ServerPage
0
0
724
568
6
6
6
6
-
0
Network Configuration
-
-
6
6
6
-
-
Network Mode
-
Nat
-
Local Address
-
External Address
-
Dynamic DNS
-
50
false
Download limit (KB/s)
-
50
false
Upload limit (KB/s)
-
6
-
0
0
<html><head/><body><p>This download limit covers the whole application. However, in some situations, such as when transfering many small files at once, the estimated bandwidth becomes unreliable and the total value reported by Retroshare might exceed that limit. </p></body></html>
kB/s
1
100000
1
-
-
Port:
-
Acceptable ports range from 10 to 65535. Normally Ports below 1024 are reserved by your system.
10
65535
7812
-
-
Port:
-
Acceptable ports range from 10 to 65535. Normally ports below 1024 are reserved by your system.
10
65535
7812
-
-
-
Automatic (UPnP)
-
Firewalled
-
Manually Forwarded Port
-
200
0
<html><head/><body><p>The DHT allows you to answer connection requests from your friends using BitTorrent's DHT. It greatly improves the connectivity. No information is actually stored in the DHT. It is only used as a proxy system to get in touch with other Retroshare nodes.</p><p>The Discovery service sends node name and ids of your trusted contacts to connected peers, to help them choose new friends. The friendship is never automatic however, and both peers still need to trust each other to allow connection. </p></body></html>
-
Public: DHT & Discovery
-
Private: Discovery Only
-
Inverted: DHT Only
-
Dark Net: None
-
6
6
-
16
16
:/images/ledoff1.png
-
<html><head/><body><p>The bullet turns green as soon as Retroshare manages to get your own IP from the websites listed below, if you enabled that action. Retroshare will also use other means to find out your own IP.</p></body></html>
External ip address finder
-
6
6
-
16
16
:/images/ledoff1.png
-
Local network
-
0
0
<html><head/><body><p>The upload limit covers the entire software. Too small an upload limit might eventually block low priority services (forums, channels). A minimum recommended value is 50KB/s. </p></body></html>
kB/s
1
100000
1
-
6
6
-
16
16
:/images/ledoff1.png
-
UPnP
-
6
6
-
16
16
:/images/ledoff1.png
-
75
true
<html><head/><body><p>The bullet turns green as soon as Retroshare manages to get your own IP from the websites listed below, if you enabled that action. Retroshare will also use other means to find out your own IP.</p></body></html>
[Hidden mode]
-
-
Known / Previous IPs:
-
Qt::Horizontal
40
20
-
<html><head/><body><p>This clears the list of known addresses. This action is useful if for some reason your address list contains an invalid/irrelevant/expired address that you want to avoid passing to your friends as a contact address.</p></body></html>
Clear
-
16777215
150
-
Show Discovery information in statusbar
-
If you uncheck this, RetroShare can only determine your IP
when you connect to somebody. Leaving this checked helps
connecting when you have few friends. It also helps if you're
behind a firewall or a VPN.
Allow RetroShare to ask my ip to these websites:
true
-
0
0
QAbstractItemView::NoEditTriggers
showDiscStatusBar
allowIpDeterminationCB
IPServersLV
ipAddressList
IP Filters
-
activate IP filtering
-
0
IP blacklist
-
Qt::CustomContextMenu
<html><head/><body><p>This list gets automatically filled with information gathered at multiple sources: masquerading peers reported by the DHT, IP ranges entered by you, and IP ranges reported by your friends. Default settings should protect you against large scale traffic relaying.</p><p>Automatically guessing masquerading IPs can put your friends IPs in the blacklist. In this case, use the context menu to whitelist them.</p></body></html>
true
QAbstractItemView::SingleSelection
false
true
IP range
Status
Origin
Reason
Comment
-
<html><head/><body><p>This is very drastic, be careful. Since masquerading IPs might be actual real IPs, this option might cause disconnection, and will probably force you to add your friends' IPs into the whitelist.</p></body></html>
Ban every IP reported by your friends
-
<html><head/><body><p>Another drastic option. If you use it, be prepared to add your friends' IPs into the whitelist when needed.</p></body></html>
Ban every masquerading IP reported by your DHT
-
-
<html><head/><body><p>If used alone, this option protects you quite well from large scale IP masquerading.</p></body></html>
Automatically ban ranges of DHT masquerading IPs starting at
-
IPs
2
255
-
Qt::Horizontal
40
20
IP whitelist
-
Qt::CustomContextMenu
<html><head/><body><p>White listed IPs are gathered from the following sources: IPs coming inside a manually exchanged certificate, IP ranges entered by you in this window, or in the security feed items.</p><p>The default behavior for Retroshare is to (1) always allow connection to peers with IP in the whitelist, even if that IP is also blacklisted; (2) optionally require IPs to be in the whitelist. You can change this behavior for each peer in the "Details" window of each Retroshare node. </p></body></html>
true
QAbstractItemView::SingleSelection
false
true
IP range
Status
Origin
Reason
Comment
-
Manual input
-
-
0
0
<html><head/><body><p>Enter an IP range. Accepted formats:</p><p>193.190.209.15</p><p>193.190.209.15/24</p><p>193.190.209.15/16</p></body></html>
-
16
32
8
24
-
0
0
<html><head/><body><p>Enter any comment you'd like</p></body></html>
-
Add to blacklist
-
Add to whitelist
Hidden Service Configuration
-
Outgoing Connections
-
-
-
Tor Socks Proxy
-
-
<html><head/><body><p>This is the port of the Tor Socks proxy. Your Retroshare node can use this port to connect to</p><p>Hidden nodes. The led at right turns green when this port is active on your computer. </p><p>This does not mean however that your Retroshare traffic transits though Tor. It does only if </p><p>you connect to Hidden nodes, or if you are running a Hidden node yourself.</p></body></html>
10
65535
-
-
16
16
:/images/ledoff1.png
-
<html><head/><body><p>This led is green when the port listen on the left is active on your computer. It does not</p><p>mean that your Retroshare traffic transits though Tor. It will do so only if </p><p>you connect to Hidden nodes, or if you are running a Hidden node yourself.</p></body></html>
Tor outgoing Okay
-
0
0
-
-
I2P Socks Proxy
-
-
<html><head/><body><p>This is the port of the I2P Socks proxy. Your Retroshare node can use this port to connect to</p><p>Hidden nodes. The led at right turns green when this port is active on your computer. </p><p>This does not mean however that your Retroshare traffic transits though I2P. It does only if </p><p>you connect to Hidden nodes, or if you are running a Hidden node yourself.</p></body></html>
10
65535
-
-
:/images/ledoff1.png
-
<html><head/><body><p>This led is green when the port listen on the left is active on your computer. It does not</p><p>mean that your Retroshare traffic transits though I2P. It will do so only if </p><p>you connect to Hidden nodes, or if you are running a Hidden node yourself.</p></body></html>
I2P outgoing Okay
-
16777215
145
Qt::ScrollBarAsNeeded
true
Tor Socks Proxy default: 127.0.0.1:9050. Set in torrc config and update here.
I2P Socks Proxy: see http://127.0.0.1:7657/i2ptunnelmgr for setting up a client tunnel:
Tunnel Wizard -> Client Tunnel -> SOCKS 4/4a/5 -> enter a name -> leave 'Outproxies' empty -> enter port (memorize!) [you may also want to set the reachability to 127.0.0.1] -> check 'Auto Start' -> finish!
Now enter the address (e.g. 127.0.0.1) and the port you've picked before for the I2P Proxy.
You can connect to Hidden Nodes, even if you are running a standard Node, so why not setup Tor and/or I2P?
-
0
0
Incoming Service Connections
-
-
10
65535
-
-
<html><head/><body><p>This button simulates a SSL connection to your hidden address using the corresponding proxy. If your hidden node is reachable, it should cause a SSL handshake error, which RS will interpret as a valid connection state. This operation might also cause several "security warning" about connections from your local host IP (127.0.0.1) in the News Feed if you enabled it, which you should interpret as a sign of good communication.</p></body></html>
Test
-
10
65535
-
Service Address
-
Local Address
-
<html><head/><body><p>This is your hidden address. It should look like <span style=" font-weight:600;">[something].onion</span> or <span style=" font-weight:600;">[something].b32.i2p. </span>If you configured a hidden service with Tor, the onion address is generated automatically by Tor. You can get it in e.g. <span style=" font-weight:600;">/var/lib/tor/[service name]/hostname</span>. For I2P: Setup a server tunnel ( http://127.0.0.1:7657/i2ptunnelmgr ) and copy it's base32 address when it is started (should end with .b32.i2p)</p></body></html>
-
<html><head/><body><p>This is the local address to which the hidden service points at your localhost. Most of the time, <span style=" font-weight:600;">127.0.0.1</span> is the right answer.</p></body></html>
-
-
16
16
:/images/ledoff1.png
-
<html><head/><body><p>This led turns green only if you launch an active test using the above button. </p><p>When it does, it means that your hidden node can be reached from anywhere, using the Tor (resp. I2P) </p><p>network. Congratulations!</p></body></html>
incoming ok
-
-
Expected Configuration:
-
0
0
0
10
16777215
50
Qt::ScrollBarAlwaysOff
true
Please fill in a service address
-
0
0
16777215
100
true
To Receive Connections, you must first setup a Tor/I2P Hidden Service.
For Tor: See torrc and documentation for HOWTO details.
For I2P: See http://127.0.0.1:7657/i2ptunnelmgr for setting up a server tunnel:
Tunnel Wizard -> Server Tunnel -> Standard -> enter a name -> enter the address and port your RS is using (see Local Address above) -> check 'Auto Start' -> finish!
Once this is done, paste the Onion/I2P (Base32) Address in the box above.
This is your external address on the Tor/I2P network.
Finally make sure that the Ports match the configuration.
If you have issues connecting over Tor check the Tor logs too.
-
Qt::Vertical
20
18
localAddress
localPort
extAddress
extPort
dynDNS
showDiscStatusBar