diff --git a/i2p2www/pages/site/about/browser-config.html b/i2p2www/pages/site/about/browser-config.html index ac2056bd..e3b56988 100644 --- a/i2p2www/pages/site/about/browser-config.html +++ b/i2p2www/pages/site/about/browser-config.html @@ -91,10 +91,10 @@ that only set amount of accesses are allowed per client. Once the limit is reached, the client is blocked out for a timeframe of 1min/1h/1 day. Be respectful and do not overload these services with too many requests! {%- endtrans %}
-{% trans -%} +
{% trans tpb=i2pconv('tpb.i2p') -%}
Filtering is active on these outproxies (for example, mibbit and torrent
tracker access is blocked). Note that even though the pirate bay is blocked
-they host an official eepsite at tpb.i2p. Eepsites
+they host an official eepsite at {{ tpb }}. Eepsites
that are accessible via .i2p addresses are also not allowed via the outproxies.
As a convenience, False.i2p
blocks ad servers.
{%- endtrans %}
{% trans modpow='http://java.sun.com/j2se/1.4.2/docs/api/java/math/BigInteger.html#modPow(java.math.BigInteger,%20java.math.BigInteger)', +
{% trans modpow='http://docs.oracle.com/javase/1.4.2/docs/api/java/math/BigInteger.html#modPow(java.math.BigInteger,%20java.math.BigInteger)', +gmp='http://gmplib.org/', jbigi=site_url('misc/jbigi') -%} When I last profiled the I2P code, the vast majority of time was spent within one function: java.math.BigInteger's modPow. Rather than try to tune this method, we'll call out to -GNU MP - an insanely fast math library +GNU MP - an insanely fast math library (with tuned assembler for many architectures). (Editor: see NativeBigInteger for faster public key cryptography) {%- endtrans %}
diff --git a/i2p2www/pages/site/about/team.html b/i2p2www/pages/site/about/team.html index bbdff18f..68974c6e 100644 --- a/i2p2www/pages/site/about/team.html +++ b/i2p2www/pages/site/about/team.html @@ -37,7 +37,7 @@ network.{% trans -%} +
{% trans tahoe='https://tahoe-lafs.org/trac/tahoe-lafs' -%} Compared to I2P, Freenet offers some substantial benefits - it is a distributed data store, while I2P is not, allowing people to retrieve the content published by others even when the publisher is no longer online. In addition, it should be able to @@ -22,7 +22,7 @@ this functionality. On the other hand, there is overlap for users who simply wa communicate with each other anonymously through websites, message boards, file sharing programs, etc. There have also been some attempts to develop a distributed data store to run on top of I2P, -(most recently a port of Tahoe-LAFS) +(most recently a port of Tahoe-LAFS) but nothing is yet ready for general use. {%- endtrans %}
diff --git a/i2p2www/pages/site/comparison/other-networks.html b/i2p2www/pages/site/comparison/other-networks.html index a8040c4e..61373ac3 100644 --- a/i2p2www/pages/site/comparison/other-networks.html +++ b/i2p2www/pages/site/comparison/other-networks.html @@ -23,8 +23,8 @@ You may contribute an analysis by entering a{% trans threatmodel=site_url('docs/how/threat-model') -%} Morphmix and Tarzan are both fully distributed, peer to peer networks of @@ -174,7 +174,7 @@ both Mixminion and Mixmaster take the directory based approach as well.
{% trans -%} +
{% trans url='https://www.datenschutzzentrum.de/material/themen/presse/anonip3_e.htm' -%} JAP (Java Anonymous Proxy) is a network of mix cascades for anonymizing web requests, and as such it has a few centralized nodes (participants in the cascade) that blend and mix requests from clients through the sequence of nodes (the cascade) before @@ -184,7 +184,7 @@ are not satisfied with an Anonymizer-like service, JAP is worth reviewing. One caution to note is that anyone under the jurisdiction of the German courts may want to take care, as the German Federal Bureau of Criminal Investigation (FBCI) has successfully mounted an -attack +attack on the network. Even though the method of this attack was later found to be illegal in the German courts, the fact that the data was successfully collected is the concern. Courts change their minds based upon circumstance, and this is evidence that @@ -194,11 +194,11 @@ if it may be found inadmissible in some courts later)
{% trans -%} +
{% trans antnet='http://citeseer.ist.psu.edu/57701.html' -%} Both of these systems work through the same basic -antnet routing, providing some degree of +antnet routing, providing some degree of anonymity based on the threat model of providing plausible deniability against a simple non-colluding adversary. With the antnet routing, they first either do a random walk or a broadcast search to find some peer with the data or identity desired, and then use a feedback diff --git a/i2p2www/pages/site/contact.html b/i2p2www/pages/site/contact.html index c10ee671..e8c5502f 100644 --- a/i2p2www/pages/site/contact.html +++ b/i2p2www/pages/site/contact.html @@ -4,7 +4,7 @@
{% trans -%} Our primary IRC network is the Irc2P network within I2P; a default tunnel to this network is set up with new router installs. - We are also present on multiple standard networks like OFTC, + We are also present on multiple standard networks like OFTC, EIN and Freenode. All I2P-related channels on all these network are linked to the main channels on Irc2P via relay bots. {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/api/i2pcontrol.html b/i2p2www/pages/site/docs/api/i2pcontrol.html index c5052edf..d3f50466 100644 --- a/i2p2www/pages/site/docs/api/i2pcontrol.html +++ b/i2p2www/pages/site/docs/api/i2pcontrol.html @@ -57,7 +57,7 @@ Parameters are only provided in a named way (maps).{% trans i2cp=site_url('docs/protocol/i2cp'), i2psktmf='http://docs.i2p-projekt.de/javadoc/net/i2p/client/streaming/I2PSocketManagerFactory.html', i2psktm='http://docs.i2p-projekt.de/javadoc/net/i2p/client/streaming/I2PSocketManager.html', -i2psess='http://docs.i2p-projekt.de/javadoc/net/i2p/client/streaming/I2PSession.html', +i2psess='http://docs.i2p-projekt.de/javadoc/net/i2p/client/I2PSession.html', i2pskt='http://docs.i2p-projekt.de/javadoc/net/i2p/client/streaming/I2PSocket.html', i2psskt='http://docs.i2p-projekt.de/javadoc/net/i2p/client/streaming/I2PServerSocket.html' -%} The standard interface to the streaming lib is for the application to use the diff --git a/i2p2www/pages/site/docs/applications/supported.html b/i2p2www/pages/site/docs/applications/supported.html index 52f0ce66..f454e644 100644 --- a/i2p2www/pages/site/docs/applications/supported.html +++ b/i2p2www/pages/site/docs/applications/supported.html @@ -197,7 +197,7 @@ shortcuts. -->
El Dorado — +
El Dorado — {% trans %}Lightweight forum software.{% endtrans %} [{{ _('standalone/mod') }}]
phpBB — +
phpBB — {% trans %}Most popular open source forum software.{% endtrans %} [{{ _('standalone/mod') }}]
Monotone — +
Monotone — {% trans monotone=site_url('get-involved/guides/monotone') -%} Another distributed version control system. Currently used in I2P development. @@ -407,7 +407,7 @@ branch of the I2P Monotone repository.
I2Phex — {% trans stats=i2pconv('stats.i2p') -%} -Port of the Phex Gnutella client. Website +Port of the Phex Gnutella client. Website for plugin version here. {%- endtrans %} [{{ _('plugin') }}, {{ _('standalone') }}]
@@ -502,7 +502,7 @@ developers; they may be able to solve it via additional filtering.jIRCii — +
jIRCii — {% trans stats=i2pconv('stats.i2p') -%} Small Java-based IRC client. Plugin available here. @@ -694,7 +694,7 @@ currently serve content on the I2P network are:
nginx — +
nginx — {% trans %}High-performance lightweight web server.{% endtrans %} [{{ _('standalone') }}]
NOTE: The following is a discussion of the history of netdb implementation and is not current information. -See the main netdb page for current documentation
-(this is adapted from the I2P meeting Jan. 2, 2007)
+(this is adapted from the I2P meeting Jan. 2, 2007)
The Kademlia netDb just wasn't working properly.
Is it dead forever or will it be coming back?
@@ -282,7 +282,7 @@ Not necessarily DHT-based.
NOTE: The following is not current information. -See the main netdb page for the current status and a list of future work. +See the main netdb page for the current status and a list of future work.
The network was down to only one floodfill for a couple of hours on March 13, 2008 (approx. 18:00 - 20:00 UTC), @@ -365,7 +365,7 @@ we are now at the minimum number of stats required to monitor the network.
{% trans commonstructures=site_url('docs/spec/common-structures'),
pdf='http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.5952&rep=rep1&type=pdf',
-benchmarks=site_url('misc/benchmarks') -%}
+benchmarks=site_url('misc/benchmarks'),
+oldbenchmarks='http://www.eskimo.com/~weidai/benchmarks.html' -%}
While the standard exponent size is 2048 bits (256 bytes) and the I2P
PrivateKey
is a full 256 bytes,
@@ -150,7 +151,7 @@ we use the short exponent size of 226 bits (28.25 bytes).
This should be safe for use with the Oakley primes, per
On Diffie-Hellman Key Agreement with Short Exponents - van Oorschot, Weiner
at EuroCrypt 96, and crypto++'s benchmarks.
-Benchmarks originally at this link, now dead,
+Benchmarks originally at {{ oldbenchmarks }}
(now dead),
rescued from the wayback machine, dated Apr 23, 2008.
{%- endtrans %}
{% trans -%} diff --git a/i2p2www/pages/site/docs/how/intro.html b/i2p2www/pages/site/docs/how/intro.html index a9374630..93ec5cc1 100644 --- a/i2p2www/pages/site/docs/how/intro.html +++ b/i2p2www/pages/site/docs/how/intro.html @@ -151,10 +151,11 @@ the network (N) bears no impact. {%- endtrans %}
{% trans roadmap=site_url('get-involved/roadmap') -%} +
{% trans roadmap=site_url('get-involved/roadmap'), +jms='http://www.oracle.com/technetwork/java/jms/index.html' -%} I2P initially began in Feb 2003 as a proposed modification to Freenet to allow it to use alternate transports, such as JMS, then grew into its own as an +href="{{ jms }}">JMS, then grew into its own as an 'anonCommFramework' in April 2003, turning into I2P in July, with code being written in earnest starting in August '03. I2P is currently under development, following the roadmap. diff --git a/i2p2www/pages/site/docs/how/network-database.html b/i2p2www/pages/site/docs/how/network-database.html index 4c677a7b..45bde67c 100644 --- a/i2p2www/pages/site/docs/how/network-database.html +++ b/i2p2www/pages/site/docs/how/network-database.html @@ -747,7 +747,7 @@ for a discussion of the vulnerabilities of peer selection for tunnels. {%- endtrans %}
{% trans pdf='https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf' -%} +
{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%} (Reference: In Search of an Anonymous and Secure Lookup Section 3) {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/how/peer-selection.html b/i2p2www/pages/site/docs/how/peer-selection.html index 2537ef3e..fd26f061 100644 --- a/i2p2www/pages/site/docs/how/peer-selection.html +++ b/i2p2www/pages/site/docs/how/peer-selection.html @@ -250,8 +250,8 @@ Peers for which a recent connection attempt failed are not used.{% trans pdf='http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf', -pdf2008='http://prisms.cs.umass.edu/brian/pubs/wright.tissec.2008.pdf', +
{% trans pdf='http://forensics.umass.edu/pubs/wright-tissec.pdf', +pdf2008='http://forensics.umass.edu/pubs/wright.tissec.2008.pdf', tunnelimpl=site_url('docs/tunnels/implementation') -%} Peers are ordered within tunnels to to deal with the predecessor attack @@ -306,7 +306,7 @@ please keep in mind the following minor changes in I2P since the paper's publica
{% trans netdb=site_url('docs/how/networkdatabase') -%} +
{% trans netdb=site_url('docs/how/network-database') -%} Also discussed on the network database page (bootstrap attack). {%- endtrans %}
@@ -470,8 +470,8 @@ was specifically designed to combat the predecessor attack. See also the intersection attack. {%- endtrans %} -{% trans pdf2008='http://prisms.cs.umass.edu/brian/pubs/wright.tissec.2008.pdf', -pdf2004='http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf' -%} +
{% trans pdf2008='http://forensics.umass.edu/pubs/wright.tissec.2008.pdf', +pdf2004='http://forensics.umass.edu/pubs/wright-tissec.pdf' -%} References: {{ pdf2008 }} which is an update to the 2004 predecessor attack paper {{ pdf2004 }}. @@ -627,7 +627,7 @@ for more Sybil discussion.
{% trans pdf='https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf' -%} +
{% trans pdf='http://www.eecs.berkeley.edu/~pmittal/publications/nisan-torsk-ccs10.pdf' -%} (Reference: In Search of an Anonymouns and Secure Lookup Section 5.2) {%- endtrans %}
diff --git a/i2p2www/pages/site/docs/index.html b/i2p2www/pages/site/docs/index.html index 5f8a2341..5b860b55 100644 --- a/i2p2www/pages/site/docs/index.html +++ b/i2p2www/pages/site/docs/index.html @@ -227,7 +227,7 @@ Traditionally used only by Java applications and higher-level APIs.{{ _('Field') }} | {{ _('Length') }} | {{ _('Contents') }} - | |
---|---|---|---|
sendStreamId | 4 byte Integer | Random number selected by the connection recipient + | |
sendStreamId | 4 byte Integer | Random number selected by the connection recipient and constant for the life of the connection. 0 in the SYN message sent by the originator, and in subsequent messages, until a SYN reply is received, containing the peer's stream ID. - | |
receiveStreamId | 4 byte Integer | Random number selected by the connection originator + | |
receiveStreamId | 4 byte Integer | Random number selected by the connection originator and constant for the life of the connection. May be 0 if unknown, for example in a RESET packet. - | |
sequenceNum | 4 byte Integer | + | |
sequenceNum | 4 byte Integer | The sequence for this message, starting at 0 in the SYN message, and incremented by 1 in each message except for plain ACKs and retransmissions. If the sequenceNum is 0 and the SYN flag is not set, this is a plain ACK packet that should not be ACKed. - | |
ackThrough | 4 byte Integer | + | |
ackThrough | 4 byte Integer | The highest packet sequence number that was received on the receiveStreamId. This field is ignored on the initial connection packet (where receiveStreamId is the unknown id) or @@ -55,14 +55,14 @@ if the NO_ACK flag set. All packets up to and including this sequence number are ACKed, EXCEPT for those listed in NACKs below. - | |
NACK count | 1 byte Integer | + | |
NACK count | 1 byte Integer | The number of 4-byte NACKs in the next field - | |
NACKs | n * 4 byte Integers | + | |
NACKs | n * 4 byte Integers | Sequence numbers less than ackThrough that are not yet received. Two NACKs of a packet is a request for a 'fast retransmit' of that packet. - | |
resendDelay | 1 byte Integer | + | |
resendDelay | 1 byte Integer | How long is the creator of this packet going to wait before resending this packet (if it hasn't yet been ACKed). The value is seconds since the packet was created. @@ -71,7 +71,7 @@ Currently ignored on receive. | |
flags | 2 byte value | See below. - | |
option size | 2 byte Integer | + | |
option size | 2 byte Integer | The number of bytes in the next field | |
option data | 0 or more bytes | @@ -103,23 +103,23 @@ SIGNATURE_INCLUDED must be set also. | |
2 | RESET | -- | Abnormal close. SIGNATURE_INCLUDED must be set also. - |
3 | SIGNATURE_INCLUDED | 40 byte DSA Signature + | |
3 | SIGNATURE_INCLUDED | 40 byte DSA Signature | Currently sent only with SYNCHRONIZE, CLOSE, and RESET, where it is required. -The signature uses the Destination's DSA signing keys +The signature uses the Destination's DSA signing keys to sign the entire header and payload with the 40-byte space in the option data field for the signature being set to all zeroes. |
4 | SIGNATURE_REQUESTED | -- | Unused. Requests every packet in the other direction to have SIGNATURE_INCLUDED - |
5 | FROM_INCLUDED | 387+ byte Destination + | |
5 | FROM_INCLUDED | 387+ byte Destination | Currently sent only with SYNCHRONIZE, where it is required. - |
6 | DELAY_REQUESTED | 2 byte Integer | + |
6 | DELAY_REQUESTED | 2 byte Integer | Optional delay. How many milliseconds the sender of this packet wants the recipient to wait before sending any more data. A value greater than 60000 indicates choking. - |
7 | MAX_PACKET_SIZE_INCLUDED | 2 byte Integer | + |
7 | MAX_PACKET_SIZE_INCLUDED | 2 byte Integer | Currently sent with SYNCHRONIZE only. Was also sent in retransmitted packets until release 0.9.1. |
8 | PROFILE_INTERACTIVE | -- |