13 KiB
I2P tunnel configuration
Overview
tunnels.conf
is designed to support multiple I2P tunnels. The configuration file must be located in
~/.i2pd
(per-user) or /var/lib/i2pd
(system-wide) on Unix-based systems, and %APPDATA%/i2pd
(per-user) on Windows.
This file uses the .ini file format. It consists of multiple sections each with a unique name.
Tunnel types
Section type is specified by the type parameter.
Available tunnel types:
Type | Description |
---|---|
client | Client tunnel to remote I2P destination (TCP) |
server | Generic server tunnel to setup any TCP service in I2P network |
http | HTTP server tunnel to setup a website in I2P |
irc | IRC server tunnel to setup IRC server in I2P |
udpclient | Forwards local UDP endpoint to remote I2P destination |
udpserver | Forwards traffic from N I2P destinations to local UDP endpoint |
socks | Custom Socks proxy service to use I2P with |
httpproxy | Custom HTTP proxy service to use I2P with |
Signature types
Parameter signaturetype = <code>
in a tunnel config.
Available signature types:
Type | Code | Comment |
---|---|---|
DSA-SHA1 | 0 | Deprecated |
ECDSA-P256 | 1 | None, actively used |
ECDSA-P384 | 2 | None, actively used |
ECDSA-P521 | 3 | None, actively used |
RSA-2048-SHA256 | 4 | Deprecated |
RSA-3072-SHA384 | 5 | Deprecated |
RSA-4096-SHA512 | 6 | Deprecated |
ED25519-SHA512 | 7 | Default |
ED25519ph-SHA512 | 8 | Not implemented |
GOSTR3410-A-GOSTR3411-256 | 9 | Not compatible with Java router |
GOSTR3410-TC26-A-GOSTR3411-512 | 10 | Not compatible with Java router |
RED25519-SHA512 | 11 | For keys blinding (encrypted LeaseSet) |
LeaseSet
Available LeaseSet types (parameter i2cp.leaseSetType = <code>
in a tunnel config):
Type | Code | Comment |
---|---|---|
OLD | 1 | Deprecated |
STANDARD | 3 | Default |
ENCRYPTED | 5 | Encrypted LeaseSet. Hiding information from floodfill |
META | 7 | Not implemented |
0, 2, 4, 6 types are reserved for routers (RouterInfo types).
Available LeaseSet encryption types (parameter i2cp.leaseSetEncType = <code>
in a tunnel config):
Type | Code | Comment |
---|---|---|
ELGAMAL | 0 | Default (only for support old routers) |
ECIES_P256_SHA256_AES256CBC | 1 | Not compatible with Java router |
ECIES_P384_SHA384_AES256CBC | 2 | Not implemented |
ECIES_P521_SHA512_AES256CBC | 3 | Not implemented |
ECIES_X25519_AEAD | 4 | Default |
Client tunnels
Mnemonic: we can connect to someone as client
Each client tunnel must contain a few mandatory parameters, along with some optional ones.
Here is an example of a client tunnel:
[irc-out]
type = client
address = 127.0.0.1
port = 6668
destination = irc.ilita.i2p
keys = irc.dat
If keys is empty, transient keys will be created on every restart. If the keys file is not found, new keys will be created and stored into the specified file. If keys starts from transient, new keys will be created, but not stored into a file.
Client tunnels might share the same local destination, if the keys file contains the same identity.
Optional parameters:
Option | Description |
---|---|
address | Local interface tunnel binds to, '127.0.0.1' for connections from local host only, '0.0.0.0' for connections from everywhere. (default: 127.0.0.1) |
port | Port of client tunnel. |
signaturetype | Signature type for new keys. RSA signatures (4,5,6) are not allowed and will be changed to 7. (default: 7) |
cryptotype | Crypto type for new keys. Experimental. Should be always 0 |
destinationport | Connect to particular port at destination. 0 by default (targeting first tunnel on server side for destination) |
keepaliveinterval | Send ping to the destination after this interval in seconds. (default: 0 - no pings) |
keys | Keys for destination. When same for several tunnels, will be using same destination for every tunnel. |
So, given the example above, if you connected to 127.0.0.1:6668 on localhost, i2pd would tunnel that connection to irc.ilita.i2p.
Server/generic tunnels
Mnemonic: we serving some service to others in network
Here is an example of a server tunnel:
[smtp-in]
type = server
host = 127.0.0.1
port = 25
keys = smtp-in.dat
If keys is empty, transient keys will be created on every restart. If the keys file is not found, new keys will be created and stored into the specified file.
Destination address from keys file will be loaded and the LeaseSet of address will be published. The server tunnel must use its own destination such as host 127.0.0.1 and port 80.
The port is (non-I2P) TCP listening port on IP host that the listening local destination gets connected to.
This tunnel type should be used for any protocol other than HTTP, even HTTP with SSL encryption (HTTPS).
Optional parameters:
Option | Description |
---|---|
host | IP address of server (on this address i2pd will send data from I2P) |
port | Port of server tunnel. |
inport | (non-TCP non-UDP) I2P local destination port to listen to; an unsigned 16-bit integer. What port at local destination server tunnel listens to (default: same as port) |
accesslist | List of comma-separated of b32 address (without .b32.i2p) allowed to connect. Everybody is allowed by default |
gzip | Turns internal compression off if set to false. (default: false) |
signaturetype | Signature type for new keys. (default: 7) |
cryptotype | Crypto type for new keys. Experimental. Should be always 0 |
enableuniquelocal | If true, connection to local address will look like 127.x.x.x where x.x.x is first 3 bytes of incoming connection peer's ident hash. (default: true) |
address | IP address of an interface tunnel is connected to host from. Usually not used |
keys | Keys for destination. When same for several tunnels, will be using same destination for every tunnel. |
Server/http tunnels
http tunnels are configured just like regular server tunnels, except the 'Host:' field must be assigned to the address provided in configuration. i2pd will also resolve it if necessary.
Here's an example of an http tunnel:
[http-in]
type = http
host = 127.0.0.1
port = 80
keys = our-website.dat
Optional parameters:
Option | Description |
---|---|
hostoverride | Value to send in 'Host:' header, default: the same as host parameter |
ssl | Use SSL connection to upstream server. hostoverride parameter can be used to set SNI domain. default: false (since 2.44.0) |
Server/IRC tunnels
IRC tunnels are supposed to connect to an IRC server through WEBIRC. It replaces IP address (usually 127.0.0.1) to user's .b32 I2P address.
Optional parameters:
Option | Description |
---|---|
webircpassword | Password to send with WEBIRC command |
UDP Tunnels
There are 2 types of UDP tunnels: udpclient
and udpserver
udpclient
forwards 1 local UDP endpoint to 1 remote I2P destination
[openvpn-client-simple]
type = udpclient
destination = something.b32.i2p
port = 1194
Option | Description |
---|---|
destination | The I2P destination of a udpserver tunnel, required parameter |
address | IP address to bind local UDP endpoint to (default: 127.0.0.1 ) |
port | Port to bind local UDP endpoint to, required parameter |
gzip | Turns internal compression off if set to false. (default: false) |
keys | Keys for destination. When same for several tunnels, will be using same destination for every tunnel. |
udpserver
forwards traffic from N I2P destinations to 1 local UDP endpoint
[openvpn-simple-server]
type = udpserver
keys = openvpn.dat
host = 127.0.0.1
port = 1194
Option | Description |
---|---|
address | IP address to use for local UDP endpoints (default: 127.0.0.1 ) |
host | IP address to forward traffic to, required parameter |
port | UDP port to forward traffic on, required parameter |
gzip | Turns internal compression off if set to false. (default: false) |
keys | Keys for destination. When same for several tunnels, will be using same destination for every tunnel. |
Socks proxy
The SOCKS proxy interface can be defined in tunnels.conf
.
Here's an example of a Socks proxy:
[alt-socks]
type = socks
address = 127.0.0.1
port = 14447
keys = socks-keys.dat
Option | Description |
---|---|
address | Local address Socks proxy binds to (default: 127.0.0.1 ) |
port | TCP port Socks proxy binds to |
I2CP parameters
These I2CP parameter are common for all tunnel types and specify settings for a local destination.
Parameter | Description |
---|---|
inbound.length | Number of hops of an inbound tunnel. 3 by default, 8 by max; lower value is faster but have more deanonimize risks |
outbound.length | Number of hops of an outbound tunnel. 3 by default, 8 by max; lower value is faster but have more deanonimize risks |
inbound.quantity | Number of inbound tunnels. 5 by default, 16 by max |
outbound.quantity | Number of outbound tunnels. 5 by default, 16 by max |
inbound.lengthVariance | Random number of hops to add or subtract to an inbound tunnel between -3 and 3. 0 by default (since 2.42.0) |
outbound.lengthVariance | Random number of hops to add or subtract to an outbound tunnel between -3 and 3. 0 by default (since 2.42.0) |
crypto.tagsToSend | Number of ElGamal/AES tags to send. 40 by default; too low value may cause problems with tunnel building |
crypto.ratchet.inboundTags | None for now |
explicitPeers | List of comma-separated b64 addresses of peers to use (default: unset) |
i2p.streaming.initialAckDelay | Milliseconds to wait before sending Ack. (default: 200) |
i2p.streaming.answerPings | Enable sending pongs. true by default |
i2p.streaming.maxOutboundSpeed | Max outbound speed of stream in bytes/sec. 1730000000 by default |
i2cp.leaseSetType | Type of LeaseSet to be sent. 1, 3 or 5. (default: 3) |
i2cp.leaseSetEncType | Comma separated encryption types to be used in LeaseSet type 3 or 5. (default: 0,4) |
i2cp.leaseSetPrivKey | Decryption key for encrypted LeaseSet in base64. PSK or private DH |
i2cp.leaseSetAuthType | Authentication type for encrypted LeaseSet. 0 - no authentication(default), 1 - DH, 2 - PSK |
i2cp.leaseSetClient.dh.nnn | Client name:client's public DH in base64, for authentication type 1, nnn is integer |
i2cp.leaseSetClient.psk.nnn | Client name:client's PSK in base64, for authentication type 2, nnn is integer |
Other examples
# outgoing tunnel sample, to remote service
# mandatory parameters:
# * type -- always "client"
# * port -- local port to listen to
# * destination -- I2P hostname
# optional parameters (may be omitted)
# * keys -- our identity, if unset, will be generated on every startup,
# if set and file missing, keys will be generated and placed to this file
# * address -- local interface to bind
# * signaturetype -- signature type for new destination. 0 (DSA/SHA1), 1 (EcDSA/SHA256) or 7 (EdDSA/SHA512)
[IRC]
type = client
address = 127.0.0.1
port = 6668
destination = irc.ilita.i2p
keys = irc-keys.dat
#
# incoming tunnel sample, for local service
# mandatory parameters:
# * type -- "server" or "http"
# * host -- IP address of our service
# * port -- port of our service
# * keys -- file with LeaseSet of address in i2p
# optional parameters (may be omitted)
# * inport -- optional, I2P service port, if unset - the same as 'port'
# * accesslist -- comma-separated list of I2P addresses, allowed to connect
# every address is b32 without '.b32.i2p' part
[LOCALSITE]
type = http
host = 127.0.0.1
port = 80
keys = site-keys.dat
#
[IRC-SERVER]
type = server
host = 127.0.0.1
port = 6667
keys = irc.dat