[ [ Ana Sayfa ] [ arama ] [ hepsi ] [ comfy ] [ b / ks / tek / tlc ] [ pol / rte ] [ int ] [ sc ] [ kurallar ] [ pgp / canary ] ]

/tek/ - Teknoloji

Teknoloji, doğru kullanıldığında harika şeyler yaratır; yanlış kullanıldığında ise bizi esir eder.
İsim
Konu Başlığı
Açıklama
Bayrak
Dosya
Embed

File: 1751362135582.webp(19.06 KB, 1200x675, 9952.webp)

 No.46

Hello dear Anons;

I will write a guide for you, I will explain the secure I2P configuration on the server side and publishing your site on the I2P darkweb network.

I will explain for Debian and Ubuntu servers.

>First; we will add I2P on package manager and install I2P. I will use I2Pd for router, because its lighter and faster than I2P and I2P+ routers.


>If you are using Ubuntu server:


sudo add-apt-repository ppa:purplei2p/i2pd
sudo apt-get update
sudo apt install i2pd

>If you are using Debian for server:


wget -q -O - https://repo.i2pd.xyz/.help/add_repo | sudo bash -s -
sudo apt update
sudo apt install i2pd

>Start I2P service and enable it for if you reboot your server; it will self-start.

sudo systemctl start i2pd
sudo systemctl enable i2pd

>Second we will configure tunnel manager for creating I2P sites.


sudo nano /etc/i2pd/tunnels.conf

>At the end of the page opened, add the following configuration:


[myhiddeni2psite]
type = http
host = 127.0.0.1
port = 18246
inport = 80
keys = myhiddeni2psite.dat

Note: You can change the port section to whatever non-used port you want.

>Save this configuration file.


>Firewall Configuration

>I will use iptables for protecting 8080 port and running I2P service without crashes
>I2P uses 127.0.0.1-127.255.255.255 IP range so we must enable firewall for loopback port traffic and deny any other connections for protect from IP leaks.

sudo iptables -I INPUT -i lo -j ACCEPT
sudo iptables -I OUTPUT -o lo -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 18246 -j DROP
sudo iptables -A INPUT -p tcp --dport 80 -j DROP

>Fun fact: First two rules are important for Tor service too. If you dont add first two rules, Tor service will crash and close couple of days and leaks your IP too.


>You must save iptables rules with iptables-persistent


sudo apt install iptables-persistent

>During the installation, you will be asked if you want to save the rules. If you choose "yes", it will be saved to the following files:


>IPV4 Rules: /etc/iptables/rules.v4

>IPV6 Rules: /etc/iptables/rules.v6

>If you made a change later and want to save:


sudo netfilter-persistent save

>or


sudo iptables-save > /etc/iptables/rules.v4
sudo iptables-save > /etc/iptables/rules.v6

>Restart your I2P service.


sudo systemctl restart i2pd

>We need terminal based browser for find our .b32.i2p address. I will use lynx for this; but i you want you can use other terminal based browsers.


sudo apt install lynx

>Now we are ready for find our address.


lynx 127.0.0.1:7070

>Go to 'I2P tunnels' page and enter; you will find your .b32.i2p address under myhiddeni2psite name it will look like somethingverylonggssdopspccc....... .b32.i2p


>Nginx Side Setup:


server {
listen 127.0.0.1:18246; //Its very important too, dont listen whole 18246 port just 127.0.0.1:18246

 No.47

Thank you

 No.48

>>46
nice guide bro can i publish it

 No.49

>>48
>can i publish it
Of course; but please share source when you publish. Our site needs more traffic. Thank you.

 No.50

>>47
You're welcome.

 No.51

>Note: Normally, the firewalls allow all outgoing connections; However, if you have set your firewall to restrict outgoing connections, you should do the following steps:

>We must edit i2pd main config file


sudo nano /etc/i2pd/i2pd.conf

>Find '## Port to listen for connections'

>It should looks like default:

## Port to listen for connections
## ...
# port = 6121

>Uncomment port section and set it any not used port.


>Now it should looks like:


## Port to listen for connections
## ...
port = 54226

>Save this file and exit.


>We must open port 54226 (for me, you can change any not used port) with iptables.


sudo iptables -A OUTPUT -p tcp --sport 54226 -m state --state ESTABLISHED -j ACCEPT
sudo iptables -A OUTPUT -p udp --sport 54226 -m state --state ESTABLISHED -j ACCEPT

sudo iptables -A INPUT -p tcp --dport 54226 -m state --state NEW,ESTABLISHED -j ACCEPT
sudo iptables -A INPUT -p udp --dport 54226 -m state --state NEW,ESTABLISHED -j ACCEPT

>Save iptables rules.


sudo netfilter-persistent save

>Now restart i2pd service.


sudo systemctl restart i2pd

>Now its totally ready for restricted outgoing connection firewalls.

 No.95

Admin, how do I post a thread? I can't speak Turkish



[Return][Go to top] Catalog [Post a Reply]
[ [ Ana Sayfa ] [ arama ] [ hepsi ] [ comfy ] [ b / ks / tek / tlc ] [ pol / rte ] [ int ] [ sc ] [ kurallar ] [ pgp / canary ] ]