Does i2p traffic look like normal traffic ?

I2P router issues
Post Reply
User avatar
AntibodyMama
Posts: 29
Joined: 18 Jun 2024 20:45

Does i2p traffic look like normal traffic ?

Post by AntibodyMama »

Hi, i was wondering if i2p traffic looks like normal traffic ?
And if not, why doesn't it look like normal traffic so it cannot be censored ?
anikey
Posts: 60
Joined: 30 Nov 2023 20:08

Re: Does i2p traffic look like normal traffic ?

Post by anikey »

As far as I know, it looks like total random garbage.
Both network transports (NTCP2 and SSU2) are obfuscated at all stages of connection.
It was made that way so that it doesn't look like anything and doesn't have any unique characteristics that it can be blocked by.

You can learn more about these two protocols at http://i2p-projekt.i2p/spec, in that list see "NTCP 2" and "SSU2".
User avatar
AntibodyMama
Posts: 29
Joined: 18 Jun 2024 20:45

Re: Does i2p traffic look like normal traffic ?

Post by AntibodyMama »

Thanks much
User avatar
Robin
Posts: 2
Joined: 04 Jul 2023 13:03

Re: Does i2p traffic look like normal traffic ?

Post by Robin »

The only way to block it is to block everything that does not look like something.
User avatar
AntibodyMama
Posts: 29
Joined: 18 Jun 2024 20:45

Re: Does i2p traffic look like normal traffic ?

Post by AntibodyMama »

So its superior to Tor in this
User avatar
zzz
Posts: 184
Joined: 31 Mar 2018 13:15

Re: Does i2p traffic look like normal traffic ?

Post by zzz »

Yeah.

OP doesn't say what 'normal traffic' is, ofc there's lots of different kinds of traffic out there on the internet.

But there's basically three philosophical approaches:

1) Try to look like something else (Tor with all its various pluggable transports)
2) Try to have everything look random, every byte, every bit, and the port numbers, and do something with the packet lengths, especially in the handshakes (us, now)
3) Don't bother (e.g. wireguard)

Back in the beginning in 2003 the choice wasn't clear, jrandom went mostly with 2) but not fully, there were some holes. But this was before the rise of China's firewall and aggressive censorship around the world became a big issue, especially for Tor. Traffic identification resistance wasn't an explicit goal in the NTCP/SSU design documents, but implicitly he did make an effort.

Tor went all in on 1) but that requires a constant back-and-forth game, a pluggable architecture, a constant campaign to get users to run various relays and try different things. We're not set up for that and don't have the resources to do it.

As we started work on NTCP2 (and later SSU2) we reaffirmed we were on the right path with 2) and did our best to improve censorship resistance (traffic identification) as an explicit goal. I think we did pretty well, but there's still some things to do, especially on padding strategies (packet lengths and length distribution) and perhaps on packet interarrival times.

So I wouldn't claim 'superiority' over Tor, but what we're doing works best for us and it seems to be working, we rarely get reports of blocking.
User avatar
AntibodyMama
Posts: 29
Joined: 18 Jun 2024 20:45

Re: Does i2p traffic look like normal traffic ?

Post by AntibodyMama »

It's clearer for me now, thanks for the answer
Post Reply