{% extends "_layout.html" %} {% block title %}I2P Development Meeting 153{% endblock %} {% block content %}

I2P dev meeting, October 25, 2005

16:24 < jrandom> 0) hi

16:24 < jrandom> 1) Net status

16:24 < jrandom> 2) Fortuna integration

16:24 < jrandom> 3) GCJ status

16:24 < jrandom> 4) i2psnark returns

16:24 < jrandom> 5) More on bootstrapping

16:24 < jrandom> 6) Virus investigations

16:24 < jrandom> 7) ???

16:24 < jrandom> 0) hi

16:24 * jrandom waves

16:24 < jrandom> weekly status notes posted up @ http://dev.i2p.net/pipermail/i2p/2005-October/001079.html

16:25 * susi23 waves back

16:26 < jrandom> lets jump on in to 1) net status

16:26 < jrandom> as I mentioned, things look pretty reasonable so far.

16:26 <+fox> <Romster> ah meeting sweet

16:27 < jrandom> there is some good stuff coming down the line too, so we'll have a new release later this week

16:27 < jrandom> anyone have anything they want to bring up regarding 1) net status?

16:27 <@cervantes> omg 7 issues

16:27 <+legion> yup looking good :-)

16:27 < jrandom> busy week cervantes :)

16:28 <@cervantes> can only be good

16:28 <+Complication> Works relatively well, dev.i2p even - I can even pull CVS checkouts without EOF messages.

16:28 < jrandom> nice :)

16:28 <+Complication> Might have been release-related overloads, those last ones.

16:28 <+Complication> But I can't tell.

16:28 < jrandom> dev.i2p is on the latest build code too (-7), so it'll be hopefully performing substantially better than before

16:29 < jrandom> s/dev.i2p/cvs.i2p (etc)/

16:29 <+legion> forums.i2p also seems to be much better than before :)

16:29 <@cervantes> *ahem*

16:29 <+fox> <Romster> is i2p safe to let others join etc?

16:29 <+Ragnarok> ok, now I've got to try this miraculous "cvs checkout that works the first time"

16:30 <+fox> <Romster> since there is no known limits now

16:30 <@cervantes> that's because everyone's hammering i2p-list instead of posting to the forum

16:30 <+legion> hmm you sure cervantes?

16:30 < jrandom> Romster: well, we've been growing at a pretty good pace lately, but we should hold off on public beta until 0.6.2

16:30 < jrandom> heh cervantes ;)

16:30 < jrandom> hush Ragnarok, you'll jinx it!

16:31 <+Ragnarok> wow... it's true. I'm speechless

16:31 <+fox> <Romster> k jrandom

16:31 < jrandom> (man my eyes are watering from the curry my roomates are cooking downstairs)

16:31 < jrandom> nice1 Ragnarok

16:32 <+fox> <Romster> lol now that's a strong curry

16:32 < jrandom> ok, if there's nothing else on 1), we can jump quickly through 2) Fortuna integration

16:32 < jrandom> (true that Romster)

16:32 <+fox> <shardy> yay for fortuna integration!

16:32 <+fox> <Romster> moving onto 2) :P

16:32 <+fox> <Romster> what is fortuna?

16:32 < jrandom> heh thought you'd like that shardy :)

16:32 <+fox> <Romster> i've been a bit behind the last month

16:32 <+Complication> PRNG algo, if I remember.

16:33 <+Complication> Supposedly a good one, or so they write. :P

16:34 * Complication knows nothing about its inner workings, though

16:34 < jrandom> shardy: I'd love if you could give it a look sometime

16:34 <+fox> <shardy> of course

16:34 <+fox> <shardy> you're using the gnu implementation?

16:34 < jrandom> Romster/Complication: there are some links in the email

16:34 < jrandom> yeah shardy - http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/core/java/src/gnu/crypto/prng/Fortuna.java

16:35 < jrandom> (integrated with http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/core/java/src/net/i2p/util/FortunaRandomSource.java )

16:36 < jrandom> we vary from the straight gnu-crypto implementation though, since we've already got AES256 and SHA256 code (Cryptix's and Bouncycastle's, respectively)

16:36 < jrandom> ok, anyway, this looks cool, as we've been hacking through getting that support in there for probably a year now

16:37 < jrandom> (fortuna integration was one of the main projects driving smeghead to build 'pants' ;)

16:37 < jrandom> if anyone has any questions/comments/concerns about it, please bounce 'em to the list

16:37 < jrandom> (or email, or forum, of course)

16:38 <+fox> <Romster> yeah where is smeghead hes not been around for awhile now

16:38 < jrandom> smeghead is [redacted] doing [redacted]

16:39 < jrandom> ok, moving on to 3) GCJ status

16:39 < jrandom> i2p works on GCJ! [w00t!]

16:39 <+susi23> nice job

16:39 <+legion> sweet

16:39 < jrandom> at least, it does on GCJ 4.0.2 on linux 2.6.12. I haven't tried any other platforms

16:40 < jrandom> yeah, the GCJ and GNU Classpath folks have worked wonders

16:40 < jrandom> it was really easy to get it building, the old static reference classes I remember weren't necessary

16:41 <+Complication> Which sounds quite positive, given Sun Java's less-than complete openness (with regard to distribution, if I remember correct).

16:41 < jrandom> there's a makefile shipped with I2P now, though for simplicity, I think we'll probably stick with distributing pure java, at least primarily

16:41 <+susi23> (next we try to run it on J2ME ;)

16:42 <+fox> <Romster> GCJ to take over Suns JVM>

16:42 < cat-a-puss> how is preformance with GCJ?

16:42 < jrandom> aye, though sun is entirely open, and we /could/ distribute their JVM along side I2P, but their license prohibits distributing their JVM as a general purpose tool

16:42 < jrandom> cat-a-puss: comparable

16:42 < jrandom> most of the heavy work in i2p is already done by assembler code ;)

16:43 <+fox> <Romster> how would i2p go with C#/mono again with that jave to C# adition (forgot it's name)

16:43 <+fox> <Romster> i remember jrandom and i both tryed it out ages ago

16:43 < jrandom> no idea. but if it works with gcj, it might work with ikvm - the mono jvm thing

16:44 <+Ragnarok> IKVM

16:44 <+Ragnarok> nm

16:44 <+fox> <Romster> ah tahts the one ikvm

16:44 <+fox> <Romster> much difereances with GCJ and IKVM and Sun's?

16:45 < jrandom> i've never used ikvm

16:45 <+fox> <Romster> i'm sure you have once with mono or was that eclipse?

16:45 <+fox> * Romster shrugs

16:45 < jrandom> and i2p as shipped doesn't currently support the router console, though it does support the router operation, i2ptunnel, and sam

16:46 <+Ragnarok> what's blocking the router console?

16:47 <+susi23> xerces, when I remember correctly

16:47 < jrandom> xerces stuff. the xercesImpl shipped with i2p has sun.* dependencies, and when I naively tried to drop in the latest xerces, getting that and jdom and rome and the rest of jetty GCJed was b0rking

16:47 < jrandom> there are some additional requirements of the latest xerces, it seems

16:48 < jrandom> (for jar files we don't currently ship). however, I'm sure we can track it down

16:49 <+fox> <Romster> jrandom is good at tracking down problems :)

16:49 < jrandom> even better at making problems

16:49 <+fox> * Romster featches a coffee

16:49 < jrandom> ok, anything else on 3) GCJ status?

16:49 < jrandom> or shall we move on to 4) i2psnark

16:50 < jrandom> consider us moved

16:50 < jrandom> ok, i2psnark is back (yay)

16:51 < jrandom> not much I have to add to whats in the mail... you have anything Ragnarok?

16:51 <+Ragnarok> nope

16:51 <+susi23> regarding web frontend

16:51 <+Ragnarok> more testing would be nice though, so everyone should try it :)

16:52 <+susi23> supporting it with susibt shouldn't be a problem

16:52 < jrandom> ooh give us the scoop susi23 :)

16:52 < jrandom> nice

16:52 <+fox> <jme___> naive question, why spending time supporting old bt client while other (azureus) support full blown client ?

16:52 < jrandom> jme___: azureus *is* kickass

16:52 <+susi23> major release of susibt is scheduled for november :)

16:53 < jrandom> heh cool susi23

16:53 <+Complication> To me, Azureus seemed terribly complex.

16:53 <+Ragnarok> azureus blows monkey chunks

16:53 <+susi23> for me, I always need a headless solution

16:53 <+Ragnarok> not to put too fine a point on it

16:53 <+fox> <jme___> ok :)

16:53 < jrandom> jme___: azureus is a bit heavyweight though, but is a great general purpose bt solution

16:53 <+Complication> (I personally could see the day I'd misconfigure something in it, and dent my anonymity.)

16:54 <+fox> <jme___> it make sense, just wanted to know

16:54 <+fox> <Romster> to me azerious never workd well i've moved to bitlord which does work

16:54 < jrandom> i do still plan on helping further improve the azneti2p plugin with the azureus folks, but i2psnark took literally less than 2 hours before I was swarming data

16:54 <+legion> Yeah azureus is just too big and complicated for i2p

16:54 <+Complication> If the goal is bundling a bt client along with i2p, a lightweight client sounds best.

16:54 <+fox> <Romster> KISS principal

16:54 <+Ragnarok> I like the official client best, but i2psnark has the major advantage of being simple enough for me to hack on

16:55 <+legion> thing is i2p doesn't need a heavyweight bittorrent client

16:55 < jrandom> yeah, its really clean code (with oddball gnu formatting ;)

16:55 <+Ragnarok> damn gnu

16:55 <+Ragnarok> worst brace style ever

16:55 < jrandom> heh

16:55 <+fox> <Romster> heh code reformatter :)

16:55 <+Ragnarok> jrandom won't let me :)

16:55 <+Ragnarok> well, for good reason

16:55 <+fox> <jme___> independance and simplicity are criteria i definitly agree with

16:56 <+fox> <Romster> will there be options to enable the bt-torrent program on each i2p node?

16:56 < jrandom> aye, it'd be nice if we can backport multitorrent, piece selection, and web capacity to mjw's mainline snark

16:56 <+Ragnarok> the simpler it is, the more likely it will be maintained

16:56 < jrandom> exaaactly Ragnarok

16:57 <+legion> yeah backporting those would be killer

16:57 <+fox> <Romster> as a OT point here take a look at emules KAD network i think it's rather neat.

16:57 < jrandom> Romster: its now shipped with the build by default, but once we get it into susibt, it'll be on the top nav with the rest of the clients

16:58 <+Ragnarok> we need to be able to ship a .torrent maker as well, though. And a tracker would be nice.

16:58 < jrandom> yeah, actually, snark has both of those, I just disabled them because i didn't want to maintain 'em :)

16:58 <+legion> hmm good point ragnarok

16:58 < jrandom> but getting them back in wouldn't be much trouble

16:59 <+Ragnarok> well, the torrent maker at least shouldn't be that bad

16:59 < jrandom> there's a Tracker.java too, and handling in the PeerAcceptor, but I threw out what wasn't necessary, so one would probably want to look back at http://klomp.org/snark/ for those

17:00 < jrandom> (and review http://dev.i2p/~jrandom/snark_diff.txt for changes)

17:00 <+fox> <Romster> since snarik is back it'll get worked on right :)

17:00 <+legion> actually when it comes to a tracker, it'd be better to come up with a distributed solution

17:00 <+fox> <Romster> snark*

17:00 < jrandom> porting code is easier than building a new distributed tracker legion ;)

17:00 <+fox> <Romster> legion, your your talking

17:00 <+legion> true, that

17:01 < jrandom> but I wouldn't be opposed to integrating a nice clean maintained anonymity-friendly distributed tracker solution :)

17:01 <+fox> <Romster> could be tacked onto the eepsites?

17:01 * jrandom spots a flying pony go past the window

17:01 <+Ragnarok> the official bt client has a kademlia based distributed tracker, but obviously that's only good as a design reference

17:01 <+legion> a place to start ;)

17:02 <+fox> <Romster> actually kademlia = emules KAD netowrk? hmm, if that's the case KAD would be ideal for a tracker but bootstraping is an issue

17:03 <+Ragnarok> they're based on the same algorithm, but they're not in any way compatable

17:03 <+Ragnarok> compatible, even

17:04 <+Ragnarok> doing something like emule's KAD for i2phex would be sort of interesting...

17:04 <+Ragnarok> anyway, flying ponies

17:04 < jrandom> :)

17:04 < jrandom> (agreed on both counts)

17:04 < jrandom> ok, anything else on 4) i2psnark?

17:05 <+Ragnarok> as long as we have something to make .torrent files, the existing trackers are fine

17:05 < jrandom> thats a good point - there's some commented out code in Snark's main I believe

17:05 <+legion> no I think the existing trackers are not fine :(

17:05 < jrandom> whats wrong with them legion?

17:05 < cat-a-puss> don't just hand uesrs a torrent file ether

17:05 <+legion> often have trouble accessing them

17:06 < jrandom> hmm cat-a-puss? oh, you mean, we need to get a web interface to transparently swarm?

17:06 <+legion> sites get flooded with traffic

17:06 < jrandom> ah, thats i2p's issue, hopefully 0.6.1.4 will improve that

17:06 < jrandom> postman was telling me how he was getting tons of hits @ tracker.postman.i2p

17:06 < jrandom> i forget the #s offhand

17:06 < cat-a-puss> If we are handling both the swarming code and the code to get the torrent in the first place, might as well make it transparent for the user

17:07 < jrandom> orion.i2p/bt/ isn't really used though

17:07 < jrandom> (and tracker-fr seems lively)

17:07 <+susi23> with susibt I hope to include trackers rss feed, so you don't need to go on the trackers webpage anymore but get the torrents downloaded automatically :)

17:07 < cat-a-puss> also prevents confusing an i2p torrent with a non-anonymous one

17:07 <+fox> <jme___> http tracker for bt doesnt scale due to poorely designed protocol

17:07 <+fox> <Romster> router watchdog router hung hard restart wtf

17:07 <+legion> right, which is my point some trackers are flooded while others are idle

17:07 < jrandom> cat-a-puss: ah, yeah I'd love to integrate hooks from syndie into susibt :)

17:07 <+fox> <jme___> it can be easily fixed but break the compatibility with official bt protocol

17:08 <+fox> <jme___> it is the road followed by the dht tracker stuff

17:08 < jrandom> (and the other way around, so people can easily syndicate .torrent files, etc)

17:08 <+Complication> Romster: I get those, but the machine I get them on is borderline (300 MHz)

17:08 <+fox> <Romster> the distributed tracker is the solution to hammered trackers

17:08 < jrandom> legion: that can easily be remedied by people using different trackers :)

17:08 <+fox> <Romster> azerius DHT

17:08 < jrandom> code is expensive, using different URLs is cheap

17:08 <+legion> yeah, but they don't seem to be doing that do they?

17:09 < jrandom> but, yes, a distributed tracker would be great. not on my roadmap though, but if someone gets it going, that would Rule.

17:09 <+Complication> In due time... surely someone can go distributed too.

17:09 <+legion> Instead of of posting torrents to tracker sites, they could post a bith and whatever details to their eepsite.

17:10 < jrandom> bith == hash?

17:10 <+legion> yeah, stands for bittorrent hash, not my term

17:10 <+Complication> In the beginning, though... a simple and solid client, in Java, bundled with the router... can solve many problems. (Perhaps even pull signed updates without overloading dev.i2p.)

17:11 <+legion> yeah, that would be great

17:11 < jrandom> aye Complication

17:11 <+fox> <Romster> yeah torrent updates

17:11 <+fox> <Romster> ok next item ont he list :)

17:12 < jrandom> ok, 5) more on bootstrapping

17:12 <+legion> yeah lets move on

17:12 < jrandom> lots of interesting stuff on the list as of late, and no way am i going to summarize it all here :)

17:12 <+fox> <Romster> bootstraping the i2p router database?

17:12 < jrandom> anyone have any questions/comments/concerns they want to discuss about the thread?

17:12 < jrandom> Romster: see the list and/or email

17:12 <+fox> * Romster needs to read that list

17:13 < jrandom> aye, there's good stuff on there :)

17:13 <+fox> <Romster> i've been rather busy laterly

17:13 <+Complication> 26 messages to read through, can't comment yet

17:13 < jrandom> still no end result, but we're looking towards a new way of building tunnels for 0.6.2

17:14 <+fox> <Romster> a new way, is there a flay in the current method?

17:14 <+fox> <Romster> flaw*

17:14 < jrandom> Michael's analysis shows the attack is not really a problem now, as there are easier attacks on the alternatives

17:14 < jrandom> read the list ;)

17:14 <+fox> <Romster> arg later

17:14 <+fox> <Romster> this is now :)

17:15 <+fox> <Romster> i'm noramlly asleep at this time.

17:15 <+fox> <Romster> so i rearly get to be at a meeting

17:16 < cat-a-puss> can you post your ideas for a new way / existing / rejected ways in an email to the list so we can compare

17:16 <+fox> <Romster> so its todo with attack methods and tunnel creation i assume, without reading the list yet

17:16 < cat-a-puss> (that's for Jrandom)

17:16 < jrandom> cat-a-puss: i'm not sure if we've really hashed out an end result yet

17:16 <+fox> <Romster> be an idea cat-a-puss

17:17 <+Complication> Romster: yes, it was more-or-less about giving the endpoint of an exploratory tunnel less influence as a possible attacker

17:17 < jrandom> but http://dev.i2p.net/pipermail/i2p/2005-October/001073.html is the latest for what I see coming out of your suggestion

17:17 < jrandom> well, not influence - i2p is a free route mixnet - but less information

17:18 <+Complication> Yes, that would likely be a more correct term

17:18 < jrandom> (the above linked url is full of arm waving, no solid crypto figured out yet)

17:18 <+fox> <Romster> lesss = better for more robustness agenst attacks, i get what your geting at

17:18 < jrandom> ((but i think its all doable with existing techniques)

17:19 < jrandom> Romster: here's a plot of Michael's attack against the existing algorithm, with the X axist saying what % of the network is compromised - http://dev.i2p.net/~jrandom/fraction-of-attackers.png

17:20 < jrandom> (plain telescopic building would be off the chart before hitting x=200)

17:20 < jrandom> ((so what we have now is literally orders of magnitude better))

17:20 < jrandom> but we can improve upon that further

17:21 < jrandom> though there's also the garlic routing alternative too

17:21 < jrandom> anyway, yeah, more things to be hashed out, keep an eye on the list :)

17:21 <+fox> <Romster> ok i'll have a good read of that list later

17:22 <+fox> <Romster> and see if i can think of anything too add

17:22 < jrandom> cool

17:22 < cat-a-puss> would the "new" telescopic method be fast enough to do on demand construction?

17:22 < jrandom> I'm not sure we want that

17:22 < jrandom> its the O(1) vs O(N) issue

17:23 < jrandom> the new technique would allow tunnel creation without using the exploratory tunnels, leavng the exploratory tunnels for netDb operation

17:23 < jrandom> (and for exploratory tunnel creation :)

17:24 <+fox> <Romster> hrmm would it be worthwhile screwing with the hackers by givving them heaps of false positives thereby masking the real source

17:24 <+legion> sounds good :)

17:24 <+legion> I'd think some screwing like that would be good

17:24 < cat-a-puss> jrandom: right, I was asking if doing do would speed things up enough, so that sometimes that last hops don't know they are the last hop, as disguesed on list.

17:25 <+fox> <Romster> exploratory tunnels to collect netDB router refereances?

17:25 < jrandom> romster: we are the hackers ;) but yeah, if the false positives overwhelmed the true positives, it'd require substantially large number of attacks to get statistically significant data

17:26 < jrandom> hmm right cat-a-puss, but I'm not sure how that'd speed things up though, it'd move us from an O(1) to O(N) tunnel topology

17:26 < jrandom> or what do you mean by speed things up?

17:26 <+fox> <Romster> and if it got to the point of being detected it could then drop off and go silent forawhile?

17:26 < jrandom> using the new technique would reduce the failed tunnel creations, certainly

17:26 <+fox> <Romster> or mistearly change it's key and continue or something heh

17:26 < jrandom> romster: it'd probably be worth digging through the mails to review the attack ;)

17:27 <+fox> <Romster> yeah after sleep

17:27 <+Complication> Romster: afaik, it's a passive attack mostly, so the target can't detect it occurring

17:27 <+fox> <Romster> and fixing a friends pc i got sitting here

17:27 <+fox> <Romster> ah ic complication.

17:27 < cat-a-puss> jrandom: I'm not talking about the O(n) thing. I mean just waiting to construct a client tunnel until we need one for some apps, rather than just having them sit there all the time.

17:28 <+Complication> (but I might be wrong, and those last 26 messages might have active components)

17:28 <+fox> <Romster> would a long term passive attack evently find the target?

17:28 <+fox> <Romster> i'll comment after i've read the list

17:28 < jrandom> ah cat-a-puss, we'll certainly improve the tunnel pooling for 0.6.2. we currently only build the tunnel when we need it (giving ourselves a little time in case the creation fails)

17:28 <+Complication> Romster: well, persisting the attack beyond tunnel lifetime would require resources and patience

17:28 <+fox> <Romster> and understand it better

17:29 <+Complication> But time plays a part in every probability of success. You try long, you get more chances.

17:29 <+fox> <Romster> ah that's the idea tunnel life tiem be too short to actually have a worthwhile attack work.

17:29 < jrandom> each pool has a defined number of backup tunnels, and we by default build replacements between 60-120 seconds before an old one expires

17:29 <+fox> <Romster> time*

17:30 < jrandom> right Complication - each sample occurs only 'm' times every (c/n) tunnels

17:30 <+fox> <Romster> there is no interaction between each tunnel to gather stastics?

17:30 <+fox> <Romster> as one is about to die and another is being built

17:31 < jrandom> romster: the new tunnels do not talk to each other, no, but thats not the attack Michael has been describing

17:31 < jrandom> there are countless attacks out there, most of which we have dealt with, but whenever someone comes up with one that may have a bearing on I2P's operation, we want to analyze it further

17:31 <+fox> <Romster> must read the list, ok i'll leave it at that for now, anyone else got anything to say?

17:32 < jrandom> ok, if there's nothing else, lets move on to 6) virus investigations

17:32 <+fox> <Romster> actually one stastic i can see could be gathered is no 0 hop would mean that the next hop is not the end point so it could be ruled otu but with millions of nodes that analying technique would be useless

17:33 < jrandom> I don't have anything to add beyond whats been discussed on the forum

17:33 < jrandom> right Romster, there are predecessor attacks on tunnel length, which is one of the main things we're addressing in 0.6.2

17:33 <+fox> <Romster> virus, what virus, if it's linux it'll be nonexistant, but windows hmmm

17:34 <+Complication> Well, although I couldn't build a matching binary (hell knows hy) the final difference was small enough... to hopefully be useful to anyone interested in reading assembly code.

17:34 < jrandom> Romster: please, the weekly status notes should explain these agenda items, and the meeting is to discuss things /beyond/ whats in the notes ;)

17:35 <+Complication> I sure couldn't find anything obvious in there, but nor could I explain away all the difference.

17:35 <@cervantes> rtfml and rtff

17:35 <+fox> <Romster> yeah i haven't been upto speed for quite awhile, sorry about taht jrandom

17:35 <@cervantes> ;-)

17:35 < jrandom> aye, the fact that both a known safe bat file and the old one triggered the same detection code is substantial

17:35 <+Complication> Yes, that sort of eases doubts.

17:36 <+Complication> I guess the QBFC might have undocumented differences within the same version number (different builds?)

17:37 * jrandom has no idea, but its possibly just some OS interaction, or whatever. I don't know, you've put up enough analysis for people to make their own informed decision

17:37 <+Complication> I think it's better that way.

17:37 <+Complication> Disassembly is really notably outside my usual playground.

17:37 < jrandom> legion: is there anything you want to mention about this, or should people just go through the forum if they want more info?

17:38 <@cervantes> can I just re-iterate what others have said on the forum, and thank Complication for the time and maticulous attempts he's put in to checking this issue out

17:38 < jrandom> aye, its much appreciated

17:38 <+legion> I've nothing to add, I feel that I've said way too much about it already

17:39 < jrandom> 'k understood. ok, anyone else have anything to bring up on this, or shall we move on to 7) ???

17:39 < jrandom> [consider us moved]

17:40 <+fox> * Romster seconds that :)

17:40 <+legion> ok for 7)??? how about we take a moment to discuss i2phex

17:40 < jrandom> cool, good idea

17:40 <+fox> <Romster> since i'm using it right now even :)

17:40 <@cervantes> no no group hug first

17:40 < jrandom> redzara mentioned he was going to be at the meeting, but progress on the merge is going slow

17:41 <+legion> susi23 inquired about a headless version

17:41 < jrandom> ah cool, i saw your post on that

17:41 <+fox> <Romster> might i add the favourites list needs to be wider to cope with the longer i2p keys

17:42 <+susi23> (that's no must, I was just curious about it)

17:42 < jrandom> well, no one can remember base64 keys, so I'm not sure if you're missing much Romster ;)

17:42 < jrandom> (and the first few bytes should be enough to uniquely identify them)

17:42 <+fox> <Romster> starting i2phex with a server is the major problem i see so far

17:42 <+legion> Actually I'd like to see only like the first 12 characters of keys to displayed in the client

17:42 <+fox> <Romster> heh guess

17:42 * Complication is regrettably majorly busy, and can't do no xml-rpc

17:43 < jrandom> seems reasonable legion

17:43 <+fox> <Romster> what about display as many characters to make the key unique

17:43 < jnymo_> I'm having good results with i2phex

17:44 < jrandom> cool jnymo_, i've been hearing good things too

17:44 <+fox> <Romster> so if 2 keys start with abc it'll be abcx

17:44 < jnymo_> 12 identical characters isn't likely, romster

17:44 <+fox> <Romster> true

17:44 <+Complication> Besides, simpler = quicker

17:44 <+fox> <Romster> but wouldnt need 12 if the keys are that far randomised

17:45 <+Complication> (not that there is much speed to gain from displaying things)

17:45 <+legion> Well maybe there could be a new host properties window, stating the full key and certain information like how much it is sharing and whatever

17:45 <+susi23> (netdb works great with 4 chars only for router ids)

17:45 <+fox> <Romster> or the database and using the keyname=base64 and only displaying the keyname

17:45 < jrandom> hmm, i thought there was already a peer info display legion?

17:46 < jrandom> legion: some things like that would be good to add to the mainline phex, most likely?

17:46 <+legion> hmm could be right...

17:46 < jrandom> (that way Gregor can maintain it ;)

17:46 <+Complication> Well, there's a "Browse host" function, but that may not be the exact same thing. (If it works.)

17:46 < jrandom> Complication: it does

17:46 < jrandom> (work, that is)

17:47 <+Complication> Seems to basically drop the host destkey into the search box

17:47 <+Complication> ...and runs a search.

17:48 < jnymo_> this may be an i2phex mainline issue, but I didn't see an ETA on i2phex downloads

17:48 <+Complication> Hmm... or actually, doesn't run a search.

17:48 <+Complication> Mine seems to wait until I manually start it.

17:48 <+fox> <Romster> whats the nearby i2phex running tickbox for?

17:49 <+legion> I see where there is plenty of room for improvement. ;)

17:49 < jrandom> yep :)

17:50 < jrandom> lots to be done, and the forum is a good place to post up ideas/suggestions/questions(/patches :)

17:50 <+fox> <Romster> despite it's ovous name

17:50 < jrandom> ok, anyone have anything else for the meeting?

17:50 <+fox> <Romster> hmm good point

17:50 <+fox> <Romster> can't think of anything else

17:51 <+fox> <Romster> but anyone working on a distributed data store?

17:51 * cervantes checks his watch

17:51 <+fox> <Romster> like activtely

17:51 < jrandom> Romster: beyond syndie, no

17:51 < jrandom> (not to my knowledge, at least)

17:52 <+legion> well I was wondering about integrating a http download manager into i2p, would make downloading larger content from eepsites easier.

17:52 <+fox> <Romster> q and iphex and one or 2 others but i've not seen anything mentained for awhile now

17:52 <@cervantes> what's the status of feedspace...I haven't heard aught of it in a while

17:52 < jrandom> legion: that would be cool - there's a post about that on the forum too i think

17:53 <+fox> <Romster> ah feedspace another one

17:53 < jnymo_> if this was mentioned in the meeting already, nm.. but, is there news on i2p freenet colab?

17:53 < jrandom> cervantes: last i heard frosk was kind of busy, but if frosk is around, maybe he can tell us more :)

17:53 <+legion> Personally I'd like to see a i2p entropy colab.

17:54 <+fox> <Romster> i have ideas for a datastore, but it be a expansion to existing methods that are in use currently

17:54 <+legion> Given that q, feedspace and such don't seem to be going anywhere fast right now

17:54 < jrandom> jnymo_: I've bounced the freenet folks some code to run on our SSU transport,toad has been joining in on some of the discussions, but freenet won't be in a position for us to run it as a data store on top of i2p for a while (after their 0.7 release comes out, most likely)

17:54 <+fox> <Romster> i want to start a project but not go over what others have done already

17:54 <+legion> wonder if it'd be possible to port entropy to run over i2p...

17:54 < jrandom> legion: entropy would be good, but integration is kind of hard. of course, people could run things like fproxy.i2p for entropy

17:55 * jrandom doesnt know entropy's transport code at all

17:55 <+fox> <Romster> i've put my irc client on hold, there is alot of them in progress already all i2p needs now is a datastore and it'll beat freenet with ease :)

17:55 < jrandom> (but perhaps that'd be a good way to get someone to hack on the GCJ SDK :)

17:56 < jrandom> Romster: helping out on other efforts is a lot more rewarding that starting brand new projects, as you get a lot more done with less effort :)

17:56 < jnymo_> ah.. congrats on the gcj port

17:56 <+fox> <Romster> entropy's is in c or C++ iirc

17:57 < jrandom> right Romster, which is why they'd be able to use I2P's SDK and streaming lib, built with GCJ into native libraries

17:57 <+fox> <Romster> jrandom true, but who :)

17:57 < jrandom> not I

17:57 <+legion> oh and on another issue, just like to mention that today I released a new version of my readme.html update for the i2p router console.

17:57 < jrandom> (the only way to get something you care about done is for *you* to do it :)

17:57 < jrandom> cool

17:57 * dust would like to see some kind of 'squid' syndication for offloading eepsites

17:58 < jrandom> dust: yeah totally, if we can get sucker into that position, that'd be ideal

17:58 < jrandom> e.g. I'd love to get the latest info from orion in syndie, local

17:58 <+fox> <Romster> build a proxy for squid to use :)

17:59 <+legion> I'd been putting it of in the hope that certain improvements to the python eepsitechecker would have been made by now.

17:59 < dust> ah, syndie

17:59 < jrandom> (thats actually what syndie is for - syndication to cut down on load)

17:59 < dust> _the_ answer

17:59 < jrandom> there's a python eepsite checker?

17:59 <+fox> <Romster> first i've heard about it

17:59 <+legion> yeah, it's what I use ;)

18:00 < jrandom> cool legion

18:00 <+legion> really? It's been around for awhile

18:00 <+fox> <Romster> nice i'd like to check that out :)

18:00 <@cervantes> think someone ported baffled's script... can't remember who/when

18:00 <+fox> <Romster> i'm learning python

18:00 < jrandom> ah ok cervantes

18:00 <+fox> <Romster> the hard way by examples and the manual :)

18:00 < jrandom> yeah, i'm lazy, i just use polecat.i2p/i2psurvey/ and orion.i2p/ :)

18:01 < jrandom> (no need for me to spider)

18:01 <+legion> if someone would care to work with me on it, I'd really like to get the code fixed and working with either python 2.3 or 2.4

18:01 <+fox> <Romster> i have 2.4 installed here

18:01 <+Ragnarok> I may have a look at it. Got link?

18:01 <+fox> <Romster> actually think it's 2.4.1

18:02 <+legion> right now it has no py2exe compatibility and half of it works with each version, which means anyone running it needs to have both installed.

18:02 * jnymo_ would love to see an orion.i2p/I2PDirectory hybrid.. info, catagories, stats.. butter

18:02 <+legion> I'll archive it after the meeting and post a link to the forums

18:03 <+Ragnarok> ok

18:03 < jrandom> legion: hmm, do you see lots of people needing to run that though? I mean, only a few people need to spider

18:03 <+fox> <Romster> both eck, might be a bit much for me to translate to the newer dunno untill i look at the code

18:03 < jrandom> (not that there's anything wrong with making it easy for those few people, that is :)

18:04 <+fox> <Romster> cold be disected and used todo other things too?

18:04 <+legion> Well thing is I can see where there could be some uses for everyone that runs i2p.

18:04 <+fox> <Romster> could*

18:04 < jrandom> hmm, I'm not so sure, could you explain how?

18:04 < jrandom> I mean, I don't want everyone to essentially DDoS every eepsite

18:05 <+legion> One of which would be a dynamic bookmarks page, that is auto generated every 12-24 hours or so.

18:05 < jrandom> ah, that is trivial in syndie (actually one of the main features - 'new blogs')

18:05 < jrandom> ((but of course, syndie doesn't have a great ui for that yet))

18:06 <+fox> <Romster> actually would only need a few to spider and throw it into a torrent/dht like database and sync that between nodes

18:06 < jrandom> right Romster (though that torrent/dht-like database to sync, or "syndi"cate, could be syndie ;)

18:06 <+fox> <Romster> could even be a hidden way to learn more i2p nodes and services

18:07 <+fox> <Romster> yeah or syndie

18:07 < jrandom> ok, anyone else have anything for the meeting? the curry is getting cold ;)

18:08 <+fox> <Romster> if syndie is going tobe that great one could store static pages to cashe and the same with images

18:08 <+fox> <reliver> bon appetit, jrandom :-)

18:08 < jrandom> exactly romster, you can do that now

18:09 < jrandom> ok, if there's nothing else...

18:09 * jrandom winds up

18:09 * jrandom *baf*s the meeting closed

{% endblock %}