16:14 < jrandom> 0) hi 16:14 < jrandom> 1) Net status 16:14 < jrandom> 2) 0.6.1 16:14 < jrandom> 3) ??? 16:14 < jrandom> 0) hi 16:14 * jrandom waves 16:14 <+Ragnarok> ok, I'll hold my further questions 16:14 < jrandom> weekly status notes posted up at http://dev.i2p.net/pipermail/i2p/2005-September/000933.html 16:14 <+Ragnarok> hi :) 16:15 < wiht> Hello. 16:15 < jrandom> we can definitely dig into it further in 3?? if you'd prefer 16:15 <+Ragnarok> cool 16:15 < jrandom> ok, jumping into 1) Net status 16:15 < jrandom> in general, things seem pretty solid 16:16 < A123> Is the http outproxy run by just one router? 16:16 < wiht> I see 307 known nodes on my router console. 16:16 < A123> (I'm still a little hazy on how I2P works) 16:16 < jrandom> there are two outproxies configured by default, and a few others available not configured by default 16:16 < wiht> Has anyone's bandwidth been maxed out by the recent growth of the network? 16:17 < jrandom> well, my bandwidth usage has grown, a steady 30-40KBps on my routers 16:17 < jrandom> (to a steady 30-40, that is) 16:18 < jrandom> (i'm also running a few high traffic services, like squid.i2p ;) 16:19 < A123> Ever look at the logs? 16:19 < jrandom> of squid? no, i have it set to not do any request logging 16:20 <+Ragnarok> remember, he could be lying :) 16:20 <+Ragnarok> thus, it's a stupid question to ask 16:20 < jrandom> (though that could be a lie, and may work for the FBI/etc, so don't abuse it ;) 16:20 < A123> I was just curious as to whether there was anything interesting in there :) 16:21 <+mihi> A123: run your own outproxy :) 16:21 < gloin> A123: setup a tor node. 16:21 < A123> Is it easy to set up? 16:21 < jrandom> not really 16:21 < A123> gloin, tor is explicitly not designed for file sharing, so I have little interest in it. 16:22 < jrandom> (an outproxy, that is. tor is easy to set up) 16:22 < A123> Or at least, they've explicitly stated that they don't want people to use it for file sharing. 16:22 < wiht> jrandom, do you still want to wait for version 1.0 before a full public announcement of the I2P project's maturity? 16:23 <+mihi> A123: it is definitely harder than registering your nick with nickserv *hint* *hint* 16:23 < A123> Oh yeah, I sure don't want A123 to be taken :) 16:23 < wiht> If the network is doing well now, could it stand the addition of more users? 16:23 < jrandom> we'll need to do some outreach before 1.0 so that we can have some testing in larger environments 16:24 <+Ragnarok> maybe a preview release, or some such thing 16:24 < wiht> A beta release? Sounds like a good idea. 16:25 < jrandom> aye, that'll happen along side the website revamp, maybe before 0.6.2 16:25 < jrandom> (or maybe @ 0.6.2) 16:25 < jrandom> (website revamp being part of that critical path so we dont spend hours upon hours answering the same questions) 16:25 <+Ragnarok> well, with a little more end-user polish than just another beta 16:26 < A123> Is it possible for I2P-aware clients to configure tunnels themselves easily? 16:26 < jrandom> yes 16:26 < A123> I guess they could always do HTTP requests to the console... 16:26 <+Ragnarok> the router console also need a serious revamp. It would be nice for the initial page to be more like an i2p portal, and move all the technical stuff a little farther in 16:26 < jrandom> its one of the properties they send when they connect to i2p 16:26 < jrandom> agreed Ragnarok 16:27 < A123> Hrm. The Azureus I2P plugin could have a bit of additional friendliness, then. 16:27 < A123> Or any friendliness at all. 16:27 < jrandom> agreed A123 ;) 16:27 < jrandom> (though they've done a great job showing the proof of work) 16:28 < jrandom> there have been a lot of great suggestions on the mailing list as of late regarding usability 16:28 < jrandom> many/most of which should be done prior to asking new users to try i2p out 16:28 < A123> From the console: "If you can't poke a hole in your NAT or firewall to allow unsolicited UDP packets to reach the router, as detected with the Status: ERR-Reject..." 16:28 < A123> Where would I see "Status: ERR-Reject"? 16:29 <+Ragnarok> it's nice that we're at the point where we can worry about usability :) 16:29 < jrandom> A123: on the left hand side of your router console, it says Status: OK (or Status: unknown, or something else) 16:29 <+Complication> In the Status field of the router console. 16:29 < jrandom> true 'nuff Ragnarok 16:29 <+Complication> Hopefully you've got an OK or OK (NAT) there. 16:30 < A123> Complication, ah, thanks. Is that the thing that gets updated if you click on "Check network reachability..."? 16:30 < wiht> I hope that you will not have to break compatibility in future releases of I2P. Full network migration to a new version seems to have been painful in the past. 16:30 <+Complication> A123: yes, it should test again when you click 16:30 <+Complication> Doesn't happen instantly, though. 16:30 < jrandom> eh, they're not as painful as they used to be, but yeah, it'd be good if we can avoid it wiht 16:30 < A123> So I have to refresh the page? 16:30 < A123> Well, no, that would do another http post... 16:31 <+Complication> A123: it may take a minute to find a testing-suitable peer 16:31 <+Complication> 'cause you cannot test with those whom you're already speaking to 16:31 <+Complication> It could give false results. 16:32 <+Complication> So, it should show up when you view the router console sometime later. 16:32 <+Complication> Basically, in ideal circumstances, you shouldn not need to fire a peer test manually. 16:33 <+Complication> =shouldn't need 16:33 < jrandom> right, i2p now does a peer test automatically when certain events occur 16:33 < jrandom> (such as when someone tells you that your IP is something other than what you think it is) 16:33 < A123> I found that button completely unintuitive. I had no idea what it was updating and when, it never explicitly told me the results of the test... 16:34 < A123> The page wasn't automatically refreshing (I think), I can't do a reload in the browser... 16:34 < jrandom> reload should be safe 16:34 < A123> Surely that fires another test? 16:34 < jrandom> but yeah, the router console was designed more for technical reasons rather than usability 16:34 < jrandom> A123: it has a nonce to prevent that 16:34 <+Complication> That facet might benefit from a better explanation text in future 16:35 < wiht> Have we skipped 2) and gone to 3) already? 16:35 < jrandom> Complication: we'll probably drop it, since its unnecessary 16:35 < jrandom> no, still on 1 16:35 < jrandom> actually, anyone have anything else for 1) network status? 16:35 < A123> Ah, indeed, after a few times it complains about the nonce. 16:35 < jrandom> if not, moving on to 2) 0.6.1 16:35 < A123> "nonce" to non-geeks is just going to seem like a nonsense word. 16:36 < A123> :) 16:36 * Complication looks at graphs 16:36 <+Complication> No complaints about net status from here. 16:36 < jrandom> w3wt 16:37 < A123> Is there any reason that reseeding isn't automatic? 16:37 < jrandom> ok, i don't really have too much to mention regarding 0.6.1 beyond whats in the mail 16:37 < gloin> hmm.. shouldn't be the incoming and outoging traffic more or less symmetric? 16:37 < A123> Mine seems more or less symmetric. 16:37 < jrandom> A123: yes, though we may be able to do it safer 16:37 <+Complication> gloin: not if one's leeching or seeding ;) 16:37 <+Ragnarok> not if you're downloading stuff 16:38 < A123> Total: 3.74/4.09KBps (that's in/out) 16:39 < gloin> Complication: Is this a security problem? Shouldn't the 'foreign' traffic be reduced? 16:39 <+Complication> gloin: depends on what the criteria are 16:40 <+Complication> A person striving for utmost security clearly shouldn't be doing things which permit others to cause observable changes in their BW. 16:40 < jrandom> gloin: as we move to 1.0, we will stop publishing those stats 16:40 < A123> My ISP will still know them... 16:40 < jrandom> but yes, defending against local traffic analysis does require you to participate in other people's tunnels 16:41 <+Complication> (for a strict definition of "their BW", meaning "bandwidth use starting/ending at their node") 16:41 < jrandom> (or do sufficient chaff activity. tarzan for instance has "mimics" for wasting bandwidth^W^Wdefending anonymity) 16:41 < A123> Hrm. 16:41 < A123> I'm on ADSL, with far more download ability than upload. 16:42 <+Complication> Many are. 16:42 < A123> When my download exceeds my upload, doesn't that imply that I'm downloading stuff? 16:43 < wiht> No, you could also be forwarding others' traffic. 16:43 <+Complication> I guess it would imply you are downloading something. 16:43 < A123> Does I2P cache data? 16:43 * wiht would like to be corrected if that's wrong. 16:43 <+Complication> Unless you are seeding as much as you're leeching. 16:43 < jrandom> i2p itself does not cache 16:43 <+Complication> A123: no caching occurs to my knowledge 16:43 < jrandom> though syndie, on the other hand, does. 16:44 < A123> If there's no caching, then my download exceeding my upload must mean that I'm downloading something myself, right? 16:44 < jrandom> if you have large amounts of inbound trafffic but no current outbound traffic, you could just be running a syndie node 16:44 < jrandom> yes A123, given a small enough time frame 16:45 < A123> Since I could only usefully be downloading at the speed of my upload, after network buffers fill. 16:45 < jrandom> for a certain threat model, yes 16:45 < A123> Hrm. 16:45 < jrandom> (local passive attacker with sufficient resources, or a targetted local attacker, etc) 16:46 <+Complication> You could download faster, but it would increase your risk. (For which reason I have allocated up/down similar limits.) 16:46 < A123> Ah, good point, I can just limit my download speed. 16:46 <@LevDavidovitch> btw, you should limit both your dl and ul speed 16:47 <+Complication> But if someone targeted everyone who downloads more than uploads... they'd be targeting everyone and their granny. 16:47 < wiht> We are still having disconnection issues with IRC, it seems. 16:47 < jrandom> wiht: only a few people are 16:47 < wiht> OK. 16:47 <@LevDavidovitch> also reconnection is v FAST these days 16:48 < jrandom> (and nothing as bad as it was) 16:48 < wiht> I agree, reconnections are better. 16:48 < jrandom> aye, its nice to have our irc servers hosted on routers with reasonable bw limits :) 16:49 < jrandom> ((not that before was unreasonable, it was great, we just outgrew it)) 16:49 < A123> Is there any technical reason why DCC isn't supported? It can be implemented similar to the nat module, right? 16:49 < jrandom> ok, anyone have anything for 2) 0.6.1? 16:49 < jrandom> yes A123, there are technical reasons why dcc isnt supported 16:50 <@LevDavidovitch> it'd have to be done client side, i think. 16:50 < jrandom> someone could implement an irc proxy with dcc support, but no one has 16:50 < A123> What are they? Or is that a long discussion? 16:50 < jrandom> dcc support requires knowing and interpretting the irc protocol, and rewriting the irc messages sent as necessary 16:50 <@LevDavidovitch> normal dcc uses arbitrary ports and all 16:50 < jrandom> (in particular, ctcp messages for establishing dcc connections) 16:50 < A123> Oh, that's what I meant to ask... Whether it was technically possible to do it as with a nat module (which does as you say). 16:51 < jrandom> i dont know what a nat module is? 16:51 <@LevDavidovitch> the nat uses some UDP weirdnesses. 16:52 <@LevDavidovitch> the nat traversal thing i think he means 16:52 < jrandom> ah, ok, yeah, its technically possible, but no one has volunteered to work on it (and i'm swamped) 16:52 < A123> No... At least for Linux, there's a masq module for iptables which will rewrite IRC packets with DCC CTCP requests. 16:53 <@LevDavidovitch> ah, i see 16:53 <@LevDavidovitch> maybe some of that code would be usable 16:53 <@LevDavidovitch> depends how intimate it is with the ipfilter thing 16:54 < jrandom> probably simpler to just extend I2PTunnelClient to interpret irc perhaps 16:54 < A123> http://www.koders.com/c/fidA6A89E1080590138EB211E694473DDDD098B6B75.aspx <- Might be interesting, courtesy of Google. 16:54 < jrandom> (in the same way I2PTunnelHTTPClient extends it to interpret HTTP) 16:55 <@LevDavidovitch> not in most countries. 16:55 <@LevDavidovitch> oops 16:56 < jrandom> A123: an os level filter would be a bit tough to deploy, but if someone wants to work on it, that'd be a good place to start 16:57 < jrandom> ok, anything else on 2) 0.6.1, or shall we move on to 3) ??? 16:57 < A123> jrandom, it wouldn't really need to be OS level, would it? It would be coming through the IRC tunnel anyway... 16:58 < jrandom> actually, it wouldn't even work as an iptables filter. it has to be done inside i2ptunnel or some other i2p-aware proxy 16:58 < jrandom> in any case, its a lot of work, and unless someone volunteers to do it, it'll never get done ;) 16:59 < jrandom> (it *woudl* be cool though) 16:59 < A123> Right. 16:59 < A123> I meant "like the iptables filter", not "using the iptables filter" :) 16:59 < A123> -the+a 16:59 < A123> +n 17:00 < A123> Hrm hrm. 17:00 <@LevDavidovitch> go forth I think 17:01 < jrandom> ok, on to 3) ??? 17:01 < jrandom> (though one could probably say we've been on 3) all along ;) 17:01 < jrandom> anyone have anything else they want to bring up for the meeting? 17:01 <+fox> on 3) bugzilla would be nice to have in shape before 1.0 17:01 < wiht> Speaking of the usability suggestions from the mailing list, have you incorporated any of them into I2P? 17:02 < jrandom> brutus: we used to have bugzilla, but no one used it 17:03 < wiht> I should say, are you still concentrating on the core I2P functionality and planning to focus on usability a little later? 17:03 < A123> I don't want to try it here, but I think that sending someone a DCC request at the moment would reveal to them your IP. 17:03 < A123> (Assuming your client knows your IP) 17:03 < jrandom> wiht: the last week i've been doing a lot of improvements to the streaming lib which should substantially improve usability 17:04 < jrandom> A123: the irc servers filter ctcp messages 17:04 < jrandom> (they've been modified) 17:04 < A123> Servers... 17:04 < jrandom> but yes, that does send your ip to the server (which it may discard, or may file into some NSA database) 17:04 < jrandom> so, dont send dcc requests 17:04 < A123> I don't really want the server admins knowing who I am, either :) 17:05 < A123> (In theory. I don't care now or with you guys) 17:05 < A123> It might be worth warning users about that. 17:05 < jrandom> there's a page on the wiki about a whole slew of issues iirc 17:05 < jrandom> (swing by ugha.i2p) 17:06 <+fox> btw: are the irc2p servers connected via i2p or directly? 17:06 <+Complication> I'd assume i2p 17:06 <+Complication> Unless someone's gone mad meanwhile, and not notified me. :P 17:06 < wiht> jrandom, that's good, but what about the UI suggestions by Isamoor? 17:07 < jrandom> mihi: i believe they're done over i2p 17:08 < jrandom> wiht: the list of what i've been doing is available on http://dev.i2p/cgi-bin/cvsweb.cgi/i2p/history.txt?rev=HEAD 17:09 < jrandom> there's a lot more to be done, and a lot more will be done, but i have only two hands 17:09 < wiht> Thank you, I will look there. 17:10 < jrandom> actually, i have something to bring up for the meeting... 17:10 < A123> What's the server/channel that fox is changating? Or do I misunderstand fox's purpose? 17:11 < jrandom> as mentioned on hq.postman.i2p, we've had over a full year of anonymous mail service through postman's servers! 17:11 * jrandom cheers 17:11 * wiht does not want to seem ungrateful. 17:12 < A123> jrandom, have the spammers caught on yet? 17:12 < jrandom> A123: fox is a bridge to irc.freenode.net 17:12 < A123> (OK, it's a slow way to go about spamming...) 17:12 < jrandom> A123: doubt it, postman has antispam measures 17:12 < jrandom> inbound spam is a bit of a problem though ;) 17:13 < jrandom> (but my account there has been well filtered) 17:13 < mule> is it really that long. time passes ... 17:13 < A123> jrandom, ah, thanks. 17:13 * Complication looks if someone has finally dropped him a bear via e-mail 17:14 <+fox> yeah, postman & cervantes deserve a medal, they're pulling some great weights around here 17:15 <+fox> excellent services indeed 17:16 < jrandom> mos' def'. as is mule with his outproxy and fproxy, orion with his site, and the rest of y'all with yer content :) 17:16 < jrandom> ok, anyone have anything else to bring up for the meeting? 17:16 < wiht> Speaking of content... 17:16 < wiht> It seems that we know what sites are up or not, but no easily accessible directory of sites. 17:17 < A123> My clock runs fast. Would it be possible for the "Updating clock offset to -316819ms from -304801ms" messages to be downgraded from "CRIT"? It's a little disconcerting. 17:17 < wiht> I was thinking of creating one where site admins can post what their site is about. 17:17 < jrandom> orion.i2p is pretty easily accessible...? 17:17 < jrandom> A123: hmm, perhaps 17:18 < wiht> It has a short description of sites' purposes? 17:18 <+postman> A123: spam is only a problem for incoming mail ( mail FROM the internet ) 17:18 < jrandom> wiht: yeah, it does, though i dont know where they come from 17:18 <+Complication> wiht: no, orion doesn't seem to have that feature 17:18 < wiht> I will look again. 17:18 < jrandom> iirc jnymo used to maintain them 17:18 <+postman> A123: i2p mail users can rarely spam themselves as well as they cannot spam internet targets 17:19 <+Complication> Sorry, meant to say it doesn't seem user-accessible. 17:19 < wiht> I was thinking of a directory that categorizes sites, something similar to dmoz.org. 17:19 < A123> wiht, as a brand new user, that sounds great. 17:19 <+fox> wiht: Do we have enough sites to need to classify them? 17:19 < A123> wiht, but check Freenet for an excellent example of how not to do it. 17:20 < jrandom> a reliable categorized site would be neat. or perhaps we can integrate it into syndie to let people tag and categorize their peer references (and share them) 17:20 < jrandom> (syndie already has a set of category tags for each bookmark, laying it out visually dmoz style wouldnt be hard) 17:20 < jrandom> and it'd be local <--- fast 17:20 < A123> Or just get Google interested in i2p... 17:20 < jrandom> heh 17:24 < jrandom> ok, if there's nothing more for the meeting... 17:25 * jrandom winds up 17:25 * jrandom *baf*s the meeting closed