diff --git a/i2p2www/pages/site/faq.html b/i2p2www/pages/site/faq.html index 3203c97e..71e43f90 100644 --- a/i2p2www/pages/site/faq.html +++ b/i2p2www/pages/site/faq.html @@ -10,7 +10,6 @@
  • {% trans %}Whats an "eepsite" and how do I configure my browser so I can use them?{% endtrans %}
  • {% trans %}What do the Active x/y numbers mean in the router console?{% endtrans %}
  • {% trans %}My router has very few active peers, is this OK?{% endtrans %}
  • -
  • {% trans %}My router is using too much CPU?!?{% endtrans %}
  • {% trans %}I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?{% endtrans %}
  • {% trans %}Is it possible to block I2P?{% endtrans %}
  • {% trans %}In wrapper.log I see an error stating Protocol family unavailable when I2P is loading{% endtrans %}
  • @@ -49,6 +48,7 @@
  • {% trans %}I can't access regular Internet sites through I2P.{% endtrans %}
  • {% trans %}I can't access https:// or ftp:// sites through I2P.{% endtrans %}
  • +
  • {% trans %}My router is using too much CPU?!?{% endtrans %}
  • {% trans %}My router has very few active peers, is this OK?{% endtrans %}
  • {% trans %}My active peers / known peers / participating tunnels / connections / bandwidth vary dramatically over time! Is anything wrong?{% endtrans %}
  • {% trans %}What makes downloads, torrents, web browsing, and everything else slower on I2P as compared to the regular internet?{% endtrans %}
  • @@ -97,7 +97,7 @@ While the main I2P client implementation requires Java, there are several {%- endtrans %}

    -{% trans %}Whats an "eepsite"?{% endtrans %} +{% trans %}What is an I2P Site or "eepsite?"{% endtrans %}

    {% trans -%} An eepsite is a website that is hosted anonymously, a hidden service which is accessible through your web browser. @@ -112,87 +112,6 @@ x is the number of peers you've sent or received a message from successfully in Try hovering your cursor over the other lines of information for a brief description. {%- endtrans %}

    -

    -{% trans %}Is my router an "exit node" to the regular Internet? I don't want it to be.{% endtrans %} -

    -

    {% trans outproxy="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=21&t=189" -%} -No. Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - -are not an inherent part of the network. -Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. -There are very, very few of these. - -By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh. - -There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy. -{%- endtrans %}

    - -

    {% trans %}Is using I2P Safe?{% endtrans %}

    -

    {% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing -software and strong encryption are not illegal to possess or use.{% endtrans %}

    - -

    {% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic. -{% endtrans %}

    - -

    Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

    - -

    -{% trans %}I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?{% endtrans %} -

    -

    {% trans -%} -Yes, and this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. -{%- endtrans %}

    - -

    {% trans -%} -While the fact that your computer runs I2P is public, nobody can see your activities in it. You can't say if a user behind this IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the project. -{%- endtrans %}

    - -

    {% trans %}Is it easy to detect the use of I2P by analyzing network traffic?{% endtrans %}

    -

    {% trans %}It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure. -The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a -bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able -to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic -on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out -to reseed servers to get more peers, which a network administrator can probably observe.{% endtrans %}

    - -

    -{% trans %}I can't access regular Internet sites through I2P.{% endtrans %} -

    -

    {% trans -%} -I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. -With that said, there are services which are provided by volunteers that act as proxies to clearnet based content - these are referred to as "outproxies" on the I2P network. -There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. -While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. -If your main requirement from an anonymous network is the ability to access clearnet resources, we would recommend using Tor. -{%- endtrans %}

    - -

    -{% trans -%}Is using an outproxy safe?{% endtrans %} -

    -

    {% trans -%} -I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). -I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. -Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. -This means that you are vulnerable to snooping by the outproxy operators. -One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS. -{%- endtrans %}

    - -

    {% trans -%} -For more information, you may read the Tor FAQ's answer to this question: -https://www.torproject.org/docs/faq#CanExitNodesEavesdrop -{%- endtrans %}

    - -

    {% trans zzz=i2pconv('zzz.i2p'), i2pforum="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=32&t=272" -%} -In addition, you may be vulnerable to collusion between the outproxy operator -and operators of other I2P services, if you use the same tunnels ("shared clients"). -There is additional discussion about this on {{ zzz }}. -This discussion has been mirrored on our forums as well. -{%- endtrans %}

    - -

    {% trans threatmodel=site_url('docs/how/threat-model') %} -Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, -your threat model, and how much you choose to trust the outproxy operator. -{%- endtrans %}

    -

    {% trans %}I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?{% endtrans %}

    @@ -231,12 +150,62 @@ Your router will not request any content without your specific instruction to do -

    Is it possible to block I2P?

    +

    Is it possible to block I2P?

    {% trans %}Yes, by far the easiest and most common way is by blocking bootstrap, or "Reseed" servers. Completely blocking all obfuscated traffic would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far). In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github. You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline.{% endtrans %}

    +

    +{% trans %}In wrapper.log I see an error that states "Protocol family unavailable" when loading the Router Console{% endtrans %} +

    +

    {% trans -%} +Often this error will occur with any network enabled java software on some systems that are configured to use IPv6 by default. There are a few ways to solve this: +{%- endtrans %}

    + +{% trans -%} +Another option would be to remove the ::1 from ~/.i2p/clients.config +{%- endtrans %} + +

    {% trans -%} +WARNING: For any changes to wrapper.config to take effect, you must completely +stop the router and the wrapper. Clicking Restart on your +router console will NOT reread this file! You must +click Shutdown, wait 11 minutes, then start I2P. +{%- endtrans %}

    + +

    +{% trans %}Most of the eepsites within I2P are down?{% endtrans %} +

    +

    {% trans eepstatus='http://'+i2pconv('identiguy.i2p') -%} +If you consider every eepsite that has ever been created, yes, most of them are down. +People and eepsites come and go. +A good way to get started in I2P is check out a list of eepsites that are currently up. +{{ eepstatus }} tracks active eepsites. +{%- endtrans %}

    + +

    +{% trans %}Why is I2P listening on port 32000?{% endtrans %} +

    +

    {% trans -%} +The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. +When the JVM is launched it is given a key so it can connect to the wrapper. +After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections. +{%- endtrans %}

    +

    {% trans -%} +More information can be found in the wrapper documentation. +{%- endtrans %}

    +

    Configuration

    @@ -674,6 +643,100 @@ If you would like more information on the socks proxy application anyway, there are some helpful hints on the socks page. {%- endtrans %}

    +

    +{% trans %}How do I access IRC, BitTorrent, or other services on the regular Internet?{% endtrans %} +

    +

    {% trans -%} +Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. +There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. +If this type of service is required, we recommend that you use Tor. + +Please be aware that the Tor project recommends against using BitTorrent over Tor, +as there are serious anonymity-related issues associated with doing so. +{%- endtrans %}

    + +

    Privacy and Safety

    + +

    +{% trans %}Is my router an "exit node" to the regular Internet? I don't want it to be.{% endtrans %} +

    +

    {% trans outproxy="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=21&t=189" -%} +No. Unlike Tor, "exit nodes" - or "outproxies" as they are referred to on the I2P network - +are not an inherent part of the network. +Only volunteers who specifically set up and run separate applications will relay traffic to the regular Internet. +There are very, very few of these. + +By default, I2P's HTTP Proxy (configured to run on port 4444) includes a single outproxy: false.i2p. This is run on a voluntary basis by Meeh. + +There is an outproxy guide available on our forums, if you would like to learn more about running an outproxy. +{%- endtrans %}

    + +

    {% trans %}Is using I2P Safe?{% endtrans %}

    +

    {% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing +software and strong encryption are not illegal to possess or use.{% endtrans %}

    + +

    {% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic. +{% endtrans %}

    + +

    Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

    + +

    +{% trans %}I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?{% endtrans %} +

    +

    {% trans -%} +Yes, and this is how a fully distributed peer-to-peer network works. Every node participates in routing packets for others, so your IP address must be known to establish connections. +{%- endtrans %}

    + +

    {% trans -%} +While the fact that your computer runs I2P is public, nobody can see your activities in it. You can't say if a user behind this IP address is sharing files, hosting a website, doing research or just running a node to contribute bandwidth to the project. +{%- endtrans %}

    + +

    {% trans %}Is it easy to detect the use of I2P by analyzing network traffic?{% endtrans %}

    +

    {% trans %}It can be deduced that somebody is using the I2P network with some reliability, but it is a little difficult to know for sure. +The most reliable way to know for sure would be to have a computer with a fairly stable IP address that you suspect is an I2P user, and a +bunch of computers you control on different networks all running I2P. When one of them connects to your suspected computer, you will be able +to see their I2P router in the netDB. This might take time, and it might never happen. You could also try blocking all obfuscated traffic +on a particular network until you're sure every I2P router on that network has lost all of it's peers. At that point, they'll reach out +to reseed servers to get more peers, which a network administrator can probably observe.{% endtrans %}

    + +

    +{% trans -%}Is using an outproxy safe?{% endtrans %} +

    +

    {% trans -%} +I2P does not encrypt the Internet, neither does Tor - for example, through Transport Layer Security (TLS). +I2P and Tor both aim to transport your traffic as-is securely and anonymously over the corresponding network, to its destination. +Any unencrypted traffic generated at your system will arrive at the outproxy (on I2P) or the exit node (on Tor) as unencrypted traffic. +This means that you are vulnerable to snooping by the outproxy operators. +One way to protect your outproxy traffic against this is to ensure that any traffic that will be handled by the outproxy is encrypted with TLS. +{%- endtrans %}

    + +

    {% trans -%} +For more information, you may read the Tor FAQ's answer to this question: +https://www.torproject.org/docs/faq#CanExitNodesEavesdrop +{%- endtrans %}

    + +

    {% trans zzz=i2pconv('zzz.i2p'), i2pforum="http://"+i2pconv('i2pforum.i2p')+"/viewtopic.php?f=32&t=272" -%} +In addition, you may be vulnerable to collusion between the outproxy operator +and operators of other I2P services, if you use the same tunnels ("shared clients"). +There is additional discussion about this on {{ zzz }}. +This discussion has been mirrored on our forums as well. +{%- endtrans %}

    + +

    {% trans threatmodel=site_url('docs/how/threat-model') %} +Ultimately, this is a question that only you can answer because the correct answer depends on your browsing behaviour, +your threat model, and how much you choose to trust the outproxy operator. +{%- endtrans %}

    + +

    Reseeds

    + +

    +{% trans %}My router has been up for several minutes and has zero or very few connections{% endtrans %} +

    +

    {% trans -%} +New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. +If you need to carry out a reseed of your router, please see the reseed instructions. +{%- endtrans %}

    +

    {% trans %}How do I reseed manually?{% endtrans %}

    @@ -745,16 +808,18 @@ sparingly (< 2 per week).
  • {% trans %}The file is valid only a few days (< 20)!{% endtrans %}
  • -

    -{% trans %}How do I access IRC, BitTorrent, or other services on the regular Internet?{% endtrans %} + +

    Internet Access/Performance

    + +

    +{% trans %}I can't access regular Internet sites through I2P.{% endtrans %}

    {% trans -%} -Unless an outproxy has been specifically set up for the service you want to connect to, this cannot be done. -There are only three types of outproxies running right now: HTTP, HTTPS, and email. Note that there is no SOCKS outproxy. -If this type of service is required, we recommend that you use Tor. - -Please be aware that the Tor project recommends against using BitTorrent over Tor, -as there are serious anonymity-related issues associated with doing so. +I2P is primarily not intended, nor designed, to be used as a proxy to the regular internet. +With that said, there are services which are provided by volunteers that act as proxies to clearnet based content - these are referred to as "outproxies" on the I2P network. +There is an outproxy configured by default in I2P's HTTP client tunnel - false.i2p. +While this service does currently exist, there is no guarantee that it will always be there as it is not an official service provided by the I2P project. +If your main requirement from an anonymous network is the ability to access clearnet resources, we would recommend using Tor. {%- endtrans %}

    @@ -785,8 +850,6 @@ as there are serious anonymity-related issues associated with doing so. -

    Reseeds

    -

    {% trans %}My router is using a large amount of CPU, what can I do about this?{% endtrans %}

    {% trans -%} @@ -851,14 +914,6 @@ or by setting router.maxParticipatingTunnels=nnn on the -{% trans %}My router has been up for several minutes and has zero or very few connections{% endtrans %} -

    -

    {% trans -%} -New installations of I2P carry out the reseeding process automatically, as well as when the number of known peers falls to a drastically low value. -If you need to carry out a reseed of your router, please see the reseed instructions. -{%- endtrans %}

    -

    {% trans %}My router has very few active peers, is this OK?{% endtrans %}

    @@ -955,56 +1010,6 @@ I2P is a work in progress. Lots of improvements and fixes are being implemented, If you haven't, install the latest release. {%- endtrans %}

    -

    -{% trans %}In wrapper.log I see an error that states "Protocol family unavailable" when loading the Router Console{% endtrans %} -

    -

    {% trans -%} -Often this error will occur with any network enabled java software on some systems that are configured to use IPv6 by default. There are a few ways to solve this: -{%- endtrans %}

    - -{% trans -%} -Another option would be to remove the ::1 from ~/.i2p/clients.config -{%- endtrans %} - -

    {% trans -%} -WARNING: For any changes to wrapper.config to take effect, you must completely -stop the router and the wrapper. Clicking Restart on your -router console will NOT reread this file! You must -click Shutdown, wait 11 minutes, then start I2P. -{%- endtrans %}

    - -

    -{% trans %}Most of the eepsites within I2P are down?{% endtrans %} -

    -

    {% trans eepstatus='http://'+i2pconv('identiguy.i2p') -%} -If you consider every eepsite that has ever been created, yes, most of them are down. -People and eepsites come and go. -A good way to get started in I2P is check out a list of eepsites that are currently up. -{{ eepstatus }} tracks active eepsites. -{%- endtrans %}

    - -

    -{% trans %}Why is I2P listening on port 32000?{% endtrans %} -

    -

    {% trans -%} -The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. -When the JVM is launched it is given a key so it can connect to the wrapper. -After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections. -{%- endtrans %}

    -

    {% trans -%} -More information can be found in the wrapper documentation. -{%- endtrans %}

    -

    {% trans %}I think I found a bug, where can I report it?{% endtrans %}