forked from I2P_Developers/i2p.www
Add license-agreements.html, other minor changes
This commit is contained in:
@@ -22,10 +22,10 @@ testing before setting the default requirement for building jbigi.jar.</p>
|
||||
|
||||
<h2>Step-by-step instructions</h2>
|
||||
<ol>
|
||||
<li>Look on <a href="http://localhost:7655/routerStats.html">http://localhost:7655/routerStats.html</a>
|
||||
<li>Look on <a href="http://localhost:7657/oldstats.jsp">http://localhost:7657/oldstats.jsp</a>
|
||||
to see what the values for <code>crypto.elGamal.decrypt</code> and
|
||||
<code>crypto.elGamal.encrypt</code> are. Copy this somewhere so you can compare
|
||||
it later on.</li>
|
||||
<code>crypto.elGamal.encrypt</code> are. The numbers are times in milliseconds. Copy these somewhere so you can compare
|
||||
them later on.</li>
|
||||
<li>Get the latest sourcecode of I2P out of the monotone database mtn.i2p2.de</li>
|
||||
<li>Inside the source tree change directory to: <code>core/c</code></li>
|
||||
<li>Take a look at <code>build.sh</code>, if your <code>JAVA_HOME</code>
|
||||
|
57
www.i2p2/pages/license-agreements.html
Normal file
57
www.i2p2/pages/license-agreements.html
Normal file
@@ -0,0 +1,57 @@
|
||||
{% extends "_layout.html" %}
|
||||
{% block title %}License Agreements{% endblock %}
|
||||
{% block content %}
|
||||
|
||||
<p>For more information see <a href="licenses.html">licenses.html</a>.
|
||||
<pre>
|
||||
|
||||
Complication:
|
||||
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA1
|
||||
|
||||
Applicable to the code I contribute to the I2P project,
|
||||
I hereby state that:
|
||||
|
||||
* Unless marked otherwise, all code I commit
|
||||
is implicitly licensed under the component's primary license
|
||||
|
||||
* If specified in the source, the code may be explicitly licensed
|
||||
under one of the component's alternate licenses
|
||||
|
||||
* I have the right to release the code I commit
|
||||
under the terms I am committing it
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1.4.6 (GNU/Linux)
|
||||
|
||||
iD8DBQFHyXwu+h38a3n8zjMRAjeSAJ9MFx/ENbUu8+3/U7KTj+FGL/NkHQCdE38G
|
||||
IWV1Gaqcis9sFEW7Nh0hY+c=
|
||||
=WPeP
|
||||
-----END PGP SIGNATURE-----
|
||||
|
||||
|
||||
zzz:
|
||||
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA1
|
||||
|
||||
I affirm that:
|
||||
|
||||
* Unless marked otherwise, all code I commit is implicitly licensed under the component's primary license
|
||||
* If specified in the source, the code may be explicitly licensed under one of the component's alternate licenses
|
||||
* I have the right to release the code I commit under the terms I am committing it
|
||||
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
Version: GnuPG v1.4.6 (GNU/Linux)
|
||||
|
||||
iD8DBQFHyaYXQVV2uqduC+0RAhn4AJ40JO/ep1JhmghjPU/IeISIa2fY8ACgiuV0
|
||||
vOCHNLZ8kiXKc8cTzYHGnU0=
|
||||
=ZzDd
|
||||
-----END PGP SIGNATURE-----
|
||||
|
||||
welterde:
|
||||
Received by zzz 2008-02-16, need to put clearsigned version here.
|
||||
|
||||
|
||||
</pre>
|
||||
{% endblock %}
|
@@ -262,5 +262,7 @@ That means that they must send one of the release managers a signed message affi
|
||||
|
||||
<p>If anyone is aware of any instances where the above conditions are not met,
|
||||
please contact the component lead and/or an I2P release manager with further
|
||||
information.</p>
|
||||
information.
|
||||
<a href="license-agreements.html">See developers' license agreements</a>.
|
||||
</p>
|
||||
{% endblock %}
|
||||
|
@@ -647,7 +647,8 @@ Priority sending for SSU was implemented by zzz but was never checked in
|
||||
The advanced transport bid control
|
||||
i2np.udp.preferred was implemented in 0.6.1.29.
|
||||
<li>
|
||||
Pushback for NTCP was implemented in 0.6.1.30
|
||||
Pushback for NTCP was implemented in 0.6.1.30, disabled in 0.6.1.31 due to anonymity concerns,
|
||||
and reenabled with improvements to address those concerns in 0.6.1.32.
|
||||
<li>
|
||||
None of zzz's proposals 1-5 have been implemented.
|
||||
</ul>
|
||||
|
@@ -217,7 +217,8 @@ samples when dealing with longer tunnels.</p>
|
||||
<li><h3 id="ordering">Strict ordering of participants within tunnels</h3>
|
||||
|
||||
<p>As Connelly <a href="http://dev.i2p/pipermail/i2p/2004-July/000335.html">proposed</a>
|
||||
to deal with the <a href="http://prisms.cs.umass.edu/pubs/wright-tissec.pdf">predecessor attack</a>,
|
||||
to deal with the <a href="http://prisms.cs.umass.edu/brian/pubs/wright-tissec.pdf">predecessor attack</a>
|
||||
<a href="http://prisms.cs.umass.edu/brian/pubs/wright.tissec.2008.pdf">(2008 update)</a>,
|
||||
keeping the order of peers within our tunnels consistent (aka whenever Alice creates
|
||||
a tunnel with both Bob and Charlie in it, Bob's next hop is always Charlie), we address
|
||||
the issue as Bob doesn't get to substantially sample Alice's peer selection group. We may even want
|
||||
|
Reference in New Issue
Block a user