IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#i2p-dev
/2024/01/18
eyedeekay I read through the advisories here: openjdk.org/groups/vulnerability/advisories/2024-01-16 and compared them to the i2p.firefox features and I don't think any of them apply, they tend to target Java Web Start applications or carry the qualifier "run untrusted code from web sources and rely on the Java sandbox for security" and neither of those apply, so there will be no urgent rebuild of the
eyedeekay i2p.firefox bundle at this time
dr|z3d that's a relief, eyedeekay
eyedeekay There's one where the details still aren't released so I'm going to be ready to do one with a pretty quick turnaround when I see what that's about
eyedeekay But for now, looks OK
zzz what happened to prestium and their two new reseed servers?
zzz did the whole thing go belly up just days after our release with their reseeds in there?
dr|z3d *poof*
zzz annoying
dr|z3d Host: reseed.onion.im
dr|z3d Version: 1705523449 (17-Jan-2024 20:30)
dr|z3d Signer: lazygravy@mail.i2p
dr|z3d SigType: RSA_SHA512_4096
dr|z3d Content: RESEED
dr|z3d FileType: ZIP
dr|z3d Failure: 2 old RouterInfos returned
dr|z3d Host: reseed-fr.i2pd.xyz
dr|z3d Failure: Status code -1
dr|z3d Host: lapras.bungee.systems
dr|z3d Failure: Status code -1
dr|z3d (although canon isn't using lapras, but they appear to have gone *poof* as well.
dr|z3d dunno, wasn't paying any attention.
zzz if anybody hears any news holler
dr|z3d NULL may know something, if he returns.
dr|z3d possible server/hosting issues.
orignal so whould we exclude them from the list?
zzz up to you. If they are still down in late March before our release I'll send out an email
dr|z3d Host: coconut.incognet.io
dr|z3d Version: 1705582742 (18-Jan-2024 12:59)
dr|z3d Signer: rambler@mail.i2p
dr|z3d SigType: RSA_SHA512_4096
dr|z3d Content: RESEED
dr|z3d FileType: ZIP
dr|z3d Success: 100 RouterInfos returned
dr|z3d go nuts, as it were.
dr|z3d and yeah, it's hosted in a different data center to banana.
zzz if you're doing a i2pd .3 release before then, write a note to do your own testing
zzz looks like they lost their DNS
zzz Testing reseed.is.prestium.org
zzz 01/18 08:25:18.424 WARN [main ] nn.ssl.DefaultHostnameVerifier: Certificate for <reseed.us.prestium.org> doesn't match any of the subject alternative names: [test.thevirtualasylum.com]
orignal no we are not planning to make .3
orignal all these release were about openssl 3.2.0
zzz nobody ever "plans" for a .3 )))
orignal we would make 2.51.0 in this case
dr|z3d they migrated one of their iso mirrors to a different service provider, might be related.
zzz note that our planned april release pretty much guarantees we will only have 3 releases this year
orignal why only 3?
zzz 13 week cycles would be april, then july, october, january 2025
orignal then maybe we will make more release once we have something to release
zzz <dr|z3d> Host: reseed-fr.i2pd.xyz
zzz <dr|z3d> Failure: Status code -1
zzz whats the story there orignal?
orignal will ask R4SAS
orignal it's his
orignal I think he is just busy
zzz make sure you're dropping UDP < 40 bytes now that SSU1 and hole punch is disabled
zzz I'm getting a few of these, mostly from tmobile ips, some ancient gaming ddos
zzz WARN [DPReceiver 1] uter.transport.udp.UDPReceiver: Dropping short 25 byte udp packet from /172.59.108.140:11497
zzz 00000000 ff ff ff ff 54 53 6f 75 72 63 65 20 45 6e 67 69 |....TSource Engi|
zzz 00000010 6e 65 20 51 75 65 72 79 00 |ne Query. |
orignal thanks
orignal 40 bytes
zzz yup, that's ssu2 minimum
orignal I check for 24 bytes now, where does 40 come from?
orignal 40 is whole packet or payload?
R4SAS looks like acme.sh making shit with using zerossl by default
R4SAS I'll fix soom
R4SAS soon*
R4SAS dr|z3d: check it now