Skip Navigation
New i2pd release 2.52.0
github.com GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

🛡 I2P: End-to-End encrypted and anonymous Internet - PurpleI2P/i2pd

GitHub - PurpleI2P/i2pd: 🛡 I2P: End-to-End encrypted and anonymous Internet

[2.52.0] - 2024-05-12

Added

  • Separate threads for persisting RouterInfos and profiles to disk
  • Give preference to address with direct connection
  • Exclude addresses with incorrect static or intro key
  • Avoid two firewalled routers in the row in tunnel
  • Drop unsolicited database search replies

Changed

  • Increase number of hashes to 16 in exploratory lookup reply
  • Reduce number of a RouterInfo lookup attempts to 5
  • Reset stream RTO if outbound tunnel was changed
  • Insert previously excluded floodfill back when successfully connected
  • Increase maximum stream resend attempts to 9
  • Reply to exploratory lookups with only confirmed routers if low tunnel build rate
  • Don't accept too old RouterInfo
  • Build client tunnels through confirmed routers only if low tunnel build rate
  • Manage netDb requests more frequently
  • Don't reply with closer than us only floodfills for lookup

Fixed

  • Crash on router lookup if exploratory pool is not ready
  • Race condition in excluded peers for next lookup
  • Excessive number of lookups for same destination
  • Race condition with transport peers during shutdown
  • Corrupted RouterInfo files
3
What should I run and why?
  • Well you could run these services in your server (only if you have enough spare bandwidth, ram and cpu) to help the comunity to circumvent censorship in some countries, like Russia or Iran. Here you have more information for tor and i2pd.

  • How was the Snowflake proxy used in 2023?
  • Snowflake/bridge is used when you do not want the authorities/ISP know, you are using tor or because it might be blocked (like on contries with censorship). When you are running snowflake/bridge you are helping these users. For the contrary, if you use a normal tor relay, they(ISP, authorities, who ever is watching your connection) know, but they do not know what you are doing.

  • geoip location of the connections

    I run different services on my debian server and I would like to know if there any terminal command or something to show the countries and number connections that have established contact

    7
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SU
    supervent @lemmy.dbzer0.com
    Posts 2
    Comments 101