- cross-posted to:
- privacy
- cross-posted to:
- privacy
This release, I2P 2.6.0, continues our work by fixing bugs, adding features, and improving the network’s reliability.
Newer routers will be favored when selecting floodfill routers. I2PSnark received features which improve the performance of PeX(Peer Exchange), in addition to bug fixes. Legacy transport protocols are being removed, simplifying the code in the UDP transports. Locally-hosted destination will be reachable by local clients without requesting their LeaseSet, improving performance and testability. Additional tweaks were made to peer selection strategies.
I2P no longer allows I2P-over-Tor, connections from Tor exit IP addresses are now blocked. We discourage this because it degrades the performance of I2P and uses up the resources of Tor exits for no benefit. If you are a helpful person running both a Tor Exit and I2P we encourage you to continue to do so, using different IP addresses for each. Non-exit relays and Tor clients are unaffected by this and do not need to change anything.
As usual, we recommend that you update to this release. The best way to maintain security and help the network is to run the latest release.
RELEASE DETAILS Changes
-
Router: Increase minimum version for floodfill routers
-
Router: Disable I2P over Tor
-
Address Book: Cache locally hosted destinations
Bug Fixes
-
I2PSnark: Peer Exchange Tweaks
-
I2PSnark: Bugfixes
-
Router: Peer Selection Tweaks
Other
- Translation updates
There was an attack not too long ago. I think there’s something about it here on lemmy too. But start with this link.
https://geti2p.net/en/blog/post/2023/02/09/about_the_recent_denial_of_service_attacks
That was barely helpful at all. It just said that there were issues back in 2023 and I don’t see anything about any kind of mitigations.