From the I2P+ Help section
An I2P web application that manages service destinations for the network, mapping B64 hashes to human-readable names. Destinations may be added manually, or via subscriptions to hosts.txt files. Also referredto as SusiDNS. For more information, see the online documentation.
Base32 (B32) / Base64 (B64)
A Base32 link (which always ends with .b32.i2p) is a hash of a Base64 destination. For services on the network, the Base64 hash is often mapped to an .i2p domain in the addressbook.
BOB (Basic Open Bridge) is a simple application-to-router protocol, largely superseded by SAM. For more information, see the online documentation.
Clearnet normally refers to the publicly accessible internet, the opposite of the darknet that typically describes the encrypted, anonymous services built on I2P, Tor etc. For more information, see the Wikipedia article.
The unique cryptographic identity of the inbound endpoint of a tunnel providing access to a service on the I2P network, represented as aBase32 or Base64 hash of the public key. Equivalent to an IP address and port.
A command-line application supplied with I2P that is used to request URL resources, similar to wget or curl. Eepget is also used internally by the router, for example to reseedfrom remote hosts. By default, eepget uses the HTTP proxy on
A tunnel used by the router for communicating with other routers toperform various "housekeeping" functions such as learning and publishing leasesets, testing client tunnels, and learning about and validating other routers in the network. These tunnels are normally low-bandwidth.
A router on the network tasked with providing and receiving informationabout other routers on the network. The current minimum share bandwidth for a router to be considered as capable of performing floodfill duties is 128 KBytes/sec, though it's possible to override this requirement and force a router to be a floodfill on the Advanced Configuration page. For more information, see the online documentation.
A variant of onion routing that encrypts multiple messages together tomake it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer. For more information, see the online documentation.
A router configured to run in Hidden Mode will not publish its details to the Network Database and will not participate in routing traffic for other routers. Routers operating in countries designated as strict and routers manually configured run in Hidden Mode.
The I2P Client Protocol (I2CP) enables external applications (clients)to communicate with I2P over single TCP socket, by default using port 7654. For more information, see the online documentation.
The I2P Network Protocol (I2NP) manages the routing and mixing ofmessages between routers, in addition to the transport selection (wheremore than one is supported) when communicating with a peer. For moreinformation, see the online documentation.
A soft fork of the Java I2P software which retains full compatibility, providing an enhanced user interface and improvements to network performance. See http://skank.i2p/static/i2p+.html for more information.
An alternative implementation of an I2P router coded in C++. For more information, see https://i2pd.website/.
A fork of the Snark BitTorrent client refactored for use on the I2P network. Usually supplied as part of the default suite of applications with Java I2P, and also available as a standalone Java application.
A router that facilitates the connection to the network of another router that is behind a firewall.
A simple CGI application that takes a hostname as a parameter and returns a 301 redirect to the proper URL with a
?i2paddresshelper=key string appended. The HTTP proxy will interpret the appended string and use the key as the actual destination. In addition, the proxy will cache the key so the address helper is not necessary until restart, and offer the option to add the resolved address to the addressbook.
An optional configuration that automatically changes your router identity and external port when the public ip address your system is on changes. This can prevent an adversary from correlating your router identity and ip address inscenarios where your ip address may change frequently, for example when you're running I2P on a laptop from multiple locations.
The information that defines the authorization for a particular tunnel to receive messages targeting a Destination.
A group of tunnel entry points (leases) for a destination. Note: A 0-hop server tunnel will only have one lease, regardless of the number of tunnels configured.
Monotone / mtn
The distributed version control system (DVCS) used to maintain I2P's source code. For more information, see the online guide.
Services may be hosted on multiple routers simultaneously, by sharingthe same private key for the destination. Multihoming can further enhance the security and stability of a server by providing redundancy; if a server is multihomed, when a server in the pool goes offline, the provided service will remain available, making it more difficult to correlate server downtime with a router going offline.
A distributed database containing router contact information (RouterInfos) and destination contact information (LeaseSets). A singlerouter maintains its own (partial) database for communicating with other routers on the network; no single router will maintain a list of allrouters. The RouterInfos are stored on disk and read into memory whenthe router starts, or when new RouterInfos are acquired. Also referredto as the NetDb. For more information, see the online documentation.
NTCP / NTCP2
NTCP (NIO-based TCP) and NTCP2 are TCP-based network transports which use Java's NIO (New I/O) TCP implementation to deliver I2NP messages between routers on the network. NTCP2 improves the resistance of NTCP to various attacks and automated traffic identification methods. For more information, see the online documentation.
A java implementation of a Tor client, available as an I2P plugin. Can be used as the default outproxy if configured in the relevant SOCKS or HTTP client tunnel in the Tunnel Manager. Available from http://stats.i2p/i2p/plugins. Source code is available on github.
A service on the network that provides a proxy connection to the clearnet. By default, I2P has an HTTP outproxy configured for web browsing on
The act of contributing to the network by permitting other routers tobuild tunnels using your router in a tunnel chain. At least 12KB/s upstream bandwidth (network share) is required to be allocated in order to enable participation. Note that firewalled routers will be limited in how much they contribute to participation, and a router designated asHidden will not participate at all.
The process of acquiring router identities, normally via clearnet servers, to ensure your router can communicate and build tunnels withother routers on the network. When a router has no router identities for other peers (usually immediately after installation), the process of reseeding is also referred to as bootstrapping.
The core I2P software, which routes encrypted packets on the I2P network. All routers by default participate in the network except routers running in countries considered hostile (see Strict Countries), which both helps the network and provides cover traffic for any clients or servers connecting to the I2P network through the router.
Information defining the unique identity of a router on the network which includes its IP address (or the IP addresses of intermediate introducers) and listening port, public signing and encryption keys. Router identities correlate to peers in the NetDB. Also referred to as a RouterInfo.
SAM (Simple Anonymous Messaging) is a protocol which allows a client application written in any programming language to communicate over I2P, by using a socket-based interface to the I2P router. For more information, see the online documentation.
SSU (Secure Semi-reliable UDP) is an I2P network transport providing encrypted, connection-oriented, point-to-point connections, in addition to IP address detection and NAT traversal services. For moreinformation, see the online documentation.
A list of countries derived from the World Freedom Report with a poor civil liberties reputation. This list is used to place routers running in the specified countries in Hidden Mode to provide enhanced security for users. The following countries are designated as strict: Afghanistan, Azerbaijan, Bahrain, Belarus, Brunei, Burundi, Cameroon, Central African Republic, Chad, China, Cuba,Democratic Republic of the Congo, Egypt, Equatorial Guinea, Eritrea, Ethiopia, Iran, Kazakhstan, Laos, Libya, Myanmar, North Korea, Palestinian Territories, Rwanda, Saudi Arabia, Somalia, South Sudan, Sudan, Eswatini (Swaziland), Syria, Tajikistan, Thailand, Turkey, Turkmenistan, Venezuela, United Arab Emirates, Uzbekistan, Western Sahara, Yemen.
A unidirectional encrypted communication pathway between a client or server on the I2Pnetwork. Similar to a circuit in Tor, except that Tor circuits are bi-directional.
The last router in a tunnel, which may be the Outbound Endpoint, where the client's tunnels meet the Inbound Gateway of the destination server's tunnels, or the Inbound Endpoint which is the final router in the chain that connects to the destination server.
The first router in a tunnel. For inbound tunnels, this is the one mentioned in the LeaseSet published in the Network Database. For outbound tunnels, the gateway is the originating router.
A web application supplied with the router that permits creation and configuration of client and server tunnels. Also referred to as the Hidden Services Manager.
A router in a tunnel not designated as a gateway or endpoint.
Theme: I2P+ Light Console theme override Charcoal