Skip Navigation
i2pd 2.53.0 release
github.com GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

🛡 I2P: End-to-End encrypted and anonymous Internet - PurpleI2P/i2pd

GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

[2.53.0] - 2024-07-19

Added

  • New congestion control algorithm for streaming
  • Support miniupnp-2.2.8
  • Limit stream's outbound speed
  • Flood to next day closest floodfills before UTC midnight
  • Recognize duplicated routers and bypass them
  • Random SSU2 resend interval

Changed

  • Set minimal version to 0.9.69 for floodfills and 0.9.58 for client tunnels
  • Removed openssl 1.0.2 support
  • Move unsent I2NP messages to the new session if replaced
  • Use mt19937 RNG instead rand()
  • Update router's congestion caps before initial publishing
  • Don't try introducer with invalid address
  • Select newest introducers to publish
  • Don't request relay tag for every session if we have enough introducers
  • Update timestamp for non-reachable or hidden router
  • Reset streaming routing path if duplicated SYN received
  • Update LeaseSet if inbound tunnel failed
  • Reseeds list

Fixed

  • Crash when a destination gets terminated
  • Expired offline signature upon destination creation
  • Race condition between local RouterInfo buffer creation and sending it through the transports
0
New i2pd release 2.52.0
github.com GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

🛡 I2P: End-to-End encrypted and anonymous Internet - PurpleI2P/i2pd

GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

[2.52.0] - 2024-05-12

Added

  • Separate threads for persisting RouterInfos and profiles to disk
  • Give preference to address with direct connection
  • Exclude addresses with incorrect static or intro key
  • Avoid two firewalled routers in the row in tunnel
  • Drop unsolicited database search replies

Changed

  • Increase number of hashes to 16 in exploratory lookup reply
  • Reduce number of a RouterInfo lookup attempts to 5
  • Reset stream RTO if outbound tunnel was changed
  • Insert previously excluded floodfill back when successfully connected
  • Increase maximum stream resend attempts to 9
  • Reply to exploratory lookups with only confirmed routers if low tunnel build rate
  • Don't accept too old RouterInfo
  • Build client tunnels through confirmed routers only if low tunnel build rate
  • Manage netDb requests more frequently
  • Don't reply with closer than us only floodfills for lookup

Fixed

  • Crash on router lookup if exploratory pool is not ready
  • Race condition in excluded peers for next lookup
  • Excessive number of lookups for same destination
  • Race condition with transport peers during shutdown
  • Corrupted RouterInfo files
3
What should I run and why?
  • Well you could run these services in your server (only if you have enough spare bandwidth, ram and cpu) to help the comunity to circumvent censorship in some countries, like Russia or Iran. Here you have more information for tor and i2pd.

  • How was the Snowflake proxy used in 2023?
  • Snowflake/bridge is used when you do not want the authorities/ISP know, you are using tor or because it might be blocked (like on contries with censorship). When you are running snowflake/bridge you are helping these users. For the contrary, if you use a normal tor relay, they(ISP, authorities, who ever is watching your connection) know, but they do not know what you are doing.

  • geoip location of the connections

    I run different services on my debian server and I would like to know if there any terminal command or something to show the countries and number connections that have established contact

    7
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SU
    supervent @lemmy.dbzer0.com
    Posts 3
    Comments 103