IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#i2p-dev
/2023/07/19
@eyedeekay
&eche|on
&kytv
&zzz
+R4SAS
+RN
+StormyCloud
+T3s|4
+dr|z3d
+goose2_
+hagen
+orignal
+postman
+weko
Afkaid
An0nm0n
Arch
Danny
DeltaOreo
DiCEy1904
FreefallHeavens
Irc2PGuest11229
Irc2PGuest48909
Irc2PGuest71250
Nausicaa
Onn4l7h
PenguinDriver_
SoniEx2
T3s|4_
Teeed
acetone_
anon2
b3t4f4c3__
bak83
boonst
cumlord
dr4wd3
eyedeekay_bnc
goose2
hk
itsjustme
j6
numberwang
onon_1
poriori
profetikla
qend-irc2p
rapidash
shiver_
tr
u5657
user
veiledwizard
w8rabbit
x74a6
obscuratus eyedeekay: Re: Banning on Congestion caps in idk/i2p.i2p, I think this is a bad idea. We don't provide a guarantee that everyone one will have the latest RI. Quite the opposite.
obscuratus Banning someone because they don't have our latest RI will be a problem.
dr|z3d obscuratus: I've raised that with eyedeekay, because we're not sure how fresh the router's copy of our RI is.
eyedeekay obscuratus sure that's why it's an MR, we can walk it back if it doesn't help/does hurt
dr|z3d eyedeekay: there are some options. we could publish our RI more frequently, or send our RI to connected routers every x, or if our cap changes, whichever's sooner.
obscuratus If I'm not mistaken, we'll "publish" our RI every time we change it. But most routers won't update the RI until it starts to become old (I think it's an hour).
obscuratus Although it's not directly related to the topic of discussion, we still haven't implemented a solution for insuring that the RI we receive really is from that router.
obscuratus I'm still not 100% understanding how that exploit worked were someone was spoofing other poeples RI, but I'm pretty sure it's still there.
dr|z3d yeah, we need to get on top of RI spoofing
eyedeekay I've got some stuff in a branch, I'll fix it up and push it next week
eyedeekay What do you think about using a minimum threshold, say request a tunnel from a capped router X number of times before a ban for instance?
eyedeekay Currently I have it hardcoded at 10
dr|z3d request from a capped router? capped howso?
eyedeekay As in having the no more tunnels cap
dr|z3d so we're publishing G?
eyedeekay Also I wonder if it would be OK to send an updated RI with the updated caps as a reply to a refused tunnel build
dr|z3d I think that's a good idea. we reject, send new RI, if router keeps requesting thereafter, ban it.
eyedeekay That makes sense to me
obscuratus Does I2PD already know to avoid these routers also?
eyedeekay Hmmm. Tenative yes, but I'll verify their congestion cap handling myself, they should be sending no tunnels to G capped routers and IIRC they're also sending no tunnels to E capped routers
eyedeekay libi2pd/RouterInfo.cpp line 1122 is the check, looks like they avoid the G cap by default
eyedeekay Pretty interesting 19 lines of code actually