1501 lines
61 KiB
HTML
1501 lines
61 KiB
HTML
<div>
|
|
<header title="I2P News">News feed, and router updates</header>
|
|
<article
|
|
id="urn:uuid:"
|
|
title="New Release I2P 2.3.0 - Security Fixes, Tweakable blocklists, DTG API"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2023/06/25/new_release_2.3.0"
|
|
author="idk"
|
|
published="2023-06-25T12:00:00Z"
|
|
updated="2023-06-25T12:00:00Z">
|
|
<details>
|
|
<summary>I2P 2.3.0 - Security Fixes, Tweakable blocklists, DTG API</summary>
|
|
</details>
|
|
<p>
|
|
This release contains fixes for CVE-2023-36325.
|
|
CVE-2023-36325 is a context-confusion bug which occurred in the bloom filter.
|
|
An attacker crafts an I2NP message containing a unique messageID, and sends that messageID to a client.
|
|
The message, after passing through the bloom filter, is not allowed to be re-used in a second message.
|
|
The attacker then sends the same message directly to the router.
|
|
The router passes the message to the bloom filter, and is dropped.
|
|
This leaks the information that the messageID has been seen before, giving the attacker a strong reason to believe that the router is hosting the client.
|
|
This has been fixed by separting the bloom filter's functionality into different contexts based on whether a message came down a client tunnel, an exploratory tunnel, was sent to the router directly.
|
|
Under normal circumstances, this attack takes several days to perform successfully and may be confounded by several factors such as routers restarting during the attack phase and sensitivity to false-positives.
|
|
Users of Java I2P are recommended to update immediately to avoid the attack.
|
|
</p>
|
|
<p>
|
|
In the course of fixing this context confusion bug, we have revised some of our strategies to code defensively, against these types of leaks.
|
|
This includes tweaks to the netDb, the rate-limiting mechanisms, and the behavior of floodfill routers.
|
|
</p>
|
|
<p>
|
|
This release adds not_bob as a second default hosts provider, and adds <a href="http://notbob.i2p">notbob.i2p</a> and <a href="http://ramble.i2p">ramble.i2p</a> to the console homepage.
|
|
</p>
|
|
<p>
|
|
This release also contains a tweakable blocklist.
|
|
Blocklisting is semi-permanent, each blocked IP address is normally blocked until the router is restarted.
|
|
Users who observe explosive blocklist growth during sybil attacks may opt-in to shorter timeouts by configuring the blocklist to expire entries at an interval.
|
|
This feature is off-by-default and is only recommended for advanced users at this time.
|
|
</p>
|
|
<p>
|
|
This release also includes an API for plugins to modify with the Desktop GUI(DTG).
|
|
It is now possible to add menu items to the system tray, enabling more intuitive launching of plugins which use native application interfaces.
|
|
</p>
|
|
<p>
|
|
As usual, we recommend that you update to this release.
|
|
The best way to maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
<article
|
|
id="urn:uuid:d960054d-6e03-4638-b808-cd3dadae40d5"
|
|
title="New Release 2.2.1, Packaging fixes for Docker, Ubuntu Lunar and Debian Sid"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2023/4/12/new_release_2.2.1"
|
|
author="idk"
|
|
published="2023-04-12T03:00:00Z"
|
|
updated="2023-04-12T03:00:00Z">
|
|
<details>
|
|
<summary>I2P 2.2.1 - maintenance release for 2.2.0</summary>
|
|
</details>
|
|
<p>
|
|
After the I2P 2.2.0 release, which was moved forward to accelerate mitigations for the DDOS attacks, we learned about a few developing issues which made it necessary to build and release new packages.
|
|
This release fixes an issue within Ubuntu Lunar and Debian Sid where the router console was inaccessible using an updated version of the jakarta package.
|
|
Docker packages were not reading arguments correctly, resulting in inaccessible configuration files.
|
|
This issue has also been resolved.
|
|
The docker container is now also compatible with Podman.
|
|
</p>
|
|
<p>
|
|
This release syncs translations with transifex and updates the GeoIP database.
|
|
</p>
|
|
<p>
|
|
As usual, we recommend that you update to this release.
|
|
The best way to maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:3b44ff84-d820-4976-bb4a-9c6e4dd3e362"
|
|
title="New Release 2.2.0, Mitigations to DDOS attacks and tweaks to the Streaming subsystem"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2023/3/13/new_release_2.2.0"
|
|
author="idk"
|
|
published="2023-03-13T17:00:00Z"
|
|
updated="2023-03-13T17:00:00Z">
|
|
<details>
|
|
<summary>Mitigations to DDOS attacks and tweaks to the Streaming subsystem</summary>
|
|
</details>
|
|
<p>
|
|
We have elected to move forward the 2.2.0 release date, which will be occurring today, March 13, 2023.
|
|
This release includes a changes across the NetDB, Floodfill, and Peer-Selection components which improve the ability of the router to survive DDOS attacks.
|
|
The attacks are likely to continue, but the improvements to these systems will help to mitigate the risk of DDOS attacks by helping the router identify and de-prioritize routers that appear malicious.
|
|
</p>
|
|
<p>
|
|
This release also adds replay protection to the Streaming subsystem, which prevents an attacker who can capture an encrypted packet from being able to re-use it by sending it to unintended recipients.
|
|
This is a backward-compatible change, so older routers will still be able to use the streaming capabilities of newer routers.
|
|
This issue was discovered and fixed internally, by the I2P development team, and is not related to the DDOS attacks.
|
|
We have never encountered a replayed streaming packet in the wild and do not believe a streaming replay attack has ever taken place against the I2P network at this time.
|
|
</p>
|
|
<p>
|
|
As you may have noticed, these release notes and the release itself have been signed by idk, and not zzz.
|
|
zzz has chosen to step away from the project and his responsibilities are being taken on by other team members.
|
|
As such, the project is working on replacing the network statistics infrastructure and moving the development forum to i2pforum.i2p.
|
|
We thank zzz for providing these services for such a long time.
|
|
</p>
|
|
<p>
|
|
As usual, we recommend that you update to this release.
|
|
The best way to maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:1a4d272b-8f28-4bb0-bab7-59953c1013f7"
|
|
title="DDoS Update"
|
|
href="http://zzz.i2p/topics/3593"
|
|
author="zzz"
|
|
published="2023-02-14T19:00:00Z"
|
|
updated="2023-02-14T19:00:00Z">
|
|
<details>
|
|
<summary>DDoS Update</summary>
|
|
</details>
|
|
<p>
|
|
We have confirmed that the attacker controls a large number of routers.
|
|
Our investigations and mitigations continue.
|
|
</p><p>
|
|
This is a good time to remind people that even after 20 years, the I2P network is relatively small.
|
|
We have no evidence that the attacker is attempting to deanonymize any particular user or hidden service.
|
|
However, if you have a high-risk threat model, you should carefully consider whether I2P currently provides the protection you require.
|
|
The best solution, in the long run, is to spread the word and grow the I2P network to increase security of our users.
|
|
</p><p>
|
|
We will provide additional information here in the news feed and on <a href="http://zzz.i2p">zzz.i2p</a> as necessary.
|
|
We ask for your patience as we work to improve I2P.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:6558c015-7767-45f1-b80a-07def923a88d"
|
|
title="About the recent Denial of Service attacks"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2023/2/9/about_the_recent_denial_of_service_attacks"
|
|
author="sadie,idk"
|
|
published="2023-02-09T23:00:00Z"
|
|
updated="2023-02-09T23:00:00Z">
|
|
<details>
|
|
<summary>I2P remains intact with impaired performance</summary>
|
|
</details>
|
|
<p>
|
|
The I2P network is currently being affected by a Denial of Service attack.
|
|
The floodfill function of the network has been affected, resulting in responses being disrupted and tunnel build success rates dropping.
|
|
Participants in the network have experienced difficulties connecting to I2P sites and using I2P services.
|
|
Mitigation strategies are being investigated and implemented gradually.
|
|
</p>
|
|
<p>
|
|
While the attack has degraded performance, the network remains intact and usable.
|
|
Java I2P routers appear to be handling the issues better than i2pd routers for now.
|
|
Various mitigations should begin to appear in dev builds of both Java and C++ routers in the next week.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:68f9a58c-de7f-493e-8cb7-c0ceeda78007"
|
|
title="2.1.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2023/01/09/2.1.0-Release"
|
|
author="zzz"
|
|
published="2023-01-09T12:00:00Z"
|
|
updated="2023-01-09T12:00:00Z">
|
|
<details>
|
|
<summary>2.1.0 with numerous SSU2 fixes</summary>
|
|
</details>
|
|
<p>
|
|
We have learned several things since our 2.0.0 release in November.
|
|
As routers have updated to that release, the network has gone from about 1% to over 60% support for our new SSU2 transport protocol.
|
|
First, we have confirmed that SSU2 is a solid, well designed, and secure protocol.
|
|
Second, however, we have found and fixed numerous minor or rarely-triggered bugs in the implementation of the protocol.
|
|
Cumulatively, the effects of these bugs have reduced the performance of the network.
|
|
</p><p>
|
|
Also, we are aware of increased tunnel count and reduced tunnel build success rate in the network,
|
|
possibly triggered by Bitcoin's new I2P transient address feature,
|
|
but made worse by our SSU2 bugs and other congestion control problems.
|
|
We are working with Bitcoin and other non-Bitcoin projects to reduce I2P network demands.
|
|
We have improved our algorithms to reduce network load during times of congestion.
|
|
We are also collaborating with i2pd to develop common congestion control strategies.
|
|
</p><p>
|
|
Therefore, we have accelerated this release by about six weeks, to get the fixes out to everybody.
|
|
i2pd released their version 2.45.0 last week and the early results are encouraging.
|
|
New protocols, and distributed networks, are difficult to develop.
|
|
Congestion can arrive with little warning and with little clue of the cause.
|
|
Thank you for your patience as we have diagnosed and hopefully fixed the problems.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:adf95235-a183-4870-b5fa-99752e3657d2"
|
|
title="2.0.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/11/21/2.0.0-Release"
|
|
author="zzz"
|
|
published="2022-11-21T12:00:00Z"
|
|
updated="2022-11-21T12:00:00Z">
|
|
<details>
|
|
<summary>SSU2 Transport Enabled</summary>
|
|
</details>
|
|
<p>
|
|
I2P release 2.0.0 enables our new UDP transport SSU2 for all users, after completion of minor features, testing, and numerous bug fixes.
|
|
</p><p>
|
|
We also have fixes all over, including for the installer, network database, adding to the private address book, the Windows browser launcher, and IPv6 UPnP.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:65da828c-43de-49a4-98e7-b8bfeed8d341"
|
|
title="Recent Blog Posts"
|
|
href="http://i2p-projekt.i2p/en/blog/"
|
|
author="zzz"
|
|
published="2022-10-12T12:00:00Z"
|
|
updated="2022-10-12T12:00:00Z">
|
|
<details>
|
|
<summary>A few recent blog posts</summary>
|
|
</details>
|
|
<p>
|
|
Here's links to several recent blog posts on our website:
|
|
</p>
|
|
<ul>
|
|
<li><a href="http://i2p-projekt.i2p/en/blog/post/2022/10/11/SSU2-Transport">Overview of our new SSU2 transport</a></li>
|
|
<li><a href="http://i2p-projekt.i2p/en/blog/post/2022/09/26/i2p-safety-reminder">A warning about I2P coins and other scams</a></li>
|
|
<li><a href="http://i2p-projekt.i2p/en/blog/post/2022/09/26/meet-your-maintainer-divaexchange">An interview with Konrad from diva.exchange</a></li>
|
|
<li><a href="http://i2p-projekt.i2p/en/blog/post/2022/09/07/Meet_your_Maintainer_StormyCloud">An interview with Dustin from StormyCloud</a></li>
|
|
</ul>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:b998384f-08ae-4979-908b-2f57e72b05f5"
|
|
title="1.9.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/8/22/1.9.0-Release"
|
|
author="zzz"
|
|
published="2022-08-22T12:00:00Z"
|
|
updated="2022-08-22T12:00:00Z">
|
|
<details>
|
|
<summary>1.9.0 with SSU2 for testing</summary>
|
|
</details>
|
|
<p>
|
|
We have spent the last three months working on our new UDP transport protocol "SSU2"
|
|
with a small number of volunteer testers.
|
|
This release completes the implementation, including relay and peer testing.
|
|
We are enabling it by default for Android and ARM platforms, and a small percentage of other routers at random.
|
|
This will allow us to do much more testing in the next three months, finish the connection migration feature,
|
|
and fix any remaining issues.
|
|
We plan to enable it for everyone in the next release scheduled for November.
|
|
No manual configuration is necessary.
|
|
</p><p>
|
|
Of course, there's the usual collection of bug fixes in this release as well.
|
|
We also added an automatic deadlock detector that has already found a rare deadlock that is now fixed.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:4c69e33a-6238-4b50-98ef-6ee00d2d8da7"
|
|
title="New Outproxy exit.stormycloud.i2p"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/8/4/Enable-StormyCloud"
|
|
author="zzz"
|
|
published="2022-08-05T11:00:00Z"
|
|
updated="2022-08-05T11:00:00Z">
|
|
<details>
|
|
<summary>New Outproxy</summary>
|
|
</details>
|
|
<p>
|
|
I2P "outproxies" (exit nodes) may be used to access the internet through
|
|
your HTTP proxy tunnel.
|
|
As approved at our <a href="http://i2p-projekt.i2p/en/meetings/314">monthly meeting</a>,
|
|
<b>exit.stormycloud.i2p</b> is now our official, recommended outproxy, replacing the long-dead <b>false.i2p</b>.
|
|
For more information on the StormyCloud <a href="http://stormycloud.i2p/">organization</a>,
|
|
<a href="http://stormycloud.i2p/outproxy.html">outproxy</a>,
|
|
and <a href="http://stormycloud.i2p/tos.html">terms of service</a>,
|
|
see the <a href="http://stormycloud.i2p/">StormyCloud website</a>.
|
|
</p><p>
|
|
We suggest you change your <a href="/i2ptunnel/edit?tunnel=0">Hidden Services Manager configuration</a>
|
|
to specify <b>exit.stormycloud.i2p</b>
|
|
in two places: <b>Outproxies</b> and <b>SSL Outproxies</b>.
|
|
After editing, <b>scroll down and click Save</b>.
|
|
See our <a href="http://i2p-projekt.i2p/en/blog/post/2022/8/4/Enable-StormyCloud">blog post for a screenshot</a>.
|
|
For Android instructions and screenshots see <a href="http://notbob.i2p/cgi-bin/blog.cgi?page=116">notbob's blog</a>.
|
|
</p><p>
|
|
Router updates will not update your configuration, you must edit it manually.
|
|
Thanks to StormyCloud for their support, and please consider a <a href="http://stormycloud.i2p/donate.html">donation</a>.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:ad7c438d-01c6-435b-b290-855190d73b73"
|
|
title="1.8.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/05/23/1.8.0-Release"
|
|
author="zzz"
|
|
published="2022-05-23T12:00:00Z"
|
|
updated="2022-05-23T12:00:00Z">
|
|
<details>
|
|
<summary>1.8.0 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
This release includes bug fixes in i2psnark,
|
|
the router, I2CP, and UPnP.
|
|
Router fixes address bugs in soft restart, IPv6, SSU peer testing,
|
|
network database stores, and tunnel building.
|
|
Router family handling and Sybil classification have also been
|
|
significantly improved.
|
|
</p><p>
|
|
Together with i2pd, we are developing our new UDP transport, SSU2.
|
|
SSU2 will bring substantial performance and security improvements.
|
|
It will also allow us to finally replace our last usage of the very slow ElGamal encryption,
|
|
completing the full cryptography upgrade we started about 9 years ago.
|
|
This release contains a preliminary implementation which is disabled by default.
|
|
If you wish to participate in testing, please look for current information
|
|
on zzz.i2p.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:0b18adce-f766-45bf-bf12-dc0b32951a71"
|
|
title="Install essential Java/Jpackage updates"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/4/21/Easy-Install-Updates"
|
|
author="idk"
|
|
published="2022-04-22T11:00:00Z"
|
|
updated="2022-04-22T11:00:00Z">
|
|
<details>
|
|
<summary></summary>
|
|
</details>
|
|
<p>
|
|
The recent Java "Psychic Signatues" vulnerability affects I2P. Current users of
|
|
I2P on Linux, or any users of I2P who are using a non-bundled JVM should update
|
|
their JVM or switch to a version which does not contain the vulnerability, below
|
|
Java 15.
|
|
</p>
|
|
<p>
|
|
New I2P Easy-Install bundles have been generated using the latest release of the
|
|
Java Virtual Machine. Further details have been published in the respective
|
|
bundle newsfeeds.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:5136d7e2-5957-4310-a69a-8882d9c88228"
|
|
title="1.7.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2022/02/21/1.7.0-Release"
|
|
author="zzz"
|
|
published="2022-02-21T12:00:00Z"
|
|
updated="2022-02-21T12:00:00Z">
|
|
<details>
|
|
<summary>1.7.0 with reliability and performance improvements</summary>
|
|
</details>
|
|
<p>
|
|
The 1.7.0 release contains several performance and reliability improvements.
|
|
</p><p>
|
|
There are now popup messages in the system tray, for those platforms that support it.
|
|
i2psnark has a new torrent editor.
|
|
The NTCP2 transport now uses much less CPU.
|
|
</p><p>
|
|
The long-deprecated BOB interface is removed for new installs.
|
|
It will continue to work in existing installs, except for Debian packages.
|
|
Any remaining users of BOB applications should ask the developers to convert to the SAMv3 protocol.
|
|
</p><p>
|
|
We know that since our 1.6.1 release, network reliability has steadily deteriorated.
|
|
We were aware of the problem soon after the release, but it took us almost two months to find the cause.
|
|
We eventually identified it as a bug in i2pd 2.40.0,
|
|
and the fix will be in their 2.41.0 release coming out about the same time as this release.
|
|
Along the way, we've made several changes on the Java I2P side to improve the
|
|
robustness of network database lookups and stores, and avoid poorly-performing peers in tunnel peer selection.
|
|
This should help the network be more robust even in the presence of buggy or malicious routers.
|
|
Additionally, we're starting a joint program to test pre-release i2pd and Java I2P routers
|
|
together in an isolated test network, so we can find more problems before the releases, not after.
|
|
</p><p>
|
|
In other news, we continue to make great progress on the design of our new UDP transport "SSU2" (proposal 159)
|
|
and have started implementation.
|
|
SSU2 will bring substantial performance and security improvements.
|
|
It will also allow us to finally replace our last usage of the very slow ElGamal encryption,
|
|
completing a full cryptography upgrade that started about 9 years ago.
|
|
We expect to start joint testing with i2pd soon, and roll it out to the network later this year.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:edd3c726-6c3e-4840-9801-5d41627ec1cf"
|
|
title="1.6.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2021/11/29/1.6.0-Release"
|
|
author="zzz"
|
|
published="2021-11-29T12:00:00Z"
|
|
updated="2021-11-29T12:00:00Z">
|
|
<details>
|
|
<summary>1.6.0 enables new tunnel build messages</summary>
|
|
</details>
|
|
<p>
|
|
This release completes the rollout of two major protocol updates developed in 2021.
|
|
The transition to X25519 encryption for routers is accelerated, and we expect almost all routers to be rekeyed by the end of the year.
|
|
Short tunnel build messages are enabled for a significant bandwidth reduction.
|
|
</p><p>
|
|
We added a theme selection panel to the new install wizard.
|
|
We've improved SSU performance and fixed an issue with SSU peer test messages.
|
|
The tunnel build Bloom filter was adjusted to reduce memory usage.
|
|
We have enhanced support for non-Java plugins.
|
|
</p><p>
|
|
In other news, we are making excellent progress on the design of our new UDP transport SSU2 and expect to start implementation early next year.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:87e8a1b1-d683-4e8e-9f5a-b1ac746b3ae9"
|
|
title="1.5.0 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2021/08/23/1.5.0-Release"
|
|
author="zzz"
|
|
published="2021-08-23T12:00:00Z"
|
|
updated="2021-08-23T12:00:00Z">
|
|
<details>
|
|
<summary>1.5.0 with new tunnel build messages</summary>
|
|
</details>
|
|
<p>
|
|
Yes, that's right, after 9 years of 0.9.x releases, we are going straight from 0.9.50 to 1.5.0.
|
|
This does not signify a major API change, or a claim that development is now complete.
|
|
It is simply a recognition of almost 20 years of work to provide anonymity and security for our users.
|
|
</p><p>
|
|
This release finishes implementation of smaller tunnel build messages to reduce bandwidth.
|
|
We continue the transition of the network's routers to X25519 encryption.
|
|
Of course there are also numerous bug fixes and performance improvements.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:e7a0f375-817f-4c8f-a961-43a81467f560"
|
|
title="MuWire Desktop Vulnerability"
|
|
href="http://muwire.i2p/security.html"
|
|
author="zlatinb"
|
|
published="2021-07-09T15:00:00Z"
|
|
updated="2021-07-09T15:00:00Z">
|
|
<details>
|
|
<summary>Muwire Desktop Vulnerability</summary>
|
|
</details>
|
|
<p>
|
|
A security vulnerability has been discovered in the MuWire standalone desktop application.
|
|
It does not affect the console plugin, and is not related to the previously-announced plugin issue.
|
|
If you are running the MuWire desktop application you should <a href="http://muwire.i2p/">update to version 0.8.8</a> immediately.
|
|
</p><p>
|
|
Details of the issue will be published on <a href="http://muwire.i2p/security.html">muwire.i2p</a>
|
|
on July 15, 2021.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:0de64d0d-8357-49cf-8eea-e1d889cd7387"
|
|
title="MuWire Plugin Vulnerability"
|
|
href="http://muwire.i2p/security.html"
|
|
author="zlatinb"
|
|
published="2021-07-07T11:00:00Z"
|
|
updated="2021-07-07T11:00:00Z">
|
|
<details>
|
|
<summary>Muwire Plugin Vulnerability</summary>
|
|
</details>
|
|
<p>
|
|
A security vulnerability has been discovered in the MuWire plugin.
|
|
It does not affect the standalone desktop client.
|
|
If you are running the MuWire plugin you should <a href="/configplugins">update to version 0.8.7-b1</a> immediately.
|
|
</p><p>
|
|
See <a href="http://muwire.i2p/security.html">muwire.i2p</a>
|
|
for more information about the vulnerability and updated security recommendations.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:9a6591a3-e663-4758-95d1-9fa4e0526d48"
|
|
title="0.9.50 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2021/05/17/0.9.50-Release"
|
|
author="zzz"
|
|
published="2021-05-17T12:00:00Z"
|
|
updated="2021-05-17T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.50 with IPv6 fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.50 continues the transition to ECIES-X25519 for router encryption keys.
|
|
We have enabled DNS over HTTPS for reseeding to protect users from passive DNS snooping.
|
|
There are numerous fixes and improvements for IPv6 addresses, including new UPnP support.
|
|
</p><p>
|
|
We have finally fixed some longstanding SusiMail corruption bugs.
|
|
Changes to the bandwidth limiter should improve network tunnel performance.
|
|
There are several improvements in our Docker containers.
|
|
We have improved our defenses for possible malicious and buggy routers in the network.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:f3629d00-d989-4082-9185-302139c1c9c3"
|
|
title="0.9.49 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2021/02/17/0.9.49-Release"
|
|
author="zzz"
|
|
published="2021-02-17T12:00:00Z"
|
|
updated="2021-02-17T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.49 with SSU fixes and faster crypto</summary>
|
|
</details>
|
|
<p>
|
|
0.9.49 continues the work to make I2P faster and more secure.
|
|
We have several improvements and fixes for the SSU (UDP) transport that should result in faster speeds.
|
|
This release also starts the migration to new, faster ECIES-X25519 encryption for routers.
|
|
(Destinations have been using this encryption for a few releases now)
|
|
We've been working on the specifications and protocols for new encryption for several years,
|
|
and we are getting close to the end of it! The migration will take several releases to complete.
|
|
</p><p>
|
|
For this release, to minimize disruption, only new installs and a very small percentage of existing installs
|
|
(randomly selected at restart) will be using the new encryption.
|
|
If your router does "rekey" to use the new encryption, it may have lower traffic or less reliability than usual for several days after you restart.
|
|
This is normal, because your router has generated a new identity.
|
|
Your performance should recover after a while.
|
|
</p><p>
|
|
We have "rekeyed" the network twice before, when changing the default signature type,
|
|
but this is the first time we've changed the default encryption type.
|
|
Hopefully it will all go smoothly, but we're starting slowly to be sure.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:2f702241-c585-4151-a364-76c561621989"
|
|
title="0.9.48 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2020/11/30/0.9.48-Release"
|
|
author="zzz"
|
|
published="2020-12-01T12:00:00Z"
|
|
updated="2020-12-01T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.48 with performance enhancements</summary>
|
|
</details>
|
|
<p>
|
|
0.9.48 enables our new end-to-end encryption protocol (proposal 144) for most services.
|
|
We have added preliminary support for new tunnel build message encryption (proposal 152).
|
|
There are significant performance improvements throughout the router.
|
|
</p><p>
|
|
Packages for Ubuntu Xenial (16.04 LTS) are no longer supported.
|
|
Users on that platform should upgrade so you may continue to receive I2P updates.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:12c0f414-175a-401e-a35c-47307627a050"
|
|
title="0.9.47 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2020/08/24/0.9.47-Release"
|
|
author="zzz"
|
|
published="2020-08-24T12:00:00Z"
|
|
updated="2020-08-24T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.47 enables new encryption</summary>
|
|
</details>
|
|
<p>
|
|
0.9.47 enables our new end-to-end encryption protocol (proposal 144) by default for some services.
|
|
The Sybil analysis and blocking tool is now enabled by default.
|
|
</p><p>
|
|
Java 8 or higher is now required.
|
|
Debian packages for Wheezy and Stretch, and for Ubuntu Trusty and Precise, are no longer supported.
|
|
Users on those platforms should upgrade so you may continue to receive I2P updates.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:c9389925-50cd-47fe-abb2-20708f9d52b9"
|
|
title="0.9.46 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2020/05/25/0.9.46-Release"
|
|
author="zzz"
|
|
published="2020-05-25T12:00:00Z"
|
|
updated="2020-05-25T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.46 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.46 contains significant performance improvements in the streaming library.
|
|
We have completed development of ECIES encryption (proposal 144) and there is now an option to enable it for testing.
|
|
</p><p>
|
|
Windows users only:
|
|
This release fixes a local privilege escalation vulnerability
|
|
which could be exploited by a local user.
|
|
Please apply the update as soon as possible.
|
|
Thanks to Blaze Infosec for responsible disclosure of the issue.
|
|
</p><p>
|
|
This is the last release to support Java 7, Debian packages Wheezy and Stretch, and Ubuntu packages Precise and Trusty.
|
|
Users on those platforms must upgrade to receive future I2P updates.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:b35dd505-4fd2-451d-91c5-d148bc095869"
|
|
title="0.9.45 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2020/02/25/0.9.45-Release"
|
|
author="zzz"
|
|
published="2020-02-25T12:00:00Z"
|
|
updated="2020-02-25T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.45 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.45 contains important fixes for hidden mode and the bandwidth tester.
|
|
There's an update to the console dark theme.
|
|
We continue work on improving performance and the development of new end-to-end encryption (proposal 144).
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:322cb1a3-e169-4879-a053-b99371ed85d5"
|
|
title="0.9.44 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/12/01/0.9.44-Release"
|
|
author="zzz"
|
|
published="2019-12-01T12:00:00Z"
|
|
updated="2019-12-01T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.44 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.44 contains an important fix for a denial of service issue in hidden services handling of new encryption types.
|
|
All users should update as soon as possible.
|
|
</p><p>
|
|
The release includes initial support for new end-to-end encryption (proposal 144).
|
|
Work continues on this project, and it is not yet ready for use.
|
|
There are changes to the console home page, and new embedded HTML5 media players in i2psnark.
|
|
Additional fixes for firewalled IPv6 networks are included.
|
|
Tunnel build fixes should result in faster startup for some users.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:18696206-3dc9-439c-9eab-b2d6bada1e7b"
|
|
title="0.9.43 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/10/22/0.9.43-Release"
|
|
author="zzz"
|
|
published="2019-10-22T12:00:00Z"
|
|
updated="2019-10-22T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.43 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
In the 0.9.43 release, we continue work on stronger security and privacy features and performance improvements.
|
|
Our implementation of the new leaseset specification (LS2) is now complete.
|
|
We are beginning our implementation of stronger and faster end-to-end encryption (proposal 144) for a future release.
|
|
Several IPv6 address detection issues have been fixed, and there of course are several other bug fixes.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:b49344e5-2eff-4fb4-a52b-e8e5756e6319"
|
|
title="0.9.42 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/08/27/0.9.42-Release"
|
|
author="zzz"
|
|
published="2019-08-27T12:00:00Z"
|
|
updated="2019-08-27T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.42 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.42 continues the work to make I2P faster and more reliable.
|
|
It includes several changes to speed up our UDP transport.
|
|
We have split up the configuration files to enable future work for more modular packaging.
|
|
We continue work to implement new proposals for faster and more secure encryption.
|
|
There are, of course, a lot of bug fixes also.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:f5c9ec1d-7a95-4a17-8be4-c41664125e2f"
|
|
title="0.9.41 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/07/02/0.9.41-Release"
|
|
author="zzz"
|
|
published="2019-07-02T12:00:00Z"
|
|
updated="2019-07-02T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.41 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.41 continues the work to implement new features for proposal 123,
|
|
including per-client authentication for encrypted leasesets.
|
|
The console has an updated I2P logo and several new icons.
|
|
We've updated the Linux installer.
|
|
</p><p>
|
|
Startup should be faster on platforms such as Raspberry Pi.
|
|
We've fixed several bugs, including some serious ones affecting low-level network messages.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:6ed561d0-0f78-49e3-ab95-c6a10167155f"
|
|
title="0.9.40 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/05/07/0.9.40-Release"
|
|
author="zzz"
|
|
published="2019-05-07T12:00:00Z"
|
|
updated="2019-05-07T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.40 with new icons</summary>
|
|
</details>
|
|
<p>
|
|
0.9.40 includes support for the new encrypted leaseset format.
|
|
We disabled the old NTCP 1 transport protocol.
|
|
There's a new SusiDNS import feature, and a new scripted filtering mechanism for incoming connections.
|
|
</p><p>
|
|
We've made a lot of improvements to the OSX native installer, and we've updated the IzPack installer as well.
|
|
The work continues on refreshing the console with new icons.
|
|
As usual, we've fixed lots of bugs also!
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:e34fc8d5-02fc-40cd-af83-a699ca56282e"
|
|
title="0.9.39 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/03/21/0.9.39-Release"
|
|
author="zzz"
|
|
published="2019-03-21T12:00:00Z"
|
|
updated="2019-03-21T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.39 with performance improvements</summary>
|
|
</details>
|
|
<p>
|
|
0.9.39 includes extensive changes for the new network database types (proposal 123).
|
|
We've bundled the i2pcontrol plugin as a webapp to support development of RPC applications.
|
|
There are numerous performance improvements and bug fixes.
|
|
</p><p>
|
|
We've removed the midnight and classic themes to reduce the maintenance burden;
|
|
previous users of those themes will now see the dark or light theme.
|
|
There's also new home page icons, a first step in updating the console.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:6c580177-a55b-400b-bb61-dc8a14d40219"
|
|
title="0.9.38 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2019/01/22/0.9.38-Release"
|
|
author="zzz"
|
|
published="2019-01-22T12:00:00Z"
|
|
updated="2019-01-22T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.38 with new setup wizard</summary>
|
|
</details>
|
|
<p>
|
|
0.9.38 includes a new first-install wizard with a bandwidth tester.
|
|
We've added support for the latest GeoIP database format.
|
|
There's a new Firefox profile installer and a new, native Mac OSX installer on our website.
|
|
Work continues on supporting the new "LS2" netdb format.
|
|
</p><p>
|
|
This release also contains plenty of bug fixes, including several issues with susimail attachments, and a fix for IPv6-only routers.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:dfeb655e-d305-42ba-88d4-0579550e5f8a"
|
|
title="35C3 Trip Report"
|
|
href="http://i2p-projekt.i2p/en/get-involved/roadmap"
|
|
author="sadie"
|
|
published="2019-01-21T12:00:00Z"
|
|
updated="2019-01-21T12:00:00Z">
|
|
<details>
|
|
<summary>I2P at 35C3</summary>
|
|
</details>
|
|
<p>
|
|
The I2P team was mostly all in attendance at 35C3 in Leipzig.
|
|
Daily meetings were held to review the past year and cover our development and design goals for 2019.
|
|
</p><p>
|
|
The Project Vision and new Roadmap can be <a href="http://i2p-projekt.i2p/en/get-involved/roadmap">reviewed here</a>.
|
|
</p><p>
|
|
Work will continue on LS2, the Testnet, and usability improvements to our website and console.
|
|
A plan is in place to be in Tails, Debian and Ubuntu Disco. We still need people to work on Android and I2P_Bote fixes.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:b02623a0-5936-4fb6-aaa8-2a3d81c2f01e"
|
|
title="0.9.37 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2018/10/04/0.9.37-Release"
|
|
author="zzz"
|
|
published="2018-10-04T12:00:00Z"
|
|
updated="2018-10-04T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.37 with NTCP2 enabled</summary>
|
|
</details>
|
|
<p>
|
|
0.9.37 enables a faster, more secure transport protocol called NTCP2.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:678f9d11-a129-40ea-b68a-0b3d4c433774"
|
|
title="0.9.36 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2018/08/23/0.9.36-Release"
|
|
author="zzz"
|
|
published="2018-08-23T12:00:00Z"
|
|
updated="2018-08-23T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.36 with NTCP2 and bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.36 contains a new, more secure transport protocol called NTCP2.
|
|
It is disabled by default, but you may enable it for testing by adding the <a href="/configadvanced">advanced configuration</a> <tt>i2np.ntcp2.enable=true</tt> and restarting.
|
|
NTCP2 will be enabled in the next release.
|
|
</p><p>
|
|
This release also contains several performance improvements and bug fixes.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:32750025-4fc9-4858-a6bb-4ad9c28657c4"
|
|
title="0.9.35 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2018/06/26/0.9.35-Release"
|
|
author="zzz"
|
|
published="2018-06-26T12:00:00Z"
|
|
updated="2018-06-26T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.35 with SusiMail folders and SSL Wizard</summary>
|
|
</details>
|
|
<p>
|
|
0.9.35 adds support for folders in SusiMail, and a new SSL Wizard for setting up HTTPS on your Hidden Service website.
|
|
We also have the usual collection of bug fixes, especially in SusiMail.
|
|
</p><p>
|
|
We're hard at work on several things for 0.9.36, including a new OSX installer and a faster, more secure transport protocol called NTCP2.
|
|
</p><p>
|
|
I2P will be at HOPE in New York City, July 20-22. Find us and say hello!
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:40eaa552-2afb-4485-ab68-426f3f2aa17a"
|
|
title="0.9.34 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2018/04/10/0.9.34-Release"
|
|
author="zzz"
|
|
published="2018-04-10T12:00:00Z"
|
|
updated="2018-04-10T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.34 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.34 contains a lot of bug fixes!
|
|
It also has improvements in SusiMail, IPv6 handling, and tunnel peer selection.
|
|
We add support for IGD2 schemas in UPnP.
|
|
There's also preparation for more improvements you will see in future releases.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:344db535-fa7b-429a-8e7e-417c2772270c"
|
|
title="0.9.33 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2018/01/30/0.9.33-Release"
|
|
author="zzz"
|
|
published="2018-01-30T12:00:00Z"
|
|
updated="2018-01-30T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.33 with bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.33 contains a large number of bug fixes, including i2psnark, i2ptunnel, streaming, and SusiMail.
|
|
For those who cannot access the reseed sites directly, we now support several types of proxies for reseeding.
|
|
We now set rate limits by default in the hidden services manager.
|
|
For those that run high-traffic servers, please review and adjust the limits as necessary.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:dc95b7d9-0c55-472e-8cd9-cf485a495c2c"
|
|
title="KAISER, Meltdown and Spectre"
|
|
href="https://gruss.cc/files/kaiser.pdf"
|
|
author="echelon"
|
|
published="2018-01-04T12:00:00Z"
|
|
updated="2018-01-04T12:00:00Z">
|
|
<details>
|
|
<summary>Security issues found in nearly every system</summary>
|
|
</details>
|
|
<p>
|
|
A very serious issue has been found in modern CPUs which are found in nearly all sold computers worldwide, including mobiles. Those security issues are named "Kaiser", "Meltdown", and "Spectre".
|
|
</p><p>
|
|
The whitepaper for KAISER/KPTI can be found under <a href="https://gruss.cc/files/kaiser.pdf" target="_blank">KAISER.pdf</a>, Meltdown under <a href="https://meltdownattack.com/meltdown.pdf" target="_blank">Meltdown.pdf</a>, and SPECTRE under <a href="https://spectreattack.com/spectre.pdf" target="_blank">Spectre.pdf</a>. Intels first response is listed under <a href="https://newsroom.intel.com/news/intel-responds-to-security-research-findings/" target="_blank">Intels response</a>.
|
|
</p><p>
|
|
It is important for our I2P users to update your system, as long as updates are available. Windows 10 patches are availble from now on, Windows 7 and 8 will follow soon. MacOS patches are already available, to. Lots of Linux systems have a newer Kernel with a included fix available, too. Same applies to Android, which security fix of 2nd Jan 2018 includes a patch for this issues.
|
|
Please update your systems as soon as available and possible.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:a6fc490b-2877-4cbf-afa8-d6e7d4637440"
|
|
title="Happy new year! - 34C3"
|
|
href="http://zzz.i2p/topics/2437-meetings-dec-27-30-at-34c3"
|
|
author="echelon"
|
|
published="2018-01-04T12:00:00Z"
|
|
updated="2018-01-04T12:00:00Z">
|
|
<details>
|
|
<summary>New year and I2P at 34C3</summary>
|
|
</details>
|
|
<p>Happy new year from the I2P team to everyone!
|
|
</p><p>
|
|
No less than 7 I2P team members did meet at the 34C3 in Leipzig from 27th til 30th december 2017. Beside the <a href="http://zzz.i2p/topics/2437-meetings-dec-27-30-at-34c3" target="_blank">meetings</a> at our table we did meet lots of friends of I2P all over the place.
|
|
Results of the meetings are posted on <a href="http://zzz.i2p" target="_blank">zzz.i2p</a> already.
|
|
</p><p>Also we did hand out lots of stickers and gave information about our project to anyone asking.
|
|
Our annual I2P dinner was a full success as a thank you to all attendees for ongoing support of I2P.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
<article
|
|
id="urn:uuid:062c316b-2148-4aae-a0d3-81faeb715345"
|
|
title="0.9.32 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2017/11/07/0.9.32-Release"
|
|
author="zzz"
|
|
published="2017-11-07T12:00:00Z"
|
|
updated="2017-11-07T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.32 with console updates</summary>
|
|
</details>
|
|
<p>
|
|
0.9.32 contains a number of fixes in the router console and associated webapps (addressbook, i2psnark, and susimail).
|
|
We have also changed the way we handle configured hostnames for published router infos, to eliminate some network enumeration attacks via DNS.
|
|
We have added some checks in the console to resist rebinding attacks.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:48298a7a-e365-4719-a6ac-cb335cf0a4ce"
|
|
title="0.9.31 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2017/08/07/0.9.31-Release"
|
|
author="zzz"
|
|
published="2017-08-07T12:00:00Z"
|
|
updated="2017-08-07T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.31 with console updates</summary>
|
|
</details>
|
|
<p>
|
|
The changes in this release are much more noticeable than usual!
|
|
We have refreshed the router console to make it easier to understand,
|
|
improved accessibility and cross-browser support,
|
|
and generally tidied things up.
|
|
This is the first step in a longer-term plan to make the router console more user-friendly.
|
|
We have also added torrent ratings and comments support to i2psnark.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:2ce9a846-4d7e-11e7-b788-00163e5e6c1b"
|
|
title="Call for Translators"
|
|
href="https://www.transifex.com/otf/I2P/announcements/7243/"
|
|
author="str4d"
|
|
published="2017-06-10T12:00:00Z"
|
|
updated="2017-06-10T12:00:00Z">
|
|
<details>
|
|
<summary>The upcoming 0.9.31 release has more untranslated strings than usual</summary>
|
|
</details>
|
|
<p>
|
|
In preparation for the 0.9.31 release, which brings with it significant updates
|
|
to the user interface, we have a larger than normal collection of untranslated
|
|
strings that need attention. If you're a translator, we would greatly appreciate
|
|
it if you could set aside a little more time than usual during this release cycle
|
|
in order to bring the translations up to speed. We have pushed the strings early
|
|
to give you three weeks to work on them.
|
|
</p><p>
|
|
If you're not currently an I2P translator, now would be a great time to get
|
|
involved! Please see the
|
|
<a href="http://i2p-projekt.i2p/en/get-involved/guides/new-translators" target="_blank">New Translator's Guide</a>
|
|
for information on how to get started.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:3b9b01cf-23ec-4aeb-ab20-2f79e8396c4f"
|
|
title="0.9.30 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2017/05/03/0.9.30-Release"
|
|
author="zzz"
|
|
published="2017-05-03T12:00:00Z"
|
|
updated="2017-05-03T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.30 updates to Jetty 9</summary>
|
|
</details>
|
|
<p>
|
|
0.9.30 contains an upgrade to Jetty 9 and Tomcat 8.
|
|
The previous versions are no longer supported, and are not available in the upcoming Debian Stretch and Ubuntu Zesty releases.
|
|
The router will migrate the jetty.xml configuration file for each Jetty website to the new Jetty 9 setup.
|
|
This should work for recent, unmodified configurations but may not work for modified or very old setups.
|
|
Verify that your Jetty website works after upgrading, and contact us on IRC if you need assistance.
|
|
</p><p>
|
|
Several plugins are not compatible with Jetty 9 and must be updated.
|
|
The following plugins have been updated to work with 0.9.30, and your router should update them after restart:
|
|
i2pbote 0.4.6; zzzot 0.15.0.
|
|
The following plugins (with current versions listed) will not work with 0.9.30.
|
|
Contact the appropriate plugin developer for the status of new versions:
|
|
BwSchedule 0.0.36; i2pcontrol 0.11.
|
|
</p><p>
|
|
This release also supports migration of old (2014 and earlier) DSA-SHA1 hidden services to the more-secure EdDSA signature type.
|
|
See <a href="http://zzz.i2p/topics/2271">zzz.i2p</a> for further information, including a guide and FAQ.
|
|
</p><p>
|
|
Note: On non-Android ARM platforms such as the Raspberry Pi, the blockfile database will upgrade on restart, which may take several minutes.
|
|
Please be patient.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:5f5166f0-a1c3-4ca9-9db0-32a157eb6ca7"
|
|
title="0.9.29 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2017/02/27/0.9.29-Release"
|
|
author="zzz"
|
|
published="2017-02-27T12:00:00Z"
|
|
updated="2017-02-27T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.29 contains bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.29 contains fixes for numerous Trac tickets, including workarounds for corrupt compressed messages.
|
|
We now support NTP over IPv6.
|
|
We've added preliminary Docker support.
|
|
We now have translated man pages.
|
|
We now pass same-origin Referer headers through the HTTP proxy.
|
|
There are more fixes for Java 9, although we do not yet recommend Java 9 for general use.
|
|
</p><p>
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:cb742cac-df38-11e6-aed3-00163e5e6c1b"
|
|
title="I2P-Bote Security Vulnerability"
|
|
href="http://bote.i2p/news/0.4.5/"
|
|
author="str4d"
|
|
published="2017-01-20T12:00:00Z"
|
|
updated="2017-01-20T12:00:00Z">
|
|
<details>
|
|
<summary>I2P-Bote Security Vulnerability</summary>
|
|
</details>
|
|
<p>
|
|
I2P-Bote 0.4.5 fixes a security vulnerability present in all earlier versions of the
|
|
I2P-Bote plugin. The Android app was not affected.
|
|
</p><p>
|
|
When showing emails to the user, most fields were being escaped. However, the filenames
|
|
of attachments were not escaped, and could be used to execute malicious code in a browser
|
|
with JavaScript enabled. These are now escaped, and additionally a Content Security Policy
|
|
has been implemented for all pages.
|
|
</p><p>
|
|
All I2P-Bote users will be upgraded automatically the first time they restart their router
|
|
after I2P 0.9.29 is released in mid-February. However, for safety we recommend that you
|
|
<a href="http://bote.i2p/install/">follow the instructions on the installation page</a> to
|
|
upgrade manually if you plan on using I2P or I2P-Bote in the intervening time.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:91ad7d6c-a1e1-4e3c-b9bc-0b3b2742153c"
|
|
title="0.9.28 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2016/12/12/0.9.28-Release"
|
|
author="zzz"
|
|
published="2016-12-12T12:00:00Z"
|
|
updated="2016-12-12T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.28 contains bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.28 contains fixes for over 25 Trac tickets, and updates for a number of bundled software packages including Jetty.
|
|
There are fixes for the IPv6 peer testing feature introduced last release.
|
|
We continue improvements to detect and block peers that are potentially malicious.
|
|
There are preliminary fixes for Java 9, although we do not yet recommend Java 9 for general use.
|
|
</p><p>
|
|
I2P will be at 33C3, please stop by our table and give us your ideas on how to improve the network.
|
|
We will review our 2017 roadmap and priorities 2017 at the Congress.
|
|
</p><p>
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:00015ff6-b556-11e6-adb4-00163e5e6c1a"
|
|
title="I2P-Bote Security Vulnerability"
|
|
href="http://bote.i2p/news/0.4.4/"
|
|
author="str4d"
|
|
published="2016-11-28T12:00:00Z"
|
|
updated="2016-11-28T12:00:00Z">
|
|
<details>
|
|
<summary>I2P-Bote Security Vulnerability</summary>
|
|
</details>
|
|
<p>
|
|
I2P-Bote 0.4.4 fixes a security vulnerability present in all earlier versions of the
|
|
I2P-Bote plugin. The Android app was not affected.
|
|
</p><p>
|
|
A lack of CSRF protection meant that if a user was running I2P-Bote and then loaded a
|
|
malicious site in a browser with JavaScript enabled, the adversary could trigger actions
|
|
in I2P-Bote on behalf of the user, such as sending messages. This might also have enabled
|
|
extraction of private keys for I2P-Bote addresses, however no proof-of-exploit was tested
|
|
for this.
|
|
</p><p>
|
|
All I2P-Bote users will be upgraded automatically the first time they restart their router
|
|
after I2P 0.9.28 is released in mid-December. However, for safety we recommend that you
|
|
<a href="http://bote.i2p/install/">follow the instructions on the installation page</a> to
|
|
upgrade manually if you plan on using I2P or I2P-Bote in the intervening time. You should
|
|
also consider generating new I2P-Bote addresses if you regularly browse sites with
|
|
JavaScript enabled while running I2P-Bote.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:c1d01ac3-81e7-4acd-bacd-d9178089e8c3"
|
|
title="0.9.27 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2016/10/17/0.9.27-Release"
|
|
author="zzz"
|
|
published="2016-10-17T12:00:00Z"
|
|
updated="2016-10-17T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.27 contains bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.27 contains a number of bug fixes.
|
|
The updated GMP library for crypto acceleration, which was bundled in the 0.9.26 release for new installs and Debian builds only, is now included in the in-network update for 0.9.27.
|
|
There are improvements in IPv6 transports, SSU peer testing, and hidden mode.
|
|
</p><p>
|
|
We updated a number of plugins during <a href="http://i2p-projekt.i2p/en/blog/post/2016/06/01/I2P-Summer-Dev">I2P Summer</a> and your router will automatically update them after restart.
|
|
</p><p>
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:7e818120-88f8-401a-88fe-8db4ba20ad4d"
|
|
title="I2P Stack Exchange proposal"
|
|
href="https://area51.stackexchange.com/proposals/99297/i2p"
|
|
author="zzz"
|
|
published="2016-06-07T13:00:00Z"
|
|
updated="2016-06-07T13:00:00Z">
|
|
<details>
|
|
<summary>I2P is now a proposed site on Stack Exchange!</summary>
|
|
</details>
|
|
<p>
|
|
I2P is now a proposed site on Stack Exchange!
|
|
Please <a href="https://area51.stackexchange.com/proposals/99297/i2p">commit to using it</a> so the beta phase can begin.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:5b1ccc70-2160-44cd-ad1e-2f0be6beb621"
|
|
title="0.9.26 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2016/06/07/0.9.26-Release"
|
|
author="zzz"
|
|
published="2016-06-07T12:00:00Z"
|
|
updated="2016-06-07T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.26 contains crypto updates, Debian packaging improvements, and bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.26 contains a major upgrade to our native crypto library,
|
|
a new addressbook subscription protocol with signatures,
|
|
and major improvements to the Debian/Ubuntu packaging.
|
|
</p><p>
|
|
For crypto, we have upgraded to GMP 6.0.0, and added support for newer processors,
|
|
which will speed up crypto operations considerably.
|
|
Also, we are now using constant-time GMP functions to prevent side-channel attacks.
|
|
For caution, the GMP changes are enabled for new installs and Debian/Ubuntu builds only;
|
|
we will include them for in-net updates in the 0.9.27 release.
|
|
</p><p>
|
|
For Debian/Ubuntu builds, we have added dependencies on several packages,
|
|
including Jetty 8 and geoip, and removed the equivalent bundled code.
|
|
</p><p>
|
|
There's a collection of bug fixes also, including a fix for a timer bug
|
|
that caused instability and performance degradations over time.
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
|
|
<article
|
|
id="urn:uuid:c6f7228d-3330-4422-a651-ef9d8ca3484b"
|
|
title="0.9.25 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2016/03/22/0.9.25-Release"
|
|
author="zzz"
|
|
published="2016-03-22T12:00:00Z"
|
|
updated="2016-03-22T12:00:00Z">
|
|
<details>
|
|
<summary>0.9.25 contains SAM 3.3, QR codes, and bug fixes</summary>
|
|
</details>
|
|
<p>
|
|
0.9.25 contains a major new version of SAM, v3.3, to support sophisticated multiprotocol applications.
|
|
It adds QR codes for sharing hidden service addresses with others,
|
|
and "identicon" images for visually distinguishing addresses.
|
|
</p><p>
|
|
We've added a new "router family" configuration page in the console,
|
|
to make it easier to declare that your group of routers is run by a single person.
|
|
There are several changes to increase the capacity of the network and hopefully improve tunnel build success.
|
|
</p><p>
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
<article
|
|
id="urn:uuid:8390114d-8e50-45fd-8b4d-3e613bdd034e"
|
|
title="0.9.24 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2016/01/27/0.9.24-Release"
|
|
author="zzz"
|
|
published="2016-01-27T18:00:00Z"
|
|
updated="2016-01-27T18:00:00Z">
|
|
<details>
|
|
<summary>0.9.24 contains several bug fixes and speedups</summary>
|
|
</details>
|
|
<p>
|
|
0.9.24 contains a new version of SAM (v3.2) and numerous bug fixes and efficiency improvements.
|
|
Note that this release is the first to require Java 7.
|
|
Please update to Java 7 or 8 as soon as possible.
|
|
Your router will not automatically update if you are using Java 6.
|
|
</p><p>
|
|
To prevent the problems caused by the ancient commons-logging library, we have removed it.
|
|
This will cause very old I2P-Bote plugins (0.2.10 and below, signed by HungryHobo) to crash if they have IMAP enabled.
|
|
The recommended fix is to replace your old I2P-Bote plugin with the current one signed by str4d.
|
|
For more details, see <a href="http://bote.i2p/news/0.4.3">this post</a>.
|
|
</p><p>
|
|
We had a great <a href="http://i2p-projekt.i2p/en/blog/post/2016/01/23/32C3">32C3 Congress</a> and are making good progress on our 2016 project plans.
|
|
Echelon gave a talk on I2P's history and current status, and his slides are <a href="http://whnxvjwjhzsske5yevyokhskllvtisv5ueokw6yvh6t7zqrpra2q.b32.i2p/media/ccc/2015/I2P_Still_alive.pdf">here</a> (pdf).
|
|
Str4d attended <a href="http://www.realworldcrypto.com/rwc2016/program">Real World Crypto</a> and gave a talk on our crypto migration,
|
|
his slides are <a href="http://whnxvjwjhzsske5yevyokhskllvtisv5ueokw6yvh6t7zqrpra2q.b32.i2p/media/rwc/2016/rwc2016-str4d-slides.pdf">here</a> (pdf).
|
|
</p><p>
|
|
As usual, we recommend that all users update to this release.
|
|
The best way to help the network and stay secure is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
<article
|
|
id="urn:uuid:91d19b26-0d7c-4e4a-aa7b-c22d4f400668"
|
|
title="0.9.23 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2015/11/19/0.9.23-Release"
|
|
author="str4d"
|
|
published="2015-11-19T18:00:00Z"
|
|
updated="2015-11-19T18:00:00Z">
|
|
<details>
|
|
<summary>0.9.23 contains a variety of bug fixes, and some minor improvements in I2PSnark</summary>
|
|
</details>
|
|
<p>
|
|
Hello I2P! This is the first release signed by me (str4d), after 49 releases
|
|
signed by zzz. This is an important test of our redundancy for all things,
|
|
including people.
|
|
</p>
|
|
<p><b>Housekeeping</b></p>
|
|
<p>
|
|
My signing key has been in router updates for over two years (since 0.9.9), so
|
|
if you are on a recent version of I2P this update should be just as easy as
|
|
every other update. However, if you are running an older version than 0.9.9, you
|
|
will first need to manually update to a recent version. Update files for recent
|
|
versions can be downloaded
|
|
<a href="http://whnxvjwjhzsske5yevyokhskllvtisv5ueokw6yvh6t7zqrpra2q.b32.i2p/releases/">here</a>,
|
|
and instructions on how to manually update are provided
|
|
<a href="http://i2p-projekt.i2p/en/download#update">here</a>. Once you have manually
|
|
updated, your router will then find and download the 0.9.23 update as usual.
|
|
</p><p>
|
|
If you installed I2P via a package manager, you are not affected by the change,
|
|
and can update as usual.
|
|
</p>
|
|
<p><b>Update details</b></p>
|
|
<p>
|
|
The migration of RouterInfos to new, stronger Ed25519 signatures is going well,
|
|
with at least half of the network already estimated to have rekeyed. This
|
|
release accelerates the rekeying process. To reduce network churn, your router
|
|
will have a small probability of converting to Ed25519 at each restart. When it
|
|
does rekey, expect to see lower bandwidth usage for a couple of days as it
|
|
reintegrates into the network with its new identity.
|
|
</p><p>
|
|
Note that this will be the last release to support Java 6. Please update to
|
|
Java 7 or 8 as soon as possible. We are already working to make I2P compatible
|
|
with the upcoming Java 9, and some of that work is in this release.
|
|
</p><p>
|
|
We have also made some minor improvements in I2PSnark, and added a new page in
|
|
the routerconsole for viewing older news items.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
<article
|
|
id="urn:uuid:fe93e501-255c-4558-af7e-1cd433939b43"
|
|
title="0.9.22 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2015/09/12/0.9.22-Release"
|
|
author="zzz"
|
|
published="2015-09-12T18:00:00Z"
|
|
updated="2015-09-12T18:00:00Z">
|
|
<details>
|
|
<summary>0.9.22 with bug fixes and starts Ed25519 migration</summary>
|
|
</details>
|
|
<p>
|
|
0.9.22 contains fixes for i2psnark getting stuck before completion, and begins the migration of router infos to new, stronger Ed25519 signatures.
|
|
To reduce network churn, your router will have only a small probability of converting to Ed25519 at each restart.
|
|
When it does rekey, expect to see lower bandwidth usage for a couple of days as it reintegrates into the network with its new identity.
|
|
If all goes well, we will accelerate the rekeying process in the next release.
|
|
</p><p>
|
|
I2PCon Toronto was a big success!
|
|
All the presentations and videos are listed on the <a href="http://i2p-projekt.i2p/en/about/i2pcon/2015">I2PCon page</a>.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
|
|
|
|
<article
|
|
id="urn:uuid:49713025-cfb8-4ebb-aaaa-7805333efa6a"
|
|
title="0.9.21 Released"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2015/07/31/0.9.21-Release"
|
|
author="zzz"
|
|
published="2015-07-31T18:00:00Z"
|
|
updated="2015-07-31T18:00:00Z">
|
|
<details>
|
|
<summary>0.9.21 released with performance improvements and bug fixes.</summary>
|
|
</details>
|
|
<p>
|
|
0.9.21 contains several changes to add capacity to the network, increase the efficiency of the floodfills,
|
|
and use bandwidth more effectively.
|
|
We have migrated the shared clients tunnels to ECDSA signatures and added a DSA fallback
|
|
using the new "multisession" capability for those sites that don't support ECDSA.
|
|
</p><p>
|
|
The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.
|
|
Have a look on the <a href="http://i2p-projekt.i2p/en/blog/post/2015/07/16/I2PCon">I2PCon page</a> for details.
|
|
Reserve your seat on <a href="http://www.eventbrite.ca/e/i2p-meetup-tickets-17773984466">Eventbrite I2PCon</a>.
|
|
</p><p>
|
|
As usual, we recommend that you update to this release. The best way to
|
|
maintain security and help the network is to run the latest release.
|
|
</p>
|
|
</article>
|
|
<article
|
|
id="urn:uuid:53ba215d-6cf2-489c-8135-10248e06a141"
|
|
title="I2PCon Toronto speakers and schedule announced"
|
|
href="http://i2p-projekt.i2p/en/blog/post/2015/07/16/I2PCon"
|
|
author="echelon"
|
|
published="2015-07-19T18:00:00Z"
|
|
updated="2015-07-22T12:00:00Z">
|
|
<details>
|
|
<summary>I2PCon Toronto 2015 speakers and schedule announced</summary>
|
|
</details>
|
|
<p>
|
|
The speakers and the schedule of the I2PCon in Toronto 2015 have been announced.
|
|
Have a look on the <a href="http://i2p-projekt.i2p/en/blog/post/2015/07/16/I2PCon">I2PCon page</a> for details.
|
|
Reserve your seat on <a href="http://www.eventbrite.ca/e/i2p-meetup-tickets-17773984466">Eventbrite I2PCon</a>.
|
|
</p>
|
|
</article>
|
|
</div>
|