Invisible Internet Project (I2P)
From Whonix
Introduction[edit]
Network[edit]
The Invisible Internet Project (I2P) homepage [archive] provides a simple overview of the protocol:
I2P is an anonymous network built on top of the internet. It allows users to create and access content and build online communities on a network that is both distributed and dynamic. It is intended to protect communication and resist monitoring by third parties such as ISPs.
Aside from anonymizing traffic within the network, I2P functions with the same capabilities as the Internet, however its design and decentralization create a censorship resistant environment for the free-flow of information.
Mirrored sites hosted on the network allow access to news outlets and other resources in areas where information is being filtered or denied. Online communities wishing to organize in restrictive environments can do so anonymously to mitigate political threat and protect each other.
The I2P anonymous network exposes a simple layer that applications can use to anonymously and securely send messages to each other through "tunnels". The network itself is strictly message-based (IP), but there is a library available to allow reliable streaming communication on top of it (TCP). All communication is encrypted end-to-end -- in total there are four layers of encryption used when sending a message -- and even the end points ("destinations") are cryptographic identifiers (essentially a pair of public keys). [1]
This design is known as garlic routing [archive] which is a variant of onion routing [archive] (used in the Tor network) and benefits from the research on the latter but makes some different tradeoffs. [2] Each client application has their own I2P 'router' that finds other clients by querying against the fully distributed 'network database' - a custom structured distributed hash table (DHT) based on the Kademlia algorithm [archive]. Every router transports traffic for its peers which it uses as cover traffic for its own. To learn more about I2P technical details, see here [archive].
In contrast to the Tor network, I2P is focused on creating a community around P2P darknet services rather than providing "outproxies"(exits) to the clearnet. The I2P development team [archive] is an open group that welcomes all parties who are interested in getting involved [archive]. All the code is open source [archive]. The core I2P Software Development Kit (SDK) and the current router implementation is accomplished in Java, [3] and there is a simple socket based API [archive] for accessing the network from other languages (with a C library available, and both Python and Perl in development). The network is actively being developed and has not yet reached the 1.0 release, but the current roadmap [archive] describes their active schedule.
Tor vs I2P[edit]
Many of Tor's concepts have (virtual) equivalents in I2P, despite the terminology [archive] being somewhat different.
Table: Tor vs. I2P Terminology [4]
Tor Terminology | I2P Equivalent |
---|---|
Cell | Message |
Circuit | Tunnel |
Client | Router or Client |
Directory | NetDb |
Directory Server | Floodfill Router |
Entry Guards | Fast Peers |
Entry Node | Inproxy |
Exit Node | Outproxy |
Hidden (Onion) Service | Hidden Service, Eepsite or Destination |
Hidden Service Descriptor | LeaseSet |
Hidden Service 'Stealth Mode' | I2P Client Whitelist [5] or Encrypted LeaseSets [6] [7] |
Introduction Point | Inbound Gateway |
Node | Router |
Onion Proxy | I2PTunnel Client (more or less) |
Relay | Router |
Rendezvous Point | Similar to Inbound Gateway + Outbound Endpoint |
Router Descriptor | RouterInfo |
Server | Router |
Single Onion Service | I2P 0-hop Tunnel [8] |
The I2P comparison page notes the relative strengths of Tor and I2P; those are summarized below.
Tor's primary strengths are: a larger user base; greater academic interest and research; significant funding; a large development team; greater resistance to state-level censorship (TLS transport and bridges); large number of exit nodes; better memory usage; thorough documentation; low client bandwidth overhead; higher throughput and lower latency. [4]
In comparison, I2P's primary strengths are: optimization for hidden services; a fully distributed design; better peer selection; varied and untrusted directory servers; peer-to-peer friendly nature; improved load balancing and resilience; unidirectional tunnels; [9] protection against client activity detection; short-lived tunnels; [10] low bandwidth overhead for full peers; TCP and UDP transports; and being based on the Java programming language. [4]
How-to: Use I2P in Whonix ™[edit]
There are two methods of using I2P in Whonix ™:
- Inproxies inside Whonix-Workstation; or
- I2P client inside Whonix-Workstation (recommended)
The inproxy method is better suited for causal use of I2P. In this instance, users just want to anonymously view an Eepsite and are not concerned about eavesdroppers so long as anonymity is assured.
It is safer to use the I2P client inside Whonix ™, since all I2P traffic is tunneled through Tor and access is fully featured. This is a little more difficult than installing I2P the ordinary way, that is using I2P in the clear, not over Tor.
Readers who are considering using I2P in Whonix ™ are suggested to review the related forum thread [archive].
Inproxies inside Whonix-Workstation[edit]
There are several I2P inproxies and they have similar functionality to Tor2web [archive]. [11] Simply use Tor Browser which is installed in Whonix ™ by default to directly access the I2P proxies listed.
Although this is the easiest method, on the downside end-to-end encryption is lost when connecting to the eepsites. This is not the case when I2P is installed directly inside Whonix-Workstation ™ or if I2P is used in the ordinary way. Further, potentially Tor Exit Nodes can Eavesdrop on Communications if an inproxy uses plain http, since it is an unencrypted connection. This risk is averted if the inproxy uses https or is reachable via an onion service. In any case, the I2P inproxy administrator can see all of your traffic in the I2P network and it is impossible to prevent that.
Example list of I2P inproxy domains (in bold):
- http://forum.i2p.rocks [archive] [12]
- http://forum.i2p.re [archive]
- http://forum.i2p.xyz [archive]
- https://www.hiddenservice.net/ [archive]
- Many others are down at the time of writing; see footnotes. [13] [14]
I2P Client inside Whonix-Workstation[edit]
Introduction[edit]
The preferred configuration is to connect to Tor before I2P inside Whonix-Workstation ™: user
→ Tor
→ I2P
→ Internet
Before configuring this tunnel link, it is recommended to read the following related wiki entries:
Post-Tor I2P Tunnel Effects[edit]
Table: Post-Tor I2P Connections
Domain | Information |
---|---|
Advantages |
|
Disadvantages |
|
Warning: No Stream-isolation Support |
|
Installation and Setup[edit]
- A large number of dependencies are required for this procedure, so a separate (cloned) Whonix-Workstation ™ (Qubes-Whonix ™:
whonix-ws-15-clone-1
TemplateVM) is recommended. - Privoxy [archive] and
about:config
changes in Tor Browser worsen the browser fingerprint. The modified Tor Browser should only be used for I2P purposes.- In Qubes-Whonix ™, a separate
anon-whonix-I2P
AppVM is recommended.
- In Qubes-Whonix ™, a separate
- If I2P is non-functional, report any issues in the i2p inside Whonix-Workstation broken [archive] forum thread.
OUTDATED! I2P is unavailable in Debian bullseye
.
1. Update the package lists. (Qubes-Whonix ™: whonix-ws-15-clone-1
TemplateVM).
sudo apt update
2. Install I2P and dependencies.
sudo apt install i2p
3. Install Privoxy. [17]
sudo apt install privoxy
4. Add I2P forwarding to the Privoxy configuration file.
sudoedit /etc/privoxy/config
At the bottom of the configuration file, add.
forward .i2p 127.0.0.1:4444
Save and exit.
5. Configure I2P.
sudo dpkg-reconfigure i2p
The following settings are recommended:
- leave the user as
i2psvc
- have I2P run as a daemon when starting (the service will automatically run when the system boots)
- apply the Debian AppArmor profile
- leave the default RAM setting as 128MB
In Qubes-Whonix ™, shut down the TemplateVM.
6. Configure Tor Browser to allow connections to I2P (Qubes-Whonix ™: anon-whonix-I2P
AppVM).
Note: The following steps will no longer be required once Whonix ™ releases a custom Tor Browser for connecting to alternative networks. [18]
- This step changes the web fingerprint of Tor Browser!
- Leave all other settings as is!
In Tor Browser, type about:config
into the URL bar and press Enter
. Make the following changes:
extensions.torbutton.use_nontor_proxy true
network.proxy.share_proxy_settings true
network.proxy.http 127.0.0.1
network.proxy.http_port 8118
network.proxy.no_proxies_on 1
network.proxy.socks_remote_dns false
7. Optional: Start/stop/check the I2P service.
This step is unnecessary if I2P was set to automatically run as a daemon.
To start the I2P service, run.
sudo systemctl start i2p
To stop the I2P service, run.
sudo systemctl stop i2p
To check the status of the I2P service, run.
sudo systemctl status i2p
Before using I2P, it is recommended to access the I2P router configuration and make several adjustments for better performance.
Usage[edit]
Open I2P router console [archive] in Tor Browser (Qubes-Whonix ™: anon-whonix-I2P
AppVM).
http://127.0.0.1:7657
Figure: I2P Router Console
Recommendation:
- set your preferred language
- allow the network bandwidth test to complete (takes 60 seconds)
- review and adjust the bandwidth settings
- the default settings of 300 KB/s down / 60 KB/s up are fairly conservative
- users report settings of 5000+ KB/s provide better connectivity
- on the network configuration page, set "Prefer IPv4 over IPv6" and "Completely disable" the UDP port and save the changes
If errors appear like: "Network: ERR-UDP Disabled and Inbound TCP host/port not set" or "ERR-Clock Skew of X min", they can be safely ignored.
Note that once the Local Tunnels (shared clients) section shows a green connection, I2P should be fully functional and it is possible to browse eepsites like echelon.i2p
. Some users report this process can be lengthy and take more than 10 minutes before the tunnels are stable/available.
Searching I2P[edit]
Search engines:
- The onion service search engine https://ahmia.fi [archive] now supports I2P eepsites and Tor2Web plans on adding I2P support. [21]
- http://seeker.i2p [archive] is a search engine for I2P eepsites.
Eepsite directories:
- http://stats.i2p [archive] lists registered i2p websites.
- http://identiguy.i2p [archive] lists many known and alive I2P websites.
- http://no.i2p [archive] lists known latest and alive i2p websites. The site list is generated from registered sites and external sources.
- http://inr.i2p [archive] lists known latest and alive i2p websites. The site list is generated from registered sites and external sources.
Figure: I2P Browsing in Whonix ™
Services[edit]
The I2P supported applications webpage [archive] warns that no guarantee can be provided about the safety of compatible applications, plugins and services -- they must be properly configured and might jeopardize anonymity due to design faults or carelessness. Carefully vet these tools and research them diligently beforehand.
Many interesting features and functionality are implemented for I2P in the form of stand-alone packages or plugins that can be optionally installed from their official plugin eepsite [archive]. Various tools are available for:
- blogging, forums and wikis
- decentralized file storage
- development tools
- domain naming
- file sharing
- network administration
- real-time chat
- web browsing
- website hosting
The instructions are simple to follow. The signing keys for these plugins are already built into the official I2P package and so are already white-listed. This is not a complete list.
For documentation about default port numbers of I2P plugins, see this page [archive].
I2P-Bote[edit]
I2P-Bote [archive] is a serverless, encrypted email plugin that uses I2P for anonymity. Messages are stored in the distributed hash table (DHT) [archive] for 100 days, during which the recipient is able to download them. Emails are automatically encrypted and digitally signed, which means only the intended recipient can read them and they cannot be forged by third parties.
To back up I2P-Bote data, copy the i2pbote folder inside the I2P config directory (~/.i2p/i2pbote on Unix systems or /var/lib/i2p/i2p-config when running as a daemon).
Compartmentalize activities and only use the I2P-Bote/Susimail VM snapshot for this purpose. Generally, applications that run with a browser interface are vulnerable to a whole class of bugs, including cross-site request forgery (CSRF) [archive].[22][23]
Features[edit]
- themeable webmail interface
- user interface translated into many languages
- one-click creation of email accounts (called email identities)
- emails can be sent under a sender identity, or anonymously
- ElGamal, Elliptic Curve, and NTRU encryption
- encryption and signing is transparent, without the need to know about PGP
- delivery confirmation
- basic support for short recipient names
- IMAP / SMTP
Planned Features[edit]
- custom folders
- sending and receiving via relays, similar to Mixmaster
- lots of small improvements
[edit]
RetroShare is a friend-to-friend [archive] (F2F) network that enables end-to-end encrypted communications, including general messaging, mail, forums, publish-subscribe messaging ('pubsub'), file exchange and even telephony. It can be used as an alternative to Syndie (see further below) and can be tunneled through I2P for enhanced anonymity.
Follow the steps in this guide [archive] to connect to others over I2P. Also see: I2P Hidden RetroShare Nodes [archive].
To install RetroShare, see: Installation.
Syncthing[edit]
Syncthing [archive] is a popular libre software for file syncing based on the bittorrent protocol. [24] Syncthing provides several benefits: [25]
- cross-platform availability
- data is not stored on a central server, but only on your computer(s)
- all communication is secured with TLS and perfect forward secrecy [archive]
- every node is identified by a strong cryptographic certificate
- a completely open protocol -- open source, open development and open discourse
- portable and simple to use Web GUI
It is possible to tunnel Syncthing traffic over I2P as shown in this guide [archive]. [26]
To install Syncthing, run.
sudo apt install syncthing
Syndie[edit]
Syndie [archive] is I2P's distributed (decentralized) forum software, allowing asynchronous conversations between anonymous participants. It was the focus of I2P's creator shortly before he ceased public activity. It supports single and multiple author modes, adjustable visibility of posts and post moderation. Syndie features its own minimalist and secure reader to protect against browser exploitation. In 2018, Syndie was being rewritten in another programming language to provide a more modern and simple interface, along with basic image rendering. [27]
A key benefit of Syndie is that unlike centralized forums, it cannot be easily taken offline via denial of service attacks or administrative action, and there is no single point to monitor group activity. Offline forum participation is possible, by 'syncing up' any accumulated changes when it is convenient (days, weeks or even months later). In addition to simple text messages, entire webpages or the full content of sites can be packaged into a single post, which can even be browsed offline.
The Syndie Technical Features section notes: [28]
On the whole, Syndie works at the *content layer* - individual posts are contained in encrypted zip files, and participating in the forum means simply sharing these files. There are no dependencies upon how the files are transferred (over I2P [archive], Tor [archive], Freenet [archive], gnutella [archive], bittorrent [archive], RSS [archive], usenet [archive], email [archive]), but simple aggregation and distribution tools will be bundled with the standard Syndie release.
To install Syndie, run.
sudo apt install syndie
ZeroNet[edit]
Unfortunately, I2P is not yet natively supported as a tunneling option in ZeroNet. However, progress has been made towards this goal since 2016; see footnotes to follow recent GitHub developments. [29] [30]
Installing I2P on Whonix-Gateway[edit]
It is possible to run I2P and Tor simultaneously on Whonix-Gateway ™:
user
→Tor
→Internet
; anduser
→I2P
→Internet
Users who are interested in this configuration should follow the detailed instructions found here [archive].
This configuration is untested by Whonix ™ developers and it is considered experimental. Also, Whonix ™ developer HulaHoop has noted it is difficult to have a preconfigured Tor Browser for accessing .i2p
domains and other non-clearnet top-level domains, as well as optimizing I2P operations when tunneled over Tor.
For further information and to report successes/failures of this approach, refer to the development discussion [archive] and old development discussion [archive].
Footnotes[edit]
- ↑ https://geti2p.net/en/about/intro [archive]
- ↑ https://geti2p.net/en/research [archive]
- ↑ Currently working with both sun and kaffe; gcj support is planned for later.
- ↑ 4.0 4.1 4.2 https://geti2p.net/en/comparison/tor [archive]
- ↑ https://twitter.com/i2p/status/756952247662239744 [archive]
- ↑ https://geti2p.net/sv/docs/how/network-database [archive]
- ↑ I2P documentation is lacking in describing these features, but there are plans to improve the situation.
- ↑ https://twitter.com/i2p/status/756948810790821888 [archive]
- ↑ This should make it more difficult for adversaries to compromise the relevant information.
- ↑ Making it harder for adversaries to sample for attack purposes.
- ↑ Tor2web is a project which allows Internet users access to Tor Onion Services without Tor Browser.
- ↑ http://i2p.rocks/ [archive]
- ↑
Non-functional I2P inproxy domains:
- awxcnx I2P eepsite inproxy
- awxcnx I2P IRC inproxy - see Chat for general chat safety advice.
- Or simply add '.to' after '.i2p'. For example, instant of http://forum.I2P [archive] you could use http://forum.i2p.to [archive]
- ↑ For onion services, simply append the onion service name after the short eepsite name, omitting the .i2p TLD.
- ↑ This sounds worse than it really is because very few people are expected to use I2P over Tor. Further, I2P itself offers this option. It is not like a leeching mod.
- ↑ https://www.reddit.com/r/i2p/comments/579idi/warning_i2p_is_linkablefingerprintable/ [archive]
- ↑ Privoxy homepage [archive]:
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.
- ↑ Except in the case of YaCy, which needs internet access.
- ↑
Optional: run I2P manually as
user
. Note: The configuration folder changes to/home/user/.i2p/
i2prouter start
- ↑ /usr/share/doc/i2p/README.Debian
- ↑ https://lists.torproject.org/pipermail/tor-talk/2016-January/039814.html [archive]
- ↑ https://chaoswebs.net/blog/2016/12/01/Exploiting-I2P-Bote/ [archive]
- ↑ https://chaoswebs.net/blog/2016/10/15/Stealing-Your-I2P-Email/ [archive]
- ↑
Syncthing is a continuous file synchronization program. It synchronizes files between two or more computers and replaces proprietary sync and cloud services with something open, trustworthy and decentralized. Your data is your data alone and you deserve to choose where it is stored, if it is shared with some third party and how it's transmitted over the internet.
- ↑ https://syncthing.net/ [archive]
- ↑ This guide is also reposted here [archive].
- ↑ https://i2pforum.net/viewtopic.php?f=25&t=9 [archive]
- ↑ https://syndie.de/features.html [archive]
- ↑ https://github.com/HelloZeroNet/ZeroNet/issues/57 [archive]
- ↑ https://github.com/HelloZeroNet/ZeroNet/issues/45 [archive]
Whonix ™ is Supported by Evolution Host DDoS Protected VPS. Stay private and get your VPS with Bitcoin or Monero.
100px | |
Fosshost | About Advertisements |
Search engines: YaCy | Qwant | ecosia | MetaGer | peekier | Whonix ™ Wiki
Want to make Whonix ™ safer and more usable? We're looking for helping hands. Check out the Open Issues and development forum.
Priority Support | Investors | Professional Support
Whonix ™ | © ENCRYPTED SUPPORT LP | Freedom Software / Open Source (Why?)
The personal opinions of moderators or contributors to the Whonix ™ project do not represent the project as a whole.