Files
i2p.www/www.i2p2/pages/meeting133.html
2008-02-04 18:22:36 +00:00

323 lines
31 KiB
HTML

{% extends "_layout.html" %}
{% block title %}I2P Development Meeting 133{% endblock %}
{% block content %}<h3>I2P dev meeting, March 15, 2005</h3>
<div class="irclog">
<p>13:07 &lt; jrandom&gt; 0) hi</p>
<p>13:07 &lt; jrandom&gt; 1) Net status</p>
<p>13:07 &lt; jrandom&gt; 2) Feedspace</p>
<p>13:07 &lt; jrandom&gt; 3) ???</p>
<p>13:07 &lt; jrandom&gt; 0) hi</p>
<p>13:07 * jrandom waves</p>
<p>13:07 &lt; jrandom&gt; weekly status notes up @ http://dev.i2p.net/pipermail/i2p/2005-March/000649.html</p>
<p>13:08 &lt; Teal&gt; hi</p>
<p>13:08 &lt; jrandom&gt; (yeah, i was late this time, but close!)</p>
<p>13:08 &lt; frosk&gt; hi</p>
<p>13:08 &lt; jrandom&gt; might as well jump on in to 1) net status</p>
<p>13:08 &lt; jrandom&gt; the net, its, like, up, 'n stuff</p>
<p>13:09 &lt; jrandom&gt; overall throughput is still down where it was before, with a substantial number of dropped messages & fragments</p>
<p>13:09 &lt; bla&gt; hi</p>
<p>13:09 &lt; ant&gt; &lt;dm&gt; bad</p>
<p>13:09 &lt; Teal&gt; any clues as to why ?</p>
<p>13:10 &lt; jrandom&gt; Teal: sure, read the status notes? :)</p>
<p>13:10 &lt;+detonate&gt; hi</p>
<p>13:11 &lt; jrandom&gt; there are still ~ 25 people on older builds, and likely, they'll be staying there until we drop them off the net</p>
<p>13:11 &lt; jrandom&gt; in any case, we should be able to work around them, so having them here is actually helpful, i suppose</p>
<p>13:11 &lt; jrandom&gt; (though it'd be nice if they upgraded... ;)</p>
<p>13:11 &lt; cervantes&gt; (hi)</p>
<p>13:11 &lt; frosk&gt; those are probably sheeple who installed i2p because they read about it somewhere and wanted to try "anonymous p2p"</p>
<p>13:12 &lt; ant&gt; &lt;BS314159&gt; yeah, if network quality degradation can happen due to bugs, it's possible due to malice</p>
<p>13:12 &lt; newkid&gt; This is the first meeting I am in, but I read the notes, and the problem seems related to what I explained before the meeting</p>
<p>13:12 &lt; Pseudonym&gt; do we know what specific probblems the old nodes are causing and why?</p>
<p>13:12 &lt; jrandom&gt; bs314159: never attribute to malice what can be attributed to jrandom writing bad code ;)</p>
<p>13:13 &lt; jrandom&gt; Pseudonym: yeah, see the changelog</p>
<p>13:13 &lt; newkid&gt; I run two nodes, milliseconds apart, and they don't regard eacxh other "fast" more of the time</p>
<p>13:13 &lt; jrandom&gt; right newkid </p>
<p>13:13 &lt; jrandom&gt; the speed calculator as deployed is, well, pretty shitty</p>
<p>13:13 &lt; jrandom&gt; it doesnt gather enough data to have any sort of confidence in the values</p>
<p>13:13 &lt; bla&gt; Hmm.. That's bad at best ;)</p>
<p>13:13 &lt; jrandom&gt; its about as meaningless as the "instantaneous rates" you can see on /oldconsole.jsp</p>
<p>13:14 &lt; jrandom&gt; i'm trying out some new calculators, and there is an improvement, but there are problems in the algorithm</p>
<p>13:14 &lt; jrandom&gt; namely, it won't let high capacity peers turn into fast peers without those fast peers dropping from the high capacity group</p>
<p>13:15 &lt; bla&gt; jrandom: Does every node get "fastness" data for the other nodes directly ("P2P"), or via tunnels?</p>
<p>13:15 &lt; jrandom&gt; (aka the first K peers placed in the fast group will stay in the fast group)</p>
<p>13:15 &lt; jrandom&gt; bla: tunnels, we cannot trust direct measurement, as that'd allow trivial anonymity attacks</p>
<p>13:15 &lt; godmode0&gt; "alfYl6RvHzw=" = "21538-900"</p>
<p>13:15 &lt; godmode0&gt; "alV9ye/y/Us=" = "23565-200"</p>
<p>13:15 &lt; godmode0&gt; its is sha1 ?</p>
<p>13:15 &lt; jrandom&gt; (e.g. be really really slow to everyone except Alice)</p>
<p>13:15 &lt;+detonate&gt; they'll stay there for the lifetime of the router?</p>
<p>13:15 &lt; jrandom&gt; godmode0: we're in a meeting right now</p>
<p>13:16 &lt; godmode0&gt; ops sorry</p>
<p>13:16 &lt; jrandom&gt; detonate: until one of them failed or rejected a tunnel (aka their capacity rank drops them from the high capacity group)</p>
<p>13:16 &lt;+detonate&gt; ok</p>
<p>13:17 &lt; bla&gt; bla: Hmm.. This sounds like a problem that ---in order to get _really_ enough_ data--- has to be &gt;&gt;log(N) on the network. </p>
<p>13:17 &lt; jrandom&gt; i've been toying with some ideas to get more data, but haven't updated it yet</p>
<p>13:17 &lt; bla&gt; In terms of load, that is.</p>
<p>13:18 &lt; jrandom&gt; well, one of the critical points certainly is when the network load exceeds the network capacity</p>
<p>13:18 &lt; jrandom&gt; i believe our capacity calculators can handle that though</p>
<p>13:18 &lt; cervantes&gt; jrandom: is -3 actually employing this fast peer selection method?</p>
<p>13:18 &lt;+polecat&gt; Hopefully since data transfer between peers has fairness controls, there won't be any way to increase load too much...</p>
<p>13:19 &lt; bla&gt; jrandom: Well, I mean more specifically: we need to make sure that the "finding out who is fast" algo. stays O(log(N))</p>
<p>13:19 &lt; jrandom&gt; cervantes: yeah, but as i said, it doesn't allow promoting peers between fast and high capacity</p>
<p>13:19 &lt; jrandom&gt; polecat: fairness controls?</p>
<p>13:19 &lt; cervantes&gt; since I've just realised I've had the proxy enabled, and have been browsing the live web without realising (I did think my connection was a little sluggish) ;-)</p>
<p>13:20 &lt; cervantes&gt; s/live web/outerweb</p>
<p>13:20 &lt; jrandom&gt; bla: i'm not sure we should be dependent upon N. no need to find an optimal 'fastest on the net', merely 'fast enough to handle our data'</p>
<p>13:20 &lt;@smeghead&gt; it would seem i2pProxy.pac is dangerous even for its creator :)</p>
<p>13:20 &lt; jrandom&gt; heh nice cervantes :)</p>
<p>13:20 &lt; jrandom&gt; lol</p>
<p>13:20 &lt; cervantes&gt; so it certainly seems to have improved things on my home node which was really suffering before</p>
<p>13:21 &lt; ant&gt; &lt;BS314159&gt; jrandom: can you randomize it?</p>
<p>13:21 &lt; cervantes&gt; smeghead: hehe hell I don't use that! you think I'm mad!</p>
<p>13:21 &lt; ant&gt; &lt;BS314159&gt; i.e. create a spontaneous transition rate?</p>
<p>13:21 &lt; jrandom&gt; BS314159: we use the tiers, and randomize within the tiers</p>
<p>13:22 &lt; jrandom&gt; BS314159: spontaneous rates are essentially what we have now, which fluctuate widely</p>
<p>13:22 &lt; jrandom&gt; (we == 0.5.0.2-0)</p>
<p>13:22 &lt; ant&gt; &lt;BS314159&gt; I think I don't understand the problem. nm.</p>
<p>13:23 &lt; jrandom&gt; it is tough to do safely and accurately, but i think there's enough data around for us to harvest sufficient info. we shall see</p>
<p>13:23 &lt; bla&gt; jrandom: In any case, finding out a couple of good nodes looks an awful lot like an ant-colony optimization thing</p>
<p>13:24 &lt; bla&gt; jrandom: Because once you've got fast peers, you're likely to use _those_ to find out who else is fast.</p>
<p>13:24 &lt; jrandom&gt; would you propose further active probing along those lines?</p>
<p>13:24 &lt; jrandom&gt; ah, actualy, thats not true</p>
<p>13:25 &lt; jrandom&gt; thats the difference between client tunnels and exploratory tunnels</p>
<p>13:25 &lt; bla&gt; jrandom: And thus, it seems you'd essentially be doing a greedy optimization scheme (much like ant-colony)</p>
<p>13:25 &lt; jrandom&gt; client tunnels are built with fast peers, exploratory tunnels are built with any non-failing peer</p>
<p>13:25 &lt; jrandom&gt; (chosen randomly)</p>
<p>13:26 &lt; bla&gt; jrandom: Hmm.. For anonimity, that's good. However, for quickly finding good tunnel-partners to use, it would be better to use fast peers in the expl. tunnels... The trade-off again</p>
<p>13:26 &lt; jrandom&gt; otoh, there may be something in that vein to help optimize the peer selection</p>
<p>13:26 &lt; jrandom&gt; oh, right, certainly you'd get better performance by using the fast peers, but then you wouldn't be exploring :)</p>
<p>13:27 &lt; jrandom&gt; the exploratory tunnels aren't used for end to end client messages, just for netDb messages, tunnel maintenance messages, and peer test messages</p>
<p>13:27 &lt; bla&gt; jrandom: I see, so effectively, you use random expl. tunnels to prevent falling into local optima?</p>
<p>13:27 &lt; jrandom&gt; so the actual throughput of the exploratory tunnels doesnt matter (as long as the data gets through, eventually)</p>
<p>13:27 &lt; jrandom&gt; aye</p>
<p>13:29 &lt; bla&gt; jrandom: Ok, I see. OTOH: When I use my client tunnels to transfer some data (like downloading from an eepsite), I seems to me (intuitively), that the timing/throughput data on that could also serve as some kind of "passive peers assessment", couldn't it?</p>
<p>13:29 &lt; jrandom&gt; definitely bla, and at the moment, we don't yet harvest that data within the speed selection</p>
<p>13:29 &lt; bla&gt; jrandom: i.e. as an aux. way to get more data on peers</p>
<p>13:30 &lt; jrandom&gt; some of it we can, though some of it will be harder to grab (since the streaming lib is external)</p>
<p>13:30 &lt; jrandom&gt; we should definitely grab what we can though to get more confidence</p>
<p>13:30 &lt; ant&gt; &lt;BS314159&gt; won't that depend on the slowest link in any tunnel?</p>
<p>13:31 &lt; ant&gt; &lt;BS314159&gt; making it very difficult to use for hops&gt;0?</p>
<p>13:31 &lt; jrandom&gt; BS314159: yeah, but it'll average out, as peers are selected randomly within the fast tier</p>
<p>13:31 &lt; jrandom&gt; same goes for any remote measurement</p>
<p>13:34 &lt; jrandom&gt; ok, so thats generally where things stand atm. hopefully we'll have some new calculators & stats up for a -4 or -5 build in the next few days, trying to see how it handles the live net</p>
<p>13:34 &lt; jrandom&gt; anyone have anything else to bring up for 1) Net status?</p>
<p>13:34 &lt; bla&gt; jrandom: It may seem that I'm putting a truckload of emphasis on this, but it seems to me to be a problem that['s very fundamental for a big I2P net to work...</p>
<p>13:35 &lt; jrandom&gt; bla: its certainly important, but remember, we don't need optimal peer selection. merely sufficient</p>
<p>13:35 &lt; ant&gt; &lt;aum&gt; morning folks</p>
<p>13:36 &lt; jrandom&gt; all we care about is finding some peers who can handle a tunnel, and making sure those tunnels can handle our data</p>
<p>13:36 &lt; jrandom&gt; 'mornin aum, in time for the meeting :)</p>
<p>13:36 &lt; bla&gt; jrandom: I see. Thnx for the explaination!</p>
<p>13:36 &lt; jrandom&gt; of course, you're right in that it'd be kickass if we /could/ find the optimal peer selection ;)</p>
<p>13:37 &lt; jrandom&gt; and there is definitely lots of room for some students to work out some ideas and write up some papers</p>
<p>13:37 &lt; frosk&gt; this would be a cool thesis project :)</p>
<p>13:37 &lt;+detonate&gt; how workable do you think it would be to actively tweak the parameters of the peer selection until it hopefully settles on something that works, disregarding the impossibility of debugging such a system? :)</p>
<p>13:38 &lt; jrandom&gt; detonate: manual peer selection is a PITA, since fast peers get congested occationally, asking you to back off, etc. </p>
<p>13:38 &lt;+detonate&gt; ah</p>
<p>13:39 &lt; jrandom&gt; i know we could dig into this forever, which is why i've set a milestone of successfully transferring one specific large file through standard tunnels, without disconnect</p>
<p>13:39 &lt;+detonate&gt; alright</p>
<p>13:40 &lt; Teal&gt; Victory at any cost!</p>
<p>13:40 &lt; jrandom&gt; (otoh, there are some undocumented features of the peer selection system to let people weight individual peers manually, but i'm not recommending 'em ;)</p>
<p>13:40 &lt; jrandom&gt; ok, thats 'bout it for 1), now lets swing on to 2) Feedspace</p>
<p>13:41 * jrandom hands the mic to frosk </p>
<p>13:41 &lt; frosk&gt; oh, ok, hi</p>
<p>13:42 &lt; Myo9&gt; Hi Frosk.</p>
<p>13:42 * jrandom gets out the high intensity spotlight</p>
<p>13:42 &lt; frosk&gt; so, everyone should check out http://feedspace.i2p (keys at orion or jrandom's blog)</p>
<p>13:42 &lt; frosk&gt; my devbuddy (which i will out now as ku) and i have started writing some code and have had many lively discussions</p>
<p>13:42 &lt; frosk&gt; also, http://feedspace.i2p/wiki/CallForComments has a fresh rev of the feedspace document :)</p>
<p>13:43 &lt; frosk&gt; hi Myo9</p>
<p>13:43 &lt; frosk&gt; oh yeah, feedspace is our new (and final) name for what used to be known as i2pcontent or fusenet :)</p>
<p>13:43 &lt; jrandom&gt; r0x0r</p>
<p>13:43 &lt; frosk&gt; as the status notes notes, we are still very interested in feedback on the general design of everything</p>
<p>13:44 &lt; frosk&gt; nobody should be shy about challenging it :)</p>
<p>13:44 &lt; frosk&gt; and the web site also lists some "job openings", we could use some helping hands on many aspects of the system and project</p>
<p>13:45 &lt; frosk&gt; we're on a pretty tight schedule and none of us are full-time developers on the project unfortunately</p>
<p>13:45 &lt; frosk&gt; so that's pretty much it, i think. questions? :)</p>
<p>13:45 &lt; ant&gt; * aum can't reach orion.i2p or jrandom's blog, so can't reach feedspace.i2p</p>
<p>13:46 &lt; frosk&gt; hm yes, the web site also has a roadmap, but the dates there _will_ change :)</p>
<p>13:46 &lt; legion&gt; feedspace.i2p=KuW5sR2iGCfnnuwdslHbFsNyNCsoZnoIwAmHeypOV-s8OQxokBpdNazksBrhoQum9nv81vprl6k15Mhcd~KWE4OajjmdU7v2fjqps7QK3KmLv4UTrX-ihSIUdhb5B9FLh2XEFEQ4-8guFTVxBRqQQE~c058AL6~uZpuFpLtEOg0HEZ6BydndOhx-FCDm8ip12pPwZ3a5O86l1UoATZBXxoctGafTjnUlx64jyQs6y0WB811l36wVrc~~dqEcanxab0yfg8dJ~1M4EUNrXcHT-PwYYrr3GgpimuF4oUtYjkeDKlq5WjfMAa8bE73HFgquxq99fuW5aI1JbLPxnTLHi00-2On0dSDwJxSP08HOhKFKMNzykI9Asg8CywzNO6kWpbX9yaML36ohCJF0iaLvvDyhS4a2B65crSJRJPVkbxIvsyyUyYMGi31EK593ijOLjOvug</p>
<p>13:46 &lt; legion&gt; there you go aum</p>
<p>13:46 * jrandom just added feedspace to http://dev.i2p.net/i2p/hosts.txt</p>
<p>13:46 &lt; jrandom&gt; (and cvs)</p>
<p>13:46 * frosk goes temporarily blind</p>
<p>13:46 &lt; jrandom&gt; legion: never paste as a single line, its too large to fit</p>
<p>13:47 &lt; ant&gt; &lt;aum&gt; thx</p>
<p>13:47 &lt; frosk&gt; jrandom can probably commit the key into his hosts.txt maybe? :)</p>
<p>13:47 &lt; jrandom&gt; aye, 'tis on there now, forgot to :)</p>
<p>13:48 &lt; frosk&gt; anyway, the plan is to have something simple and functional (and 100% bug-free!) out by I2P 0.6.1, and we'll build more neat stuff in later</p>
<p>13:49 &lt; jrandom&gt; heh wikked</p>
<p>13:49 &lt; frosk&gt; s/out/ready for real-world testing/</p>
<p>13:49 &lt; frosk&gt; i still can't say if that's realistic or not, but i hope it will be, or we'll continue to cut features ;)</p>
<p>13:49 &lt; ant&gt; &lt;BS314159&gt; since I can't reach feedspace.i2p, I'll ask a basic question</p>
<p>13:50 &lt; ant&gt; &lt;aum&gt; that key is not correct, only 441 chars</p>
<p>13:50 &lt; jrandom&gt; right aum, irc trims it, snag http://dev.i2p.net/i2p/hosts.txt</p>
<p>13:51 &lt;+detonate&gt; frosk: i have a suggestion for the meantime</p>
<p>13:51 &lt;+detonate&gt; get something on the i2p router console that grabs a list of updates from the i2p webserver, so people know when to update their routers, etc :)</p>
<p>13:51 &lt; legion&gt; ah sorry, about that. Anyways I've already commited it to my hosts.txt also.</p>
<p>13:51 &lt; ant&gt; &lt;aum&gt; thx jrandom</p>
<p>13:51 &lt; ant&gt; &lt;BS314159&gt; which of the following systems do you see feedspace supplanting: usenet, gnutella, google, livejournal, www</p>
<p>13:52 &lt; jrandom&gt; , the church</p>
<p>13:52 &lt; jrandom&gt; er..</p>
<p>13:52 &lt; cervantes&gt; jrandom: ah you caught me mid commit of hosts</p>
<p>13:52 &lt; ant&gt; &lt;BS314159&gt; i.e. is it a message forum, a filesharing system, a content indexing system, a dynamic page system, and/or a static serving system</p>
<p>13:53 &lt; ant&gt; * aum turns off throttling within routerConsole, and sees if that helps</p>
<p>13:54 &lt; frosk&gt; BS314159: we will support blogs, forums, and shared address books (for the first version, other applications are possible)</p>
<p>13:54 &lt; frosk&gt; it doesn't replace web pages per se</p>
<p>13:54 &lt; frosk&gt; but it certainly could be used for "file sharing"</p>
<p>13:54 &lt;+detonate&gt; content syndication then?</p>
<p>13:54 &lt; jrandom&gt; it'd probably supplant static web content though, allowing persistent web publication for people who cannot run eepsites</p>
<p>13:54 &lt; frosk&gt; that's what it's about</p>
<p>13:55 &lt; jrandom&gt; (two word summary: usenet+SSK)</p>
<p>13:55 &lt; frosk&gt; yeah</p>
<p>13:55 &lt; ant&gt; &lt;BS314159&gt; ok</p>
<p>13:55 &lt; Ragnarok&gt; not that persistent</p>
<p>13:56 &lt; jrandom&gt; Ragnarok: depends on syndicator policy, true</p>
<p>13:56 &lt;+detonate&gt; is anything happening with stasher?</p>
<p>13:56 &lt; frosk&gt; it can be as persistant as the most eager syndicator :)</p>
<p>13:56 &lt; jrandom&gt; (see: dejanews ;)</p>
<p>13:56 &lt; ant&gt; &lt;aum&gt; detonate: stasher is on hold, writing a whole new thing called quartermaster</p>
<p>13:57 &lt;+detonate&gt; i see</p>
<p>13:58 &lt; jrandom&gt; frosk: what can we do to help?</p>
<p>13:59 &lt; jrandom&gt; should people register & hack on the wiki, email, post on the forum?</p>
<p>13:59 &lt; jrandom&gt; oh, perhaps we can get cervantes to add a new forum category?</p>
<p>13:59 &lt; frosk&gt; i think actually a forum would be very nice at this point</p>
<p>14:00 &lt; frosk&gt; for more private discussion, you can email us both at ku@mail.i2p and frosk@mail.i2p</p>
<p>14:01 &lt; cervantes&gt; hrrrm ... are you going to put game reviews in it?</p>
<p>14:01 &lt; jrandom&gt; heh</p>
<p>14:01 &lt; jrandom&gt; w3rd</p>
<p>14:01 &lt; cervantes&gt; because if not...then you're welcome to have a new forum section</p>
<p>14:01 &lt; frosk&gt; i was thinking top20 music reviews, cervantes</p>
<p>14:02 &lt; jrandom&gt; (btw, mirror of the call for comments @ http://dev.i2p.net/~jrandom/feedspace.txt)</p>
<p>14:02 &lt; cervantes&gt; :)</p>
<p>14:04 &lt; cervantes&gt; frosk: feedspace or feed space or Feedspace or Feed Space or FeedSpace?</p>
<p>14:04 &lt; frosk&gt; cervantes: Feedspace</p>
<p>14:05 &lt; frosk&gt; looking forward to much discussion over at the forum then :) i don't have anything else for this point, anyone else?</p>
<p>14:05 &lt; jrandom&gt; ok cool, thanks for the update frosk </p>
<p>14:06 &lt;@smeghead&gt; or FEeDspace?</p>
<p>14:06 &lt; ant&gt; &lt;cervantes&gt; frosk: when you have a moment, just pm me a one liner description for the forum section</p>
<p>14:06 &lt; legion&gt; hmm speaking of new forums, lol. I'm putting a new forum site together. Though I have much hacking left to do on the phpbb code, it should be finshed sometime this week. ;)</p>
<p>14:06 &lt; jrandom&gt; cool legion </p>
<p>14:06 &lt; jrandom&gt; that actually brings us into 3) ??? nicely</p>
<p>14:06 &lt; jrandom&gt; anyone have anything else to bring up? </p>
<p>14:06 &lt; jrandom&gt; aum: any updates on Q?</p>
<p>14:07 &lt; frosk&gt; i, uhm, no</p>
<p>14:07 &lt; ant&gt; &lt;aum&gt; Q devlt is moving along nicely, nothing to announce atm</p>
<p>14:07 &lt; jrandom&gt; w3rd</p>
<p>14:07 &lt; ant&gt; * aum is 90% complete with net.i2p.i2ptunnel.I2PTunnelXMLServer</p>
<p>14:07 &lt; ant&gt; &lt;BS314159&gt; I have a simple question about netDb</p>
<p>14:07 &lt; ant&gt; &lt;aum&gt; everything's working now except 'i2p.tunnel.close'</p>
<p>14:07 &lt; legion&gt; my forums will allow for members to have decent sized avatars, discuss shared content, just about whatever.</p>
<p>14:08 &lt; jrandom&gt; wikked</p>
<p>14:08 &lt; ant&gt; &lt;BS314159&gt; it says on the page that entries are stores on the peers closest to SHA256(router identity + YYYYMMdd)</p>
<p>14:08 &lt; jrandom&gt; right BSpi</p>
<p>14:08 &lt;@smeghead&gt; legion: will it be as much a security hazard as your bt client?</p>
<p>14:08 &lt; ant&gt; &lt;BS314159&gt; does this mean there's a burst of traffic every 00:00 GMT?</p>
<p>14:08 &lt; ant&gt; * aum is actually gaining some fluency in java, having attained a 'cognitive critical mass'</p>
<p>14:09 &lt; jrandom&gt; BS: data points expire more frequently than they migrate</p>
<p>14:09 &lt; jrandom&gt; a LeaseSet is only good for 10 minutes, for example</p>
<p>14:09 &lt; bla&gt; jrandom: Is there a command-line call I can make, such that I can speed estimates of each of the peers in the net over the last, say, 60 seconds, or so?</p>
<p>14:09 &lt; legion&gt; lol, forums a security hazard?</p>
<p>14:10 &lt;@smeghead&gt; legion: yes, and if you don't know that much, i'm already convinced that your forums will be a security hazard</p>
<p>14:10 &lt; jrandom&gt; bla: yeah, java -cp lib/i2p.jar:lib/router.jar -Djava.library.path=. net.i2p.router.peermanager.ProfileOrganizer peerProfiles/*</p>
<p>14:10 &lt; jrandom&gt; (i think)</p>
<p>14:10 &lt; legion&gt; oh and the next release of my bt client shouldn't cause such issues...</p>
<p>14:10 &lt; jrandom&gt; you may need to add some log levels to logger.config, lemmie check</p>
<p>14:10 &lt;@smeghead&gt; legion: Cervantes made a ton of modifications to phpBB to lock it down for i2p use</p>
<p>14:10 &lt; ant&gt; &lt;BS314159&gt; It just seems like having it occur all-at-once at a specified time is awkward. If it were happening continuously, that would seem...smoother. It would also give an attacker less time to mount an attack, since bits of the data would be wrong in less than 24 hours</p>
<p>14:11 &lt; jrandom&gt; nah, it dumps to stdout</p>
<p>14:11 &lt; frosk&gt; jrandom: how do you feel about the i2p roadmap currently, if one may ask? do you think it's realistic?</p>
<p>14:11 &lt; legion&gt; Hmm I wonder if I can get a copy of cervantes mods?</p>
<p>14:11 &lt; jrandom&gt; frosk: i update it when i become uncomfortable with it</p>
<p>14:12 &lt; frosk&gt; ok</p>
<p>14:12 &lt;+detonate&gt; you know, there's a windows installer for python 2.4, one for wxpython, and there's the i2p-bt tarball, i don't really see why anyone would get/trust a third-party release</p>
<p>14:12 &lt; legion&gt; Otherwise I'll just have to continue to hack on the phpbb source myself...</p>
<p>14:12 &lt; jrandom&gt; BS: peers would only look in the wrong place for up to 30s, due to clock synchronization</p>
<p>14:12 &lt;@smeghead&gt; legion: have fun</p>
<p>14:12 &lt; legion&gt; well why would anyone get and use kazaa?</p>
<p>14:13 &lt; bla&gt; jrandom: I'm asking, because...</p>
<p>14:13 &lt; legion&gt; Or morpheus?</p>
<p>14:13 &lt; jrandom&gt; (because they dont know better?)</p>
<p>14:13 &lt; legion&gt; Both of those contain adware/etc...</p>
<p>14:13 &lt;+detonate&gt; they are ignorant?</p>
<p>14:14 &lt; legion&gt; yeah and there are millions of ignorant users out there. ;)</p>
<p>14:14 &lt; ant&gt; &lt;BS314159&gt; legion: you sound like you want to bundle spyware with I2P. Truly, a stroke of genius.</p>
<p>14:14 &lt; bla&gt; jrandom: ...I browsed SpeedCalculator.java and CapacityCalculator.java, and I'd like to experiment with the estimators</p>
<p>14:14 &lt; cervantes&gt; legion: stay uptodate with official patches, and put htaccess on the admin areas</p>
<p>14:14 &lt; jrandom&gt; wikked bla</p>
<p>14:14 &lt; legion&gt; What? Heck no... I hate malware...</p>
<p>14:14 &lt; cervantes&gt; most of my mods involve spam prevention</p>
<p>14:14 &lt; ant&gt; &lt;aum&gt; can i raise a more critical issue?</p>
<p>14:14 &lt; legion&gt; That's it? cervantes?</p>
<p>14:15 &lt; jrandom&gt; sup aum?</p>
<p>14:15 &lt;@smeghead&gt; legion: what about your users that also hate malware? why do you do nothing to alleviate any concerns they might have?</p>
<p>14:15 &lt; ant&gt; &lt;dm&gt; BS314159: are you a windows hotfix?</p>
<p>14:15 &lt; ant&gt; &lt;aum&gt; is it just me, or is there still some flakiness going on with in i2p? i'm having heaps of trouble with even main eepsites, irc etc</p>
<p>14:15 &lt; bla&gt; jrandom: In addition, the idea of "passive fingerprinting" is now in my head (a bit ;): If I receive data through a tunnel, this tells me something about the bandwidth/capacity of all the peers in that tunnel:...</p>
<p>14:15 &lt; jrandom&gt; aum: see the weekly status notes</p>
<p>14:16 &lt; cervantes&gt; legion: rename all registration, login , posting and profile editing pages to something non-standard </p>
<p>14:16 &lt; bla&gt; jrandom: It tells me some about the peer closest to me, somewhat less about the peers one step away, and so progressively less.</p>
<p>14:16 &lt; cervantes&gt; will help keep worms at bay</p>
<p>14:16 &lt; jrandom&gt; bla: aye, i read that timing paper, and yesterday's tor attack paper with much interest</p>
<p>14:17 &lt; Myo9&gt; Cervantes, releasing ant of your mods?</p>
<p>14:17 &lt; Myo9&gt; s/ant/any/</p>
<p>14:17 &lt; jrandom&gt; there is worry along those lines in the capacity calculator with the different tiers of rejection</p>
<p>14:18 &lt; bla&gt; jrandom: In a way, this gives me some degree of "belief" in a peers bandwidth/capacity (that degree of belief depends on the distance to each of the tunnel members, and on the amount of belief I have on the BW/cap. of the nodes closest to me)</p>
<p>14:18 &lt; legion&gt; thanks for the advice cervantes :)</p>
<p>14:18 &lt; bla&gt; jrandom: Now, I happen to know some ppl that know a lot about Bayesian Belief Networks... ;))</p>
<p>14:18 &lt;@smeghead&gt; again, legion ignores the question</p>
<p>14:18 &lt;+thetower&gt; I think we're all gonna have to call a truce with legion and let him write whatever he wants, its not like anyone is forced to use it.</p>
<p>14:18 &lt; jrandom&gt; hmm, what do you mean by distance bla?</p>
<p>14:18 &lt; ant&gt; &lt;dm&gt; what is legion up to?</p>
<p>14:19 &lt; bla&gt; jrandom: I'll have a chat with them, regarding passive fingerprinting (note: I do not mean "fingerprinting" in the negative sense of the word)</p>
<p>14:19 &lt; jrandom&gt; wikked</p>
<p>14:19 &lt; jrandom&gt; suggestions as to how we can best select 'quality' peers are very much welcome</p>
<p>14:19 &lt; cervantes&gt; Myo9: I certainly could do.</p>
<p>14:19 &lt; legion&gt; Anyways there isn't many i2p windows users just yet and not that many running my i2p-bt binary distribution. Soon my next release will be done and released, it will not have such issues... As there will be a binary and source distribution.</p>
<p>14:19 &lt;@smeghead&gt; why anyone would want to use software from someone who doesn't even take the most basic measures to address users' concerns about security and anonymity is beyond me</p>
<p>14:20 &lt; ant&gt; &lt;aum&gt; frosk: what lang you writing feedspace in? (forgive me if i asked you before)</p>
<p>14:20 &lt; cervantes&gt; it's not a clean "patch" or anything though</p>
<p>14:20 &lt; bla&gt; jrandom: distance... Say I have an inbound tunnel X -&gt; Y -&gt; me, and I know a _lot_ about Y's properties, than stats on what I receive thru that tunnel tells me a good deal about X</p>
<p>14:20 &lt; frosk&gt; aum: java (and i forgive you ;)</p>
<p>14:20 &lt; cervantes&gt; I've just been fixing stuff andproblems as it arises</p>
<p>14:20 &lt; bla&gt; jrandom: OTOH, if I have little data/belief on Y's properties, transfer stats don't tell me much about X yet; I first have more to learn about Y</p>
<p>14:20 &lt; cervantes&gt; as they</p>
<p>14:20 &lt; jrandom&gt; bla: its very hard to tell whether lag or congestion occurs @ X or Y (or earlier hops)</p>
<p>14:20 &lt; cervantes&gt; http://forum.i2p/index.php?c=4</p>
<p>14:21 &lt; cervantes&gt; new section: Feedspace</p>
<p>14:21 &lt; jrandom&gt; w00t</p>
<p>14:21 &lt; frosk&gt; yay</p>
<p>14:22 &lt; legion&gt; anyways enough discussion about my release, any further discussion about it should be done in the #itorrent channel</p>
<p>14:22 &lt; bla&gt; jrandom: That is true. However, given large amount of data (and hoping that the measurement time is not _much_ larger than the timescale on which node properties change), I'm convinced there _must_ be information in traffic/tunnel stats</p>
<p>14:22 &lt;@smeghead&gt; legion: we can discuss in meeting point # 3) any business that affects i2p</p>
<p>14:23 &lt;@smeghead&gt; legion: and i think your software is of serious concern and warrants a warning to users</p>
<p>14:23 &lt; legion&gt; yeah, ok</p>
<p>14:23 &lt; jrandom&gt; bla: certainly, we just need to rope in the RTT from the OutboundClientMessageOneShotJob</p>
<p>14:23 &lt; jrandom&gt; (and then figure out how best to calculate & decay the data)</p>
<p>14:24 &lt; legion&gt; So smeghead if you were to make such a release, what would you do differently?</p>
<p>14:24 &lt;@smeghead&gt; legion: the way you continually dodge questions and try to defer discussion on the subject is very disconcerting</p>
<p>14:25 &lt;@smeghead&gt; legion: first of all, release the source to your current binary, no matter if it's "just i2p-bt with smeghead's patch", and have a writeup on your site explaining about your fork</p>
<p>14:25 &lt; bla&gt; jrandom: What does the RTT signify there?</p>
<p>14:26 &lt;@smeghead&gt; legion: it would be helpful to do as i2p-bt does also, and make a changelog indicating all the modifications you've made</p>
<p>14:27 &lt; jrandom&gt; bla: end to end client messages are often (by default, always) bundled in garlic wrapping, containing an additional DeliveryStatusMessage that returns to the sender (through tunnels, of course), allowing the use of AES+sessionTags instead of ElGamal</p>
<p>14:28 &lt; bla&gt; jrandom: (yes)</p>
<p>14:28 &lt;+detonate&gt; as i said, you could just provide a link to the download page for the three things you need for i2p-bt to work, it's straight-forward and gets you exactly the same thing, i can't actually see a use for it besides a trojan</p>
<p>14:28 &lt; jrandom&gt; later on we'll update I2CP (and the SDK) to allow the streaming lib to deliver that same data without requiring the DeliveryStatusMessage</p>
<p>14:29 &lt;@smeghead&gt; detonate: i agree, he should have just submitted a patch to the official i2p-bt in the first place, forking was completely unnecessary and fostered immediate suspicioun</p>
<p>14:30 &lt;+detonate&gt; indeed</p>
<p>14:30 &lt;@smeghead&gt; *suspicion</p>
<p>14:31 &lt; jrandom&gt; ok, anyone else have anything to bring up for the meeting?</p>
<p>14:31 &lt; ant&gt; &lt;drakoh&gt; hi people ! wanted to know, is there anything special with the network ?</p>
<p>14:32 &lt;@smeghead&gt; because of the nature of i2p, applications developed for it require a greater measure of openness with end users and cooperation among developers</p>
<p>14:32 &lt; jrandom&gt; drakoh: see the weekly status notes</p>
<p>14:32 &lt; bla&gt; quit</p>
<p>14:32 &lt; ant&gt; &lt;drakoh&gt; no I mean something strange ...</p>
<p>14:32 &lt;@smeghead&gt; i2p users will always be naturally paranoid to some extent, and it's our duty to do what we can to dispel any concerns we possibly can</p>
<p>14:32 &lt; ant&gt; &lt;drakoh&gt; like I lost all my peers</p>
<p>14:33 &lt; jrandom&gt; aye, agreed smeghead. for anonymity or security software, especially software dealing with a trojan-laden field such as filesharing, its critical to be open.</p>
<p>14:33 &lt; jrandom&gt; drakoh: ok, hold on, we can debug that once the meeting is over</p>
<p>14:33 &lt; ant&gt; &lt;drakoh&gt; woops sorry</p>
<p>14:33 &lt; jrandom&gt; ok, speaking of the meeting being over...</p>
<p>14:34 * jrandom winds up</p>
<p>14:34 * jrandom *baf*s the meeting closed</p>
</div>
{% endblock %}