You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
add steps about sig_helper and potoken + depreciate gluetun guide (#581)
* add steps about sig_helper and potoken + depreciate gluetun guide
* reorder token position
Co-authored-by: TheFrenchGhosty <[email protected]>
* add note about token validity for same ip range
---------
Co-authored-by: TheFrenchGhosty <[email protected]>
Copy file name to clipboardexpand all lines: docs/installation.md
+165-63
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,8 @@ Running Invidious requires at least 20GB disk space, 512MB of free RAM (so ~2G i
12
12
Compiling Invidious requires at least 2.5GB of free RAM (We recommend to have at least 4GB installed).
13
13
If you have less (e.g on a cheap VPS) you can setup a SWAP file or partition, so the combined amount is >= 4GB.
14
14
15
+
You need at least 1GB of RAM for the machine that will run the tool `youtube-trusted-session-generator` in the 1st step. Doesn't need to be the same machine as the one running Invidious, just a machine running on the same public IP address.
16
+
15
17
## Docker
16
18
17
19
**The Invidious docker image is only [available on Quay](https://quay.io/repository/invidious/invidious) because, unlike Docker Hub, [Quay is Free and Open Source Software](https://github.com/quay/quay/blob/master/LICENSE). This is reflected in the `docker-compose.yml` file used in this walk-through.**
@@ -24,71 +26,106 @@ Ensure [Docker Engine](https://docs.docker.com/engine/install) and [Docker Compo
24
26
25
27
Note: Currently the repository has to be cloned, this is because the `init-invidious-db.sh` file and the `config/sql` directory have to be mounted to the postgres container (See the volumes section in the docker-compose file below). This "problem" will be solved in the future.
26
28
27
-
```bash
28
-
git clone https://github.com/iv-org/invidious.git
29
-
cd invidious
30
-
```
29
+
??? warning "About po_token and visitor_data identities"
30
+
31
+
po_token known as Proof of Origin Token. This is an attestation token generated by a complex anti robot verification system created by Google named BotGuard/DroidGuard. It is used to confirm that the request is coming from a genuine device.
32
+
33
+
These identity tokens (po_token and visitor_data) generated in this tutorial will make your entire Invidious session more easily traceable by YouTube because it is tied to a unique identifier.
34
+
35
+
There is currently no official automatic tool to periodically change these tokens. This is working in progress but, for the time being, this is the solution the Invidious team is offering.
36
+
37
+
If you want to be less traceable, you can always script the process by changing the identities every X hour.
38
+
39
+
40
+
1. Generate po_token and visitor_data identities for passing all verification checks on YouTube side:
41
+
```
42
+
docker run quay.io/invidious/youtube-trusted-session-generator
43
+
```
44
+
You have to run this command on the same public IP address as the one blocked by YouTube. Not necessarily the same machine, just the same public IP address.
45
+
You will need to copy these two parameters in the third step.
46
+
Subsequent usage of this same token will work on the same IP range or even the same ASN. The point is to generate this token on a blocked IP as "unblocked" IP addresses seems to not generate a token valid for passing the checks on a blocked IP.
Note: This compose is made for a true "production" setup, where Invidious is behind a reverse proxy. If you prefer to directly access Invidious, replace `127.0.0.1:3000:3000` with `3000:3000` under the `ports:` section.
128
+
Note: This compose is made for a true "production" setup, where Invidious is behind a reverse proxy. If you prefer to directly access Invidious, replace `127.0.0.1:3000:3000` with `3000:3000` under the `ports:` section.
92
129
93
130
94
131
### Docker-compose method (development)
@@ -106,6 +143,35 @@ docker-compose up
106
143
107
144
### Linux
108
145
146
+
#### Generate po_token and visitor_data identities
147
+
148
+
[Follow these instructions here on the official tool `youtube-trusted-session-generator`](https://github.com/iv-org/youtube-trusted-session-generator?tab=readme-ov-file#tutorial-without-docker)
149
+
150
+
These two parameters will be required for passing all verification checks on YouTube side and you will have to configure them in Invidious.
151
+
152
+
You have to run this command on the same public IP address as the one blocked by YouTube. Not necessarily the same machine, just the same public IP address.
153
+
You will need to copy these two parameters in the `config.yaml` file.
154
+
Subsequent usage of this same token will work on the same IP range or even the same ASN. The point is to generate this token on a blocked IP as "unblocked" IP addresses seems to not generate a token valid for passing the checks on a blocked IP.
155
+
156
+
??? warning "About po_token and visitor_data identities"
157
+
158
+
po_token known as Proof of Origin Token. This is an attestation token generated by a complex anti robot verification system created by Google named BotGuard/DroidGuard. It is used to confirm that the request is coming from a genuine device.
159
+
160
+
These identity tokens (po_token and visitor_data) generated in this tutorial will make your entire Invidious session more easily traceable by YouTube because it is tied to a unique identifier.
161
+
162
+
There is currently no official automatic tool to periodically change these tokens. This is working in progress but, for the time being, this is the solution the Invidious team is offering.
163
+
164
+
If you want to be less traceable, you can always script the process by changing the identities every X hour.
165
+
166
+
167
+
#### Run inv_sig_helper in background
168
+
169
+
[Follow these instructions here on the official tool `inv_sig_helper`](https://github.com/iv-org/inv_sig_helper?tab=readme-ov-file#building-and-running-without-docker) and run it in the background with systemd for example.
170
+
171
+
inv_sig_helper handle the "deciphering" of the video stream fetched from YouTube servers. As it is running untrusted code from Google themselves, make sure to isolate it by for example running it inside a LXC or locked down through systemd.
172
+
173
+
Call for action: A systemd service example is welcome, [if you want to contribute to one](https://github.com/iv-org/documentation/edit/master/docs/installation.md#linux).
174
+
109
175
#### Install Crystal
110
176
111
177
Follow the instructions for your distribution here: https://crystal-lang.org/install/
@@ -160,6 +226,10 @@ make
160
226
# Configure config/config.yml as you like
161
227
cp config/config.example.yml config/config.yml
162
228
229
+
# edit config.yaml to include po_token and visitor_data previously generated
#### Generate po_token and visitor_data identities
249
+
250
+
[Follow these instructions here on the official tool `youtube-trusted-session-generator`](https://github.com/iv-org/youtube-trusted-session-generator?tab=readme-ov-file#tutorial-without-docker)
251
+
252
+
These two parameters will be required for passing all verification checks on YouTube side and you will have to configure them in Invidious.
253
+
254
+
You have to run this command on the same public IP address as the one blocked by YouTube. Not necessarily the same machine, just the same public IP address.
255
+
You will need to copy these two parameters in the `config.yaml` file.
256
+
Subsequent usage of this same token will work on the same IP range or even the same ASN. The point is to generate this token on a blocked IP as "unblocked" IP addresses seems to not generate a token valid for passing the checks on a blocked IP.
257
+
258
+
??? warning "About po_token and visitor_data identities"
259
+
260
+
po_token known as Proof of Origin Token. This is an attestation token generated by a complex anti robot verification system created by Google named BotGuard/DroidGuard. It is used to confirm that the request is coming from a genuine device.
261
+
262
+
These identity tokens (po_token and visitor_data) generated in this tutorial will make your entire Invidious session more easily traceable by YouTube because it is tied to a unique identifier.
263
+
264
+
There is currently no official automatic tool to periodically change these tokens. This is working in progress but, for the time being, this is the solution the Invidious team is offering.
265
+
266
+
If you want to be less traceable, you can always script the process by changing the identities every X hour.
267
+
268
+
#### Run inv_sig_helper in background
269
+
270
+
[Follow these instructions here on the official tool `inv_sig_helper`](https://github.com/iv-org/inv_sig_helper?tab=readme-ov-file#building-and-running-without-docker)
271
+
272
+
inv_sig_helper handle the "deciphering" of the video stream fetched from YouTube servers. As it is running untrusted code from Google themselves, make sure to isolate it by for example running it inside Docker or a VM.
273
+
274
+
Call for action: An example here is welcome, [if you want to contribute to one](https://github.com/iv-org/documentation/edit/master/docs/installation.md#macos).
275
+
178
276
#### Install the dependencies
179
277
180
278
```bash
@@ -213,7 +311,11 @@ psql invidious kemal < config/sql/playlist_videos.sql
213
311
make
214
312
215
313
# Configure config/config.yml as you like
216
-
cp config/config.example.yml config/config.yml
314
+
cp config/config.example.yml config/config.yml
315
+
316
+
# edit config.yaml to include po_token and visitor_data previously generated
0 commit comments