diff --git a/i2p2www/pages/site/docs/spec/common-structures.html b/i2p2www/pages/site/docs/spec/common-structures.html index eeee8ea7c1e57dccea2a3249d3d5ccd4c5847b90..7d5c48fdf0d623edba7541adf6ebedc02d3740e8 100644 --- a/i2p2www/pages/site/docs/spec/common-structures.html +++ b/i2p2www/pages/site/docs/spec/common-structures.html @@ -518,7 +518,7 @@ Defines the way to uniquely identify a particular router | certificate | +----+----+----+-// -public_key :: `PublicKey` +public_key :: `PublicKey` (partial or full) length -> 256 bytes or as specified in key certificate padding :: random data @@ -586,11 +586,11 @@ public_key :: `PublicKey` (partial or full) padding :: random data length -> 0 bytes or as specified in key certificate - padding length + signing_public_key_length == 128 bytes + padding length + signing_public_key length == 128 bytes signing_public_key :: `SigningPublicKey` (partial or full) length -> 128 bytes or as specified in key certificate - padding length + signing_public_key_length == 128 bytes + padding length + signing_public_key length == 128 bytes certificate :: `Certificate` length -> >= 3 bytes @@ -843,6 +843,8 @@ As of release 0.9.3, the expiration is assumed zero and not stored, so any non-z will fail in the RouterInfo signature verification. Implementing expiration (or another use for these bytes) will be a backwards-incompatible change. Routers MUST set this field to all zeros. +As of release 0.9.12, a non-zero expiration field is again recognized, however we must wait +several releases to use this field, until the vast majority of the network recognizes it. {%- endtrans %}</li> <li>{% trans -%} diff --git a/i2p2www/pages/site/docs/transport/ntcp.html b/i2p2www/pages/site/docs/transport/ntcp.html index 8794868b3c1e83c85be86e484ccb246b813cef0d..c69ec5034b5b1bb5df4dcc9fbc295a1be5dddfc0 100644 --- a/i2p2www/pages/site/docs/transport/ntcp.html +++ b/i2p2www/pages/site/docs/transport/ntcp.html @@ -1,6 +1,6 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}NTCP (NIO-based TCP){% endtrans %}{% endblock %} -i2p2www/pages/site/docs/transport/ntcp.html 4 +{% block lastupdated %}{% trans %}February 2014{% endtrans %}{% endblock %} {% block accuratefor %}0.9.11{% endblock %} {% block content %} <p>{% trans transports=site_url('docs/transport'), ssu=site_url('docs/transport/ssu') -%} @@ -473,6 +473,9 @@ A check info connection will receive 256 bytes containing: <li>{% trans %}xor of the local router's identity hash and the SHA256 of bytes 32 through bytes 223{% endtrans %}</li> </ul> </pre> +<p>{% trans -%} +Check connection is completely disabled as of release 0.9.12. +{%- endtrans %}</p> <h2>{% trans %}Discussion{% endtrans %}</h2> <p>{% trans ntcpdisc=site_url('docs/discussions/ntcp') -%} @@ -502,9 +505,6 @@ Can the establishment messages be randomly padded somehow, to frustrate identification of I2P traffic based on initial packet sizes? {%- endtrans %}</li> -<li>{% trans -%} -Review and possibly disable 'check connection' -{%- endtrans %}</li> </ul> {% endblock %}