Feel free to include my content in your page via my
RSS feed
Follow @irongeek_adc
Help Irongeek.com pay for
bandwidth and research equipment:
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment:
Hosting Hidden Services in I2P: eepSites and SSH
Installing I2P under Windows
and you will want to read the article on
application level de-anonymizing techniques that can be used against I2P hosted
services for some background information.
I apologize for it being somewhat meandering, I was doing the video largely off
the cuff. Also be aware that "Hidden Services" is more of Tor's terminology for
much the same concept, in I2P you set up "I2P Server Tunnels".
Downloads: Contents of base32calc.py : #!/usr/bin/env python Useful Links: I2P Home Page:
Here is another foray into Cipherspace. In this video I'll show how to get your
eepSite up and running, along with pointing an HTTP tunnel to another web server
besides the build in Jetty, and also how to host SSH inside of the I2P network.
Before you watch this video, you may want to check out my videos on
Installing I2P under Linux
[フレーム]
http://www.archive.org/download/HostingHiddenServicesInI2pEepsitesAndSsh/i2p-server-tunnel-eepsite-ssh.wmv
(Better quality110.1MB)
http://www.archive.org/download/HostingHiddenServicesInI2pEepsitesAndSsh/i2p-server-tunnel-eepsite-ssh_512kb.mp4
(Smaller 32.1MB)
#Based on Duck's script from
http://forum.i2p2.de/viewtopic.php?t=4367 with no significant
changes
import base64, hashlib, sys
if len(sys.argv) != 2:
print 'Usage: convertkey.py <base64key>'
sys.exit(1)
key = sys.argv[1]
raw_key = base64.b64decode(key, '-~')
hash = hashlib.sha256(raw_key)
base32_hash = base64.b32encode(hash.digest())
print base32_hash.lower().replace('=', '')+'.b32.i2p'
http://www.i2p2.de/
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast