15 KiB
title | excerpt | date | updated | tags | series | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|
How to make your website available over I2P Eepsite on NixOS | A guide on I2P Eepsite on NixOS | 2020-03-21 | 2020-11-09 |
|
last |
9 Nov 2020: Updated to Caddy 2.1 syntax. Refer to {% post_link caddy-upgrade-v2-proxy 'this article' %} for upgrade guide.
In this segment, I show you how I set up I2P Eepsite service that reverse proxy to curben.netlify.app. This website can be accessed using this B32 address or mdleom.i2p
This post is Part 5 of a series of articles that show you how I set up Caddy, Tor hidden service and I2P Eepsite on NixOS:
- {% post_link caddy-nixos-part-1 'Part 1: Install NixOS' %}
- {% post_link caddy-nixos-part-2 'Part 2: Configure NixOS' %}
- {% post_link caddy-nixos-part-3 'Part 3: Configure Caddy' %}
- {% post_link tor-hidden-onion-nixos 'Part 4: Configure Tor' %}
- Part 5: Configure I2P
The reason I set up an Eepsite is similar to why I have a Tor hidden service, is to let people visit my website (mdleom.com) anonymously. I2P is touted as superior to Tor with its garlic routing which is claimed to be an improvement to onion routing. In practice though, I don't see much difference. From a client's (as in client-server) perspective, the browsing experience is still as slow since the traffic has to jump through a few hops, just like in Tor. For a server, the setup is similar as both involve creating public/private key pair.
A thing to note about I2P is that, while inside its network, you can only browse *.i2p websites, not normal websites or what is so-called the clearnet. This is unlike Tor where you can browse .onion and clearnet, which is routed through exit relays. You could browse the clearnet from I2P network by using a outproxy, which works similarly to exit relay of Tor. However, I2P user is discouraged from using a outproxy as that would compromise the user's anonymity.
For this website, I2P network only applies to the traffic between visitor and my (Caddy) web server, as shown in the following diagram; a request still needs to get passed to the upstream curben.netlify.app, but Netlify only sees the request comes from my web server as if it's just a regular visitor and shouldn't know that its origin from the I2P network.
Launch i2pd
To join the I2P network, I'm using i2pd, an (unofficial) C++ client of I2P. Most users probably opt for the official Java client which configures everything through a web portal. While using a web portal is more user-friendly, it's a bit tricky to configure from a server which is limited to CLI only. You could ssh port forward the web portal to your local workstation, but since I haven't (and not planning to) set up ssh on the server, I'm reluctant to do it, not to mention the risk of opening another port. i2pd does offer a web portal, but it's only for displaying some running info. Configuration is set using command line flags or a config file; for NixOS, it is through configuration.nix.
## I2P Eepsite
services.i2pd = {
enable = true;
ifname = "ens3";
address = "xxxx";
# TCP & UDP
port = 9898;
# TCP
ntcp2.port = 9899;
inTunnels = {
myEep = {
enable = true;
keys = "myEep-keys.dat";
inPort = 80;
address = "::1";
destination = "::1";
port = 8081;
# inbound.length = 1;
# outbound.length = 1;
};
};
enableIPv4 = true;
enableIPv6 = true;
};
ifname
is the interface name that has Internet connection.address
is the IP address of that Internet-connected interface. Usually i2pd can figure it out by itself, but in an IPv6 environment, an interface could have multiple IPv6 addresses due to IPv6 privacy extensions. In that case, the true IPv6 address needs to be specified.port
(TCP & UDP) port to listen for incoming connection. Even though i2pd supports NAT traversal, it's not reliable in my experience. This port needs to be open or port-forwarded. Choose any random port between 1024-65535.ntcp2.port
(TCP) port to listen for incoming NTCP2 connection. Choose any random port between 1024-65535. This port also needs to be open.- I name the service as "myEep", so the key pair will be stored in "/var/lib/i2pd/myEep-keys.dat". I set
keys
to make sure it really save to that file, despite being the default. inPort
is to set the port number that the service binds to. Recommend to set it to port 80.
- If you set it to "1234", visitor needs to specify the port number to browse your site, e.g. http://foobar.i2p:1234
- There is no need to grant CAP_NET_BIND_SERVICE capability nor open port 80.
address
is location of your server where the Eepsite is hosted. For most use cases, set it to the loopback 127.0.0.1 (default). In my case, it is the IPv6 loopback "::1".destination
is the location of your website where Eeepsite will forward the request to. It can be a loopback (if website and Eepsite are hosted within the same server), an IP address, a domain or even another eepsite.
- You can even set your domain here and skip the rest of the sections. However, this can double the latency, especially if the website is behind a CDN. For separation of privilege, it is recommended to have a web server that is dedicated for Eepsite only. The next section shows how to set up the web server.
port
is the port number that your web server listens to.enableIPv4
andenableIPv6
are optional. I enable both.- (Optional) If your website is not behind a CDN, meaning the server's IP address is publicly known (in DNS A/AAAA record), I recommend setting both
inbound.length
andoutbound.length
to 1 (from the default 3). This can significantly decrease the latency of your Eepsite by reducing the hops. This diagram illustrates the effect of hops.
Run # nixos-rebuild switch
and the keypair will be generated in a file "/var/lib/i2pd/myEep-keys.dat". There are no separate files for public and private keys, both are embedded in the same file.
Backup the file. If you migrate to another server, you just need to import the file and your Eepsite should be available through the same B32 address.
B32 address
Eepsite has an 52-character Base32 (B32) address which works similarly like an onion address of Tor hidden service. B32 address is Base32-encoded SHA256 hash of an Eepsite's public key or "I2P destination" as the lingo goes. I2P generates EDDSA (ED25519-SHA512) by default, in future it may switch to RedDSA. The easy way to get your Eepsite's B32 address is look for a file with 52-character filename in /var/lib/i2pd/destinations folder. In my case, the file is ggucqf2jmtfxcw7us5sts3x7u2qljseocfzlhzebfpihkyvhcqfa.dat, so my B32 address is ggucqf2jmtfxcw7us5sts3x7u2qljseocfzlhzebfpihkyvhcqfa.b32.i2p.
Above method is only applicable if you only have one eepsite, otherwise you wouldn't know which file in "destinations" corresponds to which ".dat". Common Linux utility tools can be used to derive the B32 address of a ".dat". The public key is located in the first 391 bytes.
$ head -c 391 <name>-keys.dat | sha256sum | cut -f1 -d\ | xxd -r -p | base32 | tr '[:upper:]' '[:lower:]' | sed -r 's/=//g'
This extracts the public key, calculate its SHA256 hash which is in hexadecimal (hex), convert hex to binary, Base32-encode the binary output, convert to lowercase and remove all equal (=) sign.
I2P Destination
I2P Destination refers to the public key in Base64 encoding. An unusual thing about I2P is that it uses minus (-) and tilde (~) symbols for Base64, instead of the more common plus (+) and slash (/).
$ head -c 391 <name>-keys.dat | base64 | tr '+' '-' | tr '/' '~'
I2P Destination hash
Destination hash is Base64-encoded SHA256 hash of an Eepsite's public key
$ head -c 391 <name>-keys.dat | sha256sum | cut -f1 -d\ | xxd -r -p | base64 | tr '+' '-' | tr '/' '~'
caddyI2p.nix
I set up another Caddy-powered reverse proxy which is separate from the {% post_link caddy-nixos-part-3 "mdleom.com's" %}. It's similar to caddyTor.nix (which in turn is based on caddyProxy.nix), except I replace "caddyTor" with "caddyI2p". This Nix file exposes services.caddyI2p
so that I can enable the I2p-dedicated Caddy service from "configuration.nix".
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.caddyI2p;
in {
options.services.caddyI2p = {
enable = mkEnableOption "Caddy web server";
config = mkOption {
default = "/etc/caddy/caddyI2p.conf";
type = types.str;
description = "Path to Caddyfile";
};
adapter = mkOption {
default = "caddyfile";
example = "nginx";
type = types.str;
description = ''
Name of the config adapter to use.
See https://caddyserver.com/docs/config-adapters for the full list.
'';
};
dataDir = mkOption {
default = "/var/lib/caddyI2p";
type = types.path;
description = ''
The data directory, for storing certificates. Before 17.09, this
would create a .caddy directory. With 17.09 the contents of the
.caddy directory are in the specified data directory instead.
'';
};
package = mkOption {
default = pkgs.caddy;
defaultText = "pkgs.caddy";
type = types.package;
description = "Caddy package to use.";
};
};
config = mkIf cfg.enable {
systemd.services.caddyI2p = {
description = "Caddy web server";
after = [ "network-online.target" ];
wants = [ "network-online.target" ]; # systemd-networkd-wait-online.service
wantedBy = [ "multi-user.target" ];
startLimitIntervalSec = 14400;
startLimitBurst = 10;
serviceConfig = {
ExecStart = "${cfg.package}/bin/caddy run --config ${cfg.config} --adapter ${cfg.adapter}";
ExecReload = "${cfg.package}/bin/caddy reload --config ${cfg.config} --adapter ${cfg.adapter}";
Type = "simple";
User = "caddyI2p";
Group = "caddyI2p";
Restart = "on-abnormal";
NoNewPrivileges = true;
LimitNPROC = 512;
LimitNOFILE = 1048576;
PrivateTmp = true;
PrivateDevices = true;
ProtectHome = true;
ProtectSystem = "full";
ReadWriteDirectories = cfg.dataDir;
KillMode = "mixed";
KillSignal = "SIGQUIT";
TimeoutStopSec = "5s";
};
};
users.users.caddyI2p = {
home = cfg.dataDir;
createHome = true;
};
users.groups.caddyI2p = {
members = [ "caddyI2p" ];
};
};
}
File ownership and permissions
After you save the file to /etc/caddy/caddyI2p.nix, remember to restrict it to caddyI2p
user.
$ chown caddyI2p:caddyI2p /etc/caddy/caddyI2p.nix
$ chown 600 /etc/caddy/caddyI2p.nix
# "common.conf" must be readable by other users
$ chmod o+r /etc/caddy/common.conf
caddyFile
Create a new caddyFile in /etc/caddy/caddyI2p.conf
and starts with the following config:
http://ggucqf2jmtfxcw7us5sts3x7u2qljseocfzlhzebfpihkyvhcqfa.b32.i2p:8081 http://mdleom.i2p:8081 {
bind ::1
header {
-strict-transport-security
defer
}
}
Update the B32 address as per the value derived from the previous section. mdleom.i2p
is my I2P domain that I registered with a jump service as a shortcut to my B32 address (see next section for guide). HTTPS is disabled by specifying http://
prefix, HTTPS is not applicable since Eepsite already encrypts the traffic. No CA is going to validate your .i2p anyway. strict-transport-security
(HSTS) needs to be removed to prevent the browser from attempting to connect to HTTPS. It binds to IPv6 loopback so it only listens to localhost, use bind 127.0.0.1 ::1
if you need IPv4.
The rest are similar to "caddyTor.conf" and "caddyProxy.conf". Content of "common.conf" is available at this section.
import common.conf
# I2P Eepsite
http://ggucqf2jmtfxcw7us5sts3x7u2qljseocfzlhzebfpihkyvhcqfa.b32.i2p:8081 http://mdleom.i2p:8081 {
bind ::1
header {
import setHeaders
-strict-transport-security
defer
}
import pathProxy
}
Alternate Caddyfile
There is another approach which is suitable if you have a website that you don't have root access. It results in a much simpler Caddyfile, but it doubles the latency.
# Do not use this approach unless you are absolutely sure
http://ggucqf2jmtfxcw7us5sts3x7u2qljseocfzlhzebfpihkyvhcqfa.b32.i2p:8081 http://mdleom.i2p:8081 {
bind ::1
header {
-strict-transport-security
defer
}
reverse_proxy https://mdleom.com {
header_up Host mdleom.com
}
}
Launch Caddy
Start the Caddy service.
require = [ /etc/caddy/caddyProxy.nix /etc/caddy/caddyTor.nix /etc/caddy/caddyI2p.nix ];
services.caddyI2p = {
enable = true;
config = "/etc/caddy/caddyI2p.conf";
};
Wait for a few hours and try to access your B32 address.
Register domain.i2p
Since B32 address is too long to remember, you can register an I2P domain which acts as an alias to your B32 address. Use regaddr of i2pd-tools to generate an authentication string. i2pd-tools is not packaged in most of the distro (except for AUR, of course), so you need to manually compile it. The authentication string contains:
<domain.i2p>=<Base64-encoded public key>#!sign=<digital signature>
A jump service verifies the ownership of B32 address by checking the digital signature with the public key. The digital signature is created by signing the domain.i2p and public key with your private key.
Submit the authentication string to stats.i2p or reg.i2p (but not both). You should see the following page if the submission is successful. As the screenshot implies, your new domain will take at least a week to propagate to most users' addressbook.
File permission
-keys.dat is generated with chmod 644
permission which means it is readable by other OS users. Since it contains private key, it should be restricted to caddyI2p
and root only, by changing it to chmod 600
.