Chapter 2b: Server Issues: Networked Infrastructure: Difference between revisions

This page was last edited on 16 November 2024, at 11:17.
(vpn introduction)
(move VPN history notes to pad)
Line 27: Line 27:


History and topology of VPN --- what types of networks? origin/evolution of terminology
History and topology of VPN --- what types of networks? origin/evolution of terminology
After the WWW and http protocol, the question of secure connections became urgent as the ability to connect beyond institutional networks became wider.
AT&T Bell Laboratories developed an IP Encryption Protocol (SwIPe), an effort that effectively demonstrated the potential of encryption in the IP layer. This innovation had a significant influence on the development of IPsec, an encryption protocol that remains in widespread use today.
"IPsec, introduced around the mid-1990s, provided end-to-end security at the IP layer, authenticating and encrypting each IP packet in data traffic. Notably, IPsec was compatible with IPv4 and later incorporated as a core component of IPv6. This technology set the stage for modern VPN methodologies."
https://www.paloaltonetworks.com/cyberpedia/history-of-vpn
By end of 90s Microsoft worked towards implementing a secure tunnel protocol, which encapsulated PPP packets, creating a virtual data tunnel to ensure more secure data transmission over the web.
The encryption methods used in the PPPP was vulnerable to advanced cryptographic attacks. the MPPE (Microsoft Point-to-Point Encryption), only offers up to 128-bit keys which have been deemed insufficient for protecting against advanced threats.
Later together with Cisco, they developed another protocol, the L2TP, for serving multiple types of internet traffic.
"L2TP (Layer 2 Tunneling Protocol) works by encapsulating data packets within a tunnel over a network. Since the protocol does not inherently encrypt data, it relies on IPsec (Internet Protocol Security) for confidentiality, integrity, and authentication of the data packets traversing the tunnel."
https://www.paloaltonetworks.com/cyberpedia/what-is-l2tp
A later tunneling protocol is the openVPN, is more flexible as it allows port configuration, and more secure.
Tinc protocol follows here...
maybe the drawing of encapsulation from tunnel up/down
differences between local and public/static IP --- scarcity of ipv4, how are they assigned, and ipv6. Politics and economics of IP distribution, how do they impose power structures?  see internet governance talk and notes by Vesna during /etc
break down the differences between mesh VPN, VPN for proxy


====== Positionality of feminist servers: ======
====== Positionality of feminist servers: ======

Revision as of 11:17, 16 November 2024

Coordinator: SysterServer Contributors: xm (ooooo) and Mara

https://digitalcare.noho.st/pad/p/servpub

https://eth.leverburns.blue/p/servpub-2b

from local networks  to circumvention to intranets

P2P internet infrastructure: Domain, VPN Server (Tinc VPN), DNS, web server (nginx), and networked configuration; social and network typology, proxy, what are the affordances of the network and operations  of protocols?

murthaugh and karagianni : https://psaroskalazines.gr/pdf/rosa_beta_25_jan_23.pdf

ezn / updated :: https://etherpad.hackersanddesigners.nl/p/hd_infrastructures-tinc

methodology: metaphors, analogy, visualise intersecting/sourcing with diff domains (arts, activism, literature, choreography)

/// -- sociopolitical theory around VPN Federation/ decentralization/ distributed services/ networking politics

// ---- organisational aesthetics, commodity frontiers, debugging, troubleshooting together

update 2nd novembre 2024

Structure

Technological context:

politics of networks

History and topology of VPN --- what types of networks? origin/evolution of terminology

Positionality of feminist servers:

vulgar feminists

systerserver and allies, centralized IP, contributes to small scale server hosting, generating a cultural current in technical, aesthetical, social and political terms (Goriunova, 2012)

by making infrastructures visible with the aid of diagrams, manuals, metaphors, performances, systerserver traverses technical knowledge with an aim to de-cloud (Hilfling Ritasdatter, Gansing, 2024) our data, and redistribute our networks of machines.

"one can read Haraway as making this more, rather than less vulgar. She asks messy questions about how gender and sexuality are caught up in productive and reproductive labor – and even in relations that are not obviously either [...] the cyborg is among other things a kind of counter-myth. Buried within the knotty writing of that text is a nugget of science fiction, drawing in particular on feminist utopian and science fiction writing. A contemporary writer who I think takes this kind of project to the next level is Kim Stanley Robinson. He is unapologetically a science fiction genre writer aiming at a popular – and in that sense ‘vulgar’ – readership [...] The sciences are a source of not only specific forms of knowledge in Robinson but also orientations to working in and against nature. One of the problems he highlights – not unlike Bogdanov – is how different labors and forms of technical knowledge can coordinate and cooperate in the absence of an overarching philosophical master-code. "

Vulgar Marxists, McKenzie Wark four cheers of vulgarity

references

protocol,control, and networks, Galloway and Thacker 2004

Log out_: A glossary of Technological Resistance and Decentralization

software studies, a lexicon, editor Matthew Fuller

Art Platforms and Cultural Production on the Internet, Olga Goriunova, 2012

https://en.wikipedia.org/wiki/Vulgar_Marxism test