0v0

joined 2 years ago
[–] [email protected] 2 points 1 year ago (1 children)

Edit i2psnark.upbw.max in i2psnark.config (this can be in a number of locations based on install type and platform - just search for it).

Or you can remove the maxlength and size attributes from the text input, it will save just fine.

[–] [email protected] 2 points 1 year ago

https://linux-tc-notes.sourceforge.net/tc/doc/cls_u32.txt:

The base operation of the u32 filter is actually very simple. It extracts a bit field from a 32 bit word in the packet, and if it is equal to a value supplied by you it has a match. The 32 bit word must lie at a 32 bit boundary.

[–] [email protected] 7 points 1 year ago (1 children)

There is no central naming authority in I2P. All hostnames are local. (Naming and Address Book)

Therefore, if an url doesn't work, it isn't in your local address book.

You can add mappings yourself if you know the destination or b32 address, or make use of subscriptions. In this case, add http://i2p-projekt.i2p/hosts.txt and http://notbob.i2p/hosts.txt to your address book subscriptions, the latter contains the destination for mysu.i2p.

[–] [email protected] 1 points 1 year ago* (last edited 1 year ago)

Yes this is sane and one of the main use cases for encrypted lease sets. Encrypted lease sets make it impossible for unauthorized users to connect to your hidden services.

If you know beforehand that only one client needs to be able to connect, choose "DH" as a security strategy, and share the client's key with the server. This article explains these concepts in detail.

If you don't care about anonymity (given the 0-hop tunnels), you could also stick both hosts on an overlay network like Yggdrasil. This may or may not be more convenient / performant based on the number of services you want to expose.

[–] [email protected] 5 points 2 years ago (3 children)

Redirector allows you to specify a pattern to do that.

[–] [email protected] 37 points 2 years ago (1 children)

Quad9, a Swiss public benefit, not-for-profit foundation. Main address is 9.9.9.9.

[–] [email protected] 4 points 2 years ago

We have those on I2P already, see tracker2.postman.i2p for example.

[–] [email protected] 5 points 2 years ago (1 children)

Was it found near birch? Possibly Leccinum scabrum.

[–] [email protected] 13 points 2 years ago (1 children)

You should not torrent over the tor network, but you can torrent over the I2P network. qBittorrent even has experimental I2P support built in.

[–] [email protected] 3 points 2 years ago (1 children)

Have you tried running tcpdump / wireshark on another device in the network when this happened?

view more: ‹ prev next ›