From 752e1c6a423abf52aa5867a3e5d76cb006cc3b0f Mon Sep 17 00:00:00 2001
From: zzz <zzz@mail.i2p>
Date: Sat, 2 Jun 2012 13:53:04 +0000
Subject: [PATCH] update

---
 www.i2p2/pages/how_networkdatabase.html | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/www.i2p2/pages/how_networkdatabase.html b/www.i2p2/pages/how_networkdatabase.html
index 011ac5bc8..3f44ccbad 100644
--- a/www.i2p2/pages/how_networkdatabase.html
+++ b/www.i2p2/pages/how_networkdatabase.html
@@ -3,7 +3,7 @@
 {% block content %}
 
 <p>
-  Updated August 2011, current as of router version 0.8.9
+  Updated June 2012, current as of router version 0.9
 </p>
 
 <h2>Overview</h2>
@@ -78,7 +78,6 @@
   Current statistics are limited to:
 </p>
 <ul>
-  <li>1 hour average bandwidth (average of outbound  and inbound bandwidth)
   <li>Client and exploratory tunnel build success, reject, and timeout rates
   <li>1 hour average number of participating tunnels
 </ul>
@@ -659,7 +658,8 @@ This attack becomes more difficult as the network size grows.
   Several defenses are possible, and most of these are planned:
 </p>
 <ul>
-  <li>Switching from HTTP to HTTPS for reseeding, with SSL certificate verification
+  <li>Disallow fallback from HTTPS to HTTP for reseeding.
+    A MITM attacker could simply block HTTPS, then respond to the HTTP.
   <li>Changing the reseed task to fetch a subset of RouterInfos from
     each of several reseed sites rather than using only a single site
   <li>Creating an out-of-network reseed monitoring service that
-- 
GitLab