I2P-Netzwerk erneut heftig unter Druck

Das I2P-Netzwerk ist momentan instabil aufgrund von laufenden Denial-of-Service- und Ressourcenerschöpfungsangriffen, das ist kein Zufall!

TARNKAPPE.INFO

@b9AcE

If vpns and tor are as good as gone then what about I2P how would you ban that? There's not as many I2P sites as onion sites but if I make a site at least it will be an I2P site

#PSA #Privacy #Anonymity #Tor #I2P #Censorship

После продолжительной атаки на #I2P, сеть наконец стабилизировалась. Новый релиз понижает восприимчивость к последнему подходу DDoS до неощутимого уровня.

Три года назад была череда занимательных событий в сообществе I2P: главному разработчику официальной Java-версии i2p-роутера угрожали физической расправой и он уронил все свои сервисы и ушел в закат. Сеть жутко колбасило из-за эксплуатации нетривиального бага в протоколе. В атаке подозревали мейнтейнера i2pd под MacOS ("болгарин"), который и угрожал расправой zzz (основной разработчик I2P-java на тот момент). Также обсуждалась однополая связь этих двух (угрожающего и угрожаемого) за несколько лет до событий после какой-то конференции по теме. Тогда же всплыл атипичный сетевой отпечаток, который навел след атаки на разработчика rust-реализации i2p-роутера, который не довел дело до конца, но тоже имел контакты с болгарином... Я тогда хотел написать статью-хронику обо всем, но просто растёкся и не вывез.

В общем, всегда весело.

i2pd 2.59.0 release - Divisions by zero

## [2.59.0] - 2026-02-09 ### Added - Post-quantum NTCP2 crypto(ML-KEM-512, ML-KEM-768, ML-KEM-1024) support if openssl >= 3.5.0 - UDP associate for SOCKS5 proxy - Trusted routers list for first hop per tunnel - “i2p.streaming.maxConnsPerMinute” and “i2p.streaming.maxResends” params - Limited connectivity mode - .b32.i2p addresses for SAM datagrams - Limiting the number of datagrams sent to maintain the consistency of session encryption through UDP tunnels - Desktop app mode for Haiku - Ability to suppress X-I2P- headers for HTTP server tunnel - Multi cloves garlic message for datagrams - Network error and testing metrics for I2PControl - Handle reseed address redirection - Throttle excessive number of tunnel build message from the same peer - Localization to Esperanto, Filipino and Finnish ### Changed - Return base64 of ident instead full address for Datagram3 in SAM - Send ratchet session response for unidirectional traffic for I2CP - Set default number of generated tags to 800 for a datagram destination - Check ML-KEM encaps_key section length before decryption - Create new stream only if bandwidth is available. Close non-responding streams - Use Datagram3 by default in UDP tunnels - Floodfills are not introducers - Disable ipv6 if global ipv6 interface not found - Network congestion detection algorithm in streaming - Reply with relay tag only if accept tunnels - Case-insensitive Content-Length header in I2PControl - Increase PID string length - Don’t communicate with routers of version < 0.9.58 - Webconsole layout improvements - Localization to Hebrew - Reseeds list ### Fixed - Incorrect params length calculation for SAM streams - Unexpected index in SymmetricKeyTagSet - Incorrect preferred crypto type if i2cp.leaseSetEncType is not specified - Decoding %00 in url - Thread-unsafe localtime() - NetDb crash on stop - Peer test result OK in case of another recent peer test - Published port if full-cone NAT - Missing trailing newline in I2PControl JSON response - Language selection in webconsole

@arcanechat

I'm trying to think how I would block simplex and the first thing that came to mind was looking up all known simplex servers and adding them to a block list, can't the exact same thing be done to chatmail servers?

I'm aware tor entry nodes can be added to a block list. I wish more projects would consider I2P, I wish it was more known in general it should fix the issue of blocking entry nodes/servers because everyone is a node, add traffic obfuscation on top of that and it should have been safe from the Iran internet blackout

#PSA #E2EE #Tor #I2P #Iran #InternetBlackout #Censorship #SimpleX #DeltaChat

@b9AcE

Tor and I2P are more robust countermeasures against age verification than VPNs because servers/nodes can be anonymous and anyone with a stable internet connection can run them.

Of course maybe a service would start globally requiring id, then we should defer to privacy focused services that hide their own identity using tor or i2p addresses

#PSA #Privacy #Anonymity #VPN #Tor #I2P #AgeVerification #Censorship

zzz reports another attack on the #i2p network

> Investigating a new or modified attack that started 10 PM UTC last night. Early analysis is that this is a different attack or botnet from four countries, unrelated to the first. We continue to investigate. This may or may not delay the release if new mitigations are necessary.

http://zzz.i2p/topics/3714-network-weather-stormy

@tarnkappeinfo

So, for people concerned with #Java #I2P's memory use there are a few steps they should try.

  • Set -XX:MaxHeapFreeRatio in the wrapper.config as an "additional" argument.
  • Set -XX:MinHeapFreeRatio in the wrapper.config as an "additional" argument.
  • Use a recent JRE, improvements on memory use are being done over the years.

That has brought memory use to a fourth of what it used to be with no other change of settings for me.

And no gratuitous resort to memory-unsafe languages.

Udongein

Ongoing Attack on I2P Network Causing Degraded Performance

https://lemmy.world/post/42751690

Ongoing Attack on I2P Network Causing Degraded Performance - Lemmy.World

The I2P network is currently experiencing an attack by unknown actor(s). Tens of thousands of malicious routers have been introduced to the network that are not actually routing any traffic. This is causing: - Extremely low tunnel build success rates - Overall network congestion - Degraded performance for legitimate users The I2P development team is aware of this situation and actively investigating mitigations. We will post updates to this thread as the situation develops. Thank you for your patience. Update: 2/4/2026 11AM CST - Fixes are being tested now. Update: 2/4/2026 7pm EST - Some changes were implemented in a new build to help combat the issue. Right now I only have the binaries for apple silicon. IRC is semi alive, if you update your IRC config to use irc.echelon.i2p:6667 you should be able to connect. https://files.i2p.net/I2P-2.10.0-5.dmg [https://files.i2p.net/I2P-2.10.0-5.dmg] 2.10.0-5 i2pupdate.zip https://files.i2p.net/i2pupdate-2.10.0-5.zip [https://files.i2p.net/i2pupdate-2.10.0-5.zip]

Enjoying the darkweb tunes.

So, in my wandering through #i2p I accidentally found the solution to a problem: all these darkweb audio streams and no app that accepted a proxy setting, they just used web applets (which is a problem for those of us who refuse js on darkweb) or you had to play some kind of VPN/proxy shell game.

Solution (for Android users, anyway):
#Deutsia radio.
http://deutsia-radio.i2p
or from the source
https://github.com/deutsia/deutsia-radio

Supports clearnet, #tor , i2p or manual proxy.