Content uploaded by Nguyen Phong Hoang
Author content
All content in this area was uploaded by Nguyen Phong Hoang on Sep 25, 2018
Content may be subject to copyright.
An Empirical Study of the I2P Anonymity Network and its
Censorship Resistance
Nguyen Phong Hoang
Stony Brook University
Stony Brook, New York
nghoang@cs.stonybrook.edu
Panagiotis Kintis
Georgia Institute of Technology
Atlanta, Georgia
kintis@gatech.edu
Manos Antonakakis
Georgia Institute of Technology
Atlanta, Georgia
manos@gatech.edu
Michalis Polychronakis
Stony Brook University
Stony Brook, New York
mikepo@cs.stonybrook.edu
ABSTRACT
Tor and I2P are well-known anonymity networks used by many
individuals to protect their online privacy and anonymity. Tor’s
centralized directory services facilitate the understanding of the
Tor network, as well as the measurement and visualization of its
structure through the Tor Metrics project. In contrast, I2P does not
rely on centralized directory servers, and thus obtaining a complete
view of the network is challenging. In this work, we conduct an
empirical study of the I2P network, in which we measure properties
including population, churn rate, router type, and the geographic
distribution of I2P peers. We nd that there are currently around
32K active I2P peers in the network on a daily basis. Of these peers,
14K are located behind NAT or rewalls.
Using the collected network data, we examine the blocking re-
sistance of I2P against a censor that wants to prevent access to
I2P using address-based blocking techniques. Despite the decen-
tralized characteristics of I2P, we discover that a censor can block
more than 95% of peer IP addresses known by a stable I2P client by
operating only 10 routers in the network. This amounts to severe
network impairment: a blocking rate of more than 70% is enough to
cause signicant latency in web browsing activities, while blocking
more than 90% of peer IP addresses can make the network unusable.
Finally, we discuss the security consequences of the network being
blocked, and directions for potential approaches to make I2P more
resistant to blocking.
CCS CONCEPTS
•Networks →Network measurement
;
Network privacy and
anonymity;
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for prot or commercial advantage and that copies bear this notice and the full citation
on the rst page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specic permission and/or a
fee. Request permissions from permissions@acm.org.
IMC ’18, October 31-November 2, 2018, Boston, MA, USA
©2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5619-0/18/10. . . $15.00
https://doi.org/10.1145/3278532.3278565
KEYWORDS
I2P anonymity network, network metrics, Internet censorship, block-
ing resistance
ACM Reference Format:
Nguyen Phong Hoang, Panagiotis Kintis, Manos Antonakakis, and Michalis
Polychronakis. 2018. An Empirical Study of the I2P Anonymity Network
and its Censorship Resistance. In 2018 Internet Measurement Conference
(IMC ’18), October 31-November 2, 2018, Boston, MA, USA. ACM, Boston, MA,
USA.14 pages. https://doi.org/10.1145/3278532.3278565
1 INTRODUCTION
In recent years, Internet censorship and surveillance have become
prevalent [
4
,
13
,
18
,
47
,
64
,
69
]. For this reason, anonymous commu-
nication has drawn attention from both researchers and Internet
users [
10
,
13
,
42
,
46
,
69
,
71
,
74
]. As anonymous communication net-
works grow to support more users, more anonymity and censorship
circumvention tools are becoming freely available [
23
]. Some of
these tools include proxy servers, Virtual Private Network (VPN)
services, the Onion Router (Tor) [
10
], and the Invisible Internet
Project (I2P) [
74
]. Tor and I2P are the most popular low-latency
anonymous communication networks, which use the onion routing
technique [56] to protect user anonymity.
Although both Tor and I2P provide similar features, there are
some major dierences between them. Tor operates at the TCP
stream level, while I2P trac can use both TCP and UDP. Tor has
a centralized architecture in which a set of directory authorities
keep track of the network, while no entity has a complete view
of the I2P network due to its decentralized nature. Every I2P peer
helps other peers to route trac by default, while there are only
6.5K Tor routers serving more than two million users per day, as
of May 2018 [
62
]. As a result, while Tor is mainly designed for
latency-sensitive activities (e.g., web browsing) due to bandwidth
scarcity [
45
], I2P’s capacity also enables bandwidth-intensive peer-
to-peer (P2P) applications (e.g., BitTorrent) [68].
While helping users to browse the Internet anonymously, these
networks also provide hidden services (comprising the “dark web”)
in which the anonymity of both senders and receivers is preserved,
thus protecting their privacy. Because of its popularity and the
support of volunteer-based “exit nodes” to the normal Internet, Tor
has been widely used and extensively researched. On the other
hand, I2P has not been studied as comprehensively. We identify
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
two potential reasons I2P has been less appealing than Tor. First,
I2P’s purely distributed network architecture, which lacks any cen-
tralized directory service, makes it harder to measure. Second, the
intermittent availability of exit nodes causes I2P to operate as a
self-contained network (which only serves hidden services) most
of the time, making it less attractive to users who want to casually
browse websites on the public Internet.
In this work, we aim to ll this research gap by conducting
an empirical measurement of the I2P network, which may help
popularize I2P to both academic researchers and Internet users, and
contribute to understanding its structure and properties. With those
two goals in mind, our investigation aims to answer the following
main questions.
What is the population of I2P peers in the network? While Tor
relies on a centralized architecture for tracking its public relays,
which are indexed by a set of hard-coded authority servers, I2P is a
distributed P2P network in which no single centralized authority
can keep track of all active peers [
1
,
7
,
21
,
50
,
58
,
72
]. Tor developers
can easily collect information about the network and even visualize
it, as part of the Tor Metrics project [
41
]. In contrast, there have been
very few studies attempting to measure the I2P network [
19
,
40
,
68
].
In this work, we attempt to estimate the size of the I2P network
by running up to 40 I2P nodes under dierent settings for network
monitoring purposes. We nd that there are currently 32K active
I2P peers in the I2P network on a daily basis. The United States, Rus-
sia, England, France, Canada, and Australia contribute more than
40% of these peers. Dierent from prior works, we also observed
about 6K peers that are from 30 countries with poor Press Freedom
scores [
48
]. This is an indication that I2P is possibly being used as
an alternative to Tor in regions with heavy Internet censorship and
surveillance.
How resilient is I2P against censorship, and what is the cost of
blocking I2P? Despite the existence of many pro-privacy and anti-
censorship tools, these are often easily blocked by local Internet
authorities, thus becoming inaccessible or dicult to access by non-
tech-savvy users [
12
]. Hence, it is important to not only develop
censorship-resistant communication tools, but also to ensure that
they are easily accessible to end users. Due to the centralized nature
of Tor’s network architecture, it is relatively easy for a censor to
obtain a list of all public Tor routers and block them [
60
]. Even
hidden routers (also known as “bridges”) are often discovered and
blocked [
11
,
13
]. Despite its decentralized design, there have still
been reported attempts to block I2P [
49
]. However, to the best of
our knowledge, no prior studies have analyzed how challenging
(or not) it is for a censor to block I2P access. By analyzing the data
we collected about the I2P the network, we examine the censorship
resistance of I2P using a probabilistic model. We discover that a
censor can block more than 95% of peer IP addresses known to a
stable I2P client by injecting only 10 routers into the network.
In summary, the primary contribution of this work is an empirical
measurement of the I2P network, that aims to not only improve
our understanding of I2P’s network properties, but also to assess
the vulnerability of the I2P network to address-based blocking.
The rest of the paper is organized as follows. Section 2 gives
an overall background of I2P and presents related works. As an
indispensable part of an anonymity network study, ethical consid-
erations are discussed in Section 3, where we justify the principles
to which we adhere while collecting and analyzing data for this
study. In Section 4, we explain our measurement methodology, in-
cluding machine specications, network bandwidths, and the I2P
router types that we used to conduct our measurements. The mea-
surement results (e.g., the population of I2P peers, churn rate, and
peer distribution) of the I2P network properties are analyzed in
Section 5. Based on these network properties, we then examine the
blocking resistance of the network in Section 6, where we discover
that I2P is highly vulnerable to address-based blocking in spite of
its decentralized nature. Finally, in Sections 7 and 8, we conclude
by discussing consequences of the network being censored and
introducing potential approaches to hinder I2P censorship attempts
using address-based blocking, based on the insights that we gained
from our network measurements.
2 BACKGROUND AND RELATED WORK
2.1 I2P: The Invisible Internet Project
2.1.1 Routing Mechanism. The Invisible Internet Project (I2P) [
74
]
is a message-oriented anonymous relay network consisting of peers
(also referred to as nodes, relays, or routers) running the I2P router
software, allowing them to communicate with each other. While
Tor [
10
] uses onion-routing-based [
20
,
56
] bidirectional circuits for
communication, I2P utilizes garlic-routing-based [
8
,
9
,
17
] unidirec-
tional tunnels for incoming and outgoing messages. An I2P client
uses two types of communication tunnels: inbound and outbound.
Therefore, a single round-trip request message and its response
between two parties needs four tunnels, as shown in Figure 1.
For simplicity, each tunnel is depicted with two hops. In practice,
depending on the desired level of anonymity, tunnels can be con-
gured to comprise up to seven hops [
25
]. New tunnels are formed
every ten minutes.
When Alice wants to communicate with Bob, she sends out mes-
sages on her outbound tunnel. These messages head toward the
gateway router of Bob’s inbound tunnel. Alice learns the address
of Bob’s gateway router by querying a distributed network data-
base [
34
] (discussed in more detail in Section 2.1.2). To reply to
Alice, Bob follows the same process by sending out reply messages
on his outbound tunnel towards the gateway of Alice’s inbound
tunnel. The anonymity of both Alice and Bob is preserved since
they only know the addresses of the gateways, but not each other’s
real addresses. Note that gateways of inbound tunnels are published,
while gateways of outbound tunnels are known only by the party
who is using them.
The example in Figure 1 illustrates a case in which I2P is used as
a self-contained network, with participating peers communicating
solely with each other. However, if Bob also provides an outproxy
service, Alice can relay her trac through Bob to connect to the
public Internet. The returned Internet trac is then securely relayed
back to Alice by Bob via his outbound tunnels, while Alice’s identity
remains unknown to both Bob and the visited destination on the
Internet.
Similar to Tor’s onion routing, when an I2P message is sent over
a tunnel (i.e., from the gateway to the endpoint of that tunnel), it is
encrypted several times by the originator using the selected hops’
public keys. Each hop peels o one encryption layer to learn the
address of the next hop where the message needs to be forwarded
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
Alice Bob
Outbound Tunnel
Outbound Tunnel
Inbound Tunnel
Inbound Tunnel
Gateway router Encrypted communicationEndpoint router
Figure 1: Basic communication between two I2P peers using
unidirectional tunnels [27].
to. When the message passes through an inter-tunnel (i.e., from an
outbound tunnel to an inbound tunnel), garlic encryption (i.e. ElGa-
mal/AES) is employed by the originator [
32
], adding an additional
layer of end-to-end encryption to conceal the message from the
outbound tunnel endpoint and the inbound tunnel gateway [27].
Unlike Tor, multiple messages can be bundled together in a single
I2P garlic message. When they are revealed at the endpoint of the
transmission tunnel, each message, called "bulb" [
17
] (or "clove" in
I2P’s terminology [
32
]), has its own delivery instructions. Another
major dierence between Tor and I2P is that all I2P nodes (except
hidden routers, discussed in Section 5.1) also participate in the
network as relays, routing trac for other nodes. In Figure 1, the
hops (denoted by boxed onions) forming the tunnels for Alice and
Bob correspond to actual I2P users. While routing messages for
Alice and Bob, these hops can also communicate with their intended
destinations in the same way Alice and Bob do. Similarly, Alice and
Bob can be chosen by other peers to participate in the tunnels these
peers will form.
2.1.2 Distributed Directory. The network database of I2P, called
netDb, plays a vital role in the I2P network by allowing peers to
query for information about other peers and hidden services. The
network database is implemented as a distributed hash table using
a variation of the Kademlia algorithm [
44
]. A newly joining peer
initially learns a small portion of the netDb through a bootstrapping
process, by fetching information about other peers in the network
from a set of hardcoded reseed servers. Unlike Tor directory author-
ities, these reseed servers do not have a complete view of the whole
I2P network. They are equivalent to any other peer in the network,
with the extra ability to announce a small portion of known routers
to newly joining peers.
Queries for the network database are answered by a group of
special oodll routers [
34
], which play an essential role in main-
taining the netDb. One of their main responsibilities is to store
information about peers and hidden services in the network in a
decentralized fashion using indexing keys (i.e. routing keys). These
keys are calculated by a SHA256 hash function of a 32-byte binary
search key which is concatenated with a UTC date string. As a
result, these hash values change every day at UTC 00:00 [
34
]. In the
current I2P design, there are two ways to become a oodll router.
The rst option is to manually enable the oodll mode from the
I2P router console. The other possibility is that a high-bandwidth
router could become a oodll router automatically after passing
several “health” tests, such as stability and uptime in the network,
outbound message queue throughput, delay, and so on.
The netDb contains two types of network metadata: LeaseSets
and RouterInfos. For instance, Bob’s LeaseSet tells Alice the contact
information of the tunnel gateway of Bob’s inbound tunnel. A
RouterInfo provides contact information about a particular I2P
peer, including its key, capacity, address, and port. To publish his
LeaseSets, Bob sends a DatabaseStoreMessage (DSM) message to
several oodll routers, which encapsulates his LeaseSets. To query
Bob’s LeaseSet information, Alice sends a DatabaseLookupMessage
(DLM) to those oodll routers.
2.2 Related Work
2.2.1 I2P Network Measurement. There have been only a few stud-
ies on monitoring I2P prior to this work. In 2011, Timpanaro et
al. [
68
] built their monitoring architecture on the Planet Lab testbed
to characterize the usage of the I2P network. Planet Lab is a net-
work consisting of voluntary nodes run by research institutes and
universities around the globe. Therefore, bandwidth and trac
policies of nodes running on this network are often restricted. As
acknowledged by the group, only 15 oodll routers could be set
up successfully due to the bandwidth rate restrictions of Planet
Lab, thus limiting the amount of collected data. The authors later
expanded their work to characterize the usage of I2P, particularly
the use of le-sharing applications in the network [66, 67].
In 2014, Liu et al. [
40
] reported that they could observe 25,640
peers per day over a period of two weeks using various methods
to discover the network topology. However, there are some issues
with the methodology that the authors used to collect RouterInfos,
which we will discuss in later sections. More recently, Jeong et
al. [
37
] reported leakage of .i2p domain name resolution queries
in the public DNS infrastructure. Russia, the USA, and China are
top countries of leakage sources. Gao et al. [
19
] conducted a study
on the popularity and availability of eepsites (I2P’s terminology for
anonymous websites). The authors claimed the discovery of 1,861
online eepsites, which made up over 80% all anonymous websites
in the I2P network.
2.2.2 Anonymous Communication Network Blockage. To the best
of our knowledge, there has been no prior work focusing on the
blocking resistance of I2P. Throughout this paper, we aim to shed
some light on this aspect of the network. Similar to Tor or any other
anonymous network, I2P is susceptible to blockage. Prior to this
study, there have been some commercial tools alleging to be able
to block I2P. However, to the best of our knowledge, despite the
range of techniques used by these tools, none are able to block I2P
eectively, or at least not to the degree that would be required for a
large-scale adoption (e.g., nationwide blocking). We briey review
some of these tools below.
In network management, rewall rules are often employed to
allow or lter out trac. Popular blocking techniques often base on
port number, protocol signature, and IP address. However, anonymity
networks, including Tor and I2P, are designed to withstand censor-
ship [
29
,
54
,
61
]. As a result, any attempts to block these networks
could cause considerable collateral damage.
For port-based censorship, blocking onion relay ports (orports) or
directory information exchange ports (dirports) is eective enough
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
to block Tor relays, and blocking UDP port 123 would prevent I2P
from functioning properly because the I2P router software needs
the Network Time Protocol (NTP) service to operate properly. Nev-
ertheless, many Tor relays have orports and dirports running over
port 80 (HTTP) or 443 (HTTPS), while many legitimate applications
also use port 123 for the NTP service. Furthermore, I2P is a P2P
network application that can run on a wide range of ports using
both UDP and TCP. More specically, I2P can run on any arbitrary
port in the range of 9000–31000 [
30
]. As a result, port blocking is
not ideal for large-scale censorship because it can unintentionally
block the trac of other legitimate applications.
As nationwide Internet censorship is growing worldwide, Deep
Packet Inspection (DPI) is widely used by various entities to detect
the trac pattern of connections to anonymity networks [
6
,
39
,
70
].
Regardless of the use of well-known ports (i.e., 80, 443), the traf-
c of connections to Tor entry relays is ngerprintable and easily
blocked by DPI- enabled rewall. Consequently, Tor’s pluggable
transports have been introduced to cope with this problem [
63
].
These pluggable transports make trac from a client to Tor bridges
look similar to other innocuous and widely-used trac. Similarly,
the design of I2P also obfuscates its trac to prevent payload-
analysis-based protocol identication. However, ow analysis can
still be used to ngerprint I2P trac in the current design because
the rst four handshake messages between I2P routers can be de-
tected due to their xed lengths of 288, 304, 448, and 48 bytes [
26
].
To solve this problem, the I2P team is working on the development
of an authenticated key agreement protocol that resists various
forms of automated identication and other attacks [35].
Tenable, a network security company, provides a rewall service
that contains some modules to detect I2P trac. Based on our
review of their guidelines, none of them seem to be ecient in
blocking I2P. For instance, one of the guidelines for detecting I2P
outbound trac is to manually inspect the system for any rogue
process [
59
], which may not be feasible for large-scale blocking
such as nationwide censorship.
SonicWALL, a company specialized in content control and net-
work security, suggests blocking I2P by ltering out both UDP and
TCP tunnel trac to block proxy access with their App Control [
53
].
However, this approach is not feasible at a large scale either, as
the company acknowledges that the approach may cause collateral
damage by unintentionally blocking other legitimate trac, such
as encrypted UDP, IPSec VPN, and other encrypted TCP trac.
A more eective approach is destination ltering. To implement
this approach, a censor has to compile a list of active I2P peer ad-
dresses and block access to all of them. This address-based blocking
approach will have a severe impact on the process of forming new
I2P tunnels, thus preventing users from accessing the I2P network.
Furthermore, a simpler but still eective way to prevent new users
from accessing I2P is to block access to I2P reseed servers, which
are required for the bootstrapping process. Consequently, rst-time
users will not be able to access the I2P network if they are not able
to fetch RouterInfos of other peers.
1
One of the goals of our work
is to evaluate the cost and the eectiveness of the address-based
blocking approach against I2P.
1
To cope with this problem, I2P has a method for “manual” reseeding of a router, which
we discuss in Section 6.1.
3 ETHICAL CONSIDERATIONS
Conducting research on anonymity networks comprising thousands
of users must be performed in a responsible manner that both
respects user privacy, and does not disrupt the operation of the
network. It also necessitates all collected data to be handled in a
careful manner [
51
]. Although I2P routers are run by individuals
who may actively use the I2P network for their own purposes, our
study does not involve any human subjects research, as it focuses
on studying the infrastructure provided by I2P. Our measurements
do not capture users’ trac or their online activities. We solely
measure network-level characteristics of the I2P network.
To conduct our measurements, we need to introduce and oper-
ate several additional routers into the live I2P network. This is a
standard approach in the context of studying anonymity networks,
as is evident by the many previous works that have followed it to
study the Tor network [
2
,
3
,
45
,
52
,
55
]. The I2P team also oper-
ates an I2P router to gather network information for development
purposes [
74
,
75
]. In particular, the
stats.i2p
website provides
network performance graphs to help the I2P developers with mon-
itoring the network and assessing the eectiveness of software
changes in each release.
The I2P community has come up with a set of guidelines [
33
] for
responsibly conducting research in the I2P network, to which we
strictly adhered. According to these guidelines, we were in close
contact with the I2P team regarding the purposes of our study and
our measurements. Adhering to the principle of minimizing the
collected data to only the absolutely necessary, we collect from
I2P’s netDb only each node’s IP address, hash value, and capacity
information available in RouterInfos. Finally, we securely delete all
collected data after statistically analyzing them. Only aggregated
statistics about the collected data are published.
One could consider the (temporary) collection of IP addresses
as a potential violation of user privacy. The topic of whether IP
addresses are Personally Identiable Information (PII) is controver-
sial across many jurisdictions [
38
]. As stated in Section 3.3.3 of the
Guide to Protecting the Condentiality of Personally Identiable
Information published by NIST [
15
], IP address not readily linkable
to databases or other sources that would identify specic individu-
als, are not considered as PII. Therefore, the IP addresses observed
in our measurements cannot be considered PII, since they are not
linkable to any other data collected throughout our experiments
that could be used to identifying any individuals. Note that the
current design of I2P does not hide the use of I2P from a user’s
Internet service provider (ISP)—the I2P router software only helps
to maintain the secrecy of messages and the anonymity between
peers. Nevertheless, we still need to analyze IP-related data in a
responsible manner that will minimize the risk of exposure to third
parties (before it is deleted). For instance, when mapping IP ad-
dresses to their geographic location, we do not query any public
APIs. Instead, we use a locally installed version of the MaxMind
Database to map them in an oine fashion.
While previous works intensively crawled reseed servers and
oodll routers to harvest the netDb [
40
], we only monitor the
network in a passive manner to avoid causing any interference or
unnecessarily overloading any I2P peers. I2P can be launched in a
virtual network mode for studies related to testing attacks on the
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
network [
33
]. However, experimenting on a virtual network does
not t our research goal, which is to estimate the population of I2P
peers and assess the network’s resistance to blockage.
We should note that throughout our study, we not only con-
tribute additional routing capacity to the I2P network, but also help
in maintaining the distributed network database. Considering only
the main experiment over a period of three months, each router
under our control is congured to contribute a shared bandwidth
of 8 MB/s in each direction, with an observed maximum usage of
5MB/s.
4 METHODOLOGY
Since I2P is a distributed network without any centralized authori-
ties, we need to take a black-box approach to answer our research
questions regarding the size of the I2P network and its resistance to
censorship. In practice, there are several ways for an adversary to
harvest I2P’s network database (netDb). For instance, one can keep
crawling the hard-coded reseed servers to fetch as many Router-
Infos as possible. However, to cope with such malicious activities,
reseed servers are designed so that they only provide the same set
of RouterInfos if the requesting source is the same. Nevertheless,
an adversary who has control over a large number of IP addresses
can still continuously harvest the netDb by crawling the reseed
servers from dierent IP addresses. Another way of harvesting
netDb information is to manipulate the netDb mechanism in an
aggressive manner through the DatabaseLookupMessage (DLM)
interface. Normally, peers that do not have a sucient amount of
RouterInfos in their netDb and peers that need to look up LeaseSets
will send a DLM to oodll routers to request more RouterInfos
and LeaseSets. Making use of this mechanism, adversaries could
modify the source code of the I2P router software to make their
I2P clients repeatedly query oodll routers to aggressively gather
more RouterInfos.
For the purposes of our research, the above approaches are im-
practical and even unethical. Although one of the goals of this
paper is to estimate the population of I2P peers, which requires us
to also collect as many RouterInfos from the netDb as possible, we
need to conduct our study in a responsible manner. Our principle
is that experiments should not cause any unnecessary overheads
or saturate any resources of other I2P peers in the network. Liu et
al. [
40
] showed that crawling reseed severs only contributes 7.04%
to the total number of peers they collected, while manipulating the
netDb mechanism only contributes 30.18%.
Therefore, we choose an alternative method, and opt to conduct
our experiments in a passive way by operating several routers that
simply observe the network. The primary goal of our experiments
is to investigate how many I2P routers one needs to operate and
under what settings to eectively monitor a signicant portion of the
I2P network with the least eort. In order to avoid the bandwidth
limitation of prior studies [
68
], all of our experiments are conducted
using dedicated private servers instead of research infrastructure
shared with other researchers.
4.1 Machine Specications
Since there is no ocial guideline on how to operate a high-prole
I2P router, we employ a best-eort approach to determine what
12345678910
Day
10K
11K
12K
13K
14K
15K
16K
17K
Observed peers
Floodfill Non-floodfill
Figure 2: Number of peers observed during our initial ex-
periment for assessing the impact of dierent hardware and
software congurations.
specications are sucient to observe a signicant amount of other
I2P routers. Specications of interest include the hardware congu-
ration of the hosting machine (e.g., CPU, RAM) and conguration
parameters of the I2P router software (e.g., shared network band-
width, maximum number of participating tunnels, size of heap
memory for the Java virtual machine). Note that the ocial I2P
router software is written in Java. This is a necessary step in order
to understand the I2P software behavior. For example, increasing
the number of connections allowed to a router, without tuning the
available Java heap space, can result in errors that will force a router
to restart. Similarly, if CPU is not adequate, a router might drop
connections, block, or increase latency. These are all situations un-
der which a router would be penalized by the I2P ranking algorithm
and therefore have less chances of being chosen to participate in
peers’ tunnels. Consequently, a router that is not ne-tuned will
have less visibility into the I2P network than one that can maintain
a high service quality. We empirically investigate the upper bounds
of a system’s specications to decide the resources we will need to
dedicate to our hosts.
Intuitively, we know that a higher-prole router will observe
a larger number of RouterInfos. We rst run an I2P router using
a high-end machine with a 10-core 2.40 GHz CPU and 16 GB of
RAM. The shared bandwidth of this router is then set to 8 MB/s
because the built-in bloom lter of the I2P router software is limited
to 8 MB/s. The maximum number of participating tunnels is set
to 15K, and 10 GB is allocated to the heap memory for the Java
virtual machine. After running this router for 10 days, ve days in
each mode (i.e., oodll and non-oodll), we make the following
observations:
•Total CPU usage always stays in the range of 4–5 Ghz.
•
Memory usage stays in the range of 3–4 GB most of the time.
•The highest observed bandwidth usage is 5 MB/s.
•
The number of participating tunnels stays at around 4K,
while the highest observed number is approximately 5.5K
tunnels.
•
All of the maximum values above are observed when oper-
ating in the non-oodll mode.
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
128 256 1K 2K 3K 4K 5K
Shared bandwidth (KB/s)
10K
11K
12K
13K
14K
15K
16K
17K
18K
19K
Observed peers
both floodfill non-floodfill
Figure 3: Number of I2P peers observed when operating 14
nodes (7 in oodll and 7 in non-oodll mode) using an
increasing amount of shared bandwidth.
As shown in Figure 2, although the number of peers observed
during the non-oodll mode is slightly higher than in the oodll
mode, it constantly remains around 15–16K. Note that a peer is
dened by a unique hash value encapsulated in its RouterInfo.
Based on these observations, we set up the (virtual) machines used
for our subsequent experiments with the following upper-bound
specications:
•Three 2.4 GHz CPU cores totalling 7.2 GHz.
•
Five GB of RAM, four of which are allocated to the heap
memory of the Java virtual machine and one for the rest of
the system.
•
The maximum number of participating tunnels is set to 10K.
•
The maximum shared bandwidth is set to 8 MB/s, according
to the maximum limit of the built-in bloom lter of the I2P
router software.
4.2 Floodll vs Non-oodll Operation
Although Figure 2 shows that the number of peers observed in non-
oodll mode is slightly higher than in oodll mode, it is possible
that this dierence is the result of a uctuation in the number of
daily peers during the study period. Therefore, we operated another
14 routers in both oodll and non-oodll mode simultaneously to
prevent any potential uctuation in the number of daily peers from
aecting our observations. These 14 routers are divided into two
groups: non-oodll and oodll, with seven routers in each group.
For the routers in each group, we gradually increase the shared
bandwidth as follows: 128 KB/s, 256 KB/s, 1 MB/s, 2 MB/s, 3 MB/s,
4 MB/s, and 5 MB/s. We pick 128 KB/s as the lowest bandwidth
because it is the minimum required value for a router to be able
to gain the oodll ag [
34
], while the highest value is based on
the highest bandwidth usage observed in our previous experiment
(Section 4.1). We run these routers on machines with hardware
specications described earlier.
Figure 3 shows that oodll routers with shared bandwidth
lower than 2 MB/s observe 1.5–2K more peers than non-oodll
routers that have the same shared bandwidth. On the other hand,
non-oodll routers with shared bandwidth greater than 2 MB/s
1 5 10 15 20 25 30 35 40
Routers under our control
0K
3K
6K
9K
12K
15K
18K
21K
24K
27K
30K
33K
Observed peers
Figure 4: Cumulative number of peers observed by operating
1–40 routers.
observe about 1–1.5K more peers than oodll routers of the same
shared bandwidth. However, it is interesting that when combining
data from each pair of routers with the same shared bandwidth, the
total number of observed peers (upper line in the graph) stays at
around 17–18K, regardless of the dierence in shared bandwidth
and the number of observed peers in each mode. To explain this
behavior, we rst identify the four primary ways I2P peers can
learn about other peers in the network:
•
As part of the bootstrapping process, a newly joined peer
fetches RouterInfos from a set of hardcoded reseed servers
to learn a small portion of peers in the network. Based on
logs provided by the I2P router console, a newly joined peer
fetches around 150 RouterInfos from two reseed servers
(roughly 75 RouterInfos from each server).
•A router that does not have enough RouterInfos in its local
storage sends a DLM to oodll routers to ask for more
RouterInfos.
•
An active router is selected by other peers to route trac
for them. This way, the router learns about other adjacent
routers in tunnels that it participates in. The higher the
specications a router has, the higher the probability that it
will be selected to participate in more tunnels.
•
A oodll router receives RouterInfos published by other
“nearby” non-oodll routers or by other oodll routers via
the ooding mechanism. The “nearby” distance is calculated
based on the
XOR
distance between the indexing key of two
routers. The ooding mechanism is used when a oodll
router receives a DatabaseStoreMessage containing a valid
RouterInfo or LeaseSet that is newer than the one previously
stored in its local NetDb. In that case, the oodll router
“oods” the netDb entry to three others among its closest
oodll routers [34].
We attribute the observed behavior to the last two of the above
mechanisms, as they are the main ways in which our routers learn
about other peers in the network. Since the two groups of routers
used interact with the network in dierent ways, each group obtains
a particular view of the network from a dierent angle, which the
other group could not observe. As a result, aggregating their data
together gives us a better view of the overall network. In summary,
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
from this experiment we learn that it is important to operate routers
in both non-oodll and oodll modes. By combining dierent
viewpoints, we can gain a more complete view of the network.
4.3 Number of Routers
Next, we investigate how many routers we need to run to observe
a signicant part of the network. Prior to this work, Liu et al. [
40
]
used various methods to harvest the netDb: crawling the reseed
servers repeatedly, sending DLM continuously to other oodll
routers, and running both oodll and non-oodll routers. The
authors claim the discovery of 94.9% of all routers in the network
by comparing their collected data with the
stats.i2p
statistic
website [
75
]. However, as we have conrmed with the I2P team,
the provided statistics cannot be considered as ground truth. This
is because the statistics are collected only from an average non-
oodll router (i.e., not high bandwidth). Furthermore, reported
results are plotted using data collected over the last thirty days,
but not on a daily basis. More recently, Gao et al. [
19
] operated
40 oodll routers to collect LeaseSets and claimed the discovery
of more than 80% of all “hidden” eepsites. However, it is not clear
which hardware and software combination was used for operating
those routers. More importantly, as we are interested in gathering
RouterInfos but not LeaseSets, operating all routers in a single
mode (i.e., oodll or non-oodll) is not ideal (see our discussion
in Section 4.2).
Therefore, we choose to run a total of 40 routers equally divided
between both modes (oodll and non-oodll). Each router is
hosted on a machine with the specications dened in Section 4.1.
As RouterInfos are written to disk by design so that they are avail-
able after a restart [
34
], we keep track of the netDb directory where
these records are stored. Note that although there is an expiration
eld in the data structure of RouterInfo, it is not currently used [
28
].
That means the actual active time of a peer is unknown. In other
words, the existence of a given RouterInfo only indicates the pres-
ence of the corresponding peer in the network, but it does not
provide an indication about until when a peer was active.
Since oodll routers apply a one-hour expiration time for all
RouterInfos stored locally, we choose to monitor the netDb direc-
tory on an hourly basis to capture any new RouterInfo. Every 24
hours we clean up the netDb directory to make sure that we do not
count inactive peers on the next day. After running these routers
for ve days, we calculate the cumulative number of peers observed
daily across 40 routers.
Figure 4 shows that operating 40 routers can help us observe
about 32K peers in the network. The number of observed peers has
a logarithmic relation to the number of routers under our control.
The gure also shows that the number of observed peers increases
rapidly when increasing the number of routers from one to 20,
and then increases slowly and converges to about 32K. In fact, the
aggregated number of observed peers from operating 20 routers
already gives us 95.5% (i.e., more than 30.5K peers) of the total
number of observed peers. Beyond 35 routers, each added router
only contributes the observation of an extra 10–30 peers. Therefore,
we conclude that 20 routers are sucient for obtaining a good view
of the I2P network.
02/01/18
02/15/18
03/01/18
03/15/18
03/29/18
04/12/18
04/26/18
Date
0K
4K
8K
12K
16K
20K
24K
28K
32K
Observed peers/IPs
routers
all IP
IPv4
IPv6
Figure 5: Number of unique peers and IP addresses.
5 NETWORK MEASUREMENT
Taking the observations made in Section 4 into consideration, we
conducted our measurements by operating 20 routers using the
machine specications dened in Section 4.1. These routers consist
of 10 oodll and 10 non-oodll routers. We collected RouterIn-
fos observed by these routers for a period of three months (from
February to April, 2018).
5.1 Population of I2P Peers
Figure 5 shows the number of unique I2P peers and IP addresses,
including both IPv4 and IPv6, observed during the three-month
period. The number of daily peers remains stable at around 30.5K.
Note that an I2P peer is identied by a cryptographic identier,
which is a unique hash value encapsulated in its RouterInfo. This
identier is generated the rst time the I2P router software is in-
stalled, and never changes throughout its lifetime.
For the number of unique IP addresses, we count all unique
IPv4 and IPv6 addresses (if supported by an I2P router) on a daily
basis. Given that some peers frequently change their IP address, as
we discuss in Section 5.2.2, one would expect the total number
of unique IP addresses to be higher than the number of peers.
However, as shown in Figure 5, the total number of IP addresses
is noticeably lower than the number of peers. By analyzing the
collected RouterInfos, we identied a large number of I2P peers
whose RouterInfos do not have a valid IP address eld. In other
words, the public IP addresses of these peers are unknown. We then
analyzed other elds in the RouterInfo of these peers and discovered
that there are two subgroups of peers within the group of unknown-
IP peers. These are rewalled and hidden peers. Firewalled peers
are operated behind NAT or strict rewall congurations. Hidden
peers only use other peers to route their trac but do not help other
peers to route trac since they do not publish their IP address in
the network database. By default, peers located in countries with
poor Press Freedom scores (i.e., greater than 50) [
48
,
73
] are set to
hidden. However, this setting can be modied to expose the peer to
the rest of the network to benet a better integration, thus better
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
02/01/18
02/15/18
03/01/18
03/15/18
03/29/18
04/12/18
04/26/18
Date
0K
3K
6K
9K
12K
15K
Observed peers
unknown-IP
firewalled
hidden
overlapping
Figure 6: Number of peers with unknown IP addresses.
performance. We classify these two groups by examining the IP
address eld of introducers in each RouterInfo le.
I2P provides a way for peers behind NAT or rewalls to commu-
nicate with the rest of the network, using third-party introduction
points (aka introducers) [
31
]. An I2P peer (e.g., Bob) who resides be-
hind a rewall that blocks unsolicited inbound packets, can choose
some peers in the network to become his introducers. Each of these
introducers creates an introduction tag for Bob. These tags are
then made available to the public as a way to communicate with
Bob. Having Bob’s public tags, another peer (e.g., Alice) sends a
request packet to one of the introducers, asking it to introduce her
to Bob. The introducer then forwards the request to Bob by includ-
ing Alice’s public IP and port number, and sends a response back
to Alice, containing Bob’s public IP and port number. Once Bob
receives Alice’s information, he sends out a small random packet
to Alice’s IP and port, thus punching a hole in his rewall for Alice
to communicate with him.
By examining the IP address eld of the introduction points in
RouterInfos, we can dierentiate between rewalled and hidden
peers. A rewalled peer has information about its introducers em-
bedded in the RouterInfo, while a hidden peer does not. Figure 6
shows the number of peers in each group. In total, there are more
than 15K unknown-IP peers per day, which consist of roughly 14K
rewalled peers and 4K hidden peers. Between these two groups,
there are about 2.6K overlapping peers. In other words, there are
2.6K I2P peers per day that have their status changing between
rewalled and hidden.
5.2 Churn Rate
I2P is a dynamic P2P network in which peers come and leave fre-
quently. Prior to this work, Timpanaro et al. [
65
] conducted the rst
churn study of I2P and reported the probability of an I2P peer going
oine after 30 minutes to be around 15%. However, the experiment
was conducted for only ve days, and only eight oodll routers
were deployed. Liu et al. [
40
] ran their experiment for around two
weeks and reported that 19.03% of the collected peers survived for
10 20 30 40 50 60 70 80
Number of days
0
20
40
60
80
100
Percentage
intermittently continuously
Figure 7: Percentage of peers that we see in the network con-
tinuously or intermittently for ndays.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Number of IP addresses
0K
10K
20K
30K
40K
50K
60K
Observed peers
0
10
20
30
40
50
Percentage
Figure 8: Number of IP addresses I2P peers are associated
with.
one day, while 48.66% of them survived more than seven days. Over-
all, these works were conducted over a short period of time and on
a small scale, providing an incomplete view of the churn rate of
the I2P network. Moreover, none of the previous studies mentioned
the address changing phenomenon of peers in the network, which
often happens due to the fact that most ISPs do not usually allocate
a static IP address to residential Internet connections. In this section,
we analyze the collected RouterInfos to ll these research gaps.
5.2.1 Peer Longevity. Figure 7 illustrates the churn rate of I2P
peers during our three-month measurement. As shown in Figure 7,
the percentages of peers staying in the network for more than
seven days are 56.36% (continuously) and 73.93% (intermittently).
That percentages of peers online longer than 30 days are 20.03%
(continuously) and 31.15% (intermittently). Although I2P is a purely
distributed and dynamic P2P network, these results imply that
more than half of the peers stay stably in the network more than
a week. Compared with the churn rate of 48.66% in 2014 [
40
], our
ndings of both continuous and intermittent churn rates show that
the network is becoming more stable.
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
5.2.2 IP Address Churn. Since most ISPs do not allocate a static
IP address for residential Internet connections, it is common for
peers to be associated with more than one IP address. As shown
in Figure 8, there are 63K peers that are associated with a single IP
address (45% of known-IP peers), while more than 76K known-IP
peers (55%) are associated with at least two IP addresses. Moreover,
we notice a small group of 460 peers that are associated with more
than a hundred IP addresses during a period of three months, occu-
pying 0.65% of the total number of known-IP peers. We characterize
this phenomenon in Section 5.3.2 when we study the geographic
distribution of I2P peers.
5.3 Peer Distribution
Peers in the I2P network are classied with dierent capacity ags
based on their (1) operating mode (oodll vs. non-oodll), (2)
reachability (whether or not they are reachable by other peers), and
(3) shared bandwidth [
34
]. These capacity ags, denoted by a single
capital letter, are stored in the RouterInfo le of each peer. We are
interested in understanding the percentage of each peer type in
the I2P network. Prior to this study, Liu et al. [
40
] analyzed the
distribution of I2P peers across countries. However, the multiple IP
addresses phenomenon necessitates a more thorough approach for
analyzing peers that change address frequently. As mentioned in
Section 5.2.2, more than half of the known-IP peers are associated
with two or more IP addresses. In this section, we analyze two
aspects of I2P peers: capacity and geographic distribution.
5.3.1 Peer Capacity Distribution. Capacity ags are used by peers
in the network for basic decisions, such as peer selection for creating
tunnels, and oodll router selection for submitting RouterInfo and
LeaseSet information. The status of a peer is determined as follows:
•
A oodll router is denoted by an fag in its capacity eld,
while a non-oodll router does not have this ag.
•
The estimated shared bandwidth range of a peer is indicated
by one of seven available letters:
K
,
L
,
M
,
N
,
O
,
P
, and
X
, which
correspond to less than 12KB/s, 12–48 KB/s, 48–64 KB/s, 64–
128 KB/s, 128-256 KB/s, 256-2000 KB/s, and more than 2000
KB/s, respectively.
•
The reachability of a peer is dened by
R
(reachable) or
U
(unreachable).
For example, the
OfR
ags found in the capacity eld of a peer,
mean that the peer is a reachable oodll router with a shared band-
width of 128–256 KB/s. Analyzing these capacity ags provides us
a better understanding of peer capacity distribution in the network,
and allows us to accurately estimate the total amount of peers in
the network.
Our analysis in Figure 9 shows that
L
-agged peers are the most
dominant in the network, with an average of about 21K peers per
day. This result complies with the fact that the
L
ag is the default
shared bandwidth of the I2P router software. With more than 9K
peers on a daily basis,
N
is the second most dominant peer type.
P
,
X
,
O
,
M
, and
K
peers have an average of 2.1K, 1.8K, 875, 400, and
360 peers per day, respectively. In terms of operation mode, we ob-
served an average of 2.7K oodll peers per day, which corresponds
to 8.8% of all peers observed. Regarding peer reachability, the num-
bers of both reachable and unreachable peers are almost the same
most of the time, at around 15–16K. In other words, reachable and
K L M N O P X
Shared bandwidth capacity
0K
3K
6K
9K
12K
15K
18K
21K
Observed peers
Figure 9: Capacity distribution of I2P peers.
Bandwidth Floodll Reachable Unreachable Total
<12 KB/s K0.10 1.14 1.27 1.18
12–48 KB/s L26.82 66.62 75.81 69.67
48–64 KB/s M2.16 1.44 1.24 1.31
64–128 KB/s N62.06 36.79 26.08 29.74
128–256 KB/s O5.18 3.15 2.88 2.87
256–2000 KB/s P15.97 7.72 6.64 7.05
>2000 KB/s X13.76 6.44 5.49 5.76
Table 1: Percentage of routers in dierent bandwidths, based
on their oodll, reachable, and unreachable status.
unreachable peers occupy roughly half of the network each. Note
that unreachable peers include the unknown-IP peers discussed in
Section 5.1.
We further analyze the bandwidth capacity distribution of each
group: oodll, reachable, and unreachable. As shown in Table 1,
while reachable and unreachable groups have a similar capacity
distribution to the whole network in which
L
-agged type is the
most dominant and
N
-agged type is the second, the oodll group
has the
N
-agged type as the most dominant, and the
L
-agged type
comes second.
Note that the sum of all ags is not equal to 100% for two reasons:
(1) the uctuation in the bandwidth of a peer can frequently change
its capacity ag, and (2) for backwards compatibility with older
software versions, a peer may publish more than one bandwidth
letter at the same time [
34
]. More specically,
P
and
X
ags are
added since version 0.9.20, and they override the previous highest
bandwidth ag (
O
ag). In order for older versions of the I2P router
software to function normally, a peer with a
P
or an
X
ag also has
an Oag in its capacity eld.
Within the oodll group, the total percentage of
P
and
X
peers
is around 30%, greater than the percentage of
L
-agged peers. The
result aligns with the fact that the oodll mode is only enabled
automatically on peers that are congured with high bandwidth
limits. The current minimum requirement for a oodll router is
128 KB/s of shared bandwidth. With the current rules for automatic
oodll opt-in, a peer needs to have at least an
N
ag in order
to become a oodll router automatically [
34
]. However, Table 1
shows that there is a group of oodll routers with lower shared
bandwidth than required. This group includes
K
,
L
, and
M
-agged
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
US
RU
GB
FR
CA
AU
DE
NL
BR
IT
ES
IN
CN
JP
UA
SE
BE
CH
PL
ZA
0K
4K
8K
12K
16K
20K
24K
28K
Observed peers
0
10
20
30
40
50
60
Cumulative percentage
Figure 10: Top 20 countries where I2P peers reside.
peers, which together comprise roughly 30% of all oodll routers
observed. This contradiction is due to the fact that operators can
force their routers to operate in oodll mode by manually turning
on this option in the router console. As a consequence, the qualied
oodll routers are only routers with a sucient shared bandwidth
to serve the netDb mechanism (i.e., N,O,P, and X-agged routers).
Based on the above observation about oodll routers, we deem
those
K
,
L
, and
M
-agged oodll routers to be manually enabled
and unqualied oodll routers. We recompute the number of qual-
ied oodll routers by combining the sets of N,O,P,Xpeers, and
removing any peers that overlap with the sets of
K
,
L
,
M
peers. Based
on this calculation, 71% of the total oodll routers observed are
purely
N
,
O
,
P
, or
X
-agged. Consequently, the number of qualied
oodll routers should be 2700
×
0
.
71
=
1
,
917 routers. However,
among these qualied oodll routers, there are also high-prole
oodll routers that are manually enabled like ours. Therefore,
the amount of oodll routers that are automatically enabled after
meeting all of the “health” requirements must be less than 1,917
routers, which matches the estimated number (i.e. around 1,700)
given on the ocial I2P website as of April, 2018 [34].
According to independent observations by I2P developers on the
ocial I2P website, approximately 6% of the peers in the network
are oodll routers [
34
], but not 8.8% as found above. We show
that this dierence is the result of unqualied oodll routers,
which are manually enabled and do not actually meet the minimum
bandwidth requirements. Based on the percentage of “automatic”
oodll routers in the network (i.e., 6%), the population of I2P peers
is calculated as 1
,
917
÷
0
.
06
=
31
,
950, approximately. This result
strengthens our hypothesis and observation from Section 4.3, that
running 40 routers allowed us to observe around 32K peers in the
network. Evidently, we can conclude with condence that using 20
routers one can monitor more than 95.5% of the I2P network.
5.3.2 Geographic Distribution. Next, we utilize the MaxMind Data-
base to map addresses of I2P peers to their autonomous system
number (ASN) and country. Since about half of the observed peers
are associated with more than one IP address, as discussed in Sec-
tion 5.2.2, we need a proper way to count the number of peers
residing in each ASN/country. For each peer associated with many
IP addresses, we resolve these IP addresses into ASNs and countries
7922
9009
7018
5089
12389
12322
1221
3215
46562
6830
2856
20473
3320
20115
5607
701
22773
36351
20001
3269
0K
1K
2K
3K
4K
5K
6K
7K
8K
Observed peers
0
5
10
15
20
25
30
35
Cumulative percentage
Figure 11: Top 20 autonomous systems where I2P peers re-
side (the x axis corresponds to the AS number).
before counting them to avoid counting two dierent IP addresses
belonging to one peer. If two IP addresses of the same peer reside
in the same ASN/country, we count the peer only once. Otherwise,
each dierent IP is counted.
Figure 10 shows the top 20 geographic locations of I2P peers.
United States, Russia, England, France, Canada, and Australia oc-
cupy more than 40% of peers in the network. The United States tops
the list with roughly 28K peers. Except for New Zealand, all Five
Eyes countries [
36
] are in the top 10. This group of 20 countries
makes up more than 60% of the total number of peers observed,
while the rest is made up of peers from 205 other countries and
regions. Among 32 countries with poor Press Freedom scores (i.e.
greater than 50) [
48
], there are 30 countries with a combined total
of 6K I2P peers. China leads the group with more than 2K peers.
Singapore and Turkey follow with about 700 and 600 peers observed
in the network, respectively.
Since China actively blocks access to Tor [
13
,
69
] and VPN [
4
,
5
],
a portion of Chinese users seem to use the I2P network instead. The
number of Chinese users may be expected to increase if more out-
proxies become steadily available in the network. Although China
is one of the countries where I2P peers are congured to be in
hidden mode by default [
48
,
73
], a router operator can always turns
o this setting to make his router more reachable, thus improving
performance.
Figure 11 shows 20 autonomous systems from which most ad-
dresses originate. AS7922 (Comcast Cable Communications, LLC)
leads the list with more than 8K peers. Together these 20 ASes make
up more than 30% of the total number of peers observed.
As mentioned in Section 5.2.2, 58.9% of peers change their ad-
dress at least once. We are also interested in analyzing this change
in terms of the geographic distribution of these peers. By mapping
their IP addresses to ASN and country, we nd that most peers stay
in the same autonomous system or the same geographic region
in spite of their association with multiple IP addresses. This ob-
servation is reasonable given that although ISPs frequently rotate
dierent IP addresses dynamically for residential Internet connec-
tions, these addresses often belong to the same subnet. However,
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
12345678910
Number of autonomous systems
0K
20K
40K
60K
80K
100K
120K
Observed peers
0
20
40
60
80
100
Percentage
Figure 12: Number of autonomous systems in which
multiple-IP peers reside.
we notice a small portion of peers changing their IP addresses re-
peatedly between dierent autonomous systems and countries. The
highest number of autonomous systems that a peer associates with
is 39, while the highest number of countries in which a peer resides
in is 25. Figure 12 shows the number of autonomous systems in
which I2P peers reside in. More than 80% of peers only associate
with one ASN, while 8.4% of peers are associated with more than
ten dierent ASes. Based on a discussion with one of the I2P de-
velopers, one of the possible reasons for this phenomenon is that
some I2P routers could be operated behind VPN or Tor servers,
thus being associated with multiple autonomous systems. Note that
users of Tails [
57
] (until version 2.11) could use I2P over Tor as one
of the supported features.
A limitation of using MaxMind is that when mapping IP ad-
dresses to ASNs and countries, there are around 2K addresses that
we could not resolve using this dataset. Nonetheless, this does not
mean that we could not identify 2K peers. Our results in Section 5.2.2
show that more than 55% of known-IP peers are associated with
more than one IP address. Therefore, the actual number of peers
whose ASN and country we could not identify are just those peers
that are associated with only one IP address we could not resolve.
As mentioned in our discussion of ethical considerations, we do not
use any of the more accurate public APIs on the Internet to resolve
these IP addresses for privacy reasons.
6 CENSORSHIP RESISTANCE
Due to the centralized network architecture of Tor, it is relatively
easy for a censor to nd and block all public Tor routers. To cope
with this blocking susceptibility, several studies have aimed to
enhance the blocking resistance of Tor [
13
,
43
,
69
,
71
]. Despite its
decentralized design, I2P is also susceptible to censorship, but, to
the best of our knowledge, its resistance to censorship has not been
extensively studied—we focus on this aspect in this section.
6.1 Reseed Server Blocking
Knowing the bootstrapping mechanism of I2P, a censor can easily
block access to the reseed servers to disable the I2P bootstrapping
process. As a consequence, reseed servers present a single point
of blockage, similarly to Tor’s directory servers (e.g., as was the
case when they were blocked from China in 2009 [
60
]). Given the
current design of I2P, a new peer cannot connect to the rest of the
network if it cannot bootstrap via some reseed servers.
In April 2017, there was a post on the I2P developer forum report-
ing that reseed servers were blocked in China [
49
]. We attempted to
test the reachability of hardcoded reseed servers from some of our
vantage points hosted inside China and found that some of them
were still accessible. Moreover, the analysis in Section 5.3 shows that
China is among the top-20 countries where most I2P peers reside.
A previous study [
14
] shows two possibilities for our observation.
First, the report could be a case of small-scale blocking conducted
at provincial ISPs, but not a uniform nationwide blockage. Second,
the Great Firewall of China (GFW) sometimes fails to block access
to destinations that it normally blocks. It is worth noting that the
current I2P network can only be used as a self-contained network
most of the time due to the intermittent availability of outproxies.
In addition, because the network is still small, it probably has not
yet become a target of censorship by the GFW. However, once the
network grows larger with more stable support of outproxies to the
Internet, large-scale blocking is unavoidable.
The I2P developers have foreseen a situation in which all reseed
servers are blocked. Thus, a built-in function of the I2P router soft-
ware is provided to allow for manual reseeding. With this feature,
every active I2P peer can become a manual reseeder. Specically,
the function can be used to create a reseed le called
i2pseeds.su3
.
The le can then be shared with other peers that do not have access
to any reseed servers for the bootstrapping process. The sharing
can be done via a secondary channel, similar to how Tor distributes
bridge nodes (e.g., emails, le-sharing services). Under this circum-
stance, a censor who wants to prevent local users from accessing
I2P has to nd and block all addresses of active I2P peers. How-
ever, since I2P is a distributed P2P network, it is challenging to
obtain a complete view of the whole network. We investigate the
eectiveness and the eciency of this blocking approach next.
6.2 Probabilistic Address-Based Blocking
We begin by considering a censor who tries to monitor the network
and gather information about active peers (i.e., IP address and port),
thus being able to prevent local users from accessing the network.
We then evaluate the blocking resistance of an I2P peer and the
usability of the I2P network under aggressive blocking pressure.
6.2.1 Seing. The probabilistic blocking model comprises (1) a
group of monitoring routers operated by a censor (e.g., ISP, gov-
ernment) and (2) a victim whom the censor wants to prevent from
accessing I2P. By operating some routers in the network, the censor
can acquire information about a large portion of potential peers
that the victim may need to contact in order to access the network,
thus being able to prevent the victim from accessing the network.
The blocking rate is then calculated by the rate of peer IP addresses
seen in the netDb of the victim, which can also be found in the
netDb of routers that are controlled by the censor.
6.2.2 Blocking Resistance Assessment. We consider a long-term
I2P node who has been participating in the network and has many
RouterInfos in its netDb, which is about to be blocked. To simulate
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
2 4 6 8 10 12 14 16 18 20
Routers under our control
60
65
70
75
80
85
90
95
100
Blocking rate (%)
1 day
5 days
10 days
20 days
30 days
Figure 13: Blocking rates under dierent blacklist time win-
dows.
the censor, we use IP addresses of daily active peers observed by 20
routers under our control. For the victim, we run an independent
router outside the network that we use to host our 20 routers.
The blue line (lowest) in Figure 13 shows the cumulative success-
ful blocking rate of an adversary obtained by running 1–20 routers
for one day. By operating 20 routers in the network, a censor can
block more than 95% of peer IP addresses known by the victim,
while 90% can be blocked with just six routers.
The above blocking rate is calculated based on the assumption
that the censor only uses IP addresses collected on a single given
day. However, the actual situation could be even worse. Previous
studies on Tor have shown that once an IP address is found to be
joining an anonymous communication network or participating
in other types of network relays (e.g., VPN servers), it may get
blacklisted for several days, and sometimes even for more than a
month [
16
,
52
]. We utilize the results obtained from the churn rate
analysis in Section 5.2 to examine how blocking can be more severe
if the IP blacklist time window expands to a period of 5, 10, 20, or
30 days.
We nd that if the censor expands the blacklist time window
from one to ve days, the blocking rate increases to more than
97% with 20 routers, or 95% with only 10 routers. Moreover, if the
blacklist time windows expands to a period of 10, 20, and 30 days,
the blocking rates increase to above 98% with 20 routers, and about
96% with only 10 routers.
As shown in Figure 13, ve days would be sucient to achieve a
high blocking rate. This is within the capabilities oered by high-
end rewalls used for nationwide censorship, which can easily keep
such a large number of rules.
6.2.3 Network Usability Evaluation. Since the address-based block-
ing implemented in the GFW of China uses the null routing tech-
nique to route unwanted packets to a black-hole router, we cong-
ure our upstream router to silently drop all packets that contain
peer IP addresses that we observed from the I2P network. We then
set up three testing eepsites to test the impact of the address-based
blocking to the page load time. These eepsites are designed with a
0
65
67
69
71
73
75
77
79
81
83
85
87
89
91
93
95
97
Blocking rate (%)
0
20
40
60
80
100
Timed out requests (%)
0
10
20
30
40
50
60
Page load time (s)
Figure 14: Percentage of timeout requests and page load la-
tency in the presence of blockage.
simple and small html le to avoid wasting bandwidth of the overall
network. In addition, we conduct the test on our own eepsites in-
stead of publicly known eepsites to make sure that our experiment
does not disrupt legitimate users of those eepsites. We rst crawl
our eepsites to test their average normal load time. The result in
Figure 13 shows that a censor can block about 65% to 98% of peer
addresses found in a victim’s netDb. We then crawl these eepsites
10 times for each blocking rate applied, measure the page load time,
and count the number of timed out requests (i.e., an HTTP 504 is
returned).
Figure 14 shows that the average load time of our eepsites is 3.4
seconds without blockage. By blocking other peers with a rate of
65%, a censor could already introduce a latency of more than 20
seconds to the page load time and make 40% of requests timed out.
Any blocking rates in the range of 70–90% could cause a signi-
cantly higher latency in page load time (i.e., more than 40 seconds),
with the number of timed out requests occupying more than 60%
of total requests. Blocking rates higher than 90% heavily depreciate
the usability of the network, with 95–100% of requests timed out.
7 DISCUSSION
7.1 Potential Solutions to Blocking
Since more and more oppressive regimes attempt to prevent local
users from accessing the Tor network, Tor provides users in such
restricted regions with a set of special relays called bridges [
61
].
Similarly, I2P can adopt the use of bridges to help those restricted
users to access the network, along with a non-ngerprintable trac
pattern currently in development [
35
]. While the Tor community
may have a dicult time recruiting bridges because new bridges
are often found and blocked quickly [
13
], I2P has a higher potential
to adopt the use of bridges because of the high churn rate of its
dynamic and decentralized network.
Despite the high blocking rates shown in Section 6.2, we notice
a portion of peer IP addresses could not be blocked. These IP ad-
dresses often belong to newly joined peers. Therefore, a potential
solution is to use these peers as bridges for restricted users. Since
these peers are newly joined, they are less likely discovered and
blocked immediately by the censor.
Utilizing newly joined peers as bridges, however, may only be
suitable for censored users who need to access I2P for a short period
Measuring the I2P Anonymity Network and its Censorship Resistance IMC ’18, October 31-November 2, 2018, Boston, MA, USA
of time. If the peers stay in the network long enough, they will
be discovered by the monitoring routers of the censor and eventu-
ally will be blocked. A potential approach to remedy this problem
is to use newly joined peers in combination with the rewalled
peers discovered in Sections 5.1 for a more sustainable censorship
circumvention.
According to Figure 6, there are around 14K rewalled peers in
the network on a daily basis. Without a public IP address, the censor
cannot apply the address-based blocking technique introduced in
Section 6.2. In the current I2P design, the chance that a censor
can discover the IP address of these rewalled peers depends on
the probabilities that the routers under the censor’s control (1) are
selected to be introducers for these peers, and (2) they directly
interact with these rewalled peers.
Except for implementing an infrastructure to collect and dis-
tribute bridges, no overhead is introduced to any parties in the
aforementioned solution. Since most active peers in the network
are selected to help other peers to route trac by default, the above
approaches only changes how censored peers pick non-blocked
peers in order to access the rest of the network. Consequently, uti-
lizing newly joined peers in combination with rewalled peers can
be a potentially sustainable solution for restricted users who need
longer access to the network.
7.2 From Blocking to Other Type of Attacks
Although this study focuses on the problem of blocking access to
I2P, the probabilistic blocking model we introduced is not simply
an eort to block access to the I2P network. If a censor cannot
completely prevent a local user from accessing the network, it can
conduct attacks such as trac analysis to deanonymize that user
(e.g., revealing which destination is being visited by the user).
For instance, after blocking more than 95% of active peers in the
network, the attacker can inject malicious routers. He then cong-
ures the local network rewall in a fashion that forces the victim
to use the attacker’s routers to connect with the rest of the I2P
network. In this case, the victim is bootstrapped into the attacker’s
network. The attacker can facilitate this process by whitelisting the
group of malicious routers under their control, while repeatedly
blocking addresses of other active peers. By narrowing down the
victim’s view of the network, the attacker is a step closer to con-
ducting several types of attacks, including the deanonymization
attack mentioned above [22, 24].
8 CONCLUSION
In this work, we conducted a measurement study to better un-
derstand the I2P anonymity network, which then allowed us to
examine its censorship resistance. Although I2P is not as popular
as Tor, mainly because it is used as a self-contained anonymity net-
work, the results of our measurements show that the network size
is consistent over the three-month study period, with roughly 32K
daily active peers in the network. Among these peers, about 14K of
them are connecting to the I2P network from behind NAT/rewall.
During our three-month study, we also discover a group of about
6K peers from countries with poor Press Freedom scores.
We show that a censor can easily prevent local users from access-
ing the I2P network at a relatively low cost, despite its decentralized
nature. Although the victim in our censorship resistance evaluation
is assumed to be a long-term and strong peer that has been unin-
terruptedly participating in the network, we show that a censor
can still block more than 95% of peer IP addresses found in the
victim’s netDb. This blocking rate can be achieved by operating
only 10 routers in the network, while applying dierent blacklist
time windows and running more routers (e.g., 20 routers) can help
the censor to achieve a blocking rate of almost 100%.
As part of our future work, we plan to expand our research by
studying the feasibility of using newly joined peers in combination
with rewalled peers as bridges for those peers that are blocked
from accessing the network.
ACKNOWLEDGMENTS
We would like to thank our shepherd, Mirja Kühlewind, the anony-
mous reviewers, and the following members of the I2P team for
their valuable feedback: Sadie Doreen, str4d, echelon, meeh, psi,
slumlord, and zzz.
REFERENCES
[1]
Afzaal Ali, Maria Khan, Muhammad Saddique, Umar Pirzada, Muhammad Zohaib,
Imran Ahmad, and Narayan Debnath. 2016. TOR vs I2P: A Comparative Study.
In Proceedings of the 2016 IEEE International Conference on Industrial Technology.
[2]
A. Biryukov, I. Pustogarov, F. Thill, and R. P. Weinmann. 2014. Content and
Popularity Analysis of Tor Hidden Services. In 2014 IEEE 34th International
Conference on Distributed Computing Systems Workshops (ICDCSW). 188–193.
[3]
A. Biryukov, I. Pustogarov, and R. P. Weinmann. 2013. Trawling for Tor Hidden
Services: Detection, Measurement, Deanonymization. In 2013 IEEE Symposium
on Security and Privacy. 80–94.
[4]
Bloomberg. 2017-07-10. China Tells Carriers to Block Access to Personal
VPNs by February. https://www.bloomberg.com/news/articles/2017-07-10/
china-is- said-to- order-carriers- to-bar- personal- vpns-by- february
[5]
Cate Cadell. 2017-07-29. Apple says it is removing VPN services from China
App Store. Reuters. https://www.reuters.com/article/us-china-apple-vpn/
apple-says- it-is- removing-vpn- services-from-china- app-store- idUSKBN1AE0BQ
[6]
David Chones, Phillipa Gill, and Alan Mislove. 2017. An Empirical Evalua-
tion of Deployed DPI Middleboxes and Their Implications for Policymakers. In
Proceedings of Research Conference on Communications, Information and Internet
Policy.
[7]
Bernd Conrad and Fatemeh Shirazi. 2014. A Survey on Tor and I2P. In Proceedings
of the 9th International Conference on Internet Monitoring and Protection (ICIMP
2014).
[8]
Roger Dingledine. 2000. The Free Haven Project: design and deployment of an
anonymous secure data haven. Master’s thesis. MI T, Dept. of Electrical Engineer-
ing and Computer Science.
[9]
Roger Dingledine, Michael J. Freedman, and David Molnar. 2001. The Free Haven
Project: Distributed Anonymous Storage Service. In International Workshop on
Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unob-
servability. Springer-Verlag, Berlin, Heidelberg, 67–95. http://dl.acm.org/citation.
cfm?id=371931.371978
[10]
R. Dingledine, N. Mathewson, and P. Syverson. 2004. Tor: The Second-Generation
Onion Router. In Proceedings of the 13th USENIX Security Symposium). 303–319.
[11]
Arun Dunna, Ciarán O’Brien, and Phillipa Gill. 2018. Analyzing China’s Block-
ing of Unpublished Tor Bridges. In 8th USENIX Workshop on Free and Open
Communications on the Internet (FOCI 18). USENIX Association, Baltimore, MD.
https://www.usenix.org/conference/foci18/presentation/dunna
[12]
William H Dutton. 2011. Freedom of connection, freedom of expression: the changing
legal and regulatory ecology shaping the Internet. UNESCO.
[13]
Roya Ensa, David Field, Philipp Winter, Nick Feamster, Nicholas Weaver,
and Vern Paxson. 2015. Examining How the Great Firewall Discovers Hidden
Circumvention Servers. In Proceedings of the 2015 ACM Conference on Internet
Measurement Conference - IMC ’15. ACM Press, New York, USA, 445–458.
[14]
Roya Ensa, Philipp Winter, Abdullah Mueen, and Jedidiah R Crandall. 2015.
Analyzing the Great Firewall of China over space and time. Proceedings on privacy
enhancing technologies 2015, 1 (2015), 61–76.
[15]
Erika McCallister, Tim Grance, Karen Scarfone. 2010. Guide to Protecting the
Condentiality of Personally Identiable Information. National Institute of
Standards and Technology, U.S. Department of Comerece.
[16]
David Field and Lynn Tsai. 2016. Censors’ Delay in Blocking Circumvention
Proxies. In 6th USENIX Workshopon Free and Op en Communications on the Internet
IMC ’18, October 31-November 2, 2018, Boston, MA, USA NP. Hoang et al.
(FOCI 16). USENIX Association, Austin, TX.
[17]
Michael J Freedman. [n. d.]. Design and analysis of an anonymous communication
channel for the free haven project.
[18]
Freedom House. 2017. Freedom on the Net 2017: Manipulating Social Me-
dia to Undermine Democracy. https://freedomhouse.org/report/freedom-net/
freedom-net- 2017
[19]
Yue Gao, Qingfeng Tan,Jinqiao Shi, Xuebin Wang, and Muqian Chen. 2017. Large-
scale discovery and empirical analysis for I2P eepSites. In 2017 IEEE Symposium
on Computers and Communications (ISCC). 444–449.
[20]
David M. Goldschlag, Michael G. Reed, and Paul F. Syverson. 1996. Hiding
Routing information. In Information Hiding, Ross Anderson (Ed.). Springer Berlin
Heidelberg, Berlin, Heidelberg, 137–150.
[21]
Jack Grigg. 2017. Looking For Group: Open Research Questions about I2P. In
10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
[22]
Michael Herrmann and Christian Grotho. 2011. Privacy-implications of
performance-based peer selection by onion-routers: a real-world case study using
I2P. In International Symposium on Privacy Enhancing Technologies Symposium.
Springer, 155–174.
[23]
Nguyen Phong Hoang and Davar Pishva. 2014. Anonymous Communication
and Its Importance in Social Networking.. In The 16th International Conference
on Advanced Communication Technology (ICACT). IEEE, 34–39. https://doi.org/
10.1109/ICACT.2014.6778917
[24]
I2P Ocial Homepage. 2010. Threat Models. https://geti2p.net/en/docs/how/
threat-model
[25]
I2P Ocial Homepage. 2011. I2P Tunnel Routing. https://geti2p.net/en/docs/
how/tunnel-routing
[26]
I2P Ocial Homepage. 2014-01-03. NTCP Obfuscation. https://geti2p.net/spec/
proposals/106-ntcp- obfuscation
[27]
I2P Ocial Homepage. 2017. A Gentle Introduction to How I2P Works. https:
//geti2p.net/en/docs/how/intro
[28]
I2P Ocial Homepage. 2018. Common Structures Specication - Router Address.
https://geti2p.net/spec/common-structures#struct- routeraddress
[29]
I2P Ocial Homepage. 2018. Frequently Asked Questions. https://geti2p.net/
en/faq#badcontent
[30]
I2P Ocial Homepage. 2018. What ports does I2P use? https://geti2p.net/en/
faq#ports
[31]
I2P Ocial Homepage. 2018-03. Secure Semireliable UDP (SSU). https://geti2p.
net/en/docs/transport/ssu#introduction
[32]
I2P Ocial Homepage. 2018-04. Garlic Routing and "Garlic" Terminology. https:
//geti2p.net/en/docs/how/garlic-routing
[33]
I2P Ocial Homepage. 2018-04. I2P Academic Research Guidelines. https:
//geti2p.net/en/research https://geti2p.net/en/research.
[34]
I2P Ocial Homepage. 2018-04. The Network Database of I2P. https://geti2p.
net/en/docs/how/network-database
[35]
I2P Ocial Homepage. 2018-05-14. N TCP2. https://geti2p.net/spec/proposals/
111-ntcp- 2
[36]
James Cox. 2012. Canada and the FiveEyes Intelligence Community. Canadian
Defence and Foreign Aairs Institute.
[37]
Seong Hoon Jeong, Ah Reum Kang, Joongheon Kim, Huy Kang Kim, and Aziz
Mohaisen. 2016. A longitudinal analysis of. i2p leakage in the public DNS infras-
tructure. In Proceedings of the 2016 ACM SIGCOMM Conference. ACM, 557–558.
[38]
Frederick Lah. 2008. Are ip addresses personally identiable information. ISJLP
4 (2008), 681.
[39]
Fangfan Li, Abbas Razaghpanah, Arash Molavi Kakhki, Arian Akhavan Niaki,
David Chones, Phillipa Gill, and Alan Mislove. 2017. Lib.erate, (N): A Library
for Exposing (Trac-classication) Rules and Avoiding Them Eciently. In
Proceedings of the 2017 Internet Measurement Conference (IMC ’17). ACM, New
York, NY, USA, 128–141.
[40]
Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, and
Jinqiao Shi. 2014. Empirical Measurement and Analysis of I2P Routers. Journal
of Networks 9, 9 (2014), 2269–2278.
[41]
Karsten Loesing, Steven J. Murdoch, and Roger Dingledine. 2010. A Case Study
on Measuring Statistical Data in the Tor Anonymity Network. In Proceedings
of the Workshop on Ethics in Computer Security Research (WECSR 2010) (LNCS).
Springer.
[42]
Marcello Mari. 2014-12-05. How Facebook’s Tor service could encourage a more
open web. The Guardian. https://www.theguardian.com/technology/2014/dec/
05/how-faceboook- tor-service-encourage- open-web
[43]
Srdjan Matic, Carmela Troncoso, and Juan Caballero. 2017. Dissecting Tor Bridges:
a Security Evaluation of Their Private and Public Infrastructures. In Network and
Distributed Systems Security Symposium. The Internet Society, 1–15.
[44]
Petar Maymounkov and D Mazieres. 2002. Kademlia: A peer-to-peer information
system based on the xor metric. In First International Workshop on Peer-to-Peer
Systems. 53–65.
[45]
Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas
Sicker. 2008. Shining Light in Dark Places: Understanding the Tor Network. In
Privacy Enhancing Technologies, Nikita Borisov and Ian Goldberg (Eds.). Springer
Berlin Heidelberg, Berlin, Heidelberg, 63–76.
[46]
D Nobori and Y Shinjo. 2014. VPN gate: A volunteer-organized public vpn relay
system with blocking resistance for bypassing government censorship rewalls.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and
Inplementation (2014).
[47]
Palko Karasz. 2018-05-02. What Is Telegram, and Why Are Iran and Russia Trying
to Ban It? The New York Times. https://www.nytimes.com/2018/05/02/world/
europe/telegram-iran- russia.html
[48]
Reporters Without Borders. 2018. World Press Freedom Index. https://rsf.org/
en/ranking
[49]
Reseed Contributor. 2017-04-15. Circumvent Blockade of Reseed Servers
in China. I2P Development and Discussion Forum. http://zzz.i2p/topics/
2302-request- for-comments- circumvent-blockade- of-reseed- servers- in-china
[50]
Khalid Shahbar and A. Nur Zincir-Heywood. 2017. Eects of Shared Bandwidth
on Anonymity of the I2P Network Users. In Proceedings of the 38th IEEE Sympo-
sium on Security and Privacy Workshops, 2nd International Workshop on Trac
Measurements for Cybersecurity (WTMC 2017).
[51]
Douglas C. Sicker, Paul Ohm, and Dirk Grunwald. 2007. Legal Issues Surrounding
Monitoring During Network Research. In Proceedings of the 7th ACM SIGCOMM
Conference on Internet Measurement (IMC ’07). ACM, New York, NY, USA, 141–
148.
[52]
Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl
Tschantz, Phillipa Gill, and Vern Paxson. 2017. Characterizing the Nature and
Dynamics of Tor Exit Blocking. In 26th USENIX Security Symposium (USENIX
Security 17). USENIX Association, Vancouver, BC, 325–341.
[53]
SonicWALL. 2018-05-11. How to Block I2P trac using App Control Advanced.
https://support.sonicwall.com/kb/sw13993
[54]
Stuart Dredge. 2013-11-05. What is Tor? A beginner’s guide to the privacy
tool. The Guardian. https://www.theguardian.com/technology/2013/nov/05/
tor-beginners- guide-nsa- browser
[55]
Yixin Sun, Anne Edmundson, Laurent Vanbever, Oscar Li, Jennifer Rexford, Mung
Chiang, and Prateek Mittal. 2015. RAPTOR: Routing Attacks on Privacy in Tor.
In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association,
Berkeley, CA, USA, 271–286.
[56]
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. 1997. Anonymous Connections
and Onion Routing. In IEEE Symposium on Security and Privacy. 44–54.
[57] Tails. 2018-03. Introduction to Bayesian Statistics. https://tails.boum.org/
[58]
Gildas Nya Tchabe and Yinhua Xu. 2014. Anonymous Communications: A survey
on I2P. CDC Publication.
[59]
Tenable Network Security. 2016-10-07. I2P Outbound Connection Detection.
https://www.tenable.com/pvs-plugins/7170
[60]
The Tor Project. 2009-09-27. Tor partially blocked in China. https://blog.
torproject.org/tor-partially- blocked-china
[61] The Tor Project. 2018. Tor: Bridges. https://www.torproject.org/docs/bridges
[62] The Tor Project. 2018. Tor Metrics. https://metrics.torproject.org/
[63]
The Tor Project. 2018. Tor: Pluggable Transports. https://www.torproject.org/
docs/pluggable-transports
[64]
Thomas Erdbrink. 2018-05-01. Iran, Like Russia Before It, Tries to Block Tele-
gram App. The New York Times. https://www.nytimes.com/2018/05/01/world/
middleeast/iran-telegram- app-russia.html
[65]
Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, and Olivier Festor.
2015. Evaluation of the anonymous I2P network’s design choices against perfor-
mance and security. In International Conference on Information Systems Security
and Privacy (ICISSP). IEEE, 1–10.
[66]
Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor. 2012. A bird’s eye
view on the I2P anonymous le-sharing environment. In International Conference
on Network and System Security. Springer, 135–148.
[67]
Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor. 2014. Group-based
characterization for the I2P anonymous le-sharing environment. In 2014 6th
International Conference on New Technologies, Mobility and Security - Proceedings
of NTMS 2014 Conference and Workshops.
[68]
Juan Pablo Timpanaro, Chrisment Isabelle, and Festor Olivier. 2011. Monitoring
the I2P network. Ph.D. Dissertation. INRIA.
[69]
P Winter and S Lindskog. 2012. How the Great Firewall of China is Blocking Tor.
In The 2nd Workshop on Free and Open Communications on the Internet. USENIX.
[70]
Young Xu. 2016-03-08. Deconstructing the Great Firewall of China. Thousand
Eyes Blog.
[71]
Mahdi Zamani, Jared Saia, and Jedidiah Crandall. 2017. TorBricks: Blocking-
Resistant Tor Bridge Distribution. In International Symposium on Stabilization,
Safety, and Security of Distributed Systems. Springer, 426–440.
[72]
Bassam Zantout and Ramzi Haraty. 2011. I2P Data Communication System. In
Proceedings of ICN 2011, The Tenth International Conference on Networks.
[73]
zzz. 2011-08-27. Frequently Asked Questions. I2P Devel-
opment and Discussion Forum. http://www.zzz.i2p/topics/
969-proposal- auto-hidden- mode-for- certain-countries
[74]
zzz (Pseudonym) and Lars Schimmer. 2009. Peer Proling and Selection in the
I2P Anonymous Network. In Proceedings of PET-CON 2009.1. 59–70.
[75] zzz’s I2P Statistics Website. 2018. NetDB Statistics Index. http://stats.i2p