diff --git a/README.md b/README.md index 8ce2af659..b0ae3678a 100644 --- a/README.md +++ b/README.md @@ -17,6 +17,8 @@ It is made in honor of the grind that went into upstream projects and is not mea - Fast🚜 Scream🚜 Mod🔌 Tracker/SID playback support (Thanks to [Jeder](https://iceshrimp.dev/iceshrimp/iceshrimp/pulls/490)) - Suppress the "You haven't configured mail" message (Patch adopted [from mia](https://iceshrimp.dev/mia/withdrawal)) - Fixes that allow proper federation of likes with instances using the UA "misskey" (Sharkey) + - Allow federation via Tor / i2p + - Improvements for single-user instances, anonymous and pseudonymous federation via Tor / i2p - Accessibility settings in the unauthenticated web viewer - So much more - Read the [changelog](CHANGELOG.md) to get an overview of all changes - Don't like the Web UI? Good luck, the Mastodon-compatible API might work with the following clients: diff --git a/docs/federate-via-onion-i2p.md b/docs/federate-via-onion-i2p.md new file mode 100644 index 000000000..af9af62a5 --- /dev/null +++ b/docs/federate-via-onion-i2p.md @@ -0,0 +1,71 @@ +# Quick example of federating with Tor instances from clearnet + +![figure1](https://gist.githubusercontent.com/hcmiya/e635b31ae8c4b33d903f224ddbc45197/raw/84bb5c81f9681837920cbf6d0b05cb7c5513c565/002-clearnet-tor.png) + +## Install and configure Tor / Privoxy + +```console +# pacman -S privoxy tor +``` + +Append following to `/etc/tor/torrc` +```text +SOCKSPort 127.0.0.1 9050 +``` + +Append following to `/etc/privoxy/config` +```text +forward-socks5t .onion 127.0.0.1:9050 . # remember '.' on the end +``` + +Then restart tor and privoxy. + +## Configure TrashPoss + +Append following to `.env` +```text +ALLOW_ACCESS_TO_HIDDEN_SERVICE=true +``` + +Uncomment the following line and set as follows: +```text +# Proxy for HTTP/HTTPS +proxy: http://127.0.0.1:8118 +``` + +Then restart TrashPoss services. Try to search users on the tor instance e.g. `@root@nq5jmc5rsyo4fiph.onion`, `@notjeff@pleroma.oniichanylo2tsi4.onion`, `@xps2@5z5ce433e2yp73jqm3yxmyh2yvcn33venhnm5trqde6uwjysxyy3gbad.onion`, etc. + +# I2P support + +![figure2](https://gist.githubusercontent.com/hcmiya/e635b31ae8c4b33d903f224ddbc45197/raw/84bb5c81f9681837920cbf6d0b05cb7c5513c565/003-clearnet-tor-i2p.png) + +## Install and configure I2P / Privoxy + +If you are using Arch Linux, just type following: + +```console +# pacman -S i2p +``` + +Otherwise see install documentation in official site: https://geti2p.net/en/download + +After the installation and running I2P, You need to create new SOCKS proxy. **Using HTTP proxy instead of SOCKS proxy does not work well**. + +1. Open I2P router config by brower at http://127.0.0.1:7657/i2ptunnelmgr +2. Create "New client tunnel" whose type is "SOCKS 4/4a/5" from bottom of the page. +3. Configure new proxy as following: + ```text + Auto Start Tunnel: True + Access Point: Port: 9049, Reachable by: 127.0.0.1 + ``` + +Append following to `/etc/privoxy/config` +```text +forward-socks5 .i2p 127.0.0.1:9049 . # remember '.' on the end +``` + +Then restart I2P client tunnel and privoxy. Try to search users on the I2P instance e.g. `@root@5hftbbffiohmyugvc6vypyqhi6tl2yxo6wvyscybvv5c57pva3iq.b32.i2p` + +# See also + +* [Darknet連合対応インスタンスの一覧 - マストドン日本語ウィキ](https://ja.mstdn.wiki/Darknet%E9%80%A3%E5%90%88%E5%AF%BE%E5%BF%9C%E3%82%A4%E3%83%B3%E3%82%B9%E3%82%BF%E3%83%B3%E3%82%B9%E3%81%AE%E4%B8%80%E8%A6%A7) \ No newline at end of file