diff --git a/i2p2www/pages/site/faq.html b/i2p2www/pages/site/faq.html index 3203c97e..71e43f90 100644 --- a/i2p2www/pages/site/faq.html +++ b/i2p2www/pages/site/faq.html @@ -10,7 +10,6 @@
wrapper.log
I see an error stating Protocol family unavailable
when I2P is loading{% endtrans %}{% trans -%} An eepsite is a website that is hosted anonymously, a hidden service which is accessible through your web browser. @@ -112,87 +112,6 @@ x is the number of peers you've sent or received a message from successfully in Try hovering your cursor over the other lines of information for a brief description. {%- endtrans %}
-{% trans outproxy="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=21&t=189" -%} -No. Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - -are not an inherent part of the network. -Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. -There are very, very few of these. - -By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh. - -There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy. -{%- endtrans %}
- -{% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing -software and strong encryption are not illegal to possess or use.{% endtrans %}
- -{% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic. -{% endtrans %}
- -Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.
- -{% trans -%} -Yes, and this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. -{%- endtrans %}
- -{% trans -%} -While the fact that your computer runs I2P is public, nobody can see your activities in it. You can't say if a user behind this IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the project. -{%- endtrans %}
- -{% trans %}It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure. -The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a -bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able -to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic -on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out -to reseed servers to get more peers, which a network administrator can probably observe.{% endtrans %}
- -{% trans -%} -I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. -With that said, there are services which are provided by volunteers that act as proxies to clearnet based content - these are referred to as "outproxies" on the I2P network. -There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. -While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. -If your main requirement from an anonymous network is the ability to access clearnet resources, we would recommend using Tor. -{%- endtrans %}
- -{% trans -%} -I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). -I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. -Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. -This means that you are vulnerable to snooping by the outproxy operators. -One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS. -{%- endtrans %}
- -{% trans -%} -For more information, you may read the Tor FAQ's answer to this question: -https://www.torproject.org/docs/faq#CanExitNodesEavesdrop -{%- endtrans %}
- -{% trans zzz=i2pconv('zzz.i2p'), i2pforum="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=32&t=272" -%} -In addition, you may be vulnerable to collusion between the outproxy operator -and operators of other I2P services, if you use the same tunnels ("shared clients"). -There is additional discussion about this on {{ zzz }}. -This discussion has been mirrored on our forums as well. -{%- endtrans %}
- -{% trans threatmodel=site_url('docs/how/threat-model') %} -Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, -your threat model, and how much you choose to trust the outproxy operator. -{%- endtrans %}
-{% trans %}Yes, by far the easiest and most common way is by blocking bootstrap, or "Reseed" servers. Completely blocking all obfuscated traffic would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far). In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github. You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline.{% endtrans %}
+wrapper.log
I see an error that states "Protocol family unavailable
" when loading the Router Console{% endtrans %}
+{% trans -%} +Often this error will occur with any network enabled java software on some systems that are configured to use IPv6 by default. There are a few ways to solve this: +{%- endtrans %}
+echo 0 > /proc/sys/net/ipv6/bindv6only
{% endtrans %}
+wrapper.config
.{% endtrans %}#wrapper.java.additional.5=-Djava.net.preferIPv4Stack=true
+ #wrapper.java.additional.6=-Djava.net.preferIPv6Addresses=false
+
~/.i2p/clients.config
+{%- endtrans %}
+
+{% trans -%}
+WARNING: For any changes to wrapper.config
to take effect, you must completely
+stop the router and the wrapper. Clicking Restart on your
+router console will NOT reread this file! You must
+click Shutdown, wait 11 minutes, then start I2P.
+{%- endtrans %}
{% trans eepstatus='http://'+i2pconv('identiguy.i2p') -%} +If you consider every eepsite that has ever been created, yes, most of them are down. +People and eepsites come and go. +A good way to get started in I2P is check out a list of eepsites that are currently up. +{{ eepstatus }} tracks active eepsites. +{%- endtrans %}
+ +{% trans -%} +The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. +When the JVM is launched it is given a key so it can connect to the wrapper. +After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections. +{%- endtrans %}
+{% trans -%} +More information can be found in the wrapper documentation. +{%- endtrans %}
+{% trans -%} +Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. +There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. +If this type of service is required, we recommend that you use Tor. + +Please be aware that the Tor project recommends against using BitTorrent over Tor, +as there are serious anonymity-related issues associated with doing so. +{%- endtrans %}
+ +{% trans outproxy="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=21&t=189" -%} +No. Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - +are not an inherent part of the network. +Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. +There are very, very few of these. + +By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh. + +There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy. +{%- endtrans %}
+ +{% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing +software and strong encryption are not illegal to possess or use.{% endtrans %}
+ +{% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic. +{% endtrans %}
+ +Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.
+ +{% trans -%} +Yes, and this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. +{%- endtrans %}
+ +{% trans -%} +While the fact that your computer runs I2P is public, nobody can see your activities in it. You can't say if a user behind this IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the project. +{%- endtrans %}
+ +{% trans %}It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure. +The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a +bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able +to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic +on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out +to reseed servers to get more peers, which a network administrator can probably observe.{% endtrans %}
+ +{% trans -%} +I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). +I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. +Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. +This means that you are vulnerable to snooping by the outproxy operators. +One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS. +{%- endtrans %}
+ +{% trans -%} +For more information, you may read the Tor FAQ's answer to this question: +https://www.torproject.org/docs/faq#CanExitNodesEavesdrop +{%- endtrans %}
+ +{% trans zzz=i2pconv('zzz.i2p'), i2pforum="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=32&t=272" -%} +In addition, you may be vulnerable to collusion between the outproxy operator +and operators of other I2P services, if you use the same tunnels ("shared clients"). +There is additional discussion about this on {{ zzz }}. +This discussion has been mirrored on our forums as well. +{%- endtrans %}
+ +{% trans threatmodel=site_url('docs/how/threat-model') %} +Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, +your threat model, and how much you choose to trust the outproxy operator. +{%- endtrans %}
+ +{% trans -%} +New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. +If you need to carry out a reseed of your router, please see the reseed instructions. +{%- endtrans %}
+{% trans -%} -Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. -There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. -If this type of service is required, we recommend that you use Tor. - -Please be aware that the Tor project recommends against using BitTorrent over Tor, -as there are serious anonymity-related issues associated with doing so. +I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. +With that said, there are services which are provided by volunteers that act as proxies to clearnet based content - these are referred to as "outproxies" on the I2P network. +There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. +While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. +If your main requirement from an anonymous network is the ability to access clearnet resources, we would recommend using Tor. {%- endtrans %}
{% trans -%} @@ -851,14 +914,6 @@ or by setting router.maxParticipatingTunnels=nnn on the -{% trans %}My router has been up for several minutes and has zero or very few connections{% endtrans %} -
{% trans -%} -New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. -If you need to carry out a reseed of your router, please see the reseed instructions. -{%- endtrans %}
-wrapper.log
I see an error that states "Protocol family unavailable
" when loading the Router Console{% endtrans %}
-{% trans -%} -Often this error will occur with any network enabled java software on some systems that are configured to use IPv6 by default. There are a few ways to solve this: -{%- endtrans %}
-echo 0 > /proc/sys/net/ipv6/bindv6only
{% endtrans %}
-wrapper.config
.{% endtrans %}#wrapper.java.additional.5=-Djava.net.preferIPv4Stack=true
- #wrapper.java.additional.6=-Djava.net.preferIPv6Addresses=false
-
~/.i2p/clients.config
-{%- endtrans %}
-
-{% trans -%}
-WARNING: For any changes to wrapper.config
to take effect, you must completely
-stop the router and the wrapper. Clicking Restart on your
-router console will NOT reread this file! You must
-click Shutdown, wait 11 minutes, then start I2P.
-{%- endtrans %}
{% trans eepstatus='http://'+i2pconv('identiguy.i2p') -%} -If you consider every eepsite that has ever been created, yes, most of them are down. -People and eepsites come and go. -A good way to get started in I2P is check out a list of eepsites that are currently up. -{{ eepstatus }} tracks active eepsites. -{%- endtrans %}
- -{% trans -%} -The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. -When the JVM is launched it is given a key so it can connect to the wrapper. -After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections. -{%- endtrans %}
-{% trans -%} -More information can be found in the wrapper documentation. -{%- endtrans %}
-