107 lines
4.7 KiB
HTML
107 lines
4.7 KiB
HTML
<strong>i2psetproxy.js</strong>
|
|
|
|
WebExtension that does extended configuration of a dedicated I2P browser. While
|
|
<strong>experimental</strong>, it's capable of enforcing the use of the I2P Proxy without
|
|
needing to touch about:config and disables several
|
|
fingerprinting/de-anonymization vectors on it's own. It is also the easiest way
|
|
to configure an I2P browser on Android without requiring the user to root their
|
|
device.
|
|
|
|
<strong>The Old Version</strong>
|
|
|
|
New versions of this extension create an I2P in Private Browsing mode instead.
|
|
Since this is a drastic change to the behavior of the old plugin, a new entry
|
|
for the new plugin has been made at a new location on addons.mozilla.org.
|
|
|
|
<ul>
|
|
<li>This is the new version: <a href="https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/">[link]</a></li>
|
|
<li>This is the old version: <a href="https://addons.mozilla.org/en-US/firefox/addon/I2P-Proxy/">[link]</a></li>
|
|
</ul>
|
|
|
|
<strong>Android usage:</strong>
|
|
|
|
Open the following link
|
|
<a href="https://github.com/eyedeekay/i2psetproxy.js/releases/">Github Releases Version</a>
|
|
in the browser you want to use for I2P. Firefox will warn you that it is about
|
|
to install an extension and indicate the permissions required. Read them over
|
|
and when you're ready, accept them. That's all it should take, your browser is
|
|
now configured to use I2P.
|
|
|
|
<strong>addons.mozilla.org</strong>
|
|
|
|
If you would prefer to recieve automatic updates from AMO, the correct product
|
|
page for this plugin is
|
|
<a href="https://addons.mozilla.org/en-US/firefox/addon/i2p-in-private-browsing/">I2P In Private Browsing</a>.
|
|
This absolutely requires a working outproxy. If you want to avoid the use of AMO
|
|
for updates, you can download the identical plugin from this repository's
|
|
releases page. The latest AMO Plugin will always be identical to the latest
|
|
github release, except for the version number, which must be incremented for
|
|
submission to AMO.
|
|
|
|
<strong>Features</strong>
|
|
|
|
<ul>
|
|
<li>[done] <strong>Provide</strong> a way to launch into an I2P-Specific contextual identity
|
|
(container). Intercept requests to .i2p domains and automatically route them
|
|
to the I2P container. Isolate the router console from other local
|
|
applications by automatically intercepting requests to the router console to
|
|
another container.</li>
|
|
<li>[done/wip] <strong>Indicate</strong> the I2P browser is in use visually. Find an
|
|
acceptable way to indicate it on Android.</li>
|
|
<li>[done] <strong>Set</strong> the http proxy to use the local I2P proxy automatically.
|
|
Provide specific configuration for other types of I2P proxies(SOCKS,
|
|
isolating HTTP)</li>
|
|
<li>[done/wip] <strong>Disable</strong> risky webRTC features/offer the option to re-enable
|
|
them with the proxy enforced.</li>
|
|
<li>[done] <strong>Change</strong> the color of the browser window to indicate that I2P is in
|
|
use</li>
|
|
<li>[done-ish] <strong>Reset</strong> the HTTP Proxy tunnel to generate a new destination
|
|
on-demand
|
|
<ul>
|
|
<li>it does this by working in conjunction with this
|
|
<a href="https://github.com/eyedeekay/httptunnel">standalone HTTP proxy</a>, currently
|
|
disabled*.</li>
|
|
</ul></li>
|
|
<li>[ready] <strong>Provide</strong> help in a variety of languages.</li>
|
|
<li>[wip] <strong>Monitor</strong> the health and readiness of the I2P router it is
|
|
instructed to use.</li>
|
|
<li>[1/2] <strong>Handle</strong> router console applications under their own origins and
|
|
within their own contextual identity. (1) The router console is automatically
|
|
confined to it's own container tab. (2) Use a custom protocol handler to
|
|
place each i2p application/plugin under it's own origin, shortening router
|
|
console URL's and placing applications under their own origin.</li>
|
|
<li>[not started] <strong>Handle Torrents</strong> by talking to i2psnark-rpc plugin and then
|
|
adding them directly into the Firefox downloads drop-downs, menus, etc. If I
|
|
can.</li>
|
|
</ul>
|
|
|
|
<strong>Screenshot</strong>
|
|
|
|
|
|
|
|
<strong>Super Extra Important Background Info:</strong>
|
|
|
|
This plugin's viability is directly related to the viability of Mozilla and
|
|
Tor's work on hardening Firefox itself and of particular interest are the
|
|
"Uplift" and "Fusion(Firefox Using Onions)" projects.
|
|
|
|
<strong>Links about Project Uplift</strong>
|
|
|
|
<ul>
|
|
<li>https://wiki.mozilla.org/Security/Tor_Uplift</li>
|
|
<li>https://wiki.mozilla.org/Security/FirstPartyIsolation</li>
|
|
<li>https://wiki.mozilla.org/Security/Fingerprinting</li>
|
|
<li>https://wiki.mozilla.org/Security/Fennec%2BTor_Project</li>
|
|
<li>https://wiki.mozilla.org/Security/Tor_Uplift/Tracking</li>
|
|
</ul>
|
|
|
|
Project uplift seems to have largely been accomplished?
|
|
|
|
<strong>Links about Project Fusion</strong>
|
|
|
|
<ul>
|
|
<li>https://wiki.mozilla.org/Security/Fusion</li>
|
|
<li>https://trac.torproject.org/projects/tor/wiki/org/meetings/2018Rome/Notes/FusionProject</li>
|
|
<li>https://blog.torproject.org/tor-heart-firefox</li>
|
|
</ul>
|