039;s this all about? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
CGHMN is a collaborative project aimed to create a late 1990&#039;s/early 2000&#039;s compatible &amp;quot;internet&amp;quot; for retro computing enthusiasts and their machines&lt;br /&gt;
&lt;br /&gt;
=== Okay so how do I connect to it ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can sign up &#039;&#039;&#039;[[Signup|right now]]!&#039;&#039;&#039; to &amp;quot;alpha test&amp;quot; the network&lt;br /&gt;
&lt;br /&gt;
===  How fast is it? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Total internal network capacity is &#039;&#039;&#039;&#039;&#039;1Gbps&#039;&#039;&#039;&#039;&#039; (symmetric) due to limitations of the switches in operation. This speed may be raised or lowered depending on future federation with other members. &lt;br /&gt;
&lt;br /&gt;
Your speed will depend on factors such as how fast your device can run Wireguard and your internet connection &lt;br /&gt;
&lt;br /&gt;
=== Is this safe to use? I thought connecting old PC&#039;s to the internet was a bad idea! ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Compu-Global-Hyper-Mega-Net is not accessible by the wider internet and is specifically designed to be a &#039;&#039;hermetically sealed&#039;&#039; network. Users can only connect via the above methods &#039;&#039;&#039;and can only communicate with other devices on the network&#039;&#039;&#039;. Users that violate the Terms of Service or attempt to abuse the network (or other members) will have their access &#039;&#039;&#039;permanently removed&#039;&#039;&#039;. With that said the usual rules about not downloading suspicious files and other &amp;quot;internet hygiene&amp;quot; rules still apply. While we don&#039;t expect bad actors to be a problem, please ensure that any files contributed to the network are scanned for malware first! [https://www.virustotal.com/gui/home/upload VirusTotal] provides free scanning services for this.&lt;br /&gt;
&lt;br /&gt;
=== How can I help? ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A lot of folks have offered to donate server hosting which is wonderful. Though not (yet!) required. The two biggest things we need are &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Donations to buy infrastructure&#039;&#039;&#039; (Particularly hard disks!) there&#039;s an Amazon Wishlist here that will get updated over time. https://www.amazon.com/hz/wishlist/ls/1W3S0E9IN7ZB7?ref_=wl_share&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Volunteers who want to set up services&#039;&#039;&#039;. Want to come build a website? Run an old game server? Have some weird retro hardware you want to attach to the network? Please, reach out!&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=Category:Compu-Global-Hyper-Mega-Net&amp;diff=166</id>
		<title>Category:Compu-Global-Hyper-Mega-Net</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=Category:Compu-Global-Hyper-Mega-Net&amp;diff=166"/>
		<updated>2025-05-11T02:31:14Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: Created page with &amp;quot;Pages relating to the Compu-Global-Hyper-Mega-Net&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Pages relating to the Compu-Global-Hyper-Mega-Net&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=165</id>
		<title>CGHMN-IP-Allocations</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=165"/>
		<updated>2025-05-11T00:27:53Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: /* Member-Delegated (Sub-) Domains */ Added lily.retro to the member-delegated domains&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== IP Address Allocations in the CGHMN Network ===&lt;br /&gt;
This page documents any IP addresses that are allocated statically to routers, subnets and members.&lt;br /&gt;
&lt;br /&gt;
=== Networks on the CGHMN side ===&lt;br /&gt;
This is a list of all networks active on the CGHMN server side.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Network Name&lt;br /&gt;
!VLAN&lt;br /&gt;
!Subnet&lt;br /&gt;
!Router IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Core Services&lt;br /&gt;
|4&lt;br /&gt;
|172.23.4.0/22&lt;br /&gt;
|172.23.4.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Servers&lt;br /&gt;
|8&lt;br /&gt;
|172.23.8.0/22&lt;br /&gt;
|172.23.8.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Global LAN&lt;br /&gt;
|256&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|No IP traffic, no assigned IP addresses&lt;br /&gt;
|-&lt;br /&gt;
|Wireguard Members Tunnel&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.0/22&lt;br /&gt;
|100.89.128.0&lt;br /&gt;
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Members&#039; Networks ===&lt;br /&gt;
This list contains the subnets that are assigned to member routers on the  network. Members receive one &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt; network from the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; block, in first-come-first-serve sequential order per default.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Connection Name&lt;br /&gt;
!Tunnel IP&lt;br /&gt;
!Routed Subnet(s)&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|CursedSilicon&lt;br /&gt;
|AR300 Router&lt;br /&gt;
|100.89.128.1&lt;br /&gt;
|100.96.1.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.2&lt;br /&gt;
|100.96.2.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|OPNsense box and PPPoE server&lt;br /&gt;
|100.89.128.3&lt;br /&gt;
|100.96.3.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|PC VPN tunnel&lt;br /&gt;
|100.89.128.4&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Hadn69&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.5&lt;br /&gt;
|100.96.5.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Dell PowerEdge r620&lt;br /&gt;
|100.89.128.6&lt;br /&gt;
|100.96.6.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Theothertom&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.7&lt;br /&gt;
|100.96.7.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Hosting&lt;br /&gt;
|100.89.128.8&lt;br /&gt;
|100.96.8.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Loganius&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.9&lt;br /&gt;
|100.96.9.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|GothPanda&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.10&lt;br /&gt;
|100.96.10.0/24&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member-Delegated (Sub-) Domains ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Domain&lt;br /&gt;
!Nameserver&lt;br /&gt;
!Nameserver IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
|coyote.retro&lt;br /&gt;
|a.ns.coyote.retro&lt;br /&gt;
|100.96.2.100&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|snep.retro&lt;br /&gt;
|ns1.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
|lily.retro&lt;br /&gt;
|ns1.lily.retro&lt;br /&gt;
|100.96.6.250&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member Servers hosted on the CGHMN side ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!VM/CT ID&lt;br /&gt;
!Server Name&lt;br /&gt;
!Server IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|10811&lt;br /&gt;
|srv01.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=162</id>
		<title>CGHMN-IP-Allocations</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=162"/>
		<updated>2025-05-09T21:20:17Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: /* Members&amp;#039; Networks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== IP Address Allocations in the CGHMN Network ===&lt;br /&gt;
This page documents any IP addresses that are allocated statically to routers, subnets and members.&lt;br /&gt;
&lt;br /&gt;
=== Networks on the CGHMN side ===&lt;br /&gt;
This is a list of all networks active on the CGHMN server side.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Network Name&lt;br /&gt;
!VLAN&lt;br /&gt;
!Subnet&lt;br /&gt;
!Router IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Core Services&lt;br /&gt;
|4&lt;br /&gt;
|172.23.4.0/22&lt;br /&gt;
|172.23.4.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Servers&lt;br /&gt;
|8&lt;br /&gt;
|172.23.8.0/22&lt;br /&gt;
|172.23.8.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Global LAN&lt;br /&gt;
|256&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|No IP traffic, no assigned IP addresses&lt;br /&gt;
|-&lt;br /&gt;
|Wireguard Members Tunnel&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.0/22&lt;br /&gt;
|100.89.128.0&lt;br /&gt;
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Members&#039; Networks ===&lt;br /&gt;
This list contains the subnets that are assigned to member routers on the  network. Members receive one &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt; network from the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; block, in first-come-first-serve sequential order per default.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Connection Name&lt;br /&gt;
!Tunnel IP&lt;br /&gt;
!Routed Subnet(s)&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|CursedSilicon&lt;br /&gt;
|AR300 Router&lt;br /&gt;
|100.89.128.1&lt;br /&gt;
|100.96.1.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.2&lt;br /&gt;
|100.96.2.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|OPNsense box and PPPoE server&lt;br /&gt;
|100.89.128.3&lt;br /&gt;
|100.96.3.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|PC VPN tunnel&lt;br /&gt;
|100.89.128.4&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Hadn69&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.5&lt;br /&gt;
|100.96.5.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Dell PowerEdge r620&lt;br /&gt;
|100.89.128.6&lt;br /&gt;
|100.96.6.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Theothertom&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.7&lt;br /&gt;
|100.96.7.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Loganius&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.8&lt;br /&gt;
|100.96.8.0/24&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member-Delegated (Sub-) Domains ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Domain&lt;br /&gt;
!Nameserver&lt;br /&gt;
!Nameserver IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
|coyote.retro&lt;br /&gt;
|a.ns.coyote.retro&lt;br /&gt;
|100.96.2.100&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|snep.retro&lt;br /&gt;
|ns1.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member Servers hosted on the CGHMN side ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!VM/CT ID&lt;br /&gt;
!Server Name&lt;br /&gt;
!Server IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|10811&lt;br /&gt;
|srv01.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
	<entry>
		<id>https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=158</id>
		<title>CGHMN-IP-Allocations</title>
		<link rel="alternate" type="text/html" href="https://wiki.cursedsilicon.net/index.php?title=CGHMN-IP-Allocations&amp;diff=158"/>
		<updated>2025-05-06T22:42:36Z</updated>

		<summary type="html">&lt;p&gt;Ilostmybagel: /* Members&amp;#039; Networks */ Put what device I&amp;#039;m using in the Connection Name&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== IP Address Allocations in the CGHMN Network ===&lt;br /&gt;
This page documents any IP addresses that are allocated statically to routers, subnets and members.&lt;br /&gt;
&lt;br /&gt;
=== Networks on the CGHMN side ===&lt;br /&gt;
This is a list of all networks active on the CGHMN server side.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Network Name&lt;br /&gt;
!VLAN&lt;br /&gt;
!Subnet&lt;br /&gt;
!Router IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Core Services&lt;br /&gt;
|4&lt;br /&gt;
|172.23.4.0/22&lt;br /&gt;
|172.23.4.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Servers&lt;br /&gt;
|8&lt;br /&gt;
|172.23.8.0/22&lt;br /&gt;
|172.23.8.1&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Global LAN&lt;br /&gt;
|256&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|No IP traffic, no assigned IP addresses&lt;br /&gt;
|-&lt;br /&gt;
|Wireguard Members Tunnel&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.0/22&lt;br /&gt;
|100.89.128.0&lt;br /&gt;
|The .0 for the router is not a typo, on P2P links the network address can also be used for a host&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Members&#039; Networks ===&lt;br /&gt;
This list contains the subnets that are assigned to member routers on the  network. Members receive one &amp;lt;code&amp;gt;/24&amp;lt;/code&amp;gt; network from the &amp;lt;code&amp;gt;100.96.0.0/13&amp;lt;/code&amp;gt; block, in first-come-first-serve sequential order per default.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Connection Name&lt;br /&gt;
!Tunnel IP&lt;br /&gt;
!Routed Subnet(s)&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|CursedSilicon&lt;br /&gt;
|AR300 Router&lt;br /&gt;
|100.89.128.1&lt;br /&gt;
|100.96.1.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.2&lt;br /&gt;
|100.96.2.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|MT300n Router&lt;br /&gt;
|100.89.128.3&lt;br /&gt;
|100.96.3.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|PC VPN tunnel&lt;br /&gt;
|100.89.128.4&lt;br /&gt;
| -&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Hadn69&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.5&lt;br /&gt;
|100.96.5.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Lily&lt;br /&gt;
| Raspberry Pi&lt;br /&gt;
|100.89.128.6&lt;br /&gt;
|100.96.6.0/24&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Theothertom&lt;br /&gt;
| -&lt;br /&gt;
|100.89.128.7&lt;br /&gt;
|100.96.7.0/24&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member-Delegated (Sub-) Domains ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!Domain&lt;br /&gt;
!Nameserver&lt;br /&gt;
!Nameserver IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Talija&lt;br /&gt;
|coyote.retro&lt;br /&gt;
|a.ns.coyote.retro&lt;br /&gt;
|100.96.2.100&lt;br /&gt;
| -&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|snep.retro&lt;br /&gt;
|ns1.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Member Servers hosted on the CGHMN side ===&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
!Member Name&lt;br /&gt;
!VM/CT ID&lt;br /&gt;
!Server Name&lt;br /&gt;
!Server IP&lt;br /&gt;
!Notes&lt;br /&gt;
|-&lt;br /&gt;
|Snep&lt;br /&gt;
|10811&lt;br /&gt;
|srv01.snep.retro&lt;br /&gt;
|172.23.8.11&lt;br /&gt;
| -&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ilostmybagel</name></author>
	</entry>
</feed>