{% extends "_layout.html" %} {% block title %}I2P Status Notes for 2005-10-18{% endblock %} {% block content %}
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi y'all, its Tuesday again * Index 1) 0.6.1.3 2) Freenet, I2P, and darknets (oh my) 3) Tunnel bootstrap attacks 4) I2Phex 5) Syndie/Sucker 6) ??? [500+ symmetric nat bounty] * 1) 0.6.1.3 Last Friday we pushed out a new 0.6.1.3 release, and with 70% of the network upgraded, reports have been very positive. The new SSU improvements seems to have cut down on unnecessary retransmissions, allowing more efficient throughput at higher rates, and there haven't been any major problems with the IRC proxy or Syndie improvements to my knowledge. One thing worth noting is that Eol has posted up a bounty for symmetric NAT support on rentacoder[1], so hopefully we'll get some progress on that front! [1] http://rentacoder.com/RentACoder/misc/BidRequests ShowBidRequest.asp?lngBidRequestId=349320 * 2) Freenet, I2P, and darknets (oh my) We've finally wrapped up that 100+ message thread with a clearer view of the two networks, where they fit, and what room we have for further collaboration. I won't go into what topologies or threat models they're best suited for here, but you can dig into the lists if you want to know more. On the collaboration front, I bounced toad some sample code for reusing our SSU transport which may be helpful for the Freenet folks in the short term, and down the line we may be working together to offer premix routing for Freenet users in environments where I2P is viable. As Freenet progresses, we may be able to get Freenet working on top of I2P as a client application as well, allowing automated content distribution among users running it (e.g. pushing around Syndie archives and posts), but we'll see how Freenet's planned load and content distribution systems work first. * 3) Tunnel bootstrap attacks Michael Rogers got in touch regarding some interesting new attacks on I2P's tunnel creation [2][3][4]. The primary attack (successfully mounting a predecessor attack during the entire bootstrap process) is interesting, but not really practical - the probability of success is (c/n)^t, with c attackers, n peers in the network, and t tunnels built by the target (lifetime) - less than the probability of an adversary taking over all h hops in a tunnel (P(success) = (c/n)^h) after the router has built h tunnels. Michael has posted another attack on the list which we're working through at the moment, so you'll be able to follow that one up there as well. [2] http://dev.i2p.net/pipermail/i2p/2005-October/001005.html [3] http://dev.i2p.net/pipermail/i2p/2005-October/001008.html [4] http://dev.i2p.net/pipermail/i2p/2005-October/001006.html * 4) I2Phex Striker is making more progress on the upload bug, and reports are that he has it pinned down. It will hopefully get into CVS tonight, and will be released as 0.1.1.33 soon afterwards. Keep an eye on the forum [5] for more info. [5] http://forum.i2p.net/viewforum.i2p?f=25 The word on the street is that redzara is making pretty good progress merging back in with the Phex mainline too, so hopefully with Gregor's help we'll get things up to date soon! * 5) Syndie/Sucker dust has been crunching away with Sucker as well, with code getting more RSS/Atom data into Syndie. Perhaps we can get Sucker and the post CLI further integrated into Syndie, maybe even a web based control to schedule imports of different RSS/Atom feeds into various blogs. We shall see... * 6) ??? There's lots going on beyond the above, but thats the main gist of what I'm aware of. If anyone has any questions/concerns, or wants to bring some other things up, swing on by the meeting tonight at 8PM UTC in #i2p! =jr -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD4DBQFDVU4UWYfZ3rPnHH0RApF2AJ9Eqg55ydhqEjqSpkN5BSGb8MerYgCY16bD rYTKbx3oDZr3XWp3E9s0ag== =ga+r -----END PGP SIGNATURE-----{% endblock %}