- What systems will I2P run on?
- Is installing Java required to use I2P?
- What is an "I2P Site" and how do I configure my browser so I can use them?
- What do the Active x/y numbers mean in the router console?
- My router has very few active peers, is this OK?
- I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?
- Is it possible to block I2P?
- In
wrapper.logI see an error statingProtocol family unavailablewhen I2P is loading - Most of the I2P Sites within I2P are down?
- Why is I2P listening for connections on port 32000?
- How do I configure my browser?
- How do I connect to IRC within I2P?
- How do I set up my own I2P Site?
- If I host a website at I2P at home, containing only HTML and CSS, is it dangerous?
- How Does I2P find ".i2p" websites?
- How do I add to the Address Book?
- What ports does I2P use?
- I'm missing lots of hosts in my address book. What are some good subscription links?
- How can I access the web console from my other machines or password protect it?
- How can I use applications from my other machines?
- Is it possible to use I2P as a SOCKS proxy?
- How do I access IRC, BitTorrent, or other services on the regular Internet?
- My router has been up for several minutes and has zero or very few connections
- How do I reseed manually?
- Is my router an "exit node"(outproxy) to the regular Internet? I don't want it to be.
- Is it easy to detect the use of I2P by analyzing network traffic?
- Is using I2P Safe?
- I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?
- Is using an outproxy safe?
- What about "De-Anonymizing" attacks?
Internet Access/Performance
- I can't access regular Internet sites through I2P.
- I can't access https:// or ftp:// sites through I2P.
- Why is my router using too much CPU?
- My router has very few active peers, is this OK?
- My active peers / known peers / participating tunnels / connections / bandwidth vary dramatically over time! Is anything wrong?
- What makes downloads, torrents, web browsing, and everything else slower on I2P as compared to the regular internet?
Bugs and Questions
- I think I found a bug, where can I report it?
- I have a question!
I2P Router Help
What systems will I2P run on?
I2P is written in the Java programming language. It has been tested on Windows, Linux, FreeBSD and OSX. An Android port is also available.
In terms of memory usage, I2P is configured to use 128 MB of RAM by default. This is sufficient for browsing and IRC usage. However, other activities may require greater memory allocation. For example, if one wishes to run a high-bandwidth router, participate in I2P torrents or serve high-traffic hidden services, a higher amount of memory is required.
In terms of CPU usage, I2P has been tested to run on modest systems such as the Raspberry Pi range of single-board computers. As I2P makes heavy use of cryptographic techniques, a stronger CPU will be better suited to handle the workload generated by I2P as well as tasks related to the rest of the system (i.e. Operating System, GUI, Other processes e.g. Web Browsing).
A comparison of some of the available Java Runtime Environments (JRE) is available here: .
Using Sun/Oracle Java or OpenJDK is recommended.
Is installing Java required to use I2P?
Yes, Java is required to use I2P Core. We include Java inside our easy-installers for Windows, Mac OSX, and Linux. If you’re running the I2P Android app you will also need a Java runtime like Dalvik or ART installed in most cases.
What is an "I2P Site" and how do I configure my browser so I can use them?
An I2P Site is a normal website except that it is hosted inside I2P. I2P sites have addresses that look like normal internet addresses, ending in ".i2p" in a human- readable, non-cryptographic way, for the benefit of people. Actually connecting to an I2P Site requires cryptography, which means that I2P Site addresses are also the long “Base64” Destinations and the shorter “B32” addresses. You may need to do additional configuration to browse correctly. Browsing I2P Sites will require activating the HTTP Proxy in your I2P installation and then configuring your browser to use it. For more information, browse the “Browsers” section below or the “Browser Configuration” Guide.
What do the Active x/y numbers mean in the router console?
In the Peers page on your router console, you may see two numbers - Active x/y. The first number is the number of peers that you’ve sent or received a message to or from in the last few minutes. The second number is the number of peers seen recently, this will always be larger than or equal to the first number.
My router has very few active peers, is this OK?
Yes, this can be normal, especially when the router has just been started. New routers will need time to startup and connect to the rest of the network. To help improve network integration, uptime, and performance, review these settings:
- Share bandwidth
If a router is configured to share bandwidth, it will route more traffic for other routers which helps integrate it with the rest of the network, as well as improving the performance of one’s local connection. This can be configured on the http://localhost:7657/config page. - Network interface
Make sure there is not an interface specified on the http://localhost:7657/confignet page. This can reduce performance unless your computer is multi-homed with multiple external IP addresses. - I2NP protocol
Make sure the router is configured to expect connections on a valid protocol for the host’s operating system and empty network(Advanced) settings. Do not enter an IP address in the ‘Hostname’ field in the Network configuration page. The I2NP Protocol you select here will only be used if you do not already have a reachable address. Most Verizon 4G and 5G wireless connections in the United States, for example, block UDP and can’t be reached over it. Others would use UDP by force even if it is available to them. Choose a reasonable setting from the listed I2NP Protocols.
I am opposed to certain types of content. How do I keep from distributing, storing, or accessing them?
There is none of this material installed by default. However, since I2P is a peer-to- peer network, it’s possible that you may encounter prohibited content by accident. Here is a summary of how I2P prevents you from being unnecessarily involved in violations of your beliefs.
- Distribution
Traffic is internal to the I2P network, you are not an exit node (referred to as an outproxy in our documentation). - Storage
The I2P network does not do distributed storage of content, this has to be specifically installed and configured by the user (with Tahoe-LAFS, for example). That is a feature of a different anonymous network, Freenet. By running an I2P router, you are not storing content for anyone. - Access
Your router will not request any content without your specific instruction to do so.
Is it possible to block I2P?
Yes, by far the easiest and most common way is by blocking bootstrap, or "Reseed" servers. Completely blocking all obfuscated traffic would work as well (although it would break many, many other things that are not I2P and most are not willing to go this far). In the case of reseed blocking, there is a reseed bundle on Github, blocking it will also block Github. You can reseed over a proxy (many can be found on Internet if you do not want to use Tor) or share reseed bundles on a friend-to-friend basis offline.
In wrapper.log I see an error that states "Protocol family unavailable" when loading the Router Console
Often this error will occur with any network enabled java software on some systems that are configured to use IPv6 by default. There are a few ways to solve this:
- On Linux based systems, you can
echo 0 > /proc/sys/net/ipv6/bindv6only - Look for the following lines in
wrapper.config.#wrapper.java.additional.5=-Djava.net.preferIPv4Stack=true
#wrapper.java.additional.6=-Djava.net.preferIPv6Addresses=false
If the lines are there, uncomment them by removing the "#"s. If the lines are not there, add them without the "#"s.
~/.i2p/clients.configWARNING: For any changes to wrapper.config to take effect, you must completely
stop the router and the wrapper. Clicking Restart on your
router console will NOT reread this file! You must
click Shutdown, wait 11 minutes, then start I2P.
Most of the I2P Sites within I2P are down?
If you consider every I2P Site that has ever been created, yes, most of them are down. People and I2P Sites come and go. A good way to get started in I2P is check out a list of I2P Sites that are currently up. identiguy.i2p tracks active I2P Sites.
Why is I2P listening on port 32000?
The Tanuki java service wrapper that we use opens this port —bound to localhost— in order to communicate with software running inside the JVM. When the JVM is launched it is given a key so it can connect to the wrapper. After the JVM establishes its connection to the wrapper, the wrapper refuses any additional connections.
More information can be found in the wrapper documentation.
How do I configure my browser?
The proxy config for different browsers is on a separate page with screenshots. More advanced configs with external tools, such as the browser plug-in FoxyProxy or the proxy server Privoxy, are possible but could introduce leaks in your setup.
How do I connect to IRC within I2P?
A tunnel to the main IRC server within I2P, Irc2P, is created when I2P is installed (see the I2PTunnel configuration page), and is automatically started when the I2P router starts.
To connect to it, tell your IRC client to connect to localhost 6668.
HexChat-like client users can create a new network with the server localhost/6668 (remember to tick "Bypass proxy server" if you have a proxy server configured).
Weechat users can use the following command to add a new network:
/server add irc2p localhost/6668
How do I set up my own I2P Site?
The easiest method is to click on the i2ptunnel link in the router console and create a new 'Server Tunnel'.
You can serve dynamic content by setting the tunnel destination to the port of an existing webserver, such as Tomcat or Jetty.
You can also serve static content. For this, set the tunnel destination to: 0.0.0.0 port 7659 and place the content in the ~/.i2p/eepsite/docroot/ directory. (On non-Linux systems, this may be in a different place.
Check the router console.)
The 'eepsite' software comes as part of the I2P installation package and is set to automatically start when I2P is started.
The default site this creates can be accessed at http://127.0.0.1:7658.
However, your 'eepsite' is also accessible to others via your eepsite key file, located at:
~/.i2p/eepsite/i2p/eepsite.keys. To find out more, read the readme file at: ~/.i2p/eepsite/README.txt.
If I host a website at I2P at home, containing only HTML and CSS, is it dangerous?
It depends on your adversary and your threat model. If you are only worried about corporate “privacy” violations, typical criminals and censorship, then it is not really dangerous.
Law-enforcement will probably find you anyway if they really want to.
Only hosting when you have a normal (internet) home user browser running will make it really tough to know who is hosting that part.
Please consider the hosting of your I2P site just as hosting any other service - it is as dangerous - or safe - as you configure and manage it yourself.
Note: There is already a way to separate hosting an i2p service(destination) from the i2p router. If you understand how it works, then you can just setup a separate machine as a server for the website (or service) that will be publicly accessible and forward that to the webserver over a [very] secure SSH tunnel or use a secured, shared, filesystem.
How Does I2P find ".i2p" websites?
The I2P Address Book application maps human-readable names to long-term destinations, associated with services, making it more like a hosts file or a contact list than a network database or a DNS service. It's also local-first there is no recognized global namespace, you decide what any given .i2p domain maps to in the end. The middle-ground is something called a "Jump Service" which provides a human-readable name by redirecting you to a page where you will be asked "Do you give the I2P router permission to call $SITE_CRYPTO_KEY the name $SITE_NAME.i2p" or something to that effect. Once it's in your address book, you can generate your own jump URL's to help share the site with others.
How do I add addresses to the Address Book?
You cannot add an address without knowing at least the base32 or base64 of the site you want to visit. The "hostname" which is human-readable is only an alias for the cryptographic address, which corresponds to the base32 or base64. Without the cryptographic address, there is no way to access an I2P Site, this is by design. Distributing the address to people who do not know it yet is usually the responsibility of the Jump service provider. Visiting an I2P Site which is unknown will trigger the use of a Jump service. stats.i2p is the most reliable Jump service.
If you're hosting a site via i2ptunnel, then it won't have a registration with a jump service yet. To give it a URL locally, then visit the configuration page and click the button that says "Add to Local Address Book." Then go to http://127.0.0.1:7657/dns to look up the addresshelper URL and share it.
What ports does I2P use?
The ports that are used by I2P can be divided into 2 sections:
- Internet-facing ports, which are used for communication with other I2P routers
- Local ports, for local connections
These are described in detail below.
- Internet-facing ports
Note: Since release 0.7.8, new installs do not use port 8887; a random port between 9000 and 31000 is selected when the program is run for the first time. The selected port is shown on the router configuration page.
OUTBOUND- UDP from the random port listed on the configuration page to arbitrary remote UDP ports, allowing for replies
- TCP from random high ports to arbitrary remote TCP ports
- Outbound UDP on port 123, allowing for replies. This is necessary for I2P's internal time sync (via SNTP - querying a random SNTP host in pool.ntp.org or another server you specify)
- (Optional, recommended) UDP to the port noted on the configuration page from arbitrary locations
- (Optional, recommended) TCP to the port noted on configuration page from arbitrary locations
- Inbound TCP can be disabled on the configuration page
- Local I2P ports, listening only to local connections by default, except where noted:
PORT PURPOSE DESCRIPTION 1900 UPnP SSDP UDP multicast listener Cannot be changed. Binds to all interfaces. May be disabled on confignet. 2827 BOB bridge A higher level socket API for clients. Disabled by default. May be enabled/disabled on configclients. May be changed in the bob.config file. 4444 HTTP proxy Configured on configclients, go to the page i2ptunnel to start/stop it and on the page I2P HTTP Proxy to configure it. Include in your browser's proxy configuration for HTTP 4445 HTTPS proxy Configured on configclients, go to the page i2ptunnel to start/stop it and on the page I2P HTTPS Proxy to configure it. Include in your browser's proxy configuration for HTTPS 6668 IRC proxy A tunnel to the inside-the-I2P IRC network. Disabled by default. Configured on the page irc.postman.i2p (IRC proxy) and may be enabled/disabled on the page i2ptunnel 7654 I2CP (client protocol) port For advanced client usage. Do not expose to an external network. 7656 SAM bridge A socket API for clients. Disabled by default. May be enabled/disabled on configclients and configured on sam. 7657 (or 7658 via SSL) Router console The router console provides valuable information about your router and the network, in addition to giving you access to configure your router and its associated applications. 7659 'eepsite' - an example webserver (Jetty) Included in the i2pinstallandi2pupdatepackages - may be disabled if another webserver is available. May be configured on the page eepsite and disabled on the page i2ptunnel7660 I2PTunnel UDP port for SSH Required for Grizzled's/novg's UDP support. Instances disabled by default. May be enabled/disabled and configured to use a different port on the page i2ptunnel. 123 NTP Port Used by NTP Time Sync. May be disabled/changed.
I'm missing lots of hosts in my address book. What are some good subscription links?
The address book is located at http://localhost:7657/dns where further information can be found.
- What are some good address book subscription links?
You may try the following:
How can I access the web console from my other machines or password protect it?
For security purposes, the router's admin console by default only listens for connections on the local interface.
There are two methods for accessing the console remotely:
- SSH Tunnel
- Configuring your console to be available on a Public IP address with a username & password
These are detailed below:
- SSH Tunnel
If you are running a Unix-like Operating System, this is the easiest method for remotely accessing your I2P console. (Note: SSH server software is available for systems running Windows, for example https://github.com/PowerShell/Win32-OpenSSH)
Once you have configured SSH access to your system, the '-L' flag is passed to SSH with appropriate arguments - for example:where '(System_IP)' is replaced with your System's IP address. This command forwards port 7657 (the number before the first colon) to the remote system's (as specified by the string 'localhost' between the first and second colons) port 7657 (the number after the second colon). Your remote I2P console will now be available on your local system as 'http://localhost:7657' and will be available for as long as your SSH session is active. If you would like to start an SSH session without initiating a shell on the remote system, you can add the '-N' flag:ssh -L 7657:localhost:7657 (System_IP)ssh -NL 7657:localhost:7657 (System_IP) - Configuring your console to be available on a Public IP address with a username & password
- Open
~/.i2p/clients.configand replacewithclientApp.0.args=7657 ::1,127.0.0.1 ./webapps/where you replace (System_IP) with your system's public IP addressclientApp.0.args=7657 ::1,127.0.0.1,(System_IP) ./webapps/ - Go to http://localhost:7657/configui and add a console username and password if desired - Adding a username & password is highly recommended to secure your I2P console from tampering, which could lead to de-anonymization.
- Go to http://localhost:7657/index and hit "Graceful restart", which restarts the JVM and reloads the client applications
http://(System_IP):7657and you will be prompted for the username and password you specified in step 2 above if your browser supports the authentication popup.
NOTE: You can specify 0.0.0.0 in the above configuration. This specifies an interface, not a network or netmask. 0.0.0.0 means "bind to all interfaces", so it can be reachable on 127.0.0.1:7657 as well as any LAN/WAN IP. Be careful when using this option as the console will be available on ALL addresses configured on your system. - Open
How can I use applications from my other machines?
Please see the previous answer for instructions on using SSH Port Forwarding, and also see this page in your console: http://localhost:7657/configi2cp
Is it possible to use I2P as a SOCKS proxy?
The SOCKS proxy has been functional since release 0.7.1. SOCKS 4/4a/5 are supported. I2P does not have a SOCKS outproxy so it is limited to use within I2P only.
Many applications leak sensitive information that could identify you on the Internet and this is a risk that one should be aware of when using the I2P SOCKS proxy. I2P only filters connection data, but if the program you intend to run sends this information as content, I2P has no way to protect your anonymity. For example, some mail applications will send the IP address of the machine they are running on to a mail server. We recommend I2P-specific tools or applications (such as I2PSnark for torrents), or applications that are known to be safe to use with I2P that include popular plugins found on Firefox.
How do I access IRC, BitTorrent, or other services on the regular Internet?
There are services called Outproxies that bridge between I2P and the Internet, like Tor Exit Nodes. Default outproxy functionality for HTTP and HTTPS is provided by exit.stormycloud.i2p and is run by StormyCloud Inc. It is configured in the HTTP Proxy.
Additionally, to help protect anonymity, I2P does not permit you to make anonymous connections to the regular Internet by default.
Please see the Socks Outproxy page for more information.
Reseeds
My router has been up for several minutes and has zero or very few connections
First check the http://127.0.0.1:7657/netdb page in the Router Console – your network database. If you do not see a single router listed from within I2P but the console says you should be firewalled, then you probably cannot connect to the reseed servers. If you do see other I2P routers listed then try to lower the number of max connections http://127.0.0.1:7657/config maybe your router cannot handle many connections.
How do I reseed manually?
Under normal circumstances, I2P will connect you to the network automatically using our bootstrap links. If disrupted internet makes bootstrapping from reseed servers fail, an easy way to bootstrap is by using Tor browser(By default it open localhost), which works very nicely with http://127.0.0.1:7657/configreseed. It is also possible to reseed an I2P router manually.
When using Tor browser to reseed you can select multiple URLs at once and proceed. Though the default value which is 2(out of the multiple urls) will also work but it will be slow.
Privacy-Safety
Is my router an "exit node"(outproxy) to the regular Internet? I don't want it to be.
No, your router participates in the transport of encrypted e2e traffic across the i2p network to a random tunnel endpoint, usually not an outproxy, but no traffic is passed between your router and the Internet over the transport layer.
As an end-user, you should not run an outproxy if you are not skilled in system and network administration.
Is it easy to detect the use of I2P by analyzing network traffic?
I2P traffic usually looks like UDP traffic, and not much more – and making it look like not that much more is a goal. It also supports TCP. With some effort, passive traffic analysis may be able to classify the traffic as "I2P", but we hope that the continued development of traffic obfuscation will reduce this further. Even a fairly simple protocol obfuscation layer like obfs4 will prevent censors from blocking I2P (it is a goal that I2P deploys).
Is using I2P Safe?
It depends on your personal threat model. For most people, I2P is way safer than not using any protection. Some other networks (like Tor, mixminion/mixmaster), are probably safer against certain adversaries. For example, I2P traffic does not use TLS/SSL, so it does not have the "weakest link" issues that Tor does. I2P was used by a lot of people in Syria at the "Arab spring", and recently the project has seen bigger growth in smaller linguistical installations of I2P in the near- and middle east. The most important thing to note here is that I2P is a technology and you need a how-to/guide to enhance your privacy/anonymity on the Internet. Also check your browser or import the fingerprint-search-engine to block fingerprint attacks with a very big (meaning: typical long tails / very accurate diverse data structure) dataset about lot of environment things and dnnt use VPN to reduce all risk comes from it self like the own TLS cache behaviour and the technical construction of the provider business that can be hacked easier as a own desktop system. May using a isolated tor V-Browser with its great anti-fingerprint protections and an overall appguard-livetime-protection with only allow for the necessary systems communications and a last standing vm-use with anti-spy disable scripts and live-cd to remove any "almost permanent possible risk" and down all risks by a decreasing prpbability are a good option in public network and top individual risk model and might be the best you can do with this goal for i2p use.
I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?
Yes, for other I2P nodes who know about your router. We use this to connect with the rest of the I2P network. The addresses are physically located in "routerInfos (key,value)objects", either remotely fetched or received from peer. The "routerInfos" holds some information (some optional opportunistic added), "published by peer", about the router itself for bootstrapping. No data is in this object about clients. Looking closer under the hood will tell you that everybody got counted with the newest type of creating ids called "SHA-256 Hashes (low=Positive hash(-key), high=Negative hash(+key))". The I2P network got a own database datas of routerInfos created during upload and indexing, but this depends deep into the realization of the key/value tables and networks topology and state-of-load / state-of-bandwidth and routing probabilities for storages in DB components.
Is using an outproxy safe?
It depends on what your definition of "safe" is. Outproxies are great when they work, but unfortunately they voluntary run by people who may lose interest or may not have the resources to maintain them 24/7 – please be aware that you may experience periods of time during which services are unavailable, interrupted, or unreliable, and we are not associated with this service and have no influence on it.
The outproxys themselves can see your traffic come and go, with the exception of end-to-end encrypted HTTPS/SSL data, just like your ISP can see your traffic come and go from your computer. If you are comfortable with your ISP, it wouldn't be any worse with the outproxy.
What about "De-Anonymizing" attacks?
For a very long explanation, read more at our articles about Threat Model. In general, de-anonymizing is not trivial, but possible if you are not cautious enough.
Internet Access/Performance
I can't access regular Internet sites through I2P.
Proxying to Internet sites (eepsites that are out to the Internet) is provided as a service to I2P users by non-block providers. This service is not the main focus of I2P development, and is provided on a voluntary basis. Eepsites that are hosted on I2P should always work without an outproxy. Outproxies are a convenience but they are by design not perfect nor a large part of the project. Be aware that they may not be able to provide the high-quality service other services of I2P may provide.
I can't access https:// or ftp:// sites through I2P.
The default HTTP proxy supports HTTP and HTTPS outproxying only.
Why is my router using too much CPU?
First, make sure you have the latest version of every I2P related part – older versions had
unnecessary cpu-eating sections in code.
There is also a performance Log that documents some of the improvements in I2P performance over time.
My active peers / known peers / participating tunnels / connections / bandwidth vary dramatically over time! Is anything wrong?
The general stability of the I2P network is an ongoing area of research. A particular amount of that research is focused on how small changes to configuration settings change the behavior of the router. As I2P is a peer-to-peer network, the actions by other peers will have an influence on your router's performance.
What makes downloads, torrents, web browsing, and everything else slower on I2P as compared to the regular internet?
I2P has different protections that add extra routing and additional layers of encryption. It also bounces traffic through other peers(Tunnels) that have their own speed and quality, some are slow, some fast. This adds up to lots of overhead and traffic at different paces in different directions. By design all these things will make it slower compared to a direct connection on the internet, but much more anonymous and still fast enough for most things.
Below is an example presented with an explanation to help provide some context to the latency and bandwidth considerations when using I2P.
Consider the diagram below. It depicts a connection between a client making a request via I2P, a server receiving the request via I2P and then responding back via I2P as well. The circuit the request travels upon is also depicted.
From the diagram, consider that the boxes labelled 'P', 'Q' and 'R' represent an outbound tunnel for 'A' and that the boxes labelled 'X', 'Y' and 'Z' repres ent an outbound tunnel for 'B'. Similarly, the boxes labelled 'X', 'Y' and 'Z' represent and inbound tunnel for 'B' while the boxes labelled 'P_1', 'Q_1' and 'R_1' represent an inbound tunnel for 'A'. The arrows in between the boxes show the direction of traffic. The text above and below the arrows detail some example bandwidth between a pair of hops as well as example latencies.
When both client and server are using 3-hop tunnels throughout, a total of 12 other I2P routers are involved in relaying traffic. 6 peers relay traffic from the client to the server which is split into a 3-hop outbound tunnel from 'A' ('P', 'Q', 'R') and a 3-hop inbound tunnel to 'B' ('X', 'Y', 'Z'). Similarly, 6 peers relay traffic from the server to back to the client.
First, we can consider latency - the time that it takes for a request from a client to traverse the I2P network, reach the the server and traverse back to the client. Adding up all latencies we see that:
40 + 100 + 20 + 60 + 80 + 10 + 30 ms (client to server)
+ 60 + 40 + 80 + 60 + 100 + 20 + 40 ms (server to client)
-----------------------------------
TOTAL: 740 ms
The total round-trip time in our example adds up to 740 ms - certainly much higher than what one would normally see while browsing regular internet websites.
Second, we can consider available bandwidth. This is determined through the slowest link between hops from the client and server as well as when traffic is being transmitted by the server to the client. For traffic going from the client to the server, we see that the available bandwidth in our example between hops 'R' & 'X' as well as hops 'X' & 'Y' is 32 KB/s. Despite higher available bandwidth between the other hops, these hops will act as a bottleneck and will limit the maximum available bandwidth for traffic from 'A' to 'B' at 32 KB/s. Similarly, tracing the path from server to client shows that there is maximum bandwidth of 64 KB/s - between hops 'Z_1' & 'Y_1, 'Y_1' & 'X_1' and 'Q_1' & 'P_1'.
We recommend increasing your bandwidth limits. This helps the network by increasing the amount of available bandwidth which will in turn improve your I2P experience. Bandwidth settings are located on the http://localhost:7657/config page. Please be aware of your internet connection's limits as determined by your ISP, and adjust your settings accordingly.
We also recommend setting a sufficient amount of shared bandwidth - this allows for participating tunnels to be routed through your I2P router. Allowing participating traffic keeps your router well-integrated in the network and improves your transfer speeds.
I2P is a work in progress. Lots of improvements and fixes are being implemented, and, generally speaking, running the latest release will help your performance. If you haven't, install the latest release.
I think I found a bug, where can I report it?
You may report any bugs/issues that you encounter on our bugtracker, which is available over both non-private internet and I2P. We have a discussion forum, also available on I2P and non-private internet. You can join our IRC channel as well: either through our IRC network, IRC2P, or on Freenode.
- Our Bugtracker:
- Non-private internet: https://i2pgit.org/I2P_Developers/i2p.i2p/issues
- On I2P: http://git.idk.i2p/I2P_Developers/i2p.i2p/issues
- Our forums: i2pforum.i2p
- You may paste any interesting logs to a paste service such as the non-private internet services listed on the PrivateBin Wiki, or an I2P paste service such as this PrivateBin instance or this Javascript-free paste service and follow up on IRC in #i2p
- Join #i2p-dev Discuss with the developers on IRC
Please include relevant information from the router logs page which is available at: http://127.0.0.1:7657/logs. We request that you share all of the text under the 'I2P Version and Running Environment' section as well as any errors or warnings displayed in the various logs displayed on the page.
I have a question!
Great! Find us on IRC:
- on
irc.freenode.netchannel#i2p - on
IRC2Pchannel#i2p