Remove some irrelevant parts and add some info to the readme.

This commit is contained in:
idk
2019-01-22 17:15:04 -05:00
parent 04d57c329e
commit c7a428ed25
4 changed files with 21 additions and 30 deletions

1
.gitignore vendored
View File

@ -3,3 +3,4 @@ bin/*
.go
*.i2pkeys
*/*.i2pkeys
README.md.asc

View File

@ -1,8 +1,5 @@
# sam-forwarder
*think of it as a shell-scriptable re-implementation of i2ptunnel. That's*
*pretty much it.*
Forward a local port to i2p over the SAM API, or proxy a destination to a port
on the local host. This is a work-in-progress, but the basic functionality is,
there and it's already pretty useful. Everything TCP works, but UDP forwarding
@ -62,7 +59,8 @@ It doesn't encrypt the .i2pkeys file by default, so if someone can steal them,
then they can use them to construct tunnels to impersonate you. Experimental
support for encrypted saves has been added. The idea is that only the person
with the key will be able to decrypt and start the tunnels. It is up to the user
to determine how to go about managing these keys.
to determine how to go about managing these keys. Right now this system is
pretty bad. I'll be addressing that soon too.
TCP and UDP are both working now. Additional functionality might be added by
adding other kinds of protocols overtop the TCP and UDP tunnels as a primitive.
@ -106,9 +104,6 @@ in a different repo though. This is looking a little cluttered.
TLS configuration is experimental.
I'm eventually going to make the manager implement net.Conn. This won't be
exposed in the default application probably though, but rather as a library.
## Stuff that's using it:
Mostly mine, but this is all Free-as-in-Freedom for anyone to use:

View File

@ -1,11 +1,8 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Hash: SHA512
# sam-forwarder
*think of it as a shell-scriptable re-implementation of i2ptunnel. That's*
*pretty much it.*
Forward a local port to i2p over the SAM API, or proxy a destination to a port
on the local host. This is a work-in-progress, but the basic functionality is,
there and it's already pretty useful. Everything TCP works, but UDP forwarding
@ -65,7 +62,8 @@ It doesn't encrypt the .i2pkeys file by default, so if someone can steal them,
then they can use them to construct tunnels to impersonate you. Experimental
support for encrypted saves has been added. The idea is that only the person
with the key will be able to decrypt and start the tunnels. It is up to the user
to determine how to go about managing these keys.
to determine how to go about managing these keys. Right now this system is
pretty bad. I'll be addressing that soon too.
TCP and UDP are both working now. Additional functionality might be added by
adding other kinds of protocols overtop the TCP and UDP tunnels as a primitive.
@ -109,9 +107,6 @@ in a different repo though. This is looking a little cluttered.
TLS configuration is experimental.
I'm eventually going to make the manager implement net.Conn. This won't be
exposed in the default application probably though, but rather as a library.
## Stuff that's using it:
Mostly mine, but this is all Free-as-in-Freedom for anyone to use:
@ -132,12 +127,12 @@ Donate
BTC:159M8MEUwhTzE9RXmcZxtigKaEjgfwRbHt
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCAAdFiEEcNIGBzi++AUjrK/311wDs5teFOEFAlwcRIAACgkQ11wDs5te
FOHvmQf/aUCM5KCHoeXX1ZErxCXVaIJRE/s425Ajr4jnn9WKK0YqA47cdKplaUfU
yHWouCJ5pLwQMppysvpFE90bqc3XJG7BLUgZGiBiDk5NIZ+4i1UAk3kqTQTyx2jg
HCQuQlQH2E94Y+MUq9ebhbZ/nA5oXBJuZJYWVywZEzmAVteNvTDfbPVtyAZr0HZM
Q70sHNB76gg0mDI5quoly0Xa/p8jNidx4RSGQvdo3bCOkEKtuWVgHny9baCxXpu/
GjSSlx7NBfnXBVEDkD6lOa0cpLjEzBqLAaDV14kzFZOnTc0roqURNROlTC+SlwLN
/JFkjD+tRWvGK6EiWc9Gt+wjpwVZ5g==
=aPVO
iQEzBAEBCgAdFiEEcNIGBzi++AUjrK/311wDs5teFOEFAlxHleQACgkQ11wDs5te
FOEXEwf9HRs1h27cwE8VqH2iOCXuzED6ShPWY6HX5zc6lWaYwWqoP0254RUKjQa5
8ZcTKs+H/AIxzDrlRj4L9TBlyoG1bQsrTbJ42RIJsY0yj02YQEe0M1cH6zvf5zwr
Pee8HXpZV4hEx7KMd33yQGyvZ35FGNvxGrp6LaUYb/SR/BJ8plB8a4QGqPZEPi60
6Xz3hafunpjo8pi4lpnVOvFxfAjq2n7dmPFfwxPHxEL6q9srwN9XzfpIg9C30diF
ncoqUj81LaDejWSOtJBv99Kxj3PcsS3JSdPMTPkdAy5kaAdauX3wlGI+i1CdKBoV
eVV7h7wRPaPzPkdaBKPJZbQhP3UEqQ==
=pqBI
-----END PGP SIGNATURE-----