Search found 249 matches

by echelon
13 Jan 2023 12:18
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

HI Alice does need the server destination of bob, sure. Thats the address in I2P to reach, like IP address in clearnet. Bob does get a (session only) destination of the service Alice used to connect to Bob, and sends the reply to that destination. Hashes are NOT bound to any IP addresses. You may co...
by echelon
13 Jan 2023 09:48
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

Your flowchart is simply wrong. You need to remove the server, add a brek in the middle, add 3 nodes above and 3 below, title the existing 6 as in and out, each, and the new as In2 and out2, and server further down right. If you interprete the node as a tunnel, it would be 3 tunnel in a row with now...
by echelon
13 Jan 2023 09:04
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

Hi No, that graph is wrong, as you did miss a complete half of the tunnels. See geti2p.net docs. https://geti2p.net/en/about/performance https://geti2p.net/en/docs/how/tunnel-routing Client - OUTtunnel - OUTTunnelGateway - INTunnelGateway - INTunnel - Server - Outtunnel2 - OUTTunnelGateway2 - INTunn...
by echelon
13 Jan 2023 08:18
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

Hi

the last node does NOT know the server destination address. Just the tunnel ID and the IP. Nothing more.
Only the FIRST hop of tunnel does know the destination address and the next hop, but not the last hop, neither if nexxt hop is last hop, nor if previous hop was the client.

echelon
by echelon
13 Jan 2023 07:29
Forum: Router
Topic: I2P proxy on another machine
Replies: 12
Views: 3439

Re: I2P proxy on another machine

Hi

I cannot test currently and cannot help much more.I use SSH tunnels, as those are fart easier to manage.
Usually the log say something like bound to IP:port successfull or error

echelon
by echelon
13 Jan 2023 07:15
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

Hi Sure, everyone can collect IP data from I2P nodes, from Tor nodes, from freenode nodes. Also IF you own a IP, you may collect all data going through your node. Nothing stops this, no technical way to prevent this. Thats the internet. Also, if a destination address is long term, some guessing coul...
by echelon
12 Jan 2023 14:54
Forum: Router
Topic: Is this a security issue that leaks src_ip?
Replies: 18
Views: 4054

Re: Is this a security issue that leaks src_ip?

HI ANY connection in TCP/IP do have a source and destination address, so you see the source and destination on every connection/package you send, be it I2P, Tor, clearnet, Freenet, or anything. Every data you send from your client has a destination IP address and your IP address as sender noted, But...
by echelon
11 Jan 2023 08:05
Forum: Router
Topic: i2p can rewrite with rust / c / c++(or merge i2p and i2pd project)
Replies: 10
Views: 3021

Re: i2p can rewrite with rust / c / c++(or merge i2p and i2pd project)

HI If someone wants to do the job, go ahead! We stick with the code we do know best, which is java, which works for >20 years well enough. (and in the end, currently there is no sign of C/C++/rust doing the job better with less ressources as Java is doing) So no place for a war on coding languages. ...
by echelon
11 Jan 2023 08:01
Forum: Router
Topic: I2P proxy on another machine
Replies: 12
Views: 3439

Re: I2P proxy on another machine

Hi

the logfiles are in the logs directory. You should be able to read them if you can access that server remotely.

echelon
by echelon
10 Jan 2023 18:25
Forum: Router
Topic: A few suggestions to i2p & i2pd
Replies: 4
Views: 1746

Re: A few suggestions to i2p & i2pd

Hi Anyone can setup its own addressbook with its own entries. There is no "evil" or "good", just trust by the user. You can trust your addressbook to contain the same link as the others, but must not be. For easy start there is a predefined list on install and several server dist...