I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit 92e7cf6f authored by kytv's avatar kytv
Browse files

merge of '3dbeff2fa03095876e7d62f3e3b73028194ab363'

     and 'ee9e0c6e682353822ba0ae099de649cd048cd720'
parents fba6596e 449a5b7c
No related branches found
No related tags found
No related merge requests found
...@@ -518,7 +518,7 @@ Defines the way to uniquely identify a particular router ...@@ -518,7 +518,7 @@ Defines the way to uniquely identify a particular router
| certificate | | certificate |
+----+----+----+-// +----+----+----+-//
public_key :: `PublicKey` public_key :: `PublicKey` (partial or full)
length -> 256 bytes or as specified in key certificate length -> 256 bytes or as specified in key certificate
padding :: random data padding :: random data
...@@ -586,11 +586,11 @@ public_key :: `PublicKey` (partial or full) ...@@ -586,11 +586,11 @@ public_key :: `PublicKey` (partial or full)
padding :: random data padding :: random data
length -> 0 bytes or as specified in key certificate length -> 0 bytes or as specified in key certificate
padding length + signing_public_key_length == 128 bytes padding length + signing_public_key length == 128 bytes
signing_public_key :: `SigningPublicKey` (partial or full) signing_public_key :: `SigningPublicKey` (partial or full)
length -> 128 bytes or as specified in key certificate length -> 128 bytes or as specified in key certificate
padding length + signing_public_key_length == 128 bytes padding length + signing_public_key length == 128 bytes
certificate :: `Certificate` certificate :: `Certificate`
length -> >= 3 bytes length -> >= 3 bytes
...@@ -843,6 +843,8 @@ As of release 0.9.3, the expiration is assumed zero and not stored, so any non-z ...@@ -843,6 +843,8 @@ As of release 0.9.3, the expiration is assumed zero and not stored, so any non-z
will fail in the RouterInfo signature verification. will fail in the RouterInfo signature verification.
Implementing expiration (or another use for these bytes) will be a backwards-incompatible change. Implementing expiration (or another use for these bytes) will be a backwards-incompatible change.
Routers MUST set this field to all zeros. Routers MUST set this field to all zeros.
As of release 0.9.12, a non-zero expiration field is again recognized, however we must wait
several releases to use this field, until the vast majority of the network recognizes it.
{%- endtrans %}</li> {%- endtrans %}</li>
<li>{% trans -%} <li>{% trans -%}
......
{% extends "global/layout.html" %} {% extends "global/layout.html" %}
{% block title %}{% trans %}NTCP (NIO-based TCP){% endtrans %}{% endblock %} {% block title %}{% trans %}NTCP (NIO-based TCP){% endtrans %}{% endblock %}
i2p2www/pages/site/docs/transport/ntcp.html 4 {% block lastupdated %}{% trans %}February 2014{% endtrans %}{% endblock %}
{% block accuratefor %}0.9.11{% endblock %} {% block accuratefor %}0.9.11{% endblock %}
{% block content %} {% block content %}
<p>{% trans transports=site_url('docs/transport'), ssu=site_url('docs/transport/ssu') -%} <p>{% trans transports=site_url('docs/transport'), ssu=site_url('docs/transport/ssu') -%}
...@@ -473,6 +473,9 @@ A check info connection will receive 256 bytes containing: ...@@ -473,6 +473,9 @@ A check info connection will receive 256 bytes containing:
<li>{% trans %}xor of the local router's identity hash and the SHA256 of bytes 32 through bytes 223{% endtrans %}</li> <li>{% trans %}xor of the local router's identity hash and the SHA256 of bytes 32 through bytes 223{% endtrans %}</li>
</ul> </ul>
</pre> </pre>
<p>{% trans -%}
Check connection is completely disabled as of release 0.9.12.
{%- endtrans %}</p>
<h2>{% trans %}Discussion{% endtrans %}</h2> <h2>{% trans %}Discussion{% endtrans %}</h2>
<p>{% trans ntcpdisc=site_url('docs/discussions/ntcp') -%} <p>{% trans ntcpdisc=site_url('docs/discussions/ntcp') -%}
...@@ -502,9 +505,6 @@ Can the establishment messages be randomly padded somehow, to frustrate ...@@ -502,9 +505,6 @@ Can the establishment messages be randomly padded somehow, to frustrate
identification of I2P traffic based on initial packet sizes? identification of I2P traffic based on initial packet sizes?
{%- endtrans %}</li> {%- endtrans %}</li>
<li>{% trans -%}
Review and possibly disable 'check connection'
{%- endtrans %}</li>
</ul> </ul>
{% endblock %} {% endblock %}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment