diff --git a/core/java/src/net/i2p/client/I2CPSSLSocketFactory.java b/core/java/src/net/i2p/client/I2CPSSLSocketFactory.java
new file mode 100644
index 0000000000000000000000000000000000000000..d562388f13fff706ad9ca1c042addc0f12eb684f
--- /dev/null
+++ b/core/java/src/net/i2p/client/I2CPSSLSocketFactory.java
@@ -0,0 +1,183 @@
+package net.i2p.client;
+
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.net.Socket;
+import java.security.KeyStore;
+import java.security.GeneralSecurityException;
+import java.security.cert.Certificate;
+import java.security.cert.CertificateException;
+import java.security.cert.CertificateExpiredException;
+import java.security.cert.CertificateNotYetValidException;
+import java.security.cert.CertificateFactory;
+import java.security.cert.X509Certificate;
+
+import javax.net.ssl.SSLContext;
+import javax.net.ssl.SSLSocketFactory;
+import javax.net.ssl.TrustManager;
+import javax.net.ssl.TrustManagerFactory;
+import javax.net.ssl.X509TrustManager;
+
+import net.i2p.I2PAppContext;
+import net.i2p.util.Log;
+
+/**
+ * Loads trusted ASCII certs from ~/.i2p/certificates/ and $CWD/certificates/.
+ * Keeps a single static SSLContext for the whole JVM.
+ *
+ * @author zzz
+ * @since 0.8.3
+ */
+class I2CPSSLSocketFactory {
+
+    private static final Object _initLock = new Object();
+    private static SSLSocketFactory _factory;
+    private static Log _log;
+
+    private static final String CERT_DIR = "certificates";
+
+    /**
+     * Initializes the static SSL Context if required, then returns a socket
+     * to the host.
+     *
+     * @param ctx just for logging
+     * @throws IOException on init error or usual socket errors
+     */
+    public static Socket createSocket(I2PAppContext ctx, String host, int port) throws IOException {
+        synchronized(_initLock) {
+            if (_factory == null) {
+                _log = ctx.logManager().getLog(I2CPSSLSocketFactory.class);
+                initSSLContext(ctx);
+                if (_factory == null)
+                    throw new IOException("Unable to create SSL Context for I2CP Client");
+                _log.info("I2CP Client-side SSL Context initialized");
+            }
+        }
+        return _factory.createSocket(host, port);
+    }
+
+    /**
+     *  Loads certs from
+     *  the ~/.i2p/certificates/ and $CWD/certificates/ directories.
+     */
+    private static void initSSLContext(I2PAppContext context) {
+        KeyStore ks;
+        try {
+            ks = KeyStore.getInstance(KeyStore.getDefaultType());
+            ks.load(null, "".toCharArray());
+        } catch (GeneralSecurityException gse) {
+            _log.error("Key Store init error", gse);
+            return;
+        } catch (IOException ioe) {
+            _log.error("Key Store init error", ioe);
+            return;
+        }
+
+        File dir = new File(context.getConfigDir(), CERT_DIR);
+        int adds = addCerts(dir, ks);
+        int totalAdds = adds;
+        if (adds > 0 && _log.shouldLog(Log.INFO))
+            _log.info("Loaded " + adds + " trusted certificates from " + dir.getAbsolutePath());
+
+        File dir2 = new File(System.getProperty("user.dir"), CERT_DIR);
+        if (!dir.getAbsolutePath().equals(dir2.getAbsolutePath())) {
+            adds = addCerts(dir2, ks);
+            totalAdds += adds;
+            if (adds > 0 && _log.shouldLog(Log.INFO))
+                _log.info("Loaded " + adds + " trusted certificates from " + dir.getAbsolutePath());
+        }
+        if (totalAdds > 0) {
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Loaded total of " + totalAdds + " new trusted certificates");
+        } else {
+            _log.error("No trusted certificates loaded (looked in " +
+                       dir.getAbsolutePath() + (dir.getAbsolutePath().equals(dir2.getAbsolutePath()) ? "" : (" and " + dir2.getAbsolutePath())) +
+                       ", I2CP SSL client connections will fail. " +
+                       "Copy the file certificates/i2cp.local.crt from the router to the directory.");
+            // don't continue, since we didn't load the system keystore, we have nothing.
+            return;
+        }
+
+        try {
+            SSLContext sslc = SSLContext.getInstance("TLS");
+            TrustManagerFactory tmf =   TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
+            tmf.init(ks);
+            sslc.init(null, tmf.getTrustManagers(), context.random());
+            _factory = sslc.getSocketFactory();
+        } catch (GeneralSecurityException gse) {
+            _log.error("SSL context init error", gse);
+        }
+    }
+
+    /**
+     *  Load all X509 Certs from a directory and add them to the
+     *  trusted set of certificates in the key store
+     *
+     *  @return number successfully added
+     */
+    private static int addCerts(File dir, KeyStore ks) {
+        if (_log.shouldLog(Log.INFO))
+            _log.info("Looking for X509 Certificates in " + dir.getAbsolutePath());
+        int added = 0;
+        if (dir.exists() && dir.isDirectory()) {
+            File[] files = dir.listFiles();
+            if (files != null) {
+                for (int i = 0; i < files.length; i++) {
+                    File f = files[i];
+                    if (!f.isFile())
+                        continue;
+                    // use file name as alias
+                    String alias = f.getName().toLowerCase();
+                    boolean success = addCert(f, alias, ks);
+                    if (success)
+                        added++;
+                }
+            }
+        }
+        return added;
+    }
+
+    /**
+     *  Load an X509 Cert from a file and add it to the
+     *  trusted set of certificates in the key store
+     *
+     *  @return success
+     */
+    private static boolean addCert(File file, String alias, KeyStore ks) {
+        InputStream fis = null;
+        try {
+            fis = new FileInputStream(file);
+            CertificateFactory cf = CertificateFactory.getInstance("X.509");
+            X509Certificate cert = (X509Certificate)cf.generateCertificate(fis);
+            if (_log.shouldLog(Log.INFO)) {
+                _log.info("Read X509 Certificate from " + file.getAbsolutePath() +
+                          " Issuer: " + cert.getIssuerX500Principal() +
+                          "; Valid From: " + cert.getNotBefore() +
+                          " To: " + cert.getNotAfter());
+            }
+            try {
+                cert.checkValidity();
+            } catch (CertificateExpiredException cee) {
+                _log.error("Rejecting expired X509 Certificate: " + file.getAbsolutePath(), cee);
+                return false;
+            } catch (CertificateNotYetValidException cnyve) {
+                _log.error("Rejecting X509 Certificate not yet valid: " + file.getAbsolutePath(), cnyve);
+                return false;
+            }
+            ks.setCertificateEntry(alias, cert);
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Now trusting X509 Certificate, Issuer: " + cert.getIssuerX500Principal());
+        } catch (GeneralSecurityException gse) {
+            _log.error("Error reading X509 Certificate: " + file.getAbsolutePath(), gse);
+            return false;
+        } catch (IOException ioe) {
+            _log.error("Error reading X509 Certificate: " + file.getAbsolutePath(), ioe);
+            return false;
+        } finally {
+            try { if (fis != null) fis.close(); } catch (IOException foo) {}
+        }
+        return true;
+    }
+}
diff --git a/core/java/src/net/i2p/client/I2PSessionImpl.java b/core/java/src/net/i2p/client/I2PSessionImpl.java
index 4b65d422b0dcac6452b5619f1794410b31d7f4a7..35c205d5059944193e5563f46c991c0cb472193e 100644
--- a/core/java/src/net/i2p/client/I2PSessionImpl.java
+++ b/core/java/src/net/i2p/client/I2PSessionImpl.java
@@ -131,6 +131,9 @@ abstract class I2PSessionImpl implements I2PSession, I2CPMessageReader.I2CPMessa
     private long _lastActivity;
     private boolean _isReduced;
 
+    /** SSL interface (only) @since 0.8.3 */
+    protected static final String PROP_ENABLE_SSL = "i2cp.SSL";
+
     void dateUpdated() {
         _dateReceived = true;
         synchronized (_dateReceivedLock) {
@@ -181,7 +184,10 @@ abstract class I2PSessionImpl implements I2PSession, I2CPMessageReader.I2CPMessa
     protected void loadConfig(Properties options) {
         _options = new Properties();
         _options.putAll(filter(options));
-        if (!_context.isRouterContext()) {
+        if (_context.isRouterContext()) {
+            // just for logging
+            _hostname = "[internal connection]";
+        } else {
             _hostname = _options.getProperty(I2PClient.PROP_TCP_HOST, "127.0.0.1");
             String portNum = _options.getProperty(I2PClient.PROP_TCP_PORT, LISTEN_PORT + "");
             try {
@@ -195,6 +201,7 @@ abstract class I2PSessionImpl implements I2PSession, I2CPMessageReader.I2CPMessa
         }
 
         // auto-add auth if required, not set in the options, and we are in the same JVM
+        // TODO bypass this on router side for internal connections
         if (_context.isRouterContext() &&
             Boolean.valueOf(_context.getProperty("i2cp.auth")).booleanValue() &&
             ((!options.containsKey("i2cp.username")) || (!options.containsKey("i2cp.password")))) {
@@ -302,7 +309,10 @@ abstract class I2PSessionImpl implements I2PSession, I2CPMessageReader.I2CPMessa
                 _queue = mgr.connect();
                 _reader = new QueuedI2CPMessageReader(_queue, this);
             } else {
-                _socket = new Socket(_hostname, _portNum);
+                if (Boolean.valueOf(_options.getProperty(PROP_ENABLE_SSL)).booleanValue())
+                    _socket = I2CPSSLSocketFactory.createSocket(_context, _hostname, _portNum);
+                else
+                    _socket = new Socket(_hostname, _portNum);
                 // _socket.setSoTimeout(1000000); // Uhmmm we could really-really use a real timeout, and handle it.
                 _out = _socket.getOutputStream();
                 synchronized (_out) {
diff --git a/core/java/src/net/i2p/client/I2PSimpleSession.java b/core/java/src/net/i2p/client/I2PSimpleSession.java
index 4f15c16ff787784d80fe5da2a7f1c18894c163f6..ed9ec5cc369e1a492bc4e0c80b0cb1d6c60f0b2b 100644
--- a/core/java/src/net/i2p/client/I2PSimpleSession.java
+++ b/core/java/src/net/i2p/client/I2PSimpleSession.java
@@ -23,7 +23,6 @@ import net.i2p.internal.I2CPMessageQueue;
 import net.i2p.internal.InternalClientManager;
 import net.i2p.internal.QueuedI2CPMessageReader;
 import net.i2p.util.I2PAppThread;
-import net.i2p.util.InternalSocket;
 
 /**
  * Create a new session for doing naming and bandwidth queries only. Do not create a Destination.
@@ -80,7 +79,10 @@ class I2PSimpleSession extends I2PSessionImpl2 {
                 _queue = mgr.connect();
                 _reader = new QueuedI2CPMessageReader(_queue, this);
             } else {
-                _socket = new Socket(_hostname, _portNum);
+                if (Boolean.valueOf(getOptions().getProperty(PROP_ENABLE_SSL)).booleanValue())
+                    _socket = I2CPSSLSocketFactory.createSocket(_context, _hostname, _portNum);
+                else
+                    _socket = new Socket(_hostname, _portNum);
                 _out = _socket.getOutputStream();
                 synchronized (_out) {
                     _out.write(I2PClient.PROTOCOL_BYTE);
diff --git a/router/java/src/net/i2p/router/client/ClientListenerRunner.java b/router/java/src/net/i2p/router/client/ClientListenerRunner.java
index 4e0a91aeeecbb580f0dd21e4d4cb21e0f6c98704..5dc5c650686d47b7425e403614f3e2f4d0c7e848 100644
--- a/router/java/src/net/i2p/router/client/ClientListenerRunner.java
+++ b/router/java/src/net/i2p/router/client/ClientListenerRunner.java
@@ -25,12 +25,12 @@ import net.i2p.util.Log;
  * @author jrandom
  */
 class ClientListenerRunner implements Runnable {
-    protected Log _log;
-    protected RouterContext _context;
-    protected ClientManager _manager;
+    protected final Log _log;
+    protected final RouterContext _context;
+    protected final ClientManager _manager;
     protected ServerSocket _socket;
-    protected int _port;
-    private boolean _bindAllInterfaces;
+    protected final int _port;
+    protected final boolean _bindAllInterfaces;
     protected boolean _running;
     protected boolean _listening;
     
@@ -38,18 +38,33 @@ class ClientListenerRunner implements Runnable {
 
     public ClientListenerRunner(RouterContext context, ClientManager manager, int port) {
         _context = context;
-        _log = _context.logManager().getLog(ClientListenerRunner.class);
+        _log = _context.logManager().getLog(getClass());
         _manager = manager;
         _port = port;
-        
-        String val = context.getProperty(BIND_ALL_INTERFACES);
-        _bindAllInterfaces = Boolean.valueOf(val).booleanValue();
+        _bindAllInterfaces = context.getBooleanProperty(BIND_ALL_INTERFACES);
     }
     
-    public void setPort(int port) { _port = port; }
-    public int getPort() { return _port; }
     public boolean isListening() { return _running && _listening; }
     
+    /** 
+     * Get a ServerSocket.
+     * Split out so it can be overridden for SSL.
+     * @since 0.8.3
+     */
+    protected ServerSocket getServerSocket() throws IOException {
+        if (_bindAllInterfaces) {
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Listening on port " + _port + " on all interfaces");
+            return new ServerSocket(_port);
+        } else {
+            String listenInterface = _context.getProperty(ClientManagerFacadeImpl.PROP_CLIENT_HOST, 
+                                                          ClientManagerFacadeImpl.DEFAULT_HOST);
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Listening on port " + _port + " of the specific interface: " + listenInterface);
+            return new ServerSocket(_port, 0, InetAddress.getByName(listenInterface));
+        }
+    }
+                
     /** 
      * Start up the socket listener, listens for connections, and
      * fires those connections off via {@link #runConnection runConnection}.  
@@ -62,18 +77,7 @@ class ClientListenerRunner implements Runnable {
         int curDelay = 1000;
         while (_running) {
             try {
-                if (_bindAllInterfaces) {
-                    if (_log.shouldLog(Log.INFO))
-                        _log.info("Listening on port " + _port + " on all interfaces");
-                    _socket = new ServerSocket(_port);
-                } else {
-                    String listenInterface = _context.getProperty(ClientManagerFacadeImpl.PROP_CLIENT_HOST, 
-                                                                  ClientManagerFacadeImpl.DEFAULT_HOST);
-                    if (_log.shouldLog(Log.INFO))
-                        _log.info("Listening on port " + _port + " of the specific interface: " + listenInterface);
-                    _socket = new ServerSocket(_port, 0, InetAddress.getByName(listenInterface));
-                }
-                
+                _socket = getServerSocket();
                 
                 if (_log.shouldLog(Log.DEBUG))
                     _log.debug("ServerSocket created, before accept: " + _socket);
@@ -131,7 +135,8 @@ class ClientListenerRunner implements Runnable {
     }
     
     /** give the i2cp client 5 seconds to show that they're really i2cp clients */
-    private final static int CONNECT_TIMEOUT = 5*1000;
+    protected final static int CONNECT_TIMEOUT = 5*1000;
+    private final static int LOOP_DELAY = 250;
 
     /**
      *  Verify the first byte.
@@ -141,16 +146,17 @@ class ClientListenerRunner implements Runnable {
     protected boolean validate(Socket socket) {
         try {
             InputStream is = socket.getInputStream();
-            for (int i = 0; i < 20; i++) {
+            for (int i = 0; i < CONNECT_TIMEOUT / LOOP_DELAY; i++) {
                 if (is.available() > 0)
                     return is.read() == I2PClient.PROTOCOL_BYTE;
-                try { Thread.sleep(250); } catch (InterruptedException ie) {}
+                try { Thread.sleep(LOOP_DELAY); } catch (InterruptedException ie) {}
             }
         } catch (IOException ioe) {}
         if (_log.shouldLog(Log.WARN))
              _log.warn("Peer did not authenticate themselves as I2CP quickly enough, dropping");
         return false;
     }
+
     /**
      * Handle the connection by passing it off to a {@link ClientConnectionRunner ClientConnectionRunner}
      *
diff --git a/router/java/src/net/i2p/router/client/ClientManager.java b/router/java/src/net/i2p/router/client/ClientManager.java
index 2a3a4c6ede59b2085e17a575f60ff89ff17b164f..a534bdfb19627fb9b9acab93d67a061167159959 100644
--- a/router/java/src/net/i2p/router/client/ClientManager.java
+++ b/router/java/src/net/i2p/router/client/ClientManager.java
@@ -53,6 +53,8 @@ class ClientManager {
 
     /** Disable external interface, allow internal clients only @since 0.8.3 */
     private static final String PROP_DISABLE_EXTERNAL = "i2cp.disableInterface";
+    /** SSL interface (only) @since 0.8.3 */
+    private static final String PROP_ENABLE_SSL = "i2cp.SSL";
 
     /** ms to wait before rechecking for inbound messages to deliver to clients */
     private final static int INBOUND_POLL_INTERVAL = 300;
@@ -60,10 +62,10 @@ class ClientManager {
     public ClientManager(RouterContext context, int port) {
         _ctx = context;
         _log = context.logManager().getLog(ClientManager.class);
-        _ctx.statManager().createRateStat("client.receiveMessageSize", 
-                                              "How large are messages received by the client?", 
-                                              "ClientMessages", 
-                                              new long[] { 60*1000l, 60*60*1000l, 24*60*60*1000l });
+        //_ctx.statManager().createRateStat("client.receiveMessageSize", 
+        //                                      "How large are messages received by the client?", 
+        //                                      "ClientMessages", 
+        //                                      new long[] { 60*1000l, 60*60*1000l, 24*60*60*1000l });
         _runners = new HashMap();
         _pendingRunners = new HashSet();
         startListeners(port);
@@ -72,7 +74,11 @@ class ClientManager {
     /** Todo: Start a 3rd listener for IPV6? */
     private void startListeners(int port) {
         if (!_ctx.getBooleanProperty(PROP_DISABLE_EXTERNAL)) {
-            _listener = new ClientListenerRunner(_ctx, this, port);
+            // there's no option to start both an SSL and non-SSL listener
+            if (_ctx.getBooleanProperty(PROP_ENABLE_SSL))
+                _listener = new SSLClientListenerRunner(_ctx, this, port);
+            else
+                _listener = new ClientListenerRunner(_ctx, this, port);
             Thread t = new I2PThread(_listener, "ClientListener:" + port, true);
             t.start();
         }
@@ -494,8 +500,8 @@ class ClientManager {
                 runner = getRunner(_msg.getDestinationHash());
 
             if (runner != null) {
-                _ctx.statManager().addRateData("client.receiveMessageSize", 
-                                                   _msg.getPayload().getSize(), 0);
+                //_ctx.statManager().addRateData("client.receiveMessageSize", 
+                //                                   _msg.getPayload().getSize(), 0);
                 runner.receiveMessage(_msg.getDestination(), null, _msg.getPayload());
             } else {
                 // no client connection...
diff --git a/router/java/src/net/i2p/router/client/SSLClientListenerRunner.java b/router/java/src/net/i2p/router/client/SSLClientListenerRunner.java
new file mode 100644
index 0000000000000000000000000000000000000000..0dc053a3361e3b57d2d6d7931712cbe10d307b8a
--- /dev/null
+++ b/router/java/src/net/i2p/router/client/SSLClientListenerRunner.java
@@ -0,0 +1,282 @@
+package net.i2p.router.client;
+
+import java.io.File;
+import java.io.FileInputStream;
+import java.io.FileOutputStream;
+import java.io.IOException;
+import java.io.InputStream;
+import java.io.OutputStream;
+import java.io.PrintWriter;
+import java.net.InetAddress;
+import java.net.Socket;
+import java.net.ServerSocket;
+import java.security.KeyStore;
+import java.security.GeneralSecurityException;
+import java.security.cert.Certificate;
+import java.security.cert.CertificateEncodingException;
+import java.util.Arrays;
+
+import javax.net.ssl.KeyManagerFactory;
+import javax.net.ssl.SSLServerSocketFactory;
+import javax.net.ssl.SSLContext;
+
+import net.i2p.client.I2PClient;
+import net.i2p.data.Base32;
+import net.i2p.data.Base64;
+import net.i2p.router.RouterContext;
+import net.i2p.util.Log;
+import net.i2p.util.SecureDirectory;
+import net.i2p.util.SecureFileOutputStream;
+import net.i2p.util.ShellCommand;
+
+/**
+ * SSL version of ClientListenerRunner
+ *
+ * @since 0.8.3
+ * @author zzz
+ */
+class SSLClientListenerRunner extends ClientListenerRunner {
+
+    private SSLServerSocketFactory _factory;
+
+    private static final String PROP_KEYSTORE_PASSWORD = "i2cp.keystorePassword";
+    private static final String DEFAULT_KEYSTORE_PASSWORD = "changeit";
+    private static final String PROP_KEY_PASSWORD = "i2cp.keyPassword";
+    private static final String KEY_ALIAS = "i2cp";
+    private static final String ASCII_KEYFILE = "i2cp.local.crt";
+
+    public SSLClientListenerRunner(RouterContext context, ClientManager manager, int port) {
+        super(context, manager, port);
+    }
+    
+    /**
+     * @return success if it exists and we have a password, or it was created successfully.
+     */
+    private boolean verifyKeyStore(File ks) {
+        if (ks.exists()) {
+            boolean rv = _context.getProperty(PROP_KEY_PASSWORD) != null;
+            if (!rv)
+                _log.error("I2CP SSL error, must set " + PROP_KEY_PASSWORD + " in " +
+                           (new File(_context.getConfigDir(), "router.config")).getAbsolutePath());
+            return rv;
+        }
+        File dir = ks.getParentFile();
+        if (!dir.exists()) {
+            File sdir = new SecureDirectory(dir.getAbsolutePath());
+            if (!sdir.mkdir())
+                return false;
+        }
+        boolean rv = createKeyStore(ks);
+
+        // Now read it back out of the new keystore and save it in ascii form
+        // where the clients can get to it.
+        // Failure of this part is not fatal.
+        if (rv)
+            exportCert(ks);
+        return rv;
+    }
+
+
+    /**
+     * Call out to keytool to create a new keystore with a keypair in it.
+     * Trying to do this programatically is a nightmare, requiring either BouncyCastle
+     * libs or using proprietary Sun libs, and it's a huge mess.
+     * If successful, stores the keystore password and key password in router.config.
+     *
+     * @return success
+     */
+    private boolean createKeyStore(File ks) {
+        // make a random 48 character password (30 * 8 / 5)
+        byte[] rand = new byte[30];
+        _context.random().nextBytes(rand);
+        String keyPassword = Base32.encode(rand);
+        // and one for the cname
+        _context.random().nextBytes(rand);
+        String cname = Base32.encode(rand) + ".i2cp.i2p.net";
+
+        String keytool = (new File(System.getProperty("java.home"), "bin/keytool")).getAbsolutePath();
+        String[] args = new String[] {
+                   keytool,
+                   "-genkey",            // -genkeypair preferred in newer keytools, but this works with more
+                   "-storetype", KeyStore.getDefaultType(),
+                   "-keystore", ks.getAbsolutePath(),
+                   "-storepass", DEFAULT_KEYSTORE_PASSWORD,
+                   "-alias", KEY_ALIAS,
+                   "-dname", "CN=" + cname + ",OU=I2CP,O=I2P Anonymous Network,L=XX,ST=XX,C=XX",
+                   "-validity", "3652",  // 10 years
+                   "-keyalg", "DSA",
+                   "-keysize", "1024",
+                   "-keypass", keyPassword};
+        boolean success = (new ShellCommand()).executeSilentAndWaitTimed(args, 30);  // 30 secs
+        if (success) {
+            success = ks.exists();
+            if (success) {
+                SecureFileOutputStream.setPerms(ks);
+                _context.router().setConfigSetting(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD);
+                _context.router().setConfigSetting(PROP_KEY_PASSWORD, keyPassword);
+                _context.router().saveConfig();
+            }
+        }
+        if (success) {
+            _log.logAlways(Log.INFO, "Created self-signed certificate for " + cname + " in keystore: " + ks.getAbsolutePath() + "\n" +
+                           "The certificate name was generated randomly, and is not associated with your " +
+                           "IP address, host name, router identity, or destination keys.");
+        } else {
+            _log.error("Failed to create I2CP SSL keystore using command line:");
+            StringBuilder buf = new StringBuilder(256);
+            for (int i = 0;  i < args.length; i++) {
+                buf.append('"').append(args[i]).append("\" ");
+            }
+            _log.error(buf.toString());
+            _log.error("This is for the Sun/Oracle keytool, others may be incompatible.\n" +
+                       "If you create the keystore manually, you must add " + PROP_KEYSTORE_PASSWORD + " and " + PROP_KEY_PASSWORD +
+                       " to " + (new File(_context.getConfigDir(), "router.config")).getAbsolutePath());
+        }
+        return success;
+    }
+
+    /** 
+     * Pull the cert back OUT of the keystore and save it as ascii
+     * so the clients can get to it.
+     */
+    private void exportCert(File ks) {
+        File sdir = new SecureDirectory(_context.getConfigDir(), "certificates");
+        if (sdir.exists() || sdir.mkdir()) {
+            try {
+                KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
+                InputStream fis = new FileInputStream(ks);
+                String ksPass = _context.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD);
+                keyStore.load(fis, ksPass.toCharArray());
+                fis.close();
+                Certificate cert = keyStore.getCertificate(KEY_ALIAS);
+                if (cert != null) {
+                    File certFile = new File(sdir, ASCII_KEYFILE);
+                    saveCert(cert, certFile);
+                } else {
+                    _log.error("Error getting SSL cert to save as ASCII");
+                }
+            } catch (GeneralSecurityException gse) {
+                _log.error("Error saving ASCII SSL keys", gse);
+            } catch (IOException ioe) {
+                _log.error("Error saving ASCII SSL keys", ioe);
+            }
+        } else {
+            _log.error("Error saving ASCII SSL keys");
+        }
+    }
+
+    private static final int LINE_LENGTH = 64;
+
+    /**
+     *  Modified from:
+     *  http://www.exampledepot.com/egs/java.security.cert/ExportCert.html
+     *
+     *  Write a certificate to a file in base64 format.
+     */
+    private void saveCert(Certificate cert, File file) {
+        OutputStream os = null;
+        try {
+           // Get the encoded form which is suitable for exporting
+           byte[] buf = cert.getEncoded();
+           os = new SecureFileOutputStream(file);
+           PrintWriter wr = new PrintWriter(os);
+           wr.println("-----BEGIN CERTIFICATE-----");
+           String b64 = Base64.encode(buf, true);     // true = use standard alphabet
+           for (int i = 0; i < b64.length(); i += LINE_LENGTH) {
+               wr.println(b64.substring(i, Math.min(i + LINE_LENGTH, b64.length())));
+           }
+           wr.println("-----END CERTIFICATE-----");
+           wr.flush();
+        } catch (CertificateEncodingException cee) {
+           _log.error("Error writing X509 Certificate " + file.getAbsolutePath(), cee);
+        } catch (IOException ioe) {
+            _log.error("Error writing X509 Certificate " + file.getAbsolutePath(), ioe);
+        } finally {
+            try { if (os != null) os.close(); } catch (IOException foo) {}
+        }
+    }
+
+    /** 
+     * Sets up the SSLContext and sets the socket factory.
+     * @return success
+     */
+    private boolean initializeFactory(File ks) {
+        String ksPass = _context.getProperty(PROP_KEYSTORE_PASSWORD, DEFAULT_KEYSTORE_PASSWORD);
+        String keyPass = _context.getProperty(PROP_KEY_PASSWORD);
+        if (keyPass == null) {
+            _log.error("No key password, set " + PROP_KEY_PASSWORD +
+                       " in " + (new File(_context.getConfigDir(), "router.config")).getAbsolutePath());
+            return false;
+        }
+        try {
+            SSLContext sslc = SSLContext.getInstance("TLS");
+            KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
+            InputStream fis = new FileInputStream(ks);
+            keyStore.load(fis, ksPass.toCharArray());
+            fis.close();
+            KeyManagerFactory kmf = KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
+            kmf.init(keyStore, keyPass.toCharArray());
+            sslc.init(kmf.getKeyManagers(), null, _context.random());
+            _factory = sslc.getServerSocketFactory();
+            return true;
+        } catch (GeneralSecurityException gse) {
+            _log.error("Error loading SSL keys", gse);
+        } catch (IOException ioe) {
+            _log.error("Error loading SSL keys", ioe);
+        }
+        return false;
+    }
+
+    /** 
+     * Get a SSLServerSocket.
+     */
+    @Override
+    protected ServerSocket getServerSocket() throws IOException {
+        ServerSocket rv;
+        if (_bindAllInterfaces) {
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Listening on port " + _port + " on all interfaces");
+            rv = _factory.createServerSocket(_port);
+        } else {
+            String listenInterface = _context.getProperty(ClientManagerFacadeImpl.PROP_CLIENT_HOST, 
+                                                          ClientManagerFacadeImpl.DEFAULT_HOST);
+            if (_log.shouldLog(Log.INFO))
+                _log.info("Listening on port " + _port + " of the specific interface: " + listenInterface);
+            rv = _factory.createServerSocket(_port, 0, InetAddress.getByName(listenInterface));
+        }
+        return rv;
+    }
+
+    /** 
+     * Create (if necessary) and load the key store, then run.
+     */
+    @Override
+    public void runServer() {
+        File keyStore = new File(_context.getConfigDir(), "keystore/i2cp.ks");
+        if (verifyKeyStore(keyStore) && initializeFactory(keyStore)) {
+            super.runServer();
+        } else {
+            _log.error("SSL I2CP server error - Failed to create or open key store");
+        }
+    }
+
+    /**
+     *  Overridden because SSL handshake may need more time,
+     *  and available() in super doesn't work.
+     *  The handshake doesn't start until a read().
+     */
+    @Override
+    protected boolean validate(Socket socket) {
+        try {
+            InputStream is = socket.getInputStream();
+            int oldTimeout = socket.getSoTimeout();
+            socket.setSoTimeout(4 * CONNECT_TIMEOUT);
+            boolean rv = is.read() == I2PClient.PROTOCOL_BYTE;
+            socket.setSoTimeout(oldTimeout);
+            return rv;
+        } catch (IOException ioe) {}
+        if (_log.shouldLog(Log.WARN))
+             _log.warn("Peer did not authenticate themselves as I2CP quickly enough, dropping");
+        return false;
+    }
+}