Commit Diff


commit - ed64c153c2f4fdb54fa96597dc7d12268d1f73a1
commit + 29c95dde524408f0d23368253449795d7f70353b
blob - /dev/null
blob + 1bf06a19723d9542e7111e285fd523ec0dcce2f1 (mode 644)
--- /dev/null
+++ wiki.d/I2Pd.Install
@@ -0,0 +1,28 @@
+version=pmwiki-2.2.130 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (Linux; Android 8.1.0; vivo 1820 Build/O11019) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.141 Mobile Safari/537.36
+author=Yonle
+charset=UTF-8
+csum=Again not 7070
+ctime=1670337481
+host=114.125.28.19
+name=I2Pd.Install
+rev=4
+targets=
+text=(:title I2Pd:)%0a%0a!! Introduction%0a%0aI2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.%0a%0aIn this guide, We will tell you how to install and use I2Pd%0a%0a!! Installing%0aDepending on your operating system. If you're using a%0aAndroid, You may install I2Pd app from [[https://github.com/PurpleI2P/i2pd-android/releases/tag/2.44.0|their github release]] or via [[https://f-droid.org/packages/org.purplei2p.i2pd/|F-Droid]]%0a%0aFor other operating system guide, You may visit [[https://i2pd.website|I2Pd website]].%0a%0aIn this case, We will use OpenBSD to install I2Pd.%0a[@%0a$ doas pkg_add i2pd%0a@]%0a%0aStart i2pd daemon%0a[@%0a$ doas rcctl start i2pd%0a@]%0a%0a!! Using I2Pd & visiting I2P sites%0a%0aNow, You need to have your browser to use the I2Pd HTTP Proxy which is at http://localhost:4444.%0a%0aFor Android users, We suggest installing Firefox browser with Foxyproxy addon installed & configured to use I2Pd proxy which listening at http://localhost:4444.%0a%0aIn *NIX like system like OpenBSD, We can launch browser with this:%0a[@%0a$ export HTTP_PROXY=http://localhost:4444%0a$ export HTTPS_PROXY=http://localhost:4444%0a$ firefox%0a@]
+time=1670375785
+title=I2Pd
+author:1670375785=Yonle
+csum:1670375785=Again not 7070
+diff:1670375785:1670375765:=29c29%0a%3c For Android users, We suggest installing Firefox browser with Foxyproxy addon installed & configured to use I2Pd proxy which listening at http://localhost:4444.%0a---%0a> For Android users, We suggest installing Firefox browser with Foxyproxy addon installed & configured to use I2Pd proxy which listening at http://localhost:7070.%0a
+host:1670375785=114.125.28.19
+author:1670375765=Yonle
+csum:1670375765=Not 7070
+diff:1670375765:1670346098:=33,34c33,34%0a%3c $ export HTTP_PROXY=http://localhost:4444%0a%3c $ export HTTPS_PROXY=http://localhost:4444%0a---%0a> $ export HTTP_PROXY=http://localhost:7070%0a> $ export HTTPS_PROXY=http://localhost:7070%0a
+host:1670375765=114.125.28.19
+author:1670346098=Yonle
+csum:1670346098=android => Android
+diff:1670346098:1670337481:=10,11c10%0a%3c Depending on your operating system. If you're using a%0a%3c Android, You may install I2Pd app from [[https://github.com/PurpleI2P/i2pd-android/releases/tag/2.44.0|their github release]] or via [[https://f-droid.org/packages/org.purplei2p.i2pd/|F-Droid]]%0a---%0a> Depending on your operating system. If you're using android, You may install I2Pd app from [[https://github.com/PurpleI2P/i2pd-android/releases/tag/2.44.0|their github release]] or via [[https://f-droid.org/packages/org.purplei2p.i2pd/|F-Droid]]%0a
+host:1670346098=182.1.6.151
+author:1670337481=Yonle
+diff:1670337481:1670337481:=1,35d0%0a%3c (:title I2Pd:)%0a%3c %0a%3c !! Introduction%0a%3c %0a%3c I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.%0a%3c %0a%3c In this guide, We will tell you how to install and use I2Pd%0a%3c %0a%3c !! Installing%0a%3c Depending on your operating system. If you're using android, You may install I2Pd app from [[https://github.com/PurpleI2P/i2pd-android/releases/tag/2.44.0|their github release]] or via [[https://f-droid.org/packages/org.purplei2p.i2pd/|F-Droid]]%0a%3c %0a%3c For other operating system guide, You may visit [[https://i2pd.website|I2Pd website]].%0a%3c %0a%3c In this case, We will use OpenBSD to install I2Pd.%0a%3c [@%0a%3c $ doas pkg_add i2pd%0a%3c @]%0a%3c %0a%3c Start i2pd daemon%0a%3c [@%0a%3c $ doas rcctl start i2pd%0a%3c @]%0a%3c %0a%3c !! Using I2Pd & visiting I2P sites%0a%3c %0a%3c Now, You need to have your browser to use the I2Pd HTTP Proxy which is at http://localhost:4444.%0a%3c %0a%3c For Android users, We suggest installing Firefox browser with Foxyproxy addon installed & configured to use I2Pd proxy which listening at http://localhost:7070.%0a%3c %0a%3c In *NIX like system like OpenBSD, We can launch browser with this:%0a%3c [@%0a%3c $ export HTTP_PROXY=http://localhost:7070%0a%3c $ export HTTPS_PROXY=http://localhost:7070%0a%3c $ firefox%0a%3c @]%0a\ No newline at end of file%0a
+host:1670337481=182.1.6.151
blob - /dev/null
blob + 7741b831239d4f21d4e64e11993aa517384276db (mode 644)
--- /dev/null
+++ wiki.d/I2Pd.RecentChanges
@@ -0,0 +1,9 @@
+version=pmwiki-2.2.130 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (Linux; Android 8.1.0; vivo 1820 Build/O11019) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.141 Mobile Safari/537.36
+charset=UTF-8
+ctime=1670337481
+host=114.125.28.19
+name=I2Pd.RecentChanges
+rev=6
+text=* [[I2Pd/Install]]  . . . December 07, 2022, at 01:16 AM by [[~Yonle]]: [=Again not 7070=]%0a* [[I2Pd/Tunnels]]  . . . December 06, 2022, at 02:52 PM by [[~Yonle]]: [=There we go. =]%0a
+time=1670375785
blob - /dev/null
blob + 2fad3ad3586ea5dfb1b457d7823faedb7677b30d (mode 644)
--- /dev/null
+++ wiki.d/I2Pd.Tunnels
@@ -0,0 +1,20 @@
+version=pmwiki-2.2.130 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (Linux; Android 8.1.0; vivo 1820 Build/O11019) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.141 Mobile Safari/537.36
+author=Yonle
+charset=UTF-8
+csum=There we go. 
+ctime=1670337774
+host=182.1.6.151
+name=I2Pd.Tunnels
+rev=2
+targets=I2Pd.Install
+text=(:title I2Pd Tunnels:)%0a%0aIn this guide, We will tell you how to expose your secret site via [[I2Pd.install|I2Pd]].%0a%0a!! Logging into your VPS%0aLogin to your VPS via SSH, but with the following command:%0a%0a[@%0a$ ssh -L 4444:localhost:4444 -L 7070:localhost:7070 username@name.host.teamname.net%0a@]%0a%0aChange @@username@name.host.teamname.net@@ according your needs.%0a%0a!! Editing @@/etc/i2pd/tunnels.conf@@%0a%0aWith root access, Edit @@/etc/i2pd/tunnels.conf@@, Then add this:%0a%0a[@%0a[mysite-name]%0atype = http%0ahost = 127.0.0.1%0aport = 80%0akeys = myeepsite-key.dat%0a@]%0a%0aChange @@mysite-name@@ with your site name, The @@type = http@@ value tells I2P that your service is a HTTP site. %0a%0aChange @@port = 80@@ according your need, %0a%0aAnd change @@keys = myeepsite-key.dat@@ into whatever you want (like @@keys = secretsite-key.dat@@) as long you didn't lose the key, Which stored at @@/var/lib/i2pd@@.%0a%0aSave it, reload [[I2Pd.install|I2Pd]]%0a[@%0a$ doas rcctl reload i2pd%0a@]%0a%0aOpen I2Pd Webconsole at http://localhost:7070, Tap @@I2P Tunnels@@,%0a%0aUnder @@mysite-name@@, Copy the I2P address. The address may looked like this:%0a[@%0aancdefghijklmnopqrstuvwxyz1234567890.b23.i2p%0a@]%0a%0aYou may use that copied address to visit your site via I2P.%0a%0a!! Registering reg.i2p%0aYou can also register @@.i2p@@ domain for free.%0a%0aOpen your I2Pd Webconsole, Tap @@I2P Tunnels@@, Then tap on your @@mysite-name@@, And @@Address registration line@@, Then fill the domain field, and Click @@Generate@@.%0a%0aOnce generated, Fill @@Description@@ field if needed. And finally tap @@Submit@@
+time=1670338322
+title=I2Pd Tunnels
+author:1670338322=Yonle
+csum:1670338322=There we go. 
+diff:1670338322:1670337774:=4,12d3%0a%3c %0a%3c !! Logging into your VPS%0a%3c Login to your VPS via SSH, but with the following command:%0a%3c %0a%3c [@%0a%3c $ ssh -L 4444:localhost:4444 -L 7070:localhost:7070 username@name.host.teamname.net%0a%3c @]%0a%3c %0a%3c Change @@username@name.host.teamname.net@@ according your needs.%0a
+host:1670338322=182.1.6.151
+author:1670337774=Yonle
+diff:1670337774:1670337774:=1,42d0%0a%3c (:title I2Pd Tunnels:)%0a%3c %0a%3c In this guide, We will tell you how to expose your secret site via [[I2Pd.install|I2Pd]].%0a%3c %0a%3c !! Editing @@/etc/i2pd/tunnels.conf@@%0a%3c %0a%3c With root access, Edit @@/etc/i2pd/tunnels.conf@@, Then add this:%0a%3c %0a%3c [@%0a%3c [mysite-name]%0a%3c type = http%0a%3c host = 127.0.0.1%0a%3c port = 80%0a%3c keys = myeepsite-key.dat%0a%3c @]%0a%3c %0a%3c Change @@mysite-name@@ with your site name, The @@type = http@@ value tells I2P that your service is a HTTP site. %0a%3c %0a%3c Change @@port = 80@@ according your need, %0a%3c %0a%3c And change @@keys = myeepsite-key.dat@@ into whatever you want (like @@keys = secretsite-key.dat@@) as long you didn't lose the key, Which stored at @@/var/lib/i2pd@@.%0a%3c %0a%3c Save it, reload [[I2Pd.install|I2Pd]]%0a%3c [@%0a%3c $ doas rcctl reload i2pd%0a%3c @]%0a%3c %0a%3c Open I2Pd Webconsole at http://localhost:7070, Tap @@I2P Tunnels@@,%0a%3c %0a%3c Under @@mysite-name@@, Copy the I2P address. The address may looked like this:%0a%3c [@%0a%3c ancdefghijklmnopqrstuvwxyz1234567890.b23.i2p%0a%3c @]%0a%3c %0a%3c You may use that copied address to visit your site via I2P.%0a%3c %0a%3c !! Registering reg.i2p%0a%3c You can also register @@.i2p@@ domain for free.%0a%3c %0a%3c Open your I2Pd Webconsole, Tap @@I2P Tunnels@@, Then tap on your @@mysite-name@@, And @@Address registration line@@, Then fill the domain field, and Click @@Generate@@.%0a%3c %0a%3c Once generated, Fill @@Description@@ field if needed. And finally tap @@Submit@@%0a\ No newline at end of file%0a
+host:1670337774=182.1.6.151
blob - /dev/null
blob + f26109946e65fd99e8b3416c576ac91ced826ba8 (mode 644)
--- /dev/null
+++ wiki.d/I2pd.RecentChanges
@@ -0,0 +1,9 @@
+version=pmwiki-2.2.130 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (Android 8.1.0; Mobile; rv:107.0) Gecko/107.0 Firefox/107.0
+charset=UTF-8
+ctime=1670336167
+host=182.1.6.151
+name=I2pd.RecentChanges
+rev=5
+text=* [[I2pd/Tunnels]]  . . . December 06, 2022, at 02:45 PM by [[~Yonle]]: [==]%0a
+time=1670337922
blob - /dev/null
blob + c2744b6f959d9bedc9e05b930cb800fe54c6b3c0 (mode 644)
--- /dev/null
+++ wiki.d/I2pd.Tunnels
@@ -0,0 +1,28 @@
+version=pmwiki-2.2.130 ordered=1 urlencoded=1
+agent=Mozilla/5.0 (Android 8.1.0; Mobile; rv:107.0) Gecko/107.0 Firefox/107.0
+author=Yonle
+charset=UTF-8
+csum=
+ctime=1670336167
+host=182.1.6.151
+name=I2pd.Tunnels
+rev=5
+targets=
+text=(:redirect I2Pd/Tunnels:)
+time=1670337922
+author:1670337922=Yonle
+diff:1670337922:1670337733:=1d0%0a%3c (:redirect I2Pd/Tunnels:)%0a\ No newline at end of file%0a
+host:1670337922=182.1.6.151
+author:1670337733=Yonle
+diff:1670337733:1670336665:=0a1,42%0a> (:title I2Pd Tunnels:)%0a> %0a> In this guide, We will tell you how to expose your secret site via [[I2Pd.install|I2Pd]].%0a> %0a> !! Editing @@/etc/i2pd/tunnels.conf@@%0a> %0a> With root access, Edit @@/etc/i2pd/tunnels.conf@@, Then add this:%0a> %0a> [@%0a> [mysite-name]%0a> type = http%0a> host = 127.0.0.1%0a> port = 80%0a> keys = myeepsite-key.dat%0a> @]%0a> %0a> Change @@mysite-name@@ with your site name, The @@type = http@@ value tells I2P that your service is a HTTP site. %0a> %0a> Change @@port = 80@@ according your need, %0a> %0a> And change @@keys = myeepsite-key.dat@@ into whatever you want (like @@keys = secretsite-key.dat@@) as long you didn't lose the key.%0a> %0a> Save it, reload [[I2Pd.install|I2Pd]]%0a> [@%0a> $ doas rcctl reload i2pd%0a> @]%0a> %0a> Open I2Pd Webconsole at http://localhost:7070, Tap @@I2P Tunnels@@,%0a> %0a> Under @@mysite-name@@, Copy the I2P address. The address may looked like this:%0a> [@%0a> ancdefghijklmnopqrstuvwxyz1234567890.b23.i2p%0a> @]%0a> %0a> You may use that copied address to visit your site via I2P.%0a> %0a> !! Registering reg.i2p%0a> You can also register @@.i2p@@ domain for free.%0a> %0a> Open your I2Pd Webconsole, Tap @@I2P Tunnels@@, Then tap on your @@mysite-name@@, And @@Address registration line@@, Then fill the domain field, and Click @@Generate@@.%0a> %0a> Once generated, Fill @@Description@@ field if needed. And finally tap @@Submit@@%0a\ No newline at end of file%0a
+host:1670337733=182.1.6.151
+author:1670336665=Yonle
+csum:1670336665=Register on reg.i2p
+diff:1670336665:1670336193:=35,42c35%0a%3c You may use that copied address to visit your site via I2P.%0a%3c %0a%3c !! Registering reg.i2p%0a%3c You can also register @@.i2p@@ domain for free.%0a%3c %0a%3c Open your I2Pd Webconsole, Tap @@I2P Tunnels@@, Then tap on your @@mysite-name@@, And @@Address registration line@@, Then fill the domain field, and Click @@Generate@@.%0a%3c %0a%3c Once generated, Fill @@Description@@ field if needed. And finally tap @@Submit@@%0a\ No newline at end of file%0a---%0a> You may use that copied address to visit your site via I2P.%0a\ No newline at end of file%0a
+host:1670336665=182.1.6.151
+author:1670336193=Yonle
+diff:1670336193:1670336167:=3c3%0a%3c In this guide, We will tell you how to expose your secret site via [[I2Pd.install|I2Pd]].%0a---%0a> In this guide, We will tell you how to serve your secret service via [[I2Pd.install|I2Pd]].%0a
+host:1670336193=182.1.6.151
+author:1670336167=Yonle
+diff:1670336167:1670336167:=1,35d0%0a%3c (:title I2Pd Tunnels:)%0a%3c %0a%3c In this guide, We will tell you how to serve your secret service via [[I2Pd.install|I2Pd]].%0a%3c %0a%3c !! Editing @@/etc/i2pd/tunnels.conf@@%0a%3c %0a%3c With root access, Edit @@/etc/i2pd/tunnels.conf@@, Then add this:%0a%3c %0a%3c [@%0a%3c [mysite-name]%0a%3c type = http%0a%3c host = 127.0.0.1%0a%3c port = 80%0a%3c keys = myeepsite-key.dat%0a%3c @]%0a%3c %0a%3c Change @@mysite-name@@ with your site name, The @@type = http@@ value tells I2P that your service is a HTTP site. %0a%3c %0a%3c Change @@port = 80@@ according your need, %0a%3c %0a%3c And change @@keys = myeepsite-key.dat@@ into whatever you want (like @@keys = secretsite-key.dat@@) as long you didn't lose the key.%0a%3c %0a%3c Save it, reload [[I2Pd.install|I2Pd]]%0a%3c [@%0a%3c $ doas rcctl reload i2pd%0a%3c @]%0a%3c %0a%3c Open I2Pd Webconsole at http://localhost:7070, Tap @@I2P Tunnels@@,%0a%3c %0a%3c Under @@mysite-name@@, Copy the I2P address. The address may looked like this:%0a%3c [@%0a%3c ancdefghijklmnopqrstuvwxyz1234567890.b23.i2p%0a%3c @]%0a%3c %0a%3c You may use that copied address to visit your site via I2P.%0a\ No newline at end of file%0a
+host:1670336167=182.1.6.151