I2P dev meeting, August 9, 2005

Quick recap

  • Present:

ant, bla, detonate, duck, jrandom, jrandom2p, luckypunk, postman, smeghead,

Tam IRC Günlüğü

13:11 < jrandom2p> 0) hi
13:11 < jrandom2p> 1) 0.6.0.2
13:11 < jrandom2p> 2) roadmap update
13:11 < jrandom2p> 3) ???
13:11 < jrandom2p> 0) hi
13:11  * jrandom2p waves
13:11 <+detonate> hi
13:11 < jrandom2p> weekly status notes up @ http://dev.i2p.net/pipermail/i2p/2005-August/000839.html
13:12 < jrandom2p> ok, jumping in briefly to [1-2] before the freeforall..
13:12 < jrandom2p> 1) 0.6.0.2
13:12 < jrandom2p> its out.  and stuff
13:12 < jrandom2p> anyone have any questions/comments/concerns w/ 0.6.0.2?
13:13 < jrandom2p> if not, moving on to 2) roadmap update
13:13 < jrandom2p> the, er, roadmap has been updated.  and stuff ;)
13:14 < duck> you aussie
13:14 <+bla> jrandom: There still are intermittent problems contacting a destination, even when it's normally up
13:14  * postman can second this
13:14  * detonate can third that
13:14 <+bla> jrandom: E.g., forum.i2p works fine, then after a few minutes it doesn't, and requires a few reloads
13:15  * bla firsted it ;)
13:15 < jrandom2p> hmm, aye, i've heard reports of that.  with 0.6.0.2 as well, right?
13:16 <+postman> indeed sir
13:16 <+bla> Yes, 0.6.0.2
13:16 <+bla> Could be netDb trouble, or poor selection of peers to put in tunnels (or something else)
13:16 < jrandom2p> 'k
13:17 < jrandom2p> the tunnel peer selection has been pretty bad lately, as has netDb store flooding
13:17 < jrandom2p> (see your /oldstats.jsp for tunnel request failure counts)
13:18 <+bla> Now that we use UDP/SSU, peer classification seems to be better than before: a number of peers I _know_ to be fast, usually show up under the "fast" section on the profile pafe
13:19 < jrandom2p> nice
13:19 < jrandom2p> 0.6.0.2 added some tunnel rejection code based on the netDb that it should have been doing before (refusing to join if we can't find the next hop), so the increase in rejections is expected
13:19 <+bla> Though I really should get going at the classification algorithms again... ;)
13:20 < jrandom2p> i've been doing profile/stat analysis, but no solid results yet
13:21 < jrandom> that would be cool bla :)
13:25 < jrandom2p> ok, anything else on 2) roadmpa update?  :)
13:26 < jrandom2p> if not, moving on to 3) ???
13:26 <+detonate> do you think it would be useful to shitlist peers with high failure/duprecv rates compared to the mode?
13:27 < jrandom> hmm, i'm not sure about that - if the failure/dup rates are too high to be useful, we should just transfer slowly and carefully
13:27 < jrandom> as long as messages are getting through, messages are getting through
13:28 < jrandom> there's a reason why we haven't used stats on direct peer communication as part of our profiling - depending upon them would make us vulnerable to some easy and powerful attacks (acting differently to different peers and see who uses you, etc)
13:29 <+detonate> hmm
13:29 <+detonate> ok
13:29 < jrandom> but perhaps we need to drop sessions for peers who are in such congested cons
13:29 <+detonate> good point
13:34 < jrandom> ok, anyone else have something to bring up for 3) ???
13:34 < luckypunk> o,oh, maybe you should wait ti leveryone is back
13:34 < luckypunk> before asking critical questions :P
13:35 < jrandom2p> bah, they've got the mailing list ;)
13:35 < luckypunk> well
13:35 < luckypunk> i guess this is the right place to whine
13:36 < luckypunk> I2P still uses a bit of CPU
13:36 < luckypunk> but not as much as before
13:36 < luckypunk> true, i haven't run it since the 5.0 days
13:36 < luckypunk> but yeah
13:36 < luckypunk> er
13:36 < luckypunk> 0.5.0
13:36 < jrandom2p> cool, which of your boxes works with it?
13:36 < luckypunk> er
13:36 < luckypunk> ffs
13:36 < luckypunk> i haven't used it since 0.6.0.0
13:36 < luckypunk> it works fine with the pentium 2
13:37 < luckypunk> the default nice value mens it tends to crashif i do anything too CPU intensive for too long as I2P gets CPU starved
13:38 <+detonate> hmm, i guess there could be a space in the router console network config to hardwire the introducers, once there are introducers, if the user prefers
13:39 < jrandom2p> are you on 0.6.0.2 now luckypunk?
13:39 <@smeghead> detonate: that's trusted route stuff... later on in the roadmap :)
13:39 < luckypunk> no
13:39 < luckypunk> i haven't run it since 0.6.0.0
13:39 <@smeghead> *restricted route
13:40 < luckypunk> but it's CPU use seemed much less.
13:40 <+detonate> heh, it should be there as soon as there's introducers :)
13:40 < jrandom2p> ah yeah detonate, the introducer selection could certainly be configurable, but it'll probably be a hidden advanced config option ;)
13:41 < jrandom2p> luckypunk: 0.6.0.1 cut out a lot of crypto, and 0.6.0.2 should help further.  give it a try sometime, it may handle it better
13:41 < luckypunk> ok
13:41 <@smeghead> what if an introducer doesn't want you selecting them all the time?
13:41 < luckypunk> i have the feeling I2P would on a dedicated mid range pentium now.
13:41 < jrandom> smeghead: then they say "fuck off, i'm not going to serve as an introducer for you"
13:42 < jrandom> and peers will have multiple introducers, so it'll be balanced
13:42 < jrandom> (and its only 2 packets to wire up a new peer, not all packets communicated)
13:44 <+detonate> if introducers worked differently you could do a majority vote between them to decide which ones are working, but as it stands that doesn't make sense
13:45 < ant> <jme___> q. where can i find a description of this voting system ?
13:45 < jrandom> majority doesnt make any sense
13:45  * jrandom doesnt trust voting any further than i can throw it
13:45 < jrandom> (especially in light of sybil)
13:45 < jrandom> an introducer is working if a new peer can contact you through it
13:47 <+detonate> what's the status of vanguard, that's sort of related
13:47 <+detonate> while smeghead is around
13:51 < jrandom> ok, if there isn't anything else...
13:51  * jrandom winds up 
13:51  * jrandom *baf*s the meeting closed