1
0
mirror of https://github.com/PurpleI2P/i2pd_docs_en synced 2025-01-26 06:25:27 +00:00

306 lines
12 KiB
Markdown
Raw Normal View History

2017-01-25 14:20:49 -05:00
I2P tunnel configuration
========================
Overview
--------
`tunnels.conf` is designed to support multiple I2P tunnels. The configuration file must be located in
2022-10-29 10:24:55 +03:00
``~/.i2pd`` (per-user) or ``/var/lib/i2pd`` (system-wide) on Unix-based systems, and ``%APPDATA%/i2pd`` (per-user) on Windows.
2017-01-25 14:20:49 -05:00
This file uses the .ini file format. It consists of multiple sections each with a unique name.
2017-01-25 14:20:49 -05:00
2017-09-25 01:06:57 -04:00
Tunnel types
------------
2022-10-29 10:24:55 +03:00
Section type is specified by the *type* parameter.
2017-09-25 01:06:57 -04:00
Available tunnel types:
Type | Description
------------- | --------------------------------------
client | Client tunnel to remote I2P destination (TCP)
2022-10-29 10:24:55 +03:00
server | Generic server tunnel to setup any TCP service in I2P network
2017-09-25 01:06:57 -04:00
http | HTTP server tunnel to setup a website in I2P
irc | IRC server tunnel to setup IRC server in I2P
2022-10-29 10:24:55 +03:00
udpclient | Forwards local UDP endpoint to remote I2P destination
udpserver | Forwards traffic from N I2P destinations to local UDP endpoint
2017-09-25 01:06:57 -04:00
socks | Custom Socks proxy service to use I2P with
httpproxy | Custom HTTP proxy service to use I2P with
2021-04-30 11:58:51 -04:00
Signature types
------------
Parameter `signaturetype = <code>` in a tunnel config.
Available signature types:
2021-04-30 12:08:30 -04:00
Type | Code | Comment
2021-04-30 11:58:51 -04:00
------------------------------------ | ---- | -----------
DSA-SHA1 | 0 | Deprecated
ECDSA-P256 | 1 | *None, actively used*
ECDSA-P384 | 2 | *None, actively used*
ECDSA-P521 | 3 | *None, actively used*
RSA-2048-SHA256 | 4 | Deprecated
RSA-3072-SHA384 | 5 | Deprecated
RSA-4096-SHA512 | 6 | Deprecated
ED25519-SHA512 | 7 | **Default**
*ED25519ph-SHA512* | 8 | Not implemented
GOSTR3410-A-GOSTR3411-256 | 9 | Not compatible with Java router
GOSTR3410-TC26-A-GOSTR3411-512 | 10 | Not compatible with Java router
RED25519-SHA512 | 11 | For keys blinding (encrypted LeaseSet)
2021-04-30 11:58:51 -04:00
2021-04-30 15:43:12 -04:00
LeaseSet
2021-04-30 12:49:21 -04:00
------------
2021-04-30 15:47:33 -04:00
Available LeaseSet **types** (parameter `i2cp.leaseSetType = <code>` in a tunnel config):
2021-04-30 12:49:21 -04:00
2021-04-30 15:43:12 -04:00
Type | Code | Comment
----------- | ---- | -----------
OLD | 1 | **Default** for server tunnels because encryption type for server is `0`
STANDARD | 3 | **Default** for client tunnels because encryption type can be `0` or `4`
2021-04-30 15:49:21 -04:00
ENCRYPTED | 5 | Encrypted LeaseSet. Hiding information from floodfill
2021-04-30 15:43:12 -04:00
META | 7 | Not implemented
*0, 2, 4, 6 types are reserved for routers (RouterInfo types).*
2021-04-30 15:47:33 -04:00
Available LeaseSet **encryption** types (parameter `i2cp.leaseSetEncType = <code>` in a tunnel config):
2017-01-25 14:20:49 -05:00
2021-04-30 12:49:21 -04:00
Type | Code | Comment
------------------------------------ | ---- | -----------
ELGAMAL | 0 | **Default** for destinations
ECIES_P256_SHA256_AES256CBC | 1 | Not compatible with Java router
*ECIES_P384_SHA384_AES256CBC* | 2 | Not implemented
*ECIES_P521_SHA512_AES256CBC* | 3 | Not implemented
ECIES_X25519_AEAD | 4 | **Default** for routers
2021-04-30 15:43:12 -04:00
2017-01-25 14:20:49 -05:00
Client tunnels
--------------
Mnemonic: we can connect to someone as client
Each client tunnel must contain a few mandatory parameters, along with some optional ones.
2017-01-25 14:20:49 -05:00
Here is an example of a client tunnel:
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
```ini
[irc-out]
type = client
address = 127.0.0.1
port = 6668
destination = irc.ilita.i2p
keys = irc.dat
```
If *keys* is empty, transient keys will be created on every restart. If the keys file is not found, new keys will be created and stored into the specified file.
If *keys* starts from *transient*, new keys will be created, but not stored into a file.
2017-01-25 14:20:49 -05:00
Client tunnels might share the same local destination, if the keys file contains the same identity.
2017-01-25 14:20:49 -05:00
Optional parameters:
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
2022-10-29 10:24:55 +03:00
address | local interface tunnel binds to, '127.0.0.1' for connections from local host only, '0.0.0.0' for connections from everywhere. '127.0.0.1' by default
2022-10-29 10:02:56 +03:00
signaturetype | signature type for new keys. 0 (DSA), 1 (ECDSA-P256), 7 (EDDSA), 11 (RedDSA). RSA signatures (4,5,6) are not allowed and will be changed to 7. 7 by default
cryptotype | crypto type for new keys. Experimental. Should be always 0
destinationport | connect to particular port at destination. 0 by default (targeting first tunnel on server side for destination)
keepaliveinterval | send ping to the destination after this interval in seconds. 0 by default meaning no pings
2017-01-25 14:20:49 -05:00
2022-06-14 02:05:33 +03:00
So, given the example above, if you connected to 127.0.0.1:6668 on localhost, i2pd would tunnel that connection to irc.ilita.i2p
2017-01-25 14:20:49 -05:00
Server/generic tunnels
----------------------
Mnemonic: we serving some service to others in network
Here is an example of a server tunnel:
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
```ini
[smtp-in]
type = server
host = 127.0.0.1
port = 25
keys = smtp-in.dat
```
If *keys* is empty, transient keys will be created on every restart. If the *keys* file is not found, new keys will be created and stored into the specified file.
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
Destination address from *keys* file will be loaded and the LeaseSet of address will be published.
The server tunnel must use its own destination such as host 127.0.0.1 and port 80.
This tunnel type should be used for any protocol other than HTTP, even HTTP with SSL encryption (HTTPS).
2017-01-25 14:20:49 -05:00
Optional parameters:
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
2022-10-29 10:24:55 +03:00
inport | what port at local destination server tunnel listens to. Same as *port* by default
accesslist | list of comma-separated of b32 address (without .b32.i2p) allowed to connect. Everybody is allowed by default
gzip | turns internal compression off if set to false. true by default
signaturetype | means signature type for new keys. 0 - DSA, 1- ECDSA-P256, 7 -EDDSA, 11 -RedDSA. 7 by default
cryptotype | crypto type for new keys. Experimental. Should be always 0
enableuniquelocal | if true, connection to local address will look like 127.x.x.x where x.x.x is first 3 bytes of incoming connection peer's ident hash. true by default
address | IP address of an interface tunnel is connected to *host* from. Usually not used
2017-01-25 14:20:49 -05:00
Server/http tunnels
-------------------
2018-08-26 03:37:43 -04:00
*http* tunnels are configured just like regular server tunnels, except the 'Host:' field
must be assigned to the address provided in configuration. i2pd will also resolve it if necessary.
2017-01-25 14:20:49 -05:00
Here's an example of an http tunnel:
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
```ini
[http-in]
type = http
host = 127.0.0.1
port = 80
keys = our-website.dat
```
2017-01-25 14:20:49 -05:00
Optional parameters:
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
hostoverride | value to send in 'Host:' header, default: the same as *host* parameter
gzip | should we compress contents at I2P level. default: true
ssl | use SSL connection to upstream server. `hostoverride` parameter can be used to set SNI domain. default: false (since 2.44.0)
2017-01-25 14:20:49 -05:00
Server/IRC tunnels
-------------------
2022-10-29 10:24:55 +03:00
IRC tunnels are supposed to connect to an IRC server through WEBIRC. It replaces IP address (usually 127.0.0.1) to user's .b32 I2P address.
2017-01-25 14:20:49 -05:00
Optional parameters:
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
webircpassword | password to send with WEBIRC command
2017-01-25 14:20:49 -05:00
UDP Tunnels
-----------
There are 2 types of UDP tunnels: `udpclient` and `udpserver`
2017-09-25 01:06:57 -04:00
`udpclient` forwards 1 local UDP endpoint to 1 remote I2P destination
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
```ini
[openvpn-client-simple]
type = udpclient
destination = something.b32.i2p
port = 1194
```
2017-01-25 14:20:49 -05:00
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
destination | the I2P destination of a udpserver tunnel, required parameter
address | IP address to bind local UDP endpoint to, defaults to `127.0.0.1`
port | port to bind local UDP endpoint to, required parameter
2022-10-29 10:24:55 +03:00
gzip | turns internal compression off if set to false. true by default
2017-01-25 14:20:49 -05:00
2017-09-25 01:06:57 -04:00
`udpserver` forwards traffic from N I2P destinations to 1 local UDP endpoint
2017-01-25 14:20:49 -05:00
2022-10-29 10:24:55 +03:00
```ini
[openvpn-simple-server]
type = udpserver
keys = openvpn.dat
host = 127.0.0.1
port = 1194
```
2017-01-25 14:20:49 -05:00
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
address | IP address to use for local UDP endpoints, defaults to `127.0.0.1`
2022-10-29 10:24:55 +03:00
host | IP address to forward traffic to, required parameter
2022-10-29 10:02:56 +03:00
port | UDP port to forward traffic on, required parameter
2022-10-29 10:24:55 +03:00
gzip | turns internal compression off if set to false. true by default
2017-01-25 14:20:49 -05:00
2017-01-30 12:34:20 -05:00
Socks proxy
-----------
The SOCKS proxy interface can be defined in ``tunnels.conf``.
2017-01-30 12:34:20 -05:00
Here's an example of a Socks proxy:
2017-01-30 12:34:20 -05:00
2022-10-29 10:24:55 +03:00
```ini
[alt-socks]
type = socks
address = 127.0.0.1
port = 14447
keys = socks-keys.dat
```
2017-01-30 12:34:20 -05:00
2022-10-29 10:02:56 +03:00
Option | Description
--------------------|--------------------
address | local address Socks proxy binds to, defaults to `127.0.0.1`
port | TCP port Socks proxy binds to
2017-01-30 12:34:20 -05:00
2017-01-25 14:20:49 -05:00
I2CP parameters
---------------
These I2CP parameter are common for all tunnel types and specify settings for a local destination.
2017-01-25 14:20:49 -05:00
2022-10-29 10:02:56 +03:00
Parameter | Description
------------------------------|--------------------
inbound.length | number of hops of an inbound tunnel. 3 by default, 8 by max; lower value is faster but dangerous
outbound.length | number of hops of an outbound tunnel. 3 by default, 8 by max; lower value is faster but dangerous
inbound.quantity | number of inbound tunnels. 5 by default, 16 by max
outbound.quantity | number of outbound tunnels. 5 by default, 16 by max
inbound.lengthVariance | random number of hops to add or subtract to an inbound tunnel between -3 and 3. 0 by default **(since 2.42.0)**
outbound.lengthVariance | random number of hops to add or subtract to an outbound tunnel between -3 and 3. 0 by default **(since 2.42.0)**
crypto.tagsToSend | number of ElGamal/AES tags to send. 40 by default; too low value may cause problems with tunnel building
explicitPeers | list of comma-separated b64 addresses of peers to use, default: unset
i2p.streaming.initialAckDelay | milliseconds to wait before sending Ack. 200 by default
2022-10-29 10:24:55 +03:00
i2p.streaming.answerPings | enable sending pongs. true by default
2022-10-29 10:02:56 +03:00
i2cp.leaseSetType | type of LeaseSet to be sent. 1, 3 or 5. 1 by default
i2cp.leaseSetEncType | comma separated encryption types to be used in LeaseSet type 3 or 5. Identity's type by default
2022-10-29 10:24:55 +03:00
i2cp.leaseSetPrivKey | decryption key for encrypted LeaseSet in base64. PSK or private DH
i2cp.leaseSetAuthType | authentication type for encrypted LeaseSet. 0 - no authentication(default), 1 - DH, 2 - PSK
i2cp.leaseSetClient.dh.nnn | client name:client's public DH in base64, for authentication type 1, nnn is integer
i2cp.leaseSetClient.psk.nnn | client name:client's PSK in base64, for authentication type 2, nnn is integer
2017-01-25 14:20:49 -05:00
Other examples
--------------
2022-10-29 10:24:55 +03:00
```ini
# outgoing tunnel sample, to remote service
# mandatory parameters:
# * type -- always "client"
# * port -- local port to listen to
# * destination -- I2P hostname
# optional parameters (may be omitted)
# * keys -- our identity, if unset, will be generated on every startup,
# if set and file missing, keys will be generated and placed to this file
# * address -- local interface to bind
# * signaturetype -- signature type for new destination. 0 (DSA/SHA1), 1 (EcDSA/SHA256) or 7 (EdDSA/SHA512)
[IRC]
type = client
address = 127.0.0.1
port = 6668
destination = irc.ilita.i2p
keys = irc-keys.dat
#
# incoming tunnel sample, for local service
# mandatory parameters:
# * type -- "server" or "http"
# * host -- IP address of our service
# * port -- port of our service
# * keys -- file with LeaseSet of address in i2p
# optional parameters (may be omitted)
# * inport -- optional, I2P service port, if unset - the same as 'port'
# * accesslist -- comma-separated list of I2P addresses, allowed to connect
# every address is b32 without '.b32.i2p' part
[LOCALSITE]
type = http
host = 127.0.0.1
port = 80
keys = site-keys.dat
#
[IRC-SERVER]
type = server
host = 127.0.0.1
port = 6667
keys = irc.dat
```