ServerPage
0
0
722
650
6
6
6
6
-
2
Network Configuration
-
-
-
Automatic (UPnP)
-
Firewalled
-
Manually Forwarded Port
-
75
true
<html><head/><body><p>This Retroshare node is running in "Hidden Mode". That means it can only be reached though the Tor network.</p><p>As such, some network options are disabled.</p></body></html>
[Hidden mode]
-
Qt::Horizontal
QSizePolicy::MinimumExpanding
40
20
-
200
0
<html><head/><body><p>The DHT allows you to answer connection requests from your friends using BitTorrent's DHT. It greatly improves the connectivity. No information is actually stored in the DHT. It is only used as a proxy system to get in touch with other Retroshare nodes.</p><p>The Discovery service sends node name and ids of your trusted contacts to connected peers, to help them choose new friends. The friendship is never automatic however, and both peers still need to trust each other to allow connection. </p></body></html>
-
Public: DHT & Discovery
-
Private: Discovery Only
-
Inverted: DHT Only
-
Dark Net: None
-
-
6
-
-
Local Address
-
External Address
-
Dynamic DNS
-
6
-
-
Port:
-
Acceptable ports range from 10 to 65535. Normally Ports below 1024 are reserved by your system.
10
65535
7812
-
-
Port:
-
Acceptable ports range from 10 to 65535. Normally ports below 1024 are reserved by your system.
10
65535
7812
-
-
-
6
6
-
16
16
:/images/ledoff1.png
-
Local network
-
6
6
-
16
16
:/images/ledoff1.png
-
<html><head/><body><p>The bullet turns green as soon as Retroshare manages to get your own IP from the websites listed below, if you enabled that action. Retroshare will also use other means to find out your own IP.</p></body></html>
External ip address finder
-
6
6
-
16
16
:/images/ledoff1.png
-
UPnP
-
-
Known / Previous IPs:
-
Qt::Horizontal
40
20
-
<html><head/><body><p>This clears the list of known addresses. This action is useful if for some reason your address list contains an invalid/irrelevant/expired address that you want to avoid passing to your friends as a contact address.</p></body></html>
Clear
-
16777215
150
-
Show Discovery information in statusbar
-
If you uncheck this, RetroShare can only determine your IP
when you connect to somebody. Leaving this checked helps
connecting when you have few friends. It also helps if you're
behind a firewall or a VPN.
Allow RetroShare to ask my ip to these websites:
true
-
0
0
QAbstractItemView::NoEditTriggers
-
-
-
75
true
Download limit (KB/s)
-
0
0
<html><head/><body><p>This download limit covers the whole application. However, in some situations, such as when transfering many small files at once, the estimated bandwidth becomes unreliable and the total value reported by Retroshare might exceed that limit. </p></body></html>
kB/s
1
100000
1
-
6
-
75
true
Upload limit (KB/s)
-
0
0
<html><head/><body><p>The upload limit covers the entire software. Too small an upload limit might eventually block low priority services (forums, channels). A minimum recommended value is 50KB/s. </p></body></html>
kB/s
1
100000
1
showDiscStatusBar
allowIpDeterminationCB
IPServersLV
ipAddressList
IP Filters
-
activate IP filtering
-
0
IP blacklist
-
Qt::CustomContextMenu
<html><head/><body><p>This list gets automatically filled with information gathered at multiple sources: masquerading peers reported by the DHT, IP ranges entered by you, and IP ranges reported by your friends. Default settings should protect you against large scale traffic relaying.</p><p>Automatically guessing masquerading IPs can put your friends IPs in the blacklist. In this case, use the context menu to whitelist them.</p></body></html>
true
QAbstractItemView::SingleSelection
false
true
IP range
Status
Origin
Reason
Comment
-
<html><head/><body><p>This is very drastic, be careful. Since masquerading IPs might be actual real IPs, this option might cause disconnection, and will probably force you to add your friends' IPs into the whitelist.</p></body></html>
Ban every IP reported by your friends
-
<html><head/><body><p>Another drastic option. If you use it, be prepared to add your friends' IPs into the whitelist when needed.</p></body></html>
Ban every masquerading IP reported by your DHT
-
-
<html><head/><body><p>If used alone, this option protects you quite well from large scale IP masquerading.</p></body></html>
Automatically ban ranges of DHT masquerading IPs starting at
-
IPs
2
255
-
Qt::Horizontal
40
20
IP whitelist
-
Qt::CustomContextMenu
<html><head/><body><p>White listed IPs are gathered from the following sources: IPs coming inside a manually exchanged certificate, IP ranges entered by you in this window, or in the security feed items.</p><p>The default behavior for Retroshare is to (1) always allow connection to peers with IP in the whitelist, even if that IP is also blacklisted; (2) optionally require IPs to be in the whitelist. You can change this behavior for each peer in the "Details" window of each Retroshare node. </p></body></html>
true
QAbstractItemView::SingleSelection
false
true
IP range
Status
Origin
Reason
Comment
-
Manual input
-
-
0
0
<html><head/><body><p>Enter an IP range. Accepted formats:</p><p>193.190.209.15</p><p>193.190.209.15/24</p><p>193.190.209.15/16</p></body></html>
-
16
32
8
24
-
0
0
<html><head/><body><p>Enter any comment you'd like</p></body></html>
-
Add to blacklist
-
Add to whitelist
Hidden Service Configuration
-
Outgoing Connections
-
-
-
Tor Socks Proxy
-
-
10
65535
-
-
16
16
:/images/ledoff1.png
-
Tor outgoing Okay
-
0
0
-
-
I2P Socks Proxy
-
-
10
65535
-
-
:/images/ledoff1.png
-
I2P outgoing Okay
-
16777215
145
Qt::ScrollBarAlwaysOff
true
Tor Socks Proxy default: 127.0.0.1:9050. Set in torrc config and update here.
I2P Socks Proxy: see http://127.0.0.1:7657/i2ptunnelmgr for setting up a client tunnel.
You can connect to Hidden Nodes, even if you
are running a standard Node, so why not setup Tor and/or I2P?
-
0
0
Incoming Service Connections
-
-
10
65535
-
-
<html><head/><body><p>This button simulates a SSL connection to your hidden address using the corresponding proxy. If your hidden node is reachable, it should cause a SSL handshake error, which RS will interpret as a valid connection state. This operation might also cause several "security warning" about connections from your local host IP (127.0.0.1) in the News Feed if you enabled it,</p></body></html>
Test
-
10
65535
-
Onion Address
-
Local Address
-
<html><head/><body><p>This is your hidden address. It should look like <span style=" font-weight:600;">[something].onion</span> or <span style=" font-weight:600;">[something].b32.i2p. </span>If you configured a hidden service with Tor, the onion address is generated automatically by Tor. You can get it in e.g. <span style=" font-weight:600;">/var/lib/tor/[service name]/hostname</span>. For I2P: Setup a server tunnel ( http://127.0.0.1:7657/i2ptunnelmgr ) and copy it's base32 address when it is started (should end with .b32.i2p)</p></body></html>
-
<html><head/><body><p>This is the local address to which the hidden service points at your localhost. Most of the time, <span style=" font-weight:600;">127.0.0.1</span> is the right answer.</p></body></html>
-
-
16
16
:/images/ledoff1.png
-
Tor incoming ok
-
-
Expected Configuration:
-
0
0
0
10
16777215
50
Qt::ScrollBarAlwaysOff
true
HiddenServiceDir </your/path/to/hidden/directory/service>
HiddenServicePort 9191 127.0.0.1:9191
-
0
0
16777215
100
true
To Receive Connections, you must first setup a Tor/I2P Hidden Service.
For Tor: See torrc and documentation for HOWTO details.
For I2P: See http://127.0.0.1:7657/i2ptunnelmgr and documentation for HOWTO details.
Once this is done, paste the Onion/I2P (Base32) Address in the box above.
This is your external address on the Tor/I2P network.
Finally make sure that the Ports match the configuration.
If you have issues connecting over Tor check the Tor logs, too.
-
Qt::Vertical
20
18
netModeComboBox
discComboBox
localAddress
localPort
extAddress
extPort
dynDNS
showDiscStatusBar