Guidelines to set up an I2P reseed server over Cloudflare
Based on the original definition from I2P homapage, a reseed server consists of a Java I2P router, an HTTPS web server, and some scripts that periodically gather router infos from the router, bundle and sign them into a custom file format, and deliver these files over HTTPS.
This tutorial will walk you through the process of setting up a reseed server and routing its traffic over Cloudflare. You may ask: “But why Cloudflare?". In fact, you don’t have to serve your reseed traffic over Cloudflare, and can just follow the original guidelines on I2P homapage to set up a reseed server running on your own server. However, Cloudflare manages a large Content Delivery Network (CDN) that can be used to improve several aspects of your reseed server. These are three primary reasons (opinions) why I choose to route my reseed traffic over Cloudflare.
- Increased security. Routing your reseed traffic over Cloudflare helps hiding the actual IP address(es) of your reseed server. So malicious traffic, including those from Denial-of-Service attacks, cannot directly affect your original server without bypassing Cloudflare.
- Improved performance. Cloudflare, with its large number of data centers distributed around the globe, can optimize the delivery of the reseed bundle (i.e., the su3 file) to I2P clients worldwide. The real latency from an I2P client to your reseed server will be reduced close to the latency from that client to her nearest Cloudflare data center.
- Censorship resistance. By putting your server on Cloudflare, in most cases, it will be sharing a pool of IP addresses with many other websites. Any censors that conduct IP-based blocking against your server would have to think twice about the collateral damage of also making thousands (or even tens of thousands) of co-hosted websites inaccessible. Furthermore, in our recent paper at USENIX FOCI ‘19, my co-authors and I show that several censors block access to I2P services based on the Server Name Indication (SNI), thus encrypting SNI would remedy this problem. Currently, Cloudflare is the only provider that supports Encrypted SNI (ESNI). Although ESNI has not been widely adopted while I2P router software has not been implemented to fully support ESNI in TLS1.3 yet, I believe that ESNI adoption is a necessary step to make the Internet more resistant to censorship. Therefore, I choose to proxy my reseed server over Cloudflare to prepare for a future when ESNI becomes standardized and widely adopted.
For demonstration purpose, I hereby borrow an image from Cloudflare to illustrate some points discussed above.
To follow this tutorial, you therefore need a Cloudflare account, in which your domain name is managed. For your reference, you can add your domain name to the Cloudflare account, or you can fully transfer it to Cloudflare Registrar.
This section will walk you through the process of installing required software packages. My operating system for this tutorial is Ubuntu 18.04 LTS. According to the original guideline, it is ideal for your server to have:
- the capability to be continuously online 24/7
- at least 2 CPUs and 2GB of RAM
- a Unix environment to run the go-lang I2P reseed tools
- a sufficient amount of bandwidth
0.1 Install I2P router software
Run these commands to install the official I2P package:
sudo apt-add-repository -y ppa:i2p-maintainers/i2p; sudo apt-get update; sudo apt-get install -y i2p
Start I2P with this command:
i2prouter start if it has not yet launched. At
the time of composing this tutorial, the most current I2P version is
If you already have I2P installed via Debian Package repository previously, it
can be updated with:
sudo apt-get --only-upgrade install -y i2p
0.2 Install Go-lang
The Go project’s official download page is at https://golang.org/dl/.
If you’re using Ubuntu 16.04 LTS, 18.04 LTS or 19.04, then you can use the
longsleep/golang-backports PPA and install Go with at least version of 1.13.
sudo add-apt-repository -y ppa:longsleep/golang-backports; sudo apt-get update; sudo apt-get install -y golang-go
0.3 Install the I2P reseed tool
The official guidelines point to an all-in-one Go solution written by Matt. There are also some forked versions with more features, such as reseed over Tor and IPFS written by IDK or RTrade Technologies Ltd. For the purpose of this tutorial, all of them should function similarly so it’s up to you to choose which one to install, depend on whether you want to add more features to your reseed server later.
export GOPATH=$HOME/go; mkdir $GOPATH; cd $GOPATH; go get github.com/MDrollette/i2p-tools
You can confirm
i2p-tools has been installed properly by changing to the
directory where its binary is stored, and run this command to show
cd $GOPATH/bin; ./i2p-tools -h
1. Cloudflare Setup
Next, assume that you have created and logged into your Cloudflare account, this section shows you how to configure a DNS record for the host name of your reseed server and obtain its TLS certificate and the private key.
1.0 DNS configuration
DNS Management session, click Add record, and configure
your record with:
- Type: A
- Name: any string of your preference. However, this string should not
contain any dot(.) so that the host name of your reseed server would be
a third-level domain name to your own second-level domain. For example, if
your domain is
np-tokumei.com, then you should have your reseed server host name as
reseed.mp-tokumei.com, but NOT
reseed.server.np-tokumei.com. This is because Cloudflare’s free TLS certificate only covers up to third-level domains currently.
- IPv4 Address: the IP address of your reseed server
- TTL: Auto
- Proxy status: make sure the cloud symbol is in
orangeto route your reseed traffic over Cloudflare CDN. This is very important to mask the real IP address of your server. If you leave the cloud grey for long enough, active DNS measurements may discover and store the real IP of your server.
1.1 TLS Certificate
Next, under the
SSL/TLS session, go to Origin Certificates and click
A window will pop up for you to choose the Private key type and the host
name of your reseed server (e.g.,
You will then be provided with a private key and a certificate as shown in the
picture below. Note that I put mine here for demonstration purpose, you should
never leak your private key to anyone. As suggested, save them into two
separate files named:
your_reseed_host_name.tld>.key. Save them in a secure environment with
password protection for later use. You can download the
.pem file later from
this dashboard, but NOT the key.
i2p-tools require a TLS certificate file ended with
.crt to work, so
you will need to use this command to convert your
.pem file to a
openssl x509 -outform der -in <your_domain.tld>.pem -out temporary.crt
Now you will have a binary certificate named
temporary.crt. DON’T try
opening it with
cat yet as it will mess up your terminal with non-printable
characters. We then need to convert this binary
temporary.crt to a
base64-formated certificate, named
<your_reseed_host_name.tld>.crt. In your
<your_reseed_host_name.tld> of your reseed server and run
echo "-----BEGIN CERTIFICATE-----" >> <your_reseed_host_name.tld>.crt; cat temporary.crt | base64 >> <your_reseed_host_name.tld>.crt; echo "-----END CERTIFICATE-----" >> <your_reseed_host_name.tld>.crt
Note the number of dashes
(-) is exactly 5 on each side of the
END tags. NO new line at the end of the file is allowed since it will cause
syntax error. Finally, you can delete
temporary.crt and put the
<your_reseed_host_name.tld>.key in the
same directory where you will be executing your
2. Reseed server configuration
Now that we have all required software installed, lets navigate to your
i2p-tools binary (normally stored under
$HOME/go/bin/) and run the
./i2p-tools reseed --signer=<your_email> \ --netdb=/home/ubuntu/.i2p/netDb \ --tlsHost=<your_reseed_host_name.tld> \ --tlsKey=<your_reseed_host_name.tld>.key \ --tlsCert=<your_reseed_host_name.tld>.crt \ --trustProxy
--trustProxy flag! It is important for routing reseed traffic over
Cloudflare since it will let our server to obtain the
from client requests, which contain the actual IP addresses of newly joint I2P
clients that send the reseed request instead of IP addresses of Cloudflare
workers. As the guideline from the I2P official tutorial suggests that the
reseed server should give the same
su3 file to the same client (IP) within a
configurable time period. This helps to prevent bad clients from harvesting
information of many I2P routers in the network.
Since we are running this command for the first time, you will be prompted:
Unable to read signing key your_email.pem Would you like to generate a new signing key for your_email? (y or n):
Enter to proceed and the tool will create three files for you in
the current directory. They are named:
* is the email address you supplied for the flag
--singer= above. DO
keep these files in a secure environment with password protection, you will
need them later for production mode!!
If the reseed server starts properly, you will see similar outputs to these in your console:
2019/08/20 05:52:18 Rebuilding su3 cache... 2019/08/20 05:52:18 Building 350 su3 files each containing 77 out of 2396 routerInfos. 2019/08/20 05:52:19 Done rebuilding. 2019/08/20 05:52:19 HTTPS server started on 0.0.0.0:8443
I2P reseed server by default runs on port
8443 so make sure this port is
reachable from outside world. The
i2p-tools also provides you with some
flexibility to configure this port by using the flag
--port in the above
reseed command. However, you should choose a port that is supported by
For more detail of how to run the reseed command in background, crontab it at reboot, please refer to the original guidelines.
These are two ways you might want to test whether your reseed server can
successfully provide the reseed bundle
su3. For this purpose, you will need
a separate machine with I2P router software already installed.
2.1 Direct fetching
From the second machine, run this command to download an
su3 file from your
reseed server. Note that the port value should match with the port information
you set up above. In the original guideline, you will see the command has
--no-check-certificate flag. We don’t need it in our tutorial because our
TLS certificate is Cloudflare’s one already validated by Certificate
Authority. NOTE the user-agent flag as the server will only response to
wget --user-agent="Wget/1.11.4" -O test.su3 https://<your_reseed_host_name.tld>:8443/i2pseeds.su3
You should see a file named
test.su3 downloaded to your second machine.
Examining the file with the command
zipinfo test.su3 should show you a list
of files whose name is in the form of
2.2 Reseeding from I2P router console
Next, we want to test if a real I2P client can successfully reseed from our
server. First, you need to copy your reseed certificate (i.e.,
your_singer_email.crt) created by the reseed command above to the second
machine. Note that this is NOT the TLS certificate since the TLS
certificate in our case belongs to Cloudflare, which is already validated by
Certificate Authorities. Only copy the reseed certificate to the location
Now, on your second machine with I2P running, open a web browser and go to
http://127.0.0.1:7657/configreseed. Under Reseeding Configuration,
delete all current URLs of reseed servers, enter
https://<your_reseed_host_name.tld>:8443 and click Save changes and reseed
now button at the bottom of the page. If you could successfully reseed as
indicated in this photo, then your reseed server has been set up properly.
If you got an error, visit
http://127.0.0.1:7657/logs to investigate
further. After you could verify that your reseed server runs properly, you
should Reset URL list to the list of default reseed servers.
3. Securing your reseed server with
To secure your server from scanners (e.g, censys, shodan) and prevent its real IP address from being exposed, you will need to guard your server with firewall rules. More specifically, it should only response to requests coming from Cloudflare. You can create firewall rules to accept only requests originated from Cloudflare to your reseed server port (e.g., 8443 in this case), and drop all other connections from non-Cloudflare IPs. Note that the IP addresses used below are updated on February 21st, 2019. Please get the most current ones at Cloudflare’s IP Ranges.
sudo iptables -A INPUT -p tcp --dport 8443 -s 220.127.116.11/20 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 18.104.22.168/22 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 22.214.171.124/22 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 126.96.36.199/22 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 188.8.131.52/18 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 184.108.40.206/18 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 220.127.116.11/20 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 18.104.22.168/20 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 22.214.171.124/22 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 126.96.36.199/17 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 188.8.131.52/15 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 184.108.40.206/12 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 220.127.116.11/13 -j ACCEPT; sudo iptables -A INPUT -p tcp --dport 8443 -s 18.104.22.168/22 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2400:cb00::/32 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2606:4700::/32 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2803:f800::/32 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2405:b500::/32 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2405:8100::/32 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2a06:98c0::/29 -j ACCEPT; sudo ip6tables -A INPUT -p tcp --dport 8443 -s 2c0f:f248::/32 -j ACCEPT;
The above commands are to accept requests from all Cloudflare’s IPv4 and IPv6 addresses. The following two commands need to be add after the above to drop all connections from non-Cloudflare IPs.
sudo iptables -A INPUT -p tcp --dport 8443 -j DROP; sudo ip6tables -A INPUT -p tcp --dport 8443 -j DROP
To verify the current state of your IP tables:
sudo iptables -L; sudo ip6tables -L
To export rules to into file and reload them after every reboot:
sudo iptables-save > /etc/iptables.up.rules.v4 sudo ip6tables-save > /etc/iptables.up.rules.v6
Then, add these lines to
/usr/sbin/iptables-restore < /etc/iptables.up.rules.v4 /usr/sbin/ip6tables-restore < /etc/iptables.up.rules.v6
Finally, change the file to be executable:
chmod +x /etc/network/if-pre-up.d/iptables
Bonus: if you messed up and wanted to flush your iptables and ip6tables, use these command to delete all rules. NOTE: be cautious when using these commands as they will remove all previous rules you might have had.
sudo iptables -F INPUT; sudo ip6tables -F INPUT
Now that you have a running reseed server secured behind Cloudflare, you can
contact I2P’s reseed coordinator at
[email protected] or
backup information about your reseed server if you want it to be part
of the default list of reseed servers. Or if you just want to help some
friends who cannot bootstrap into the I2P network due to reseed server
just give them this information:
- domain/url/port of your reseed server
- the su3-signing certificate, which is the
- TLS certificate (iff self signed). Again, this information is not needed if you follow this tutorial because Cloudflare already takes care of certificate validation for us, read more.
5. Closing remarks
If you run into problems while following this tutorial, feel free to contact
[email protected] or DM me on Twitter
will try my best to help as much as possible. Or, you can also reach out to
backup via the emails provided above, or ask questions on zzz’s forum on I2P
at http://zzz.i2p/topics/1893 or http://zzz.i2p/topics/1893.
I do plan to keep the reseed server (
that I set up using this tutorial running as long as possible for those
censored users who cannot access the default list to be able to join the
network. So feel free to add the above URL to your reseed URLs, name my
su3-signing certificate as
i2p.reseed_at_protonmail.com.crt, save the
following TEXT to the file and add it to
-----BEGIN CERTIFICATE----- MIIF4zCCA8ugAwIBAgIRAPojnWFToTIZZQ6prxKvyIswDQYJKoZIhvcNAQELBQAw eTELMAkGA1UEBhMCWFgxCzAJBgNVBAcTAlhYMQswCQYDVQQJEwJYWDEeMBwGA1UE ChMVSTJQIEFub255bW91cyBOZXR3b3JrMQwwCgYDVQQLEwNJMlAxIjAgBgNVBAMM GWkycC5yZXNlZWRAcHJvdG9ubWFpbC5jb20wHhcNMTkwOTEyMDE1NjAyWhcNMjkw OTEyMDE1NjAyWjB5MQswCQYDVQQGEwJYWDELMAkGA1UEBxMCWFgxCzAJBgNVBAkT AlhYMR4wHAYDVQQKExVJMlAgQW5vbnltb3VzIE5ldHdvcmsxDDAKBgNVBAsTA0ky UDEiMCAGA1UEAwwZaTJwLnJlc2VlZEBwcm90b25tYWlsLmNvbTCCAiIwDQYJKoZI hvcNAQEBBQADggIPADCCAgoCggIBAKkSo0QeG03nKu+nWqZoFukXSSO9VXOJc6bV TP3uacK87BSdFwkkX2a42Qe8/Ox4IydrB0+WkE0fV0Fs4k1+QNyxl9sx4FgXwwUj 7D7k//h5uUGto6CI4OJjiiJDQbUZem8hNOt5MBQspQObdXn3ixRh1HpGsHsD6d2O F5uo6pGxW4u7jXzB2ezUpKdu9NPtPz8Pq0Qyi33GICKhZskiBWPB0Fbp0SyHJJiP YmnQqIddx4AMU46pxpC3938/jNqxSX4tqmkRThAdO1ClLoOXGJnepHzIyRB4sVAf Vn8k5BXa66UxjFaoe/V1YUR/AYFVrENu4E73QIT7zyv7LY1cxAgZo9eFldikjzby hMBKee5NGpUTCl26KmzTLtTHqAj/NqXKR7OEg40N/0b4YZ4ZeFlTPnbPumU7cKiu 8odqWYfeLgY/sudyvlw93cH8gtLkGJ6smNU9iZYuhbedMofBY+6OzpioyqF6mDyE jQ3cTBgxWLxkDhcZkW1nwS4yrvCHH7HUeWjZ7BmUHGFaPWObsLGcFbFse8kY0XFy npnCkjFbXPESO7BrNOH3VLbDmY4eJyfpmmdBkw/TXP/UPR+m1II9CN4tgs9JQvtX oxTvNZkE4wewvbCy/fppA4dWYrFcn7b1sxAWEuQ8VUIsziFSTVEVMXvUjhuGVZCo TnJIfvfrAgMBAAGjZjBkMA4GA1UdDwEB/wQEAwIChDAdBgNVHSUEFjAUBggrBgEF BQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zAiBgNVHQ4EGwQZaTJwLnJl c2VlZEBwcm90b25tYWlsLmNvbTANBgkqhkiG9w0BAQsFAAOCAgEABLw0DqdnuSWA qxaxQL44QPT93jTfScI1JFYuxq36jq8bnHBySqWC+7z8L/6XW42u1EOZHBCQEE6O HHcNQ2a5/8+iUY9vgx/cZlBrN7n2UWCAgP4PIneb53glhwkXCuiS9Ie8xHZZgbVz a6IV8NQvW3GQp71fFHP9gdifohmF4DSQepwSOz9bfMKMo2YtfnvZoEg3mRiYtYa3 hLfwATvdu/TX1ruGMOK5JjjiEgd1Y2O0wOUyTwtONqlDKd+FuCM2GXglEWpX81Bw 1gSKQgABPO+pBtM5rX5SWk6phMJilMHwJAfff3PA19m9FZP4VVhjp1RmMk2cF3Xy h2ziXEb797Do1hEabBu6u85SRj6+hP7Wt0vmvqgicY1xgoxvI7x5vuW1qSNjJ1Dj FZcRsh28fUIBseQzPNVA8S5h1j4xKCTbYSKnBEGhsPrNkMs8Qlmw1SdU2Tr3boY9 RIDxxbn01i+HyLEwixfiyevcGPUq/uuvXFLlZSUWHfRb2Zo8LTQScZX45bXJnca1 5lUPcTe5xYOqRr842nMr2NEnN6tDq2GTLSjH+/dRgZ0DZf6607awEneIQZvWPGwa oX5ExN11mISnymUpLm7/QgL1o8qepBsAMrN/ReBJtaLR+X3Jn96M+bbu/G4abRrA q90/pGpZM3+Tq73rhzeQpOEdfs/dUTs= -----END CERTIFICATE-----