From 752e1c6a423abf52aa5867a3e5d76cb006cc3b0f Mon Sep 17 00:00:00 2001
From: zzz
Date: Sat, 2 Jun 2012 13:53:04 +0000
Subject: [PATCH] update
---
www.i2p2/pages/how_networkdatabase.html | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/www.i2p2/pages/how_networkdatabase.html b/www.i2p2/pages/how_networkdatabase.html
index 011ac5bc..3f44ccba 100644
--- a/www.i2p2/pages/how_networkdatabase.html
+++ b/www.i2p2/pages/how_networkdatabase.html
@@ -3,7 +3,7 @@
{% block content %}
- Updated August 2011, current as of router version 0.8.9
+ Updated June 2012, current as of router version 0.9
Overview
@@ -78,7 +78,6 @@
Current statistics are limited to:
- - 1 hour average bandwidth (average of outbound and inbound bandwidth)
- Client and exploratory tunnel build success, reject, and timeout rates
- 1 hour average number of participating tunnels
@@ -659,7 +658,8 @@ This attack becomes more difficult as the network size grows.
Several defenses are possible, and most of these are planned:
- - Switching from HTTP to HTTPS for reseeding, with SSL certificate verification
+
- Disallow fallback from HTTPS to HTTP for reseeding.
+ A MITM attacker could simply block HTTPS, then respond to the HTTP.
- Changing the reseed task to fetch a subset of RouterInfos from
each of several reseed sites rather than using only a single site
- Creating an out-of-network reseed monitoring service that