2023-01-04 03:37:32 +00:00
2019-07-31 00:42:41 -07:00
2022-12-06 00:48:45 +00:00
2022-01-05 12:27:59 -05:00
2023-01-04 03:37:32 +00:00
2021-12-08 17:20:48 -05:00
2021-12-04 00:11:10 -05:00
2020-12-29 16:21:29 +01:00
2022-07-31 19:00:42 -04:00
2022-07-31 19:00:45 -04:00
2021-12-16 14:44:34 -05:00
2021-12-14 16:24:34 -05:00
2022-07-31 19:00:49 -04:00
2021-12-04 11:31:50 -05:00
2021-08-20 12:42:50 -04:00
2022-07-31 19:00:52 -04:00
2021-12-04 11:31:50 -05:00
2022-12-02 18:47:52 +00:00
2022-12-02 18:47:52 +00:00
2020-12-24 10:41:16 -05:00
2022-07-31 19:00:42 -04:00
2014-12-10 20:04:21 -06:00
2021-12-14 16:24:34 -05:00
2023-01-04 03:37:32 +00:00
2023-01-04 03:37:32 +00:00
2023-01-04 03:37:32 +00:00
2022-07-31 19:00:42 -04:00

I2P Reseed Tools

Reseed Tools Poster

This tool provides a secure and efficient reseed server for the I2P network. There are several utility commands to create, sign, and validate SU3 files. Please note that this requires at least Go version 1.13, and uses Go Modules.

Standard reseeds are distributed with the I2P packages. To get your reseed included, apply on zzz.i2p.

Dependencies

go, git, and optionally make are required to build the project. Precompiled binaries for most platforms are available at my github mirror https://github.com/eyedeekay/i2p-tools-1.

In order to install the build-dependencies on Ubuntu or Debian, you may use:

sudo apt-get install golang-go git make

Installation

Reseed-tools can be run as a user, as a freestanding service, or be installed as an I2P Plugin. It will attempt to configure itself automatically. You should make sure to set the --signer flag or the RESEED_EMAIL environment variable to configure your signing keys/contact info.

Plugin install URL's

Plugin releases are available inside of i2p at http://idk.i2p/reseed-tools/ and via the github mirror at https://github.com/eyedeekay/reseed-tools/releases. These can be installed by adding them on the http://127.0.0.1:7657/configplugins.

After installing the plugin, you should immediately edit the $PLUGIN/signer file in order to set your --signer email, which is used to name your keys. You can find the $PLUGIN directory in your I2P config directory, which is usually $HOME/.i2p on Unixes.

This will allow the developers to contact you if your reseed has issues and will authenticate your reseed to the I2P routers that use it.

Installation(From Source)

git clone https://i2pgit.org/idk/reseed-tools
cd reseed-tools
make build
# Optionally, if you want to install to /usr/bin/reseed-tools
sudo make install

Usage

Debian/Ubuntu note:

Debian users who are running I2P as a system service must also run the reseed-tools as the same user. This is so that the reseed-tools can access the I2P service's netDb directory. On Debian and Ubuntu, that user is i2psvc and the netDb directory is: /var/lib/i2p/i2p-config/netDb.

Service Integration

Support for running as a system service as part of the reseed package is new. PR's that improve integration are welcome.

Systemd Service

A systemd service is provided which should work with the I2P Debian package when reseed-tools is installed in /usr/bin/reseed-tools. If you install with make install this service is also installed. This service will cause the bundles to regenerate every 12 hours.

The contact email for your reseed should be added in: /etc/systemd/system/reseed.d/reseed.conf.

Self-signed certificates will be auto-generated for these services. To change this you should edit the /etc/systemd/system/reseed.d/reseed.service.

  • To enable starting the reseed service automatically with the system: sudo systemctl enable reseed.service
  • To run the service manually: sudo sysctl start reseed.service
  • To reload the systemd services: sudo systemctl daemon-reload
  • To view the status/logs: sudo journalctl -u reseed.service
SysV Service

An initscript is also provided. The initscript, unlike the systemd service, cannot schedule itself to restart. You should restart the service roughly once a day to ensure that the information does not expire.

The contact email for your reseed should be added in: /etc/init.d/reseed.

Self-signed certificates will be auto-generated for these services. To change this you should edit the /etc/init.d/reseed.

Example Commands:

Without a webserver, standalone with TLS support

If this is your first time running a reseed server (ie. you don't have any existing keys), you can simply run the command and follow the prompts to create the appropriate keys, crl and certificates. Afterwards an HTTPS reseed server will start on the default port and generate 6 files in your current directory (a TLS key, certificate and crl, and a su3-file signing key, certificate and crl).

reseed-tools reseed --signer=you@mail.i2p --netdb=/home/i2p/.i2p/netDb --tlsHost=your-domain.tld

Locally behind a webserver (reverse proxy setup), preferred:

If you are using a reverse proxy server it may provide the TLS certificate instead.

reseed-tools reseed --signer=you@mail.i2p --netdb=/home/i2p/.i2p/netDb --port=8443 --ip=127.0.0.1 --trustProxy
Description
No description provided
Readme MIT 1.4 MiB
Languages
Go 72.3%
Makefile 11%
HTML 8.9%
CSS 3.8%
Shell 3.4%
Other 0.6%