• Beküldte: 2004-08-31
  • Készítette: I2P devs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Well boys 'n girls, its Tuesday again!

* Index:
1) 0.3.4.3
2) 0.3.5 and 0.4
3) docs
4) stasher update
5) ???

* 1) 0.3.4.3

Well, as I'm you've all noticed, while the number of users on the
network has stayed pretty steady, the performance has significantly
degrated over the last few days.  The source of this has been a
series of bugs in the peer selection and message delivery code,
exposed when there was a minor DoS last week.  The result has been
essentially everyone's tunnels have been consistently failing, which
has a bit of a snowball effect.  So no, its not just you - the net
has been horrid for the rest of us as well ;)

But the good news is we fixed the issues pretty quickly, and they've
been in CVS since last week, but the network will still suck for
people until the next release is out.  On that note...

* 2) 0.3.5 and 0.4

While the next release will have all the goodies we've got planned
for the 0.4 release (new installer, new web interface standard,
new i2ptunnel interface, systray & windows service, threading
improvements, bugfixes, etc), the way the last release degraded over
time was telling.  I want us to move more slowly on these releases,
giving them time to deploy more fully and for kinks to show
themselves.  While the simulator can explore the basics, it doesn't
have any way of simulating the natural network issues we see on the
live net (at least, not yet).

As such, the next release will be 0.3.5 - hopefully the last 0.3.*
release, but perhaps not, if other issues arise.  Looking back at
how the network operated when I was offline in June, things started
to degrade after about two weeks.  As such, my thoughts are to hold
off marking us up to the next 0.4 release level until we can sustain
a high degree of reliability for at least two weeks.  That doesn't
mean we won't be doing work in the meantime, of course.

Anyway, as mentioned last week, hypercubus is chugging away at the
new install system, dealing with me changing things around and
requiring support for goofball systems.  We should have things
hammered out in the next few days to push out a 0.3.5 release in
the next few days.

* 3) docs

One of the important thing we need to do during that two week
"testing window" before 0.4 is to document like crazy.  What I'm
wondering is what things you feel our documentation is missing -
what questions do you have that we need to answer?  While I'd like
to say "ok, now, go write those documents", I'm realistic, so all
I'm asking is if you can identify what those documents would
discuss.

For instance, one of the docs I'm working on now is a revision of
the threat model, which I'd now describe as a series of use cases
explaining how I2P can serve different individual's needs,
including the functionality, the attackers that person is worried
about, and how they defend themselves.

If you don't think your question requires a full blown document to
address, simply phrase it as a question and we can add it to the
FAQ.

* 4) stasher update

Aum was by the channel earlier today with an update (while I
peppered him with questions):

  < aum> quick stasher update, with apologies for tomorrow's meeting:
  < aum> infinite-level splitfiles working, have successfully
         inserted and retrieved large files
  < jrandom> w00t
  < aum> splitfile fragmentation/reassembly transparently occuring
         within stasher
  < aum> freenet interface working
  < jrandom> wow
  < jrandom> so FUQID/FIW works?
  < aum> use of fcp splitfile commands in freenet clients strictly
         forbidden (at this stage)
  < aum> most clients such as fuqid/fiw should allow setting
         extremely large splitfile sizes, which should prevent them
         trying to talk splitfiles
  < aum> if not, then i can dummy up something
  < jrandom> r0x0r aum, that kicks ass!
  < aum> hooks are in for detailed freenet key support
  < jrandom> detailed freenet key support?
  < aum> yes, specific chk@, ssk@, ksk@
  < aum> seriously considering datastore encryption:
  < jrandom> ok great, so they're all verified @ each node, etc?
  < aum> no - only verifiable by the requestor
  < aum> my thinking is, given KSK@fred = 'mary',
  < aum> to store as SHA1(SHA1("KSK@fred")) = E(mary), where key
         for E is SHA1("KSK@fred")
  < aum> ie, crypto key is SHA1(uri), and kademlia key is
         SHA1(SHA1(uri))
  < jrandom> hm
  < aum> so a possessor of the URI can decyrpt, but owner of a
         datastore cannot decrypt (and therefore has plausible
         deniability)
  < jrandom> well, ksks are inherently insecure, so thats no big
             loss, but what about ssk?
  < deer> <detonate> those keys aren't very large
  < aum> SSK as for freenet
  < jrandom> so the SSKs are verified at each node?
  < aum> except i'm looking to use same encryption over the top
  < aum> not feasible to verify SSK at the target node
  < jrandom> why not?  freenet does
  < aum> well maybe it is feasible,
  < aum> i guess i shouldn't be so lazy
  < aum> i was trying to keep the kademlia and freenet layers
         separate
  < jrandom> heh, you're not being lazy, there's a truckload of
             work here, and you're doing a great job
  < aum> verifying on target node will cause some pathological
         couplings between the two layers, and force deviation
         from pure kademlia
  < jrandom> i dont think its possible to do SSKs or CHKs
             securely without having the node validate the key
             properties
  < aum> not correct
  < aum> fred asks mary, 'gimme SSK@madonna'
  < aum> mary sends back what she thinks is 'SSK@madonna'
  < aum> fred tests it, barfs, then goes on to ask the next node
  < aum> anyway, i MUST go - but am open to continuing discussion
         over email, or tomorrow
  < aum> bbl guys
  < jrandom> mallory floods the net with 'SSK@madonna' ==
            'sexDrugsRockNRoll'
  < jrandom> l8r aum

So, as you can see, lots and lots of progress.  Even if the
keys are validated above the DHT layer, that's wikked cool (imho).
Go aum!

* 5) ???

Ok, thats all I've got to say (which is good, since the meeting
starts in a few moments)... swing on by and say whatcha want!

=jr

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBQTTlqRpxS9rYd+OGEQJd3ACfYXJRO6EFjOVgO7KNbQcdr1YevJYAnj0Q
gEg6cYDHMxLuGop/ALQwU+bg
=A3Um
-----END PGP SIGNATURE-----