Posted by blueraspberryesketimine in I2P (edited by a moderator )

I moved to i2p+ from i2pd. I accidentally typed a clearnet address into a browser window configured to use i2p only and it went to the website just fine. It didnt do that before. The latest change was moving to i2p+. How do I find the leak?

EDIT: I tried disabling the http proxy in i2p and browsing in that profile. I was able to reach clearnet. so something in firefox is leaking somehow. EDITEDIT: Removing the IP address of the i2p relay in my network from the no proxy use list in firefox and adding it back in fixed this. I have absolutely no idea how this would cause this.

3

Comments

You must log in or register to comment.

blueraspberryesketimine OP wrote

found it. theres an outproxy in i2p+ by default. Why would that be there? I thought the entire point was to keep traffic internal to the i2p network

2

not_bob wrote

It's very useful to have a working outproxy. You will find many sites that are banned when you use Tor, but work just fine though an I2P outproxy.

But, remember to use one browser just for I2P. Never let it touch the normal clearnet. Going through an outproxy is fine though.

4

choclet89 wrote

Just if anyone finds this, the outproxy is disabled by default in i2pd.

3

righttoprivacy wrote (edited )

As not_bob mentioned, it's useful.

I2P+ comes with feature rich console interface, one that also happens to be a great place for beginners to start out - doesn't mean users would need to keep the outproxy.

Some otherwise might not have opportunity to try outproxy (some lazy, some unsure how).

And having access to browse clearnet also means a user is more likely to keep an i2p browser (in turn, i2prouter) set up - this means more traffic for all of us. And that's good for all.

In this way, I'd say it's a win win, to have built in (by default, not required to keep).

3