16:24 < jrandom> 0) hi 16:24 < jrandom> 1) Net status 16:24 < jrandom> 2) Fortuna integration 16:24 < jrandom> 3) GCJ status 16:24 < jrandom> 4) i2psnark returns 16:24 < jrandom> 5) More on bootstrapping 16:24 < jrandom> 6) Virus investigations 16:24 < jrandom> 7) ??? 16:24 < jrandom> 0) hi 16:24 * jrandom waves 16:24 < jrandom> weekly status notes posted up @ http://dev.i2p.net/pipermail/i2p/2005-October/001079.html 16:25 * susi23 waves back 16:26 < jrandom> lets jump on in to 1) net status 16:26 < jrandom> as I mentioned, things look pretty reasonable so far. 16:26 <+fox> ah meeting sweet 16:27 < jrandom> there is some good stuff coming down the line too, so we'll have a new release later this week 16:27 < jrandom> anyone have anything they want to bring up regarding 1) net status? 16:27 <@cervantes> omg 7 issues 16:27 <+legion> yup looking good :-) 16:27 < jrandom> busy week cervantes :) 16:28 <@cervantes> can only be good 16:28 <+Complication> Works relatively well, dev.i2p even - I can even pull CVS checkouts without EOF messages. 16:28 < jrandom> nice :) 16:28 <+Complication> Might have been release-related overloads, those last ones. 16:28 <+Complication> But I can't tell. 16:28 < jrandom> dev.i2p is on the latest build code too (-7), so it'll be hopefully performing substantially better than before 16:29 < jrandom> s/dev.i2p/cvs.i2p (etc)/ 16:29 <+legion> forums.i2p also seems to be much better than before :) 16:29 <@cervantes> *ahem* 16:29 <+fox> is i2p safe to let others join etc? 16:29 <+Ragnarok> ok, now I've got to try this miraculous "cvs checkout that works the first time" 16:30 <+fox> since there is no known limits now 16:30 <@cervantes> that's because everyone's hammering i2p-list instead of posting to the forum 16:30 <+legion> hmm you sure cervantes? 16:30 < jrandom> Romster: well, we've been growing at a pretty good pace lately, but we should hold off on public beta until 0.6.2 16:30 < jrandom> heh cervantes ;) 16:30 < jrandom> hush Ragnarok, you'll jinx it! 16:31 <+Ragnarok> wow... it's true. I'm speechless 16:31 <+fox> k jrandom 16:31 < jrandom> (man my eyes are watering from the curry my roomates are cooking downstairs) 16:31 < jrandom> nice1 Ragnarok 16:32 <+fox> lol now that's a strong curry 16:32 < jrandom> ok, if there's nothing else on 1), we can jump quickly through 2) Fortuna integration 16:32 < jrandom> (true that Romster) 16:32 <+fox> yay for fortuna integration! 16:32 <+fox> moving onto 2) :P 16:32 <+fox> what is fortuna? 16:32 < jrandom> heh thought you'd like that shardy :) 16:32 <+fox> i've been a bit behind the last month 16:32 <+Complication> PRNG algo, if I remember. 16:33 <+Complication> Supposedly a good one, or so they write. :P 16:34 * Complication knows nothing about its inner workings, though 16:34 < jrandom> shardy: I'd love if you could give it a look sometime 16:34 <+fox> of course 16:34 <+fox> you're using the gnu implementation? 16:34 < jrandom> Romster/Complication: there are some links in the email 16:34 < jrandom> yeah shardy - http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/core/java/src/gnu/crypto/prng/Fortuna.java 16:35 < jrandom> (integrated with http://dev.i2p.net/cgi-bin/cvsweb.cgi/i2p/core/java/src/net/i2p/util/FortunaRandomSource.java ) 16:36 < jrandom> we vary from the straight gnu-crypto implementation though, since we've already got AES256 and SHA256 code (Cryptix's and Bouncycastle's, respectively) 16:36 < jrandom> ok, anyway, this looks cool, as we've been hacking through getting that support in there for probably a year now 16:37 < jrandom> (fortuna integration was one of the main projects driving smeghead to build 'pants' ;) 16:37 < jrandom> if anyone has any questions/comments/concerns about it, please bounce 'em to the list 16:37 < jrandom> (or email, or forum, of course) 16:38 <+fox> yeah where is smeghead hes not been around for awhile now 16:38 < jrandom> smeghead is [redacted] doing [redacted] 16:39 < jrandom> ok, moving on to 3) GCJ status 16:39 < jrandom> i2p works on GCJ! [w00t!] 16:39 <+susi23> nice job 16:39 <+legion> sweet 16:39 < jrandom> at least, it does on GCJ 4.0.2 on linux 2.6.12. I haven't tried any other platforms 16:40 < jrandom> yeah, the GCJ and GNU Classpath folks have worked wonders 16:40 < jrandom> it was really easy to get it building, the old static reference classes I remember weren't necessary 16:41 <+Complication> Which sounds quite positive, given Sun Java's less-than complete openness (with regard to distribution, if I remember correct). 16:41 < jrandom> there's a makefile shipped with I2P now, though for simplicity, I think we'll probably stick with distributing pure java, at least primarily 16:41 <+susi23> (next we try to run it on J2ME ;) 16:42 <+fox> GCJ to take over Suns JVM> 16:42 < cat-a-puss> how is preformance with GCJ? 16:42 < jrandom> aye, though sun is entirely open, and we /could/ distribute their JVM along side I2P, but their license prohibits distributing their JVM as a general purpose tool 16:42 < jrandom> cat-a-puss: comparable 16:42 < jrandom> most of the heavy work in i2p is already done by assembler code ;) 16:43 <+fox> how would i2p go with C#/mono again with that jave to C# adition (forgot it's name) 16:43 <+fox> i remember jrandom and i both tryed it out ages ago 16:43 < jrandom> no idea. but if it works with gcj, it might work with ikvm - the mono jvm thing 16:44 <+Ragnarok> IKVM 16:44 <+Ragnarok> nm 16:44 <+fox> ah tahts the one ikvm 16:44 <+fox> much difereances with GCJ and IKVM and Sun's? 16:45 < jrandom> i've never used ikvm 16:45 <+fox> i'm sure you have once with mono or was that eclipse? 16:45 <+fox> * Romster shrugs 16:45 < jrandom> and i2p as shipped doesn't currently support the router console, though it does support the router operation, i2ptunnel, and sam 16:46 <+Ragnarok> what's blocking the router console? 16:47 <+susi23> xerces, when I remember correctly 16:47 < jrandom> xerces stuff. the xercesImpl shipped with i2p has sun.* dependencies, and when I naively tried to drop in the latest xerces, getting that and jdom and rome and the rest of jetty GCJed was b0rking 16:47 < jrandom> there are some additional requirements of the latest xerces, it seems 16:48 < jrandom> (for jar files we don't currently ship). however, I'm sure we can track it down 16:49 <+fox> jrandom is good at tracking down problems :) 16:49 < jrandom> even better at making problems 16:49 <+fox> * Romster featches a coffee 16:49 < jrandom> ok, anything else on 3) GCJ status? 16:49 < jrandom> or shall we move on to 4) i2psnark 16:50 < jrandom> consider us moved 16:50 < jrandom> ok, i2psnark is back (yay) 16:51 < jrandom> not much I have to add to whats in the mail... you have anything Ragnarok? 16:51 <+Ragnarok> nope 16:51 <+susi23> regarding web frontend 16:51 <+Ragnarok> more testing would be nice though, so everyone should try it :) 16:52 <+susi23> supporting it with susibt shouldn't be a problem 16:52 < jrandom> ooh give us the scoop susi23 :) 16:52 < jrandom> nice 16:52 <+fox> naive question, why spending time supporting old bt client while other (azureus) support full blown client ? 16:52 < jrandom> jme___: azureus *is* kickass 16:52 <+susi23> major release of susibt is scheduled for november :) 16:53 < jrandom> heh cool susi23 16:53 <+Complication> To me, Azureus seemed terribly complex. 16:53 <+Ragnarok> azureus blows monkey chunks 16:53 <+susi23> for me, I always need a headless solution 16:53 <+Ragnarok> not to put too fine a point on it 16:53 <+fox> ok :) 16:53 < jrandom> jme___: azureus is a bit heavyweight though, but is a great general purpose bt solution 16:53 <+Complication> (I personally could see the day I'd misconfigure something in it, and dent my anonymity.) 16:54 <+fox> it make sense, just wanted to know 16:54 <+fox> to me azerious never workd well i've moved to bitlord which does work 16:54 < jrandom> i do still plan on helping further improve the azneti2p plugin with the azureus folks, but i2psnark took literally less than 2 hours before I was swarming data 16:54 <+legion> Yeah azureus is just too big and complicated for i2p 16:54 <+Complication> If the goal is bundling a bt client along with i2p, a lightweight client sounds best. 16:54 <+fox> KISS principal 16:54 <+Ragnarok> I like the official client best, but i2psnark has the major advantage of being simple enough for me to hack on 16:55 <+legion> thing is i2p doesn't need a heavyweight bittorrent client 16:55 < jrandom> yeah, its really clean code (with oddball gnu formatting ;) 16:55 <+Ragnarok> damn gnu 16:55 <+Ragnarok> worst brace style ever 16:55 < jrandom> heh 16:55 <+fox> heh code reformatter :) 16:55 <+Ragnarok> jrandom won't let me :) 16:55 <+Ragnarok> well, for good reason 16:55 <+fox> independance and simplicity are criteria i definitly agree with 16:56 <+fox> will there be options to enable the bt-torrent program on each i2p node? 16:56 < jrandom> aye, it'd be nice if we can backport multitorrent, piece selection, and web capacity to mjw's mainline snark 16:56 <+Ragnarok> the simpler it is, the more likely it will be maintained 16:56 < jrandom> exaaactly Ragnarok 16:57 <+legion> yeah backporting those would be killer 16:57 <+fox> as a OT point here take a look at emules KAD network i think it's rather neat. 16:57 < jrandom> Romster: its now shipped with the build by default, but once we get it into susibt, it'll be on the top nav with the rest of the clients 16:58 <+Ragnarok> we need to be able to ship a .torrent maker as well, though. And a tracker would be nice. 16:58 < jrandom> yeah, actually, snark has both of those, I just disabled them because i didn't want to maintain 'em :) 16:58 <+legion> hmm good point ragnarok 16:58 < jrandom> but getting them back in wouldn't be much trouble 16:59 <+Ragnarok> well, the torrent maker at least shouldn't be that bad 16:59 < jrandom> there's a Tracker.java too, and handling in the PeerAcceptor, but I threw out what wasn't necessary, so one would probably want to look back at http://klomp.org/snark/ for those 17:00 < jrandom> (and review http://dev.i2p/~jrandom/snark_diff.txt for changes) 17:00 <+fox> since snarik is back it'll get worked on right :) 17:00 <+legion> actually when it comes to a tracker, it'd be better to come up with a distributed solution 17:00 <+fox> snark* 17:00 < jrandom> porting code is easier than building a new distributed tracker legion ;) 17:00 <+fox> legion, your your talking 17:00 <+legion> true, that 17:01 < jrandom> but I wouldn't be opposed to integrating a nice clean maintained anonymity-friendly distributed tracker solution :) 17:01 <+fox> could be tacked onto the eepsites? 17:01 * jrandom spots a flying pony go past the window 17:01 <+Ragnarok> the official bt client has a kademlia based distributed tracker, but obviously that's only good as a design reference 17:01 <+legion> a place to start ;) 17:02 <+fox> actually kademlia = emules KAD netowrk? hmm, if that's the case KAD would be ideal for a tracker but bootstraping is an issue 17:03 <+Ragnarok> they're based on the same algorithm, but they're not in any way compatable 17:03 <+Ragnarok> compatible, even 17:04 <+Ragnarok> doing something like emule's KAD for i2phex would be sort of interesting... 17:04 <+Ragnarok> anyway, flying ponies 17:04 < jrandom> :) 17:04 < jrandom> (agreed on both counts) 17:04 < jrandom> ok, anything else on 4) i2psnark? 17:05 <+Ragnarok> as long as we have something to make .torrent files, the existing trackers are fine 17:05 < jrandom> thats a good point - there's some commented out code in Snark's main I believe 17:05 <+legion> no I think the existing trackers are not fine :( 17:05 < jrandom> whats wrong with them legion? 17:05 < cat-a-puss> don't just hand uesrs a torrent file ether 17:05 <+legion> often have trouble accessing them 17:06 < jrandom> hmm cat-a-puss? oh, you mean, we need to get a web interface to transparently swarm? 17:06 <+legion> sites get flooded with traffic 17:06 < jrandom> ah, thats i2p's issue, hopefully 0.6.1.4 will improve that 17:06 < jrandom> postman was telling me how he was getting tons of hits @ tracker.postman.i2p 17:06 < jrandom> i forget the #s offhand 17:06 < cat-a-puss> If we are handling both the swarming code and the code to get the torrent in the first place, might as well make it transparent for the user 17:07 < jrandom> orion.i2p/bt/ isn't really used though 17:07 < jrandom> (and tracker-fr seems lively) 17:07 <+susi23> with susibt I hope to include trackers rss feed, so you don't need to go on the trackers webpage anymore but get the torrents downloaded automatically :) 17:07 < cat-a-puss> also prevents confusing an i2p torrent with a non-anonymous one 17:07 <+fox> http tracker for bt doesnt scale due to poorely designed protocol 17:07 <+fox> router watchdog router hung hard restart wtf 17:07 <+legion> right, which is my point some trackers are flooded while others are idle 17:07 < jrandom> cat-a-puss: ah, yeah I'd love to integrate hooks from syndie into susibt :) 17:07 <+fox> it can be easily fixed but break the compatibility with official bt protocol 17:08 <+fox> it is the road followed by the dht tracker stuff 17:08 < jrandom> (and the other way around, so people can easily syndicate .torrent files, etc) 17:08 <+Complication> Romster: I get those, but the machine I get them on is borderline (300 MHz) 17:08 <+fox> the distributed tracker is the solution to hammered trackers 17:08 < jrandom> legion: that can easily be remedied by people using different trackers :) 17:08 <+fox> azerius DHT 17:08 < jrandom> code is expensive, using different URLs is cheap 17:08 <+legion> yeah, but they don't seem to be doing that do they? 17:09 < jrandom> but, yes, a distributed tracker would be great. not on my roadmap though, but if someone gets it going, that would Rule. 17:09 <+Complication> In due time... surely someone can go distributed too. 17:09 <+legion> Instead of of posting torrents to tracker sites, they could post a bith and whatever details to their eepsite. 17:10 < jrandom> bith == hash? 17:10 <+legion> yeah, stands for bittorrent hash, not my term 17:10 <+Complication> In the beginning, though... a simple and solid client, in Java, bundled with the router... can solve many problems. (Perhaps even pull signed updates without overloading dev.i2p.) 17:11 <+legion> yeah, that would be great 17:11 < jrandom> aye Complication 17:11 <+fox> yeah torrent updates 17:11 <+fox> ok next item ont he list :) 17:12 < jrandom> ok, 5) more on bootstrapping 17:12 <+legion> yeah lets move on 17:12 < jrandom> lots of interesting stuff on the list as of late, and no way am i going to summarize it all here :) 17:12 <+fox> bootstraping the i2p router database? 17:12 < jrandom> anyone have any questions/comments/concerns they want to discuss about the thread? 17:12 < jrandom> Romster: see the list and/or email 17:12 <+fox> * Romster needs to read that list 17:13 < jrandom> aye, there's good stuff on there :) 17:13 <+fox> i've been rather busy laterly 17:13 <+Complication> 26 messages to read through, can't comment yet 17:13 < jrandom> still no end result, but we're looking towards a new way of building tunnels for 0.6.2 17:14 <+fox> a new way, is there a flay in the current method? 17:14 <+fox> flaw* 17:14 < jrandom> Michael's analysis shows the attack is not really a problem now, as there are easier attacks on the alternatives 17:14 < jrandom> read the list ;) 17:14 <+fox> arg later 17:14 <+fox> this is now :) 17:15 <+fox> i'm noramlly asleep at this time. 17:15 <+fox> so i rearly get to be at a meeting 17:16 < cat-a-puss> can you post your ideas for a new way / existing / rejected ways in an email to the list so we can compare 17:16 <+fox> so its todo with attack methods and tunnel creation i assume, without reading the list yet 17:16 < cat-a-puss> (that's for Jrandom) 17:16 < jrandom> cat-a-puss: i'm not sure if we've really hashed out an end result yet 17:16 <+fox> be an idea cat-a-puss 17:17 <+Complication> Romster: yes, it was more-or-less about giving the endpoint of an exploratory tunnel less influence as a possible attacker 17:17 < jrandom> but http://dev.i2p.net/pipermail/i2p/2005-October/001073.html is the latest for what I see coming out of your suggestion 17:17 < jrandom> well, not influence - i2p is a free route mixnet - but less information 17:18 <+Complication> Yes, that would likely be a more correct term 17:18 < jrandom> (the above linked url is full of arm waving, no solid crypto figured out yet) 17:18 <+fox> lesss = better for more robustness agenst attacks, i get what your geting at 17:18 < jrandom> ((but i think its all doable with existing techniques) 17:19 < jrandom> Romster: here's a plot of Michael's attack against the existing algorithm, with the X axist saying what % of the network is compromised - http://dev.i2p.net/~jrandom/fraction-of-attackers.png 17:20 < jrandom> (plain telescopic building would be off the chart before hitting x=200) 17:20 < jrandom> ((so what we have now is literally orders of magnitude better)) 17:20 < jrandom> but we can improve upon that further 17:21 < jrandom> though there's also the garlic routing alternative too 17:21 < jrandom> anyway, yeah, more things to be hashed out, keep an eye on the list :) 17:21 <+fox> ok i'll have a good read of that list later 17:22 <+fox> and see if i can think of anything too add 17:22 < jrandom> cool 17:22 < cat-a-puss> would the "new" telescopic method be fast enough to do on demand construction? 17:22 < jrandom> I'm not sure we want that 17:22 < jrandom> its the O(1) vs O(N) issue 17:23 < jrandom> the new technique would allow tunnel creation without using the exploratory tunnels, leavng the exploratory tunnels for netDb operation 17:23 < jrandom> (and for exploratory tunnel creation :) 17:24 <+fox> hrmm would it be worthwhile screwing with the hackers by givving them heaps of false positives thereby masking the real source 17:24 <+legion> sounds good :) 17:24 <+legion> I'd think some screwing like that would be good 17:24 < cat-a-puss> jrandom: right, I was asking if doing do would speed things up enough, so that sometimes that last hops don't know they are the last hop, as disguesed on list. 17:25 <+fox> exploratory tunnels to collect netDB router refereances? 17:25 < jrandom> romster: we are the hackers ;) but yeah, if the false positives overwhelmed the true positives, it'd require substantially large number of attacks to get statistically significant data 17:26 < jrandom> hmm right cat-a-puss, but I'm not sure how that'd speed things up though, it'd move us from an O(1) to O(N) tunnel topology 17:26 < jrandom> or what do you mean by speed things up? 17:26 <+fox> and if it got to the point of being detected it could then drop off and go silent forawhile? 17:26 < jrandom> using the new technique would reduce the failed tunnel creations, certainly 17:26 <+fox> or mistearly change it's key and continue or something heh 17:26 < jrandom> romster: it'd probably be worth digging through the mails to review the attack ;) 17:27 <+fox> yeah after sleep 17:27 <+Complication> Romster: afaik, it's a passive attack mostly, so the target can't detect it occurring 17:27 <+fox> and fixing a friends pc i got sitting here 17:27 <+fox> ah ic complication. 17:27 < cat-a-puss> jrandom: I'm not talking about the O(n) thing. I mean just waiting to construct a client tunnel until we need one for some apps, rather than just having them sit there all the time. 17:28 <+Complication> (but I might be wrong, and those last 26 messages might have active components) 17:28 <+fox> would a long term passive attack evently find the target? 17:28 <+fox> i'll comment after i've read the list 17:28 < jrandom> ah cat-a-puss, we'll certainly improve the tunnel pooling for 0.6.2. we currently only build the tunnel when we need it (giving ourselves a little time in case the creation fails) 17:28 <+Complication> Romster: well, persisting the attack beyond tunnel lifetime would require resources and patience 17:28 <+fox> and understand it better 17:29 <+Complication> But time plays a part in every probability of success. You try long, you get more chances. 17:29 <+fox> ah that's the idea tunnel life tiem be too short to actually have a worthwhile attack work. 17:29 < jrandom> each pool has a defined number of backup tunnels, and we by default build replacements between 60-120 seconds before an old one expires 17:29 <+fox> time* 17:30 < jrandom> right Complication - each sample occurs only 'm' times every (c/n) tunnels 17:30 <+fox> there is no interaction between each tunnel to gather stastics? 17:30 <+fox> as one is about to die and another is being built 17:31 < jrandom> romster: the new tunnels do not talk to each other, no, but thats not the attack Michael has been describing 17:31 < jrandom> there are countless attacks out there, most of which we have dealt with, but whenever someone comes up with one that may have a bearing on I2P's operation, we want to analyze it further 17:31 <+fox> must read the list, ok i'll leave it at that for now, anyone else got anything to say? 17:32 < jrandom> ok, if there's nothing else, lets move on to 6) virus investigations 17:32 <+fox> actually one stastic i can see could be gathered is no 0 hop would mean that the next hop is not the end point so it could be ruled otu but with millions of nodes that analying technique would be useless 17:33 < jrandom> I don't have anything to add beyond whats been discussed on the forum 17:33 < jrandom> right Romster, there are predecessor attacks on tunnel length, which is one of the main things we're addressing in 0.6.2 17:33 <+fox> virus, what virus, if it's linux it'll be nonexistant, but windows hmmm 17:34 <+Complication> Well, although I couldn't build a matching binary (hell knows hy) the final difference was small enough... to hopefully be useful to anyone interested in reading assembly code. 17:34 < jrandom> Romster: please, the weekly status notes should explain these agenda items, and the meeting is to discuss things /beyond/ whats in the notes ;) 17:35 <+Complication> I sure couldn't find anything obvious in there, but nor could I explain away all the difference. 17:35 <@cervantes> rtfml and rtff 17:35 <+fox> yeah i haven't been upto speed for quite awhile, sorry about taht jrandom 17:35 <@cervantes> ;-) 17:35 < jrandom> aye, the fact that both a known safe bat file and the old one triggered the same detection code is substantial 17:35 <+Complication> Yes, that sort of eases doubts. 17:36 <+Complication> I guess the QBFC might have undocumented differences within the same version number (different builds?) 17:37 * jrandom has no idea, but its possibly just some OS interaction, or whatever. I don't know, you've put up enough analysis for people to make their own informed decision 17:37 <+Complication> I think it's better that way. 17:37 <+Complication> Disassembly is really notably outside my usual playground. 17:37 < jrandom> legion: is there anything you want to mention about this, or should people just go through the forum if they want more info? 17:38 <@cervantes> can I just re-iterate what others have said on the forum, and thank Complication for the time and maticulous attempts he's put in to checking this issue out 17:38 < jrandom> aye, its much appreciated 17:38 <+legion> I've nothing to add, I feel that I've said way too much about it already 17:39 < jrandom> 'k understood. ok, anyone else have anything to bring up on this, or shall we move on to 7) ??? 17:39 < jrandom> [consider us moved] 17:40 <+fox> * Romster seconds that :) 17:40 <+legion> ok for 7)??? how about we take a moment to discuss i2phex 17:40 < jrandom> cool, good idea 17:40 <+fox> since i'm using it right now even :) 17:40 <@cervantes> no no group hug first 17:40 < jrandom> redzara mentioned he was going to be at the meeting, but progress on the merge is going slow 17:41 <+legion> susi23 inquired about a headless version 17:41 < jrandom> ah cool, i saw your post on that 17:41 <+fox> might i add the favourites list needs to be wider to cope with the longer i2p keys 17:42 <+susi23> (that's no must, I was just curious about it) 17:42 < jrandom> well, no one can remember base64 keys, so I'm not sure if you're missing much Romster ;) 17:42 < jrandom> (and the first few bytes should be enough to uniquely identify them) 17:42 <+fox> starting i2phex with a server is the major problem i see so far 17:42 <+legion> Actually I'd like to see only like the first 12 characters of keys to displayed in the client 17:42 <+fox> heh guess 17:42 * Complication is regrettably majorly busy, and can't do no xml-rpc 17:43 < jrandom> seems reasonable legion 17:43 <+fox> what about display as many characters to make the key unique 17:43 < jnymo_> I'm having good results with i2phex 17:44 < jrandom> cool jnymo_, i've been hearing good things too 17:44 <+fox> so if 2 keys start with abc it'll be abcx 17:44 < jnymo_> 12 identical characters isn't likely, romster 17:44 <+fox> true 17:44 <+Complication> Besides, simpler = quicker 17:44 <+fox> but wouldnt need 12 if the keys are that far randomised 17:45 <+Complication> (not that there is much speed to gain from displaying things) 17:45 <+legion> Well maybe there could be a new host properties window, stating the full key and certain information like how much it is sharing and whatever 17:45 <+susi23> (netdb works great with 4 chars only for router ids) 17:45 <+fox> or the database and using the keyname=base64 and only displaying the keyname 17:45 < jrandom> hmm, i thought there was already a peer info display legion? 17:46 < jrandom> legion: some things like that would be good to add to the mainline phex, most likely? 17:46 <+legion> hmm could be right... 17:46 < jrandom> (that way Gregor can maintain it ;) 17:46 <+Complication> Well, there's a "Browse host" function, but that may not be the exact same thing. (If it works.) 17:46 < jrandom> Complication: it does 17:46 < jrandom> (work, that is) 17:47 <+Complication> Seems to basically drop the host destkey into the search box 17:47 <+Complication> ...and runs a search. 17:48 < jnymo_> this may be an i2phex mainline issue, but I didn't see an ETA on i2phex downloads 17:48 <+Complication> Hmm... or actually, doesn't run a search. 17:48 <+Complication> Mine seems to wait until I manually start it. 17:48 <+fox> whats the nearby i2phex running tickbox for? 17:49 <+legion> I see where there is plenty of room for improvement. ;) 17:49 < jrandom> yep :) 17:50 < jrandom> lots to be done, and the forum is a good place to post up ideas/suggestions/questions(/patches :) 17:50 <+fox> despite it's ovous name 17:50 < jrandom> ok, anyone have anything else for the meeting? 17:50 <+fox> hmm good point 17:50 <+fox> can't think of anything else 17:51 <+fox> but anyone working on a distributed data store? 17:51 * cervantes checks his watch 17:51 <+fox> like activtely 17:51 < jrandom> Romster: beyond syndie, no 17:51 < jrandom> (not to my knowledge, at least) 17:52 <+legion> well I was wondering about integrating a http download manager into i2p, would make downloading larger content from eepsites easier. 17:52 <+fox> q and iphex and one or 2 others but i've not seen anything mentained for awhile now 17:52 <@cervantes> what's the status of feedspace...I haven't heard aught of it in a while 17:52 < jrandom> legion: that would be cool - there's a post about that on the forum too i think 17:53 <+fox> ah feedspace another one 17:53 < jnymo_> if this was mentioned in the meeting already, nm.. but, is there news on i2p freenet colab? 17:53 < jrandom> cervantes: last i heard frosk was kind of busy, but if frosk is around, maybe he can tell us more :) 17:53 <+legion> Personally I'd like to see a i2p entropy colab. 17:54 <+fox> i have ideas for a datastore, but it be a expansion to existing methods that are in use currently 17:54 <+legion> Given that q, feedspace and such don't seem to be going anywhere fast right now 17:54 < jrandom> jnymo_: I've bounced the freenet folks some code to run on our SSU transport,toad has been joining in on some of the discussions, but freenet won't be in a position for us to run it as a data store on top of i2p for a while (after their 0.7 release comes out, most likely) 17:54 <+fox> i want to start a project but not go over what others have done already 17:54 <+legion> wonder if it'd be possible to port entropy to run over i2p... 17:54 < jrandom> legion: entropy would be good, but integration is kind of hard. of course, people could run things like fproxy.i2p for entropy 17:55 * jrandom doesnt know entropy's transport code at all 17:55 <+fox> i've put my irc client on hold, there is alot of them in progress already all i2p needs now is a datastore and it'll beat freenet with ease :) 17:55 < jrandom> (but perhaps that'd be a good way to get someone to hack on the GCJ SDK :) 17:56 < jrandom> Romster: helping out on other efforts is a lot more rewarding that starting brand new projects, as you get a lot more done with less effort :) 17:56 < jnymo_> ah.. congrats on the gcj port 17:56 <+fox> entropy's is in c or C++ iirc 17:57 < jrandom> right Romster, which is why they'd be able to use I2P's SDK and streaming lib, built with GCJ into native libraries 17:57 <+fox> jrandom true, but who :) 17:57 < jrandom> not I 17:57 <+legion> oh and on another issue, just like to mention that today I released a new version of my readme.html update for the i2p router console. 17:57 < jrandom> (the only way to get something you care about done is for *you* to do it :) 17:57 < jrandom> cool 17:57 * dust would like to see some kind of 'squid' syndication for offloading eepsites 17:58 < jrandom> dust: yeah totally, if we can get sucker into that position, that'd be ideal 17:58 < jrandom> e.g. I'd love to get the latest info from orion in syndie, local 17:58 <+fox> build a proxy for squid to use :) 17:59 <+legion> I'd been putting it of in the hope that certain improvements to the python eepsitechecker would have been made by now. 17:59 < dust> ah, syndie 17:59 < jrandom> (thats actually what syndie is for - syndication to cut down on load) 17:59 < dust> _the_ answer 17:59 < jrandom> there's a python eepsite checker? 17:59 <+fox> first i've heard about it 17:59 <+legion> yeah, it's what I use ;) 18:00 < jrandom> cool legion 18:00 <+legion> really? It's been around for awhile 18:00 <+fox> nice i'd like to check that out :) 18:00 <@cervantes> think someone ported baffled's script... can't remember who/when 18:00 <+fox> i'm learning python 18:00 < jrandom> ah ok cervantes 18:00 <+fox> the hard way by examples and the manual :) 18:00 < jrandom> yeah, i'm lazy, i just use polecat.i2p/i2psurvey/ and orion.i2p/ :) 18:01 < jrandom> (no need for me to spider) 18:01 <+legion> if someone would care to work with me on it, I'd really like to get the code fixed and working with either python 2.3 or 2.4 18:01 <+fox> i have 2.4 installed here 18:01 <+Ragnarok> I may have a look at it. Got link? 18:01 <+fox> actually think it's 2.4.1 18:02 <+legion> right now it has no py2exe compatibility and half of it works with each version, which means anyone running it needs to have both installed. 18:02 * jnymo_ would love to see an orion.i2p/I2PDirectory hybrid.. info, catagories, stats.. butter 18:02 <+legion> I'll archive it after the meeting and post a link to the forums 18:03 <+Ragnarok> ok 18:03 < jrandom> legion: hmm, do you see lots of people needing to run that though? I mean, only a few people need to spider 18:03 <+fox> both eck, might be a bit much for me to translate to the newer dunno untill i look at the code 18:03 < jrandom> (not that there's anything wrong with making it easy for those few people, that is :) 18:04 <+fox> cold be disected and used todo other things too? 18:04 <+legion> Well thing is I can see where there could be some uses for everyone that runs i2p. 18:04 <+fox> could* 18:04 < jrandom> hmm, I'm not so sure, could you explain how? 18:04 < jrandom> I mean, I don't want everyone to essentially DDoS every eepsite 18:05 <+legion> One of which would be a dynamic bookmarks page, that is auto generated every 12-24 hours or so. 18:05 < jrandom> ah, that is trivial in syndie (actually one of the main features - 'new blogs') 18:05 < jrandom> ((but of course, syndie doesn't have a great ui for that yet)) 18:06 <+fox> actually would only need a few to spider and throw it into a torrent/dht like database and sync that between nodes 18:06 < jrandom> right Romster (though that torrent/dht-like database to sync, or "syndi"cate, could be syndie ;) 18:06 <+fox> could even be a hidden way to learn more i2p nodes and services 18:07 <+fox> yeah or syndie 18:07 < jrandom> ok, anyone else have anything for the meeting? the curry is getting cold ;) 18:08 <+fox> if syndie is going tobe that great one could store static pages to cashe and the same with images 18:08 <+fox> bon appetit, jrandom :-) 18:08 < jrandom> exactly romster, you can do that now 18:09 < jrandom> ok, if there's nothing else... 18:09 * jrandom winds up 18:09 * jrandom *baf*s the meeting closed