-
Notifications
You must be signed in to change notification settings - Fork 195
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
figure out i2p support #1686
Comments
This is probably not the help you wanted but I was intending to write one for my |
Hi, I'll do some motr testing and then get back with definite answers to the questions. Using the B32 address as a "fingerprint" for SASL sounds like an interesting feature idea. |
This doesn't seem necessary to me. Aren't those connections going to be on loopback anyway? I think if it's useful for i2pd to send |
Just to clarify, you can get I2P working (including multiclient / reattach) right now by disabling the |
It would make sense for it to send the |
Thanks for investigating.
If i2pd is sending WEBIRC, then it should send the secure flag. (tor has no IRC-specific support and does not send WEBIRC.) Since i2pd is terminating the I2P connection, which is end-to-end encrypted, it's free to send the secure flag; the ircd is independently responsible for validating that the link between i2pd and it is secure, as per the spec:
That said, I don't really see the point of adding special I2P support. In particular, the I2P address seems to be the worst of both worlds: for normal users, it's a supercookie that identifies them, but for malicious users, it's cheap to rotate and therefore doesn't protect against spam. So the benefits of I2P-specific support (distinguishing I2P from Tor, and displaying some form of the I2P address) seem marginal to me and not worth any increase in implementation complexity. |
tl;dr I would recommend to i2pd operators that they disable WEBIRC support, use a tor listener, and adjust |
@RNDpacman is interested in this. I think it would be sufficient to add a config option that makes WEBIRC accept the provided hostname. The |
See ergochat#1686; this allows i2pd to pass the i2p address to Ergo, which may be useful for moderation under some circumstances.
@RNDpacman did you get a chance to test this? If so, I'll add an I2P section to our manual. I'm adding the recommended configuration here for posterity:
|
Yes I have tested, everything works properly. thank you |
Right now we have basic support for I2P by treating it the same as Tor (i.e., treating each connection as totally anonymous).
@mogad0n points out that i2pd has some protocol-specific support for IRC, including sending WEBIRC with a variable proxied IP value:
https://i2pd.readthedocs.io/en/latest/tutorials/irc/#running-anonymous-irc-server
https://github.com/PurpleI2P/i2pd/blob/a8e1cd9a13d14978af7a6df8e9ccded9bb8f4dd1/libi2pd_client/I2PTunnel.cpp#L448
This support is unusable as-is because it doesn't send the WEBIRC secure flag. Questions:
GetIdentHash()
? Is it based on the client's cryptographic I2P address? How stable are these addresses under normal conditions? How easy are they to change (i.e., are they of any use as an anti-spam measure?)The text was updated successfully, but these errors were encountered: