diff --git a/i2p2www/pages/downloads/debian.html b/i2p2www/pages/downloads/debian.html index f306a05b..0efe4a76 100644 --- a/i2p2www/pages/downloads/debian.html +++ b/i2p2www/pages/downloads/debian.html @@ -96,8 +96,8 @@ user to root with "su" or by prefixing each command with "sudo").
  • {% trans %}Add the following entries to /etc/apt/sources.list.d/i2p.list{% endtrans %}
    -     deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu raring main
    -    deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu raring main

    +     deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main
    +    deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main

  • {% trans %}Notify your package manager of the new PPA by entering{% endtrans %}
    diff --git a/i2p2www/pages/site/docs/api/streaming.html b/i2p2www/pages/site/docs/api/streaming.html index 0fc04827..2c9161b0 100644 --- a/i2p2www/pages/site/docs/api/streaming.html +++ b/i2p2www/pages/site/docs/api/streaming.html @@ -1,7 +1,7 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}Streaming Library{% endtrans %}{% endblock %} {% block lastupdated %}{% trans %}July 2013{% endtrans %}{% endblock %} -{% block accuratefor %}0.9.6{% endblock %} +{% block accuratefor %}0.9.7{% endblock %} {% block content %}

    {% trans %}Overview{% endtrans %}

    @@ -134,10 +134,26 @@ Use the access list as a blacklist for incoming connections. As of release {{ release }}. {%- endtrans %} + + i2p.streaming.answerPingstrue{% trans -%} Whether to respond to incoming pings {%- endtrans %} + + i2p.streaming.blacklistnull{% trans -%} Comma- or space-separated list of Base64 peer Hashes to be blacklisted for incoming connections to ALL destinations in the context. @@ -198,12 +214,31 @@ The initial value of the resend delay field in the packet header, times 1000. Not fully implemented; see below. {%- endtrans %} -i2p.streaming.initialRTT8000 ({% trans %}if no sharing data available{% endtrans %}) +i2p.streaming.initialRTO9000{% trans -%} +Initial timeout +(if no sharing data available). +{%- endtrans %} {% trans release='0.9.8' -%} +As of release {{ release }}. +{%- endtrans %} + +i2p.streaming.initialRTT8000 {% trans -%} +Initial round trip time estimate +(if no sharing data available). +Disabled as of release 0.9.8; uses actual RTT. +{%- endtrans %} i2p.streaming.initialWindowSize6({% trans %}if no sharing data available{% endtrans %}) {% trans -%} In standard TCP, window sizes are in bytes, while in I2P, window sizes are in messages. {%- endtrans %} + + i2p.streaming.maxConcurrentStreams-1 {% trans -%} (0 or negative value means unlimited) This is a total limit for incoming and outgoing combined. @@ -273,6 +308,27 @@ while in I2P, window sizes are in messages. A higher number means slower growth. {%- endtrans %} +i2p.streaming.tcbcache.rttDampening0.75{% trans -%} +Ref: RFC 2140. Floating point value. +May be set only via context properties, not connection options. +{%- endtrans %} {% trans release='0.9.8' -%} +As of release {{ release }}. +{%- endtrans %} + +i2p.streaming.tcbcache.rttdevDampening0.75{% trans -%} +Ref: RFC 2140. Floating point value. +May be set only via context properties, not connection options. +{%- endtrans %} {% trans release='0.9.8' -%} +As of release {{ release }}. +{%- endtrans %} + +i2p.streaming.tcbcache.wdwDampening0.75{% trans -%} +Ref: RFC 2140. Floating point value. +May be set only via context properties, not connection options. +{%- endtrans %} {% trans release='0.9.8' -%} +As of release {{ release }}. +{%- endtrans %} + i2p.streaming.writeTimeout-1{% trans -%} How long to block on write/flush, in milliseconds. Negative means indefinitely. {%- endtrans %} @@ -360,8 +416,8 @@ CLOSE packets may contain data as well.

    {% trans %}Control Block Sharing{% endtrans %}

    {% trans -%} The streaming lib supports "TCP" Control Block sharing. -This shares two important streaming lib parameters -(window size and round trip time) +This shares three important streaming lib parameters +(window size, round trip time, round trip time variance) across connections to the same remote peer. This is used for "temporal" sharing at connection open/close time, not "ensemble" sharing during a connection (See @@ -370,7 +426,14 @@ There is a separate share per ConnectionManager (i.e. per local Destination) so that there is no information leakage to other Destinations on the same router. The share data for a given peer expires after a few minutes. -{%- endtrans %}

    +The following Control Block Sharing parameters can be set per router: +{%- endtrans %} + +

    {% trans %}Other Parameters{% endtrans %}

    {% trans -%} @@ -381,10 +444,12 @@ The following parameters are hardcoded, but may be of interest for analysis:

  • MAX_RESEND_DELAY = 45*1000 (maximum RTO)
  • MIN_WINDOW_SIZE = 1
  • TREND_COUNT = 3 -
  • RTT_DAMPENING = 0.875
  • MIN_MESSAGE_SIZE = 512 (minimum MTU)
  • INBOUND_BUFFER_SIZE = maxMessageSize * (maxWindowSize + 2) -
  • INITIAL_TIMEOUT = 1.5 * initialRTT +
  • INITIAL_TIMEOUT (valid only before RTT is sampled) = 9000 +
  • "alpha" ( RTT dampening factor as per RFC 6298 ) = 0.125
  • +
  • "beta" ( RTTDEV dampening factor as per RFC 6298 ) = 0.25
  • +
  • "K" ( RTDEV multiplier as per RFC 6298 ) = 4
  • PASSIVE_FLUSH_DELAY = 250
  • Maximum RTT estimate: 60*1000 diff --git a/i2p2www/pages/site/docs/spec/common-structures.html b/i2p2www/pages/site/docs/spec/common-structures.html index b3dec1e1..2f8fd109 100644 --- a/i2p2www/pages/site/docs/spec/common-structures.html +++ b/i2p2www/pages/site/docs/spec/common-structures.html @@ -381,6 +381,14 @@ certificate :: Certificate total length: 387+ bytes {% endhighlight %} +

    Notes

    + +

    Javadoc

    Lease

    @@ -530,7 +538,7 @@ signature :: Signature @@ -868,6 +874,12 @@ Expiration :: Date (8 bytes)

    TunnelData

    +

    Description

    +

    + A message sent from a tunnel's gateway or participant to the next participant or endpoint. + The data is of fixed length, containing I2NP messages that are fragmented, batched, padded, and encrypted. +

    +

    Contents

    {% highlight lang='dataspec' %} +----+----+----+----+----+----+----+----+ | tunnnelID | data | @@ -900,6 +912,11 @@ data ::

    TunnelGateway

    +

    Description

    +

    + Wraps another I2NP message to be sent into a tunnel at the tunnel's inbound gateway. +

    +

    Contents

    {% highlight lang='dataspec' %} +----+----+----+----+----+----+----+-// | tunnelId | length | data... diff --git a/i2p2www/pages/site/docs/spec/ssu.html b/i2p2www/pages/site/docs/spec/ssu.html index 083541b7..b2f1b6da 100644 --- a/i2p2www/pages/site/docs/spec/ssu.html +++ b/i2p2www/pages/site/docs/spec/ssu.html @@ -1,7 +1,7 @@ {% extends "global/layout.html" %} {% block title %}SSU Protocol Specification{% endblock %} -{% block lastupdated %}June 2013{% endblock %} -{% block accuratefor %}0.9.6{% endblock %} +{% block lastupdated %}July 2013{% endblock %} +{% block accuratefor %}0.9.7{% endblock %} {% block content %} Note: IPv6 information is preliminary. @@ -154,18 +154,13 @@ bytes.

    All messages contain 0 or more bytes of padding. Each message must be padded to a 16 byte boundary, as required by the AES256 encryption layer. -Currently, messages are not padded beyond the next 16 byte boundary. -The fixed-size tunnel messages of 1024 bytes (at a higher layer) -provide a significant amount of protection. -In the future, additional padding in the transport layer up to -a set of fixed packet sizes may be appropriate to further hide the data -fragmentation to external adversaries. -

    -Through release 0.9.6, messages were only padded to the next 16 byte boundary, +Through release 0.9.7, messages were only padded to the next 16 byte boundary, and messages not a multiple of 16 bytes could possibly be invalid. As of release 0.9.7, messages may be padded to any length as long as the current MTU is honored. Any extra 1-15 padding bytes beyond the last block of 16 bytes cannot be encrypted or decrypted and will be ignored. However, the full length and all padding is included in the MAC calculation. +As of release 0.9.8, transmitted messages are not necessarily a multiple of 16 bytes. +The SessionConfirmed message is an exception, see below.

    @@ -392,7 +387,7 @@ bits 3-0: total identity fragments (F) 1-15
  • sessionKey - Fragment 0 through F-2 + Fragment 0 through F-2 (if F > 1): {% highlight lang='dataspec' %} +----+----+----+----+----+----+----+----+ |info| cursize | | @@ -407,7 +402,7 @@ bits 3-0: total identity fragments (F) 1-15 +----+----+----+----+----+----+----+----+ {% endhighlight %} - Fragment F-1: + Fragment F-1 (last or only fragment): {% highlight lang='dataspec' %} +----+----+----+----+----+----+----+----+ |info| cursize | | @@ -422,6 +417,7 @@ bits 3-0: total identity fragments (F) 1-15 | arbitrary amount of uninterpreted | | data, to 40 bytes prior to | | end of the current packet | + | Packet length must be mult. of 16 | +----+----+----+----+----+----+----+----+ | DSA signature | + + @@ -444,7 +440,9 @@ Typical size including header, in current implementation: 480 bytes In the current implementation, the maximum fragment size is 512 bytes.
  • The typical Router Identity -is 387 bytes, so no fragmentation is usually necessary. +is 387 bytes, so no fragmentation is ever necessary. +If new crypto extends the size of the RouterIdentity, the fragmentation scheme +must be tested carefully.
  • There is no mechanism for requesting or redelivering missing fragments.
  • @@ -453,6 +451,10 @@ The total fragments field F must be set identically in all fragments. See the Keys section above for details on DSA signatures.
  • Signed-on time appears to be unused or unverified in the current implementation. +
  • +Since the signature is at the end, the padding in the last or only packet must pad the total packet to +a multiple of 16 bytes, or the signature will not get decrypted correctly. +This is different from all the other message types, where the padding is at the end.
  • diff --git a/i2p2www/pages/site/docs/spec/updates.html b/i2p2www/pages/site/docs/spec/updates.html index be572f84..76781107 100644 --- a/i2p2www/pages/site/docs/spec/updates.html +++ b/i2p2www/pages/site/docs/spec/updates.html @@ -1,7 +1,7 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}I2P Software Update Specification{% endtrans %}{% endblock %} -{% block lastupdated %}{% trans %}May 2013{% endtrans %}{% endblock %} -{% block accuratefor %}0.9.6{% endblock %} +{% block lastupdated %}{% trans %}July 2013{% endtrans %}{% endblock %} +{% block accuratefor %}0.9.7{% endblock %} {% block content %}

    {% trans %}Overview{% endtrans %}

    {% trans -%} @@ -179,28 +179,28 @@ existing version checkers 8 unused -9 Version length (in bytes not chars, including padding) +9 Signature type 0x00 = DSA-160, 0x01 = new algo + +10-11 Signature length 40 (0x0028) = DSA-160 + +12 unused + +13 Version length (in bytes not chars, including padding) must be at least 16 (0x10) for compatibility -10 unused +14 unused -11 Signer ID length (in bytes not chars) +15 Signer ID length (in bytes not chars) -12-19 Compressed content length (not including header or sig) - -20 unused - -21 Compressed type 0x00 = zip - -22 unused - -23 Content type 0x00 = router w/o pack200, 0x01 = router w/ pack200, 0x02 = plugin +16-23 Compressed content length (not including header or sig) 24 unused -25 Signature type 0x00 = DSA-160, 0x01 = new algo +25 Compressed type 0x00 = zip -26-27 Signature length 40 (0x0028) = DSA-160 +26 unused + +27 Content type 0x00 = router w/o pack200, 0x01 = router w/ pack200, 0x02 = plugin 28-39 unused diff --git a/www.i2p2/pages/translations/debian_fr.html b/www.i2p2/pages/translations/debian_fr.html index f38181c2..b2f8e993 100644 --- a/www.i2p2/pages/translations/debian_fr.html +++ b/www.i2p2/pages/translations/debian_fr.html @@ -64,8 +64,8 @@ Les étapes suivantes doivent être effectuées avec l'accès root (c.à d. en b avec "su" ou en préfixant chaque commande avec "sudo").

    1. Ajoutez les entrées suivantes à /etc/apt/sources.list.d/i2p.list
      -     deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu raring main
      -    deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu raring main

      +     deb http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main
      +    deb-src http://ppa.launchpad.net/i2p-maintainers/i2p/ubuntu precise main

      Ces deux lignes devraient fonctionner quelle que soit la version de Debian installée.
    2. Ajouter la clé GPG de signature du dépôt avec la commande suivante: