Vue d’ensemble
I2PTunnel is a tool for interfacing with and providing services on I2P. Destination of an I2PTunnel can be defined using a hostname, Base32, or a full 516-byte destination key. An established I2PTunnel will be available on your client machine as localhost:port. If you wish to provide a service on I2P network, you simply create I2PTunnel to the appropriate ip_address:port. A corresponding 516-byte destination key will be generated for the service and it will become avaliable throughout I2P. A web interface for I2PTunnel management is avaliable on localhost:7657/i2ptunnel/.
Services par défaut
Tunnels de serveur
- I2P Webserver – un tunnel pointant vers un serveur Web Jetty exécuté
sur localhost:7658 pour héberger sur I2P de façon commode et rapide.
La racine de document est :
Unix - $HOME/.i2p/eepsite/docroot
Windows - %LOCALAPPDATA%\I2P\I2P Site\docroot, which expands to: C:\Users\**username**\AppData\Local\I2P\I2P Site\docroot
Tunnels de client
- I2P HTTP Proxy - localhost:4444 - Un mandataire HTTP utilisé pour parcourir anonymement I2P et l’Internet ordinaire à travers I2P. La navigation sur Internet à travers I2P utilise un mandataire aléatoire précisé par l’option « Mandataires sortants : ».
- Irc2P - localhost:6668 - Un tunnel IRC vers le réseau IRC anonyme par défaut, Irc2P.
- gitssh.idk.i2p - localhost:7670 - SSH access to the project Git repository
- smtp.postman.i2p - localhost:7659 - Un service de SMTP fourni par postman à hq.postman.i2p.xyz
- pop3.postman.i2p - localhost:7660 - Le service POP d’accompagnement de postman à hq.postman.i2p.xyz
Configuration
Configuration d’I2PTunnelModes client
Standard
Ouvre un port TCP local qui connecte à un service (tel que HTTP, FTP ou SMTP) sur une destination à l’intérieur d’I2P. Le tunnel est dirigé vers un hôte aléatoire à partir de la liste de destinations séparées par une virgule (",").
HTTP
Un tunnel client HTTP. Le tunnel se connecte à la destination indiquée par l’URL dans une requête HTTP. Prend en charge le relais vers Internet si un mandataire sortant est fourni. Dépouille les connexions HTTP des en-têtes suivants :
- Accept*: (not including "Accept" and "Accept-Encoding") as they vary greatly between browsers and can be used as an identifier.
- Referer:
- Via:
- From:
The HTTP client proxy provides a number of services to protect the user and to provide a better user experience.
- Request header processing:
- Strip privacy-problematic headers
- Routing to local or remote outproxy
- Outproxy selection, caching, and reachability tracking
- Hostname to destination lookups
- Host header replacement to b32
- Add header to indicate support for transparent decompression
- Force connection: close
- RFC-compliant proxy support
- RFC-compliant hop-by-hop header processing and stripping
- Optional digest and basic username/password authentication
- Optional outproxy digest and basic username/password authentication
- Buffering of all headers before passing through for efficiency
- Jump server links
- Jump response processing and forms (address helper)
- Blinded b32 processing and credential forms
- Supports standard HTTP and HTTPS (CONNECT) requests
- Response header processing:
- Check for whether to decompress response
- Force connection: close
- RFC-compliant hop-by-hop header processing and stripping
- Buffering of all headers before passing through for efficiency
- HTTP error responses:
- For many common and not-so-common errors, so the user knows what happened
- Over 20 unique translated, styled, and formatted error pages for various errors
- Internal web server to serve forms, CSS, images, and errors
Transparent Response Compression
The i2ptunnel response compression is requested with the HTTP header:
- X-Accept-Encoding: x-i2p-gzip;q=1.0, identity;q=0.5, deflate;q=0, gzip;q=0, *;q=0
The server side strips this hop-by-hop header before sending the request to the web server. The elaborate header with all the q values is not necessary; servers should just look for "x-i2p-gzip" anywhere in the header.
The server side determines whether to compress the response based on the headers received from the webserver, including Content-Type, Content-Length, and Content-Encoding, to assess if the response is compressible and is worth the additional CPU required. If the server side compresses the response, it adds the following HTTP header:
- Content-Encoding: x-i2p-gzip
If this header is present in the response, the HTTP client proxy transparently decompresses it. The client side strips this header and gunzips before sending the response to the browser. Note that we still have the underlying gzip compression at the I2CP layer, which is still effective if the response is not compressed at the HTTP layer.
This design and the current implementation violate RFC 2616 in several ways:
- X-Accept-Encoding is not a standard header
- Does not dechunk/chunk per-hop; it passes through chunking end-to-end
- Passes Transfer-Encoding header through end-to-end
- Uses Content-Encoding, not Transfer-Encoding, to specify the per-hop encoding
- Prohibits x-i2p gzipping when Content-Encoding is set (but we probably don't want to do that anyway)
- The server side gzips the server-sent chunking, rather than doing dechunk-gzip-rechunk and dechunk-gunzip-rechunk
- The gzipped content is not chunked afterwards. RFC 2616 requires that all Transfer-Encoding other than "identity" is chunked.
- Because there is no chunking outside (after) the gzip, it is more difficult to find the end of the data, making any implementation of keepalive harder.
- RFC 2616 says Content-Length must not be sent if Transfer-Encoding is present, but we do. The spec says ignore Content-Length if Transfer-Encoding is present, which the browsers do, so it works for us.
Changes to implement a standards-compliant hop-by-hop compression in a backward-compatible manner are a topic for further study. Any change to dechunk-gzip-rechunk would require a new encoding type, perhaps x-i2p-gzchunked. This would be identical to Transfer-Encoding: gzip, but would have to be signalled differently for compatibility reasons. Any change would require a formal proposal.
Transparent Request Compression
Not supported, although POST would benefit. Note that we still have the underlying gzip compression at the I2CP layer.
Persistence
The client and server proxies do not currently support RFC 2616 HTTP persistent sockets on any of the three hops (browser socket, I2P socket, server socket). Connection: close headers are injected at every hop. Changes to implement a persistence are under investigation. These changes should be standards-complaint and backwards-compatible, and would not require a formal proposal.
Pipelining
The client and server proxies do not currently support RFC 2616 HTTP pipelining and there are no plans to do so. Modern browswers do not support pipelining through proxies because most proxies cannot implement it correctly.
Compatibility
Proxy implementations must work correctly with other implementations on the other side. Client proxies should work without a HTTP-aware server proxy (i.e. a standard tunnel) on the server side. Not all implementations support x-i2p-gzip.
User Agent
Selon que le tunnel utilise un mandataire sortant ou pas, l’agent utilisateur suivant sera ajouté :
- Mandataire sortant : User-Agent: Uses the user agent from a recent Firefox release on Windows
- Internal I2P use: User-Agent: MYOB/6.66 (AN/ON)
IRC Client
Creates a connection to a random IRC server specified by the comma seprated (", ")
list of destinations. Only a whitelisted subset of IRC commands are allowed due to anonymity concerns.
The following allow list is for commands inbound from the IRC server to the IRC client.
Allow list:
- AUTHENTICATE
- CAP
- ERROR
- H
- JOIN
- KICK
- MODE
- NICK
- PART
- PING
- PROTOCTL
- QUIT
- TOPIC
- WALLOPS
There is also an allow list is for commands outbound from the IRC client to the IRC server. It is quite large due to the number of IRC administrative commands. See the IRCFilter.java source for details. The outbound filter also modifies the following commands to strip identifying information:
- NOTICE
- PART
- PING
- PRIVMSG
- QUIT
- USER
SOCKS 4/4a/5
Permet d’utiliser le routeur I2P en tant que mandataire SOCKS.
SOCKS IRC
Permet d’utiliser le routeur I2P en tant que mandataire SOCKS, avec la liste blanche de commande indiquée par le mode client IRC.
CONNECT
Crée un tunnel HTTP et utilise la méthode de requête HTTP "CONNECT" pour construire un tunnel TCP qui d’habitude est utilisé pour SSL et HTTPS.
Streamr
Crée un serveur-UDP attaché à un client Streamr I2PTunnel. Le tunnel client streamr va souscrire à un tunnel serveur streamr.
Modes serveur
Standard
Creates a destination to a local ip:port with an open TCP port.
HTTP
Creates a destination to a local HTTP server ip:port. Supports gzip for requests with Accept-encoding: x-i2p-gzip, replies with Content-encoding: x-i2p-gzip in such a request.
The HTTP server proxy provides a number of services to make hosting a website easier and more secure, and to provide a better user experience on the client side.
- Request header processing:
- Header validation
- Header spoof protection
- Header size checks
- Optional inproxy and user-agent rejection
- Add X-I2P headers so the webserver knows where the request came from
- Host header replacement to make webserver vhosts easier
- Force connection: close
- RFC-compliant hop-by-hop header processing and stripping
- Buffering of all headers before passing through for efficiency
- DDoS protection:
- POST throttling
- Timeouts and slowloris protection
- Additional throttling happens in streaming for all tunnel types
- Response header processing:
- Stripping of some privacy-problematic headers
- Mime type and other headers check for whether to compress response
- Force connection: close
- RFC-compliant hop-by-hop header processing and stripping
- Buffering of all headers before passing through for efficiency
- HTTP error responses:
- For many common and not-so-common errors and on throttling, so the client-side user knows what happened
- Transparent response compression:
- The web server and/or the I2CP layer may compress, but the web server often does not, and it's most efficient to compress at a high layer, even if I2CP also compresses. The HTTP server proxy works cooperatively with the client-side proxy to transparently compress responses.
HTTP Bidirectional
Deprecated
Functions as both a I2PTunnel HTTP Server, and a I2PTunnel HTTP client with no outproxying capabilities. An example application would be a web application that does client-type requests, or loopback-testing an I2P Site as a diagnostic tool.
IRC Server
Creates a destination that filters the reqistration sequence of a client and passes the clients destination key as a hostname to the IRC-server.
Streamr
Un client-UDP qui se connecte à un serveur media est créé. Le client-UDP est couplé avec un serveur Streamr I2PTunnel.