eyedeekay
I read through the advisories here: openjdk.org/groups/vulnerability/advisories/2024-01-16 and compared them to the i2p.firefox features and I don't think any of them apply, they tend to target Java Web Start applications or carry the qualifier "run untrusted code from web sources and rely on the Java sandbox for security" and neither of those apply, so there will be no urgent rebuild of the
eyedeekay
i2p.firefox bundle at this time
dr|z3d
that's a relief, eyedeekay
eyedeekay
There's one where the details still aren't released so I'm going to be ready to do one with a pretty quick turnaround when I see what that's about
eyedeekay
But for now, looks OK
zzz
what happened to prestium and their two new reseed servers?
zzz
did the whole thing go belly up just days after our release with their reseeds in there?
dr|z3d
*poof*
zzz
annoying
dr|z3d
Host: reseed.onion.im
dr|z3d
Version: 1705523449 (17-Jan-2024 20:30)
dr|z3d
Signer: lazygravy@mail.i2p
dr|z3d
SigType: RSA_SHA512_4096
dr|z3d
Content: RESEED
dr|z3d
FileType: ZIP
dr|z3d
Failure: 2 old RouterInfos returned
dr|z3d
Host: reseed-fr.i2pd.xyz
dr|z3d
Failure: Status code -1
dr|z3d
Host: lapras.bungee.systems
dr|z3d
Failure: Status code -1
dr|z3d
(although canon isn't using lapras, but they appear to have gone *poof* as well.
dr|z3d
dunno, wasn't paying any attention.
zzz
if anybody hears any news holler
dr|z3d
NULL may know something, if he returns.
dr|z3d
possible server/hosting issues.
orignal
so whould we exclude them from the list?
zzz
up to you. If they are still down in late March before our release I'll send out an email
dr|z3d
Host: coconut.incognet.io
dr|z3d
Version: 1705582742 (18-Jan-2024 12:59)
dr|z3d
Signer: rambler@mail.i2p
dr|z3d
SigType: RSA_SHA512_4096
dr|z3d
Content: RESEED
dr|z3d
FileType: ZIP
dr|z3d
Success: 100 RouterInfos returned
dr|z3d
go nuts, as it were.
dr|z3d
and yeah, it's hosted in a different data center to banana.
zzz
if you're doing a i2pd .3 release before then, write a note to do your own testing
zzz
looks like they lost their DNS
zzz
Testing reseed.is.prestium.org
zzz
01/18 08:25:18.424 WARN [main ] nn.ssl.DefaultHostnameVerifier: Certificate for <reseed.us.prestium.org> doesn't match any of the subject alternative names: [test.thevirtualasylum.com]
orignal
no we are not planning to make .3
orignal
all these release were about openssl 3.2.0
zzz
nobody ever "plans" for a .3 )))
orignal
we would make 2.51.0 in this case
dr|z3d
they migrated one of their iso mirrors to a different service provider, might be related.
zzz
note that our planned april release pretty much guarantees we will only have 3 releases this year
orignal
why only 3?
zzz
13 week cycles would be april, then july, october, january 2025
orignal
then maybe we will make more release once we have something to release
zzz
<dr|z3d> Host: reseed-fr.i2pd.xyz
zzz
<dr|z3d> Failure: Status code -1
zzz
whats the story there orignal?
orignal
will ask R4SAS
orignal
it's his
orignal
I think he is just busy
zzz
make sure you're dropping UDP < 40 bytes now that SSU1 and hole punch is disabled
zzz
I'm getting a few of these, mostly from tmobile ips, some ancient gaming ddos
zzz
WARN [DPReceiver 1] uter.transport.udp.UDPReceiver: Dropping short 25 byte udp packet from /172.59.108.140:11497
zzz
00000000 ff ff ff ff 54 53 6f 75 72 63 65 20 45 6e 67 69 |....TSource Engi|
zzz
00000010 6e 65 20 51 75 65 72 79 00 |ne Query. |
orignal
thanks
orignal
40 bytes
zzz
yup, that's ssu2 minimum
orignal
I check for 24 bytes now, where does 40 come from?
orignal
40 is whole packet or payload?
R4SAS
looks like acme.sh making shit with using zerossl by default
R4SAS
I'll fix soom
R4SAS
soon*
R4SAS
dr|z3d: check it now