Autor Thema: Anonym im Netz: Die Darknets kommen  (Gelesen 4728 mal)

0 Mitglieder und 1 Gast betrachten dieses Thema.

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 190056
  • Ohne Input kein Output
    • DVB-Cube
I2P 2.2.1
« Antwort #75 am: 14 April, 2023, 09:00 »
Changelog


    Fix missing Java options in docker/rootfs/startapp.sh
    Detect when running in Podman instead of regular Docker
    Update Tor Browser User-Agent String
    Update local GeoIP database
    Remove invalid signing keys from old installs
    Update Tomcat version in Ubuntu Lunar and Debian Sid

Full list of fixed bugs: http://git.idk.i2p/i2p-hackers/i2p.i2p/-/issues?scope=all&state=closed&milestone_title=2.2.1

[close]

http://www.i2p2.de/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 190056
  • Ohne Input kein Output
    • DVB-Cube
I2P 2.3.0
« Antwort #76 am: 01 Juli, 2023, 19:00 »
Release Notes


This release contains fixes for CVE-2023-36325. CVE-2023-36325 is a context-confusion bug which occurred in the bloom filter. An attacker crafts an I2NP message containing a unique messageID, and sends that messageID to a client. The message, after passing through the bloom filter, is not allowed to be re-used in a second message. The attacker then sends the same message directly to the router. The router passes the message to the bloom filter, and is dropped. This leaks the information that the messageID has been seen before, giving the attacker a strong reason to believe that the router is hosting the client. This has been fixed by separting the bloom filter's functionality into different contexts based on whether a message came down a client tunnel, an exploratory tunnel, was sent to the router directly. Under normal circumstances, this attack takes several days to perform successfully and may be confounded by several factors such as routers restarting during the attack phase and sensitivity to false-positives. Users of Java I2P are recommended to update immediately to avoid the attack.

In the course of fixing this context confusion bug, we have revised some of our strategies to code defensively, against these types of leaks. This includes tweaks to the netDb, the rate-limiting mechanisms, and the behavior of floodfill routers.

This release adds not_bob as a second default hosts provider, and adds notbob.i2p and ramble.i2p to the console homepage.

This release also contains a tweakable blocklist. Blocklisting is semi-permanent, each blocked IP address is normally blocked until the router is restarted. Users who observe explosive blocklist growth during sybil attacks may opt-in to shorter timeouts by configuring the blocklist to expire entries at an interval. This feature is off-by-default and is only recommended for advanced users at this time.

This release also includes an API for plugins to modify with the Desktop GUI(DTG). It is now possible to add menu items to the system tray, enabling more intuitive launching of plugins which use native application interfaces.

As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.

DETAILS

Changes

    netDb: Throttle bursts of netDB lookups
    Sybil/Blocklist: Allow users to override blocklist expiration with an interval
    DTG: Provide an API for extending DTG with a plugin
    Addressbook: add notbob's main addressbook to the default subscriptions.
    Console: Add Ramble and notbob to console homepage

Bug Fixes

    Fix replay attack: CVE-2023-36325
    Implement handling of multihomed routers in the netDb
    Fully copy new leaseSets when a leaseSet recievedAsPublished overwrites a leaseSet recievedAsReply

Full list of fixed bugs: http://git.idk.i2p/i2p-hackers/i2p.i2p/-/issues?scope=all&state=closed&milestone_title=2.3.0

[close]

http://www.i2p2.de/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )

Offline SiLæncer

  • Cheff-Cubie
  • *****
  • Beiträge: 190056
  • Ohne Input kein Output
    • DVB-Cube
I2P 2.5.0
« Antwort #77 am: 09 April, 2024, 20:30 »
Release Notes


Changes

    I2PTunnel: Implement support for Keepalive/Server-side Persistence
    Susimail: Add markdown support for formatted plain-text content
    Susimail: Add HTML Email support
    I2PSnark: Add search capability
    I2PSnark: Preserve private=0 in torrent files
    Data: Store compressed RI and LS

Bug Fixes

    Susimail: Fix handling of forwarded mail with attachments
    Susimail: Fix handling of forwarded mail with unspecified encoding
    Susimail: Fix forwarding of HTML-only email
    Susimail: Bugfixes in presentation of encoded attachmments, mail body
    I2PSnark: Handle data directory changes
    SSU2: Cancel peer test if Charlie does not have B cap
    SSU2: Treat peer test result as unknown if Charlie is unreachable
    Router: Filter additional garlic-wrapped messages
    I2CP: Prevent loopback messages to same session
    NetDB: Resolve Exploratory/Router isolation-piercing event

Other

    API 0.9.62
    Translation updates

[close]

http://www.i2p2.de/

Arbeits.- Testrechner :

Intel® Core™ i7-6700 (4 x 3.40 GHz / 4.00 GHz)
16 GB (2 x 8 GB) DDR4 SDRAM 2133 MHz
250 GB SSD Samsung 750 EVO / 1 TB HDD
ZOTAC Geforce GTX 1080TI AMPExtreme Core Edition 11GB GDDR5
MSI Z170A PC Mate Mainboard
DVD-Brenner Laufwerk
Microsoft Windows 10 Home 64Bit

TT S2 3200 ( BDA Treiber 5.0.1.8 ) + Terratec Cinergy 1200 C ( BDA Treiber 4.8.3.1.8 )