Re: NEW: net/i2p
On Sat, October 31, 2020 10:49, Rafael Sadowski wrote: > On Fri Oct 30, 2020 at 07:11:26PM +0100, Solene Rapenne wrote: > >> On Sat, 24 Oct 2020 17:06:41 - >> "Dimitri Karamazov" : >> >> >>> Ping >>> >> >> Both ports looks fine to me. >> >> >> Now someone else need to review the ports and give their OK so we >> can import the ports into the tree. >> > > OK rsadowski@ > > I don't have any CVS access, Can you please import. regards, Dimitri
Re: NEW: net/i2p
On Fri Oct 30, 2020 at 07:11:26PM +0100, Solene Rapenne wrote: > On Sat, 24 Oct 2020 17:06:41 - > "Dimitri Karamazov" : > > > Ping > > Both ports looks fine to me. > > Now someone else need to review the ports and give their OK so we > can import the ports into the tree. > OK rsadowski@
Re: NEW: net/i2p
On Sat, 24 Oct 2020 17:06:41 - "Dimitri Karamazov" : > Ping Both ports looks fine to me. Now someone else need to review the ports and give their OK so we can import the ports into the tree.
Re: NEW: net/i2p
Ping Index: infrastructure/db/user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.376 diff -u -p -r1.376 user.list --- infrastructure/db/user.list 22 Oct 2020 13:52:57 - 1.376 +++ infrastructure/db/user.list 24 Oct 2020 17:03:08 - @@ -369,3 +369,4 @@ id usergroup port 858 _purritobin_purritobin www/purritobin 859 _miniflux _miniflux net/miniflux 860 _dendrite _dendrite net/dendrite +861 _i2p _i2pnet/i2p On Sun, October 4, 2020 03:35, Dimitri Karamazov wrote: > On Sat, October 3, 2020 13:00, Solene Rapenne wrote: > >> On Tue, 15 Sep 2020 13:16:37 - >> "Dimitri Karamazov" : >> >> >> >>> Can't seem to get any response on this, is there nobody that has >>> time to verify this? >> >> Hello, >> >> >> >> the ports looks fine and work on amd64. >> >> Although, at the end of the build process there is this message, >> could you look at the build script to disable this check producing the >> following error? > > Made changes with some input from sthen@ and solene@ > *modified existing patch to disable the test > *changed pkgname to java-tanukiwrapper > *set MODJAVA_VER to 1.8 for both ports > > > Any comments/OK's? i2p.tar.gz Description: application/gzip tanukiwrapper.tar.gz Description: application/gzip diff Description: Binary data
Re: NEW: net/i2p
Ping On Sun, October 4, 2020 03:35, Dimitri Karamazov wrote: > On Sat, October 3, 2020 13:00, Solene Rapenne wrote: > >> On Tue, 15 Sep 2020 13:16:37 - >> "Dimitri Karamazov" : >> >> >> >>> Can't seem to get any response on this, is there nobody that has >>> time to verify this? >> >> Hello, >> >> >> >> the ports looks fine and work on amd64. >> >> Although, at the end of the build process there is this message, >> could you look at the build script to disable this check producing the >> following error? > > Made changes with some input from sthen@ and solene@ > *modified existing patch to disable the test > *changed pkgname to java-tanukiwrapper > *set MODJAVA_VER to 1.8 for both ports > > > Any comments/OK's? i2p.tar.gz Description: application/gzip tanukiwrapper.tar.gz Description: application/gzip diff Description: Binary data
Re: NEW: net/i2p
On Sat, October 3, 2020 13:00, Solene Rapenne wrote: > On Tue, 15 Sep 2020 13:16:37 - > "Dimitri Karamazov" : > > >> Can't seem to get any response on this, is there nobody that has >> time to verify this? > > Hello, > > > the ports looks fine and work on amd64. > > Although, at the end of the build process there is this message, > could you look at the build script to disable this check producing the > following error? Made changes with some input from sthen@ and solene@ *modified existing patch to disable the test *changed pkgname to java-tanukiwrapper *set MODJAVA_VER to 1.8 for both ports Any comments/OK's? i2p.tar.gz Description: application/gzip diff Description: Binary data tanukiwrapper.tar.gz Description: application/gzip
Re: NEW: net/i2p
On Tue, 15 Sep 2020 13:16:37 - "Dimitri Karamazov" : > Can't seem to get any response on this, is there nobody that has > time to verify this? Hello, the ports looks fine and work on amd64. Although, at the end of the build process there is this message, could you look at the build script to disable this check producing the following error? Please set the environment variable $I2P to run tests. I2P installation not found We looked in Not running tests against I2P installation without knowing where it is. Please set the environment variable I2P to the location of your I2P installation (so that $I2P/lib/i2p.jar works). If you do so, this script will run two tests to compare your installed jbigi with the one here you just compiled to see if there is a marked improvement. /home/build/usr/ports/pobj/i2p-0.9.47/i2p-0.9.47/core/c/build.sh[12]: jar: not found
Re: NEW: net/i2p
I2P software bundle, includes the standard I2P implementation. https://geti2p.net/ Updated to 0.9.47 *Enables our new end-to-end encryption protocol by default for some services. The Sybil analysis and blocking tool is now enabled by default. About: *I2P is an anonymous overlay network - a network within a network. *It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. *Is decentralised completely unlike tor. Each client routes anonymous and encrypted traffic from other clients by default. No central directory for routing. *I2P incorporates applications in the form of webapps. *Webapps plugins (*.su3) can be loaded easily through the console. *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and Jetty (webserver). Or host with your own webserver. *Allows anonymous chats through IRC tunnel service. *Plugins for blogging, chatting, file sharing have already been written. *Every service(plugin) works within the i2p network itself(Except mail). *Not supposed to be used as an outproxy, still an outproxy is included. *I2P source code includes a java-service-wrapper compiled for specific targets but is not compatible with OpenBSD. So I've included a new port tanukiwrapper, and configured I2P to use it. *Very exhaustive(functionality) but easy to use router console. Testing: *Run the rc service, browser based console at localhost:7657. *Set HTTP proxy to localhost: to view eepsites. https://geti2p.net/en/about/browser-config *Been running the router for months now, with no problems. *Personally tested the default and external plugins(e.g muwire). *Test dependencies not present in ports, will add to it. *Mount separate partition for /var/i2p if you do heavy transfers. Index: infrastructure/db/user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.374 diff -u -p -r1.374 user.list --- infrastructure/db/user.list 8 Sep 2020 22:35:04 - 1.374 +++ infrastructure/db/user.list 15 Sep 2020 12:14:17 - @@ -368,3 +368,4 @@ id usergroup port 857 _web2ldap _web2ldap sysutils/web2ldap 858 _purritobin_purritobin www/purritobin 859 _miniflux _miniflux net/miniflux +860 _i2p _i2pnet/i2p Any comments/OK's? tanukiwrapper.tar.gz Description: application/gzip i2p.tar.gz Description: application/gzip diff Description: Binary data
Re: NEW: net/i2p
On 2020/10/03 15:00, Solene Rapenne wrote: > On Tue, 15 Sep 2020 13:16:37 - > "Dimitri Karamazov" : > > > Can't seem to get any response on this, is there nobody that has > > time to verify this? > > Hello, > > the ports looks fine and work on amd64. No interest in the port itself, I'm not going to do runtime tests, but from reading: - The ports are using JAVA_HOME directly in installed files (rather than doing a runtime lookup using javaPathHelper) - this can't work correctly with MODJAVA_VER set to 1.8+, it must be set to an exact version - Might as well retain the old java-tanukiwrapper name for the java/tanukiwrapper package rather than patching. (And remove the entry from quirks). > Although, at the end of the build process there is this message, > could you look at the build script to disable this check producing > the following error? > > Please set the environment variable $I2P to run tests. > I2P installation not found > We looked in > Not running tests against I2P installation without knowing where it is. > > Please set the environment variable I2P to the location of your > I2P installation (so that $I2P/lib/i2p.jar works). > If you do so, this script will run two tests to compare your > installed jbigi with the one here you just compiled to see if > there is a marked improvement. > /home/build/usr/ports/pobj/i2p-0.9.47/i2p-0.9.47/core/c/build.sh[12]: jar: > not found that sounds like it wants JAVAHOME/bin adding to path
Re: NEW: net/i2p
Hi Dimitri, I tested it briefly (just for a few hours) and seems to be working fine on amd64. OK ricardo Take care. Ricardo On 9/15/20 2:16 PM, Dimitri Karamazov wrote: Can't seem to get any response on this, is there nobody that has time to verify this? I2P software bundle, includes the standard I2P implementation. https://geti2p.net/ Updated to 0.9.47 *Enables our new end-to-end encryption protocol by default for some services. The Sybil analysis and blocking tool is now enabled by default. About: *I2P is an anonymous overlay network - a network within a network. *It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. *Is decentralised completely unlike tor. Each client routes anonymous and encrypted traffic from other clients by default. No central directory for routing. *I2P incorporates applications in the form of webapps. *Webapps plugins (*.su3) can be loaded easily through the console. *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and Jetty (webserver). Or host with your own webserver. *Allows anonymous chats through IRC tunnel service. *Plugins for blogging, chatting, file sharing have already been written. *Every service(plugin) works within the i2p network itself(Except mail). *Not supposed to be used as an outproxy, still an outproxy is included. *I2P source code includes a java-service-wrapper compiled for specific targets but is not compatible with OpenBSD. So I've included a new port tanukiwrapper, and configured I2P to use it. *Very exhaustive(functionality) but easy to use router console. Testing: *Run the rc service, browser based console at localhost:7657. *Set HTTP proxy to localhost: to view eepsites. https://geti2p.net/en/about/browser-config *Been running the router for months now, with no problems. *Personally tested the default and external plugins(e.g muwire). *Test dependencies not present in ports, will add to it. *Mount separate partition for /var/i2p if you do heavy transfers. Index: infrastructure/db/user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.374 diff -u -p -r1.374 user.list --- infrastructure/db/user.list 8 Sep 2020 22:35:04 - 1.374 +++ infrastructure/db/user.list 15 Sep 2020 12:14:17 - @@ -368,3 +368,4 @@ id usergroup port 857 _web2ldap _web2ldap sysutils/web2ldap 858 _purritobin _purritobin www/purritobin 859 _miniflux _miniflux net/miniflux +860 _i2p _i2pnet/i2p Any comments/OK's?
Re: NEW: net/i2p
Can't seem to get any response on this, is there nobody that has time to verify this? I2P software bundle, includes the standard I2P implementation. https://geti2p.net/ Updated to 0.9.47 *Enables our new end-to-end encryption protocol by default for some services. The Sybil analysis and blocking tool is now enabled by default. About: *I2P is an anonymous overlay network - a network within a network. *It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. *Is decentralised completely unlike tor. Each client routes anonymous and encrypted traffic from other clients by default. No central directory for routing. *I2P incorporates applications in the form of webapps. *Webapps plugins (*.su3) can be loaded easily through the console. *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and Jetty (webserver). Or host with your own webserver. *Allows anonymous chats through IRC tunnel service. *Plugins for blogging, chatting, file sharing have already been written. *Every service(plugin) works within the i2p network itself(Except mail). *Not supposed to be used as an outproxy, still an outproxy is included. *I2P source code includes a java-service-wrapper compiled for specific targets but is not compatible with OpenBSD. So I've included a new port tanukiwrapper, and configured I2P to use it. *Very exhaustive(functionality) but easy to use router console. Testing: *Run the rc service, browser based console at localhost:7657. *Set HTTP proxy to localhost: to view eepsites. https://geti2p.net/en/about/browser-config *Been running the router for months now, with no problems. *Personally tested the default and external plugins(e.g muwire). *Test dependencies not present in ports, will add to it. *Mount separate partition for /var/i2p if you do heavy transfers. Index: infrastructure/db/user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.374 diff -u -p -r1.374 user.list --- infrastructure/db/user.list 8 Sep 2020 22:35:04 - 1.374 +++ infrastructure/db/user.list 15 Sep 2020 12:14:17 - @@ -368,3 +368,4 @@ id usergroup port 857 _web2ldap _web2ldap sysutils/web2ldap 858 _purritobin_purritobin www/purritobin 859 _miniflux _miniflux net/miniflux +860 _i2p _i2pnet/i2p Any comments/OK's? tanukiwrapper.tar.gz Description: application/gzip i2p.tar.gz Description: application/gzip diff Description: Binary data
Re: NEW: net/i2p
Ping On Wed, September 2, 2020 14:12, Dimitri Karamazov wrote: > Ping > > > On Thu, August 27, 2020 18:27, Dimitri Karamazov wrote: > >> I2P software bundle, includes the standard I2P implementation. >> https://geti2p.net/ >> >> >> >> Updated to 0.9.47 >> *Enables our new end-to-end encryption protocol by default for some services. >> The Sybil analysis and blocking tool is now enabled by default. >> >> >> >> About: >> *I2P is an anonymous overlay network - a network within a network. >> *It is intended to protect communication from dragnet surveillance >> and monitoring by third parties such as ISPs. *Is decentralised completely >> unlike tor. Each client routes anonymous >> and encrypted traffic from other clients by default. No central directory >> for routing. *I2P incorporates >> applications in the form of webapps. *Webapps plugins (*.su3) can be loaded >> easily through the console. >> *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, >> and Jetty (webserver). Or host with your own webserver. *Allows anonymous >> chats through IRC tunnel service. *Plugins >> for blogging, chatting, file sharing have already been written. *Every >> service(plugin) works within the i2p network >> itself(Except mail). *Not supposed to be used as an outproxy, still an >> outproxy is included. >> *I2P source code includes a java-service-wrapper compiled for specific >> targets but is not compatible with OpenBSD. So I've included a new port >> tanukiwrapper, and configured I2P to use it. >> *Very exhaustive(functionality) but easy to use router console. >> >> >> >> Testing: >> *Run the rc service, point browser to localhost:7657. >> *Set HTTP proxy to localhost: to view eepsites. >> https://geti2p.net/en/about/browser-config >> *Been running the router for a week now, with no problems. >> *Personally tested the default and external plugins(e.g muwire). >> *Test dependencies not present in ports, will add to it. >> *Mount separate partition for /var/i2p if you do heavy transfers. >> >> >> >> Index: infrastructure/db/user.list >> === >> RCS file: /cvs/ports/infrastructure/db/user.list,v >> retrieving revision 1.372 diff -u -p -r1.372 user.list --- >> infrastructure/db/user.list 13 Aug 2020 14:02:18 - >> 1.372 >> +++ infrastructure/db/user.list 27 Aug 2020 18:02:01 - >> @@ -367,3 +367,4 @@ id user group port >> 856 _return _return telephony/resiprocate >> 857 _web2ldap_web2ldap sysutils/web2ldap >> 858 _purritobin _purritobin www/purritobin >> +859 _i2p_i2pnet/i2p >> >> >> >> Any comments? >> > >
Re: NEW: net/i2p
Ping On Thu, August 27, 2020 18:27, Dimitri Karamazov wrote: > I2P software bundle, includes the standard I2P implementation. > https://geti2p.net/ > > > Updated to 0.9.47 > *Enables our new end-to-end encryption protocol by default for some services. > The Sybil analysis and blocking tool is now enabled by default. > > > About: > *I2P is an anonymous overlay network - a network within a network. > *It is intended to protect communication from dragnet surveillance > and monitoring by third parties such as ISPs. *Is decentralised completely > unlike tor. Each client routes > anonymous and encrypted traffic from other clients by default. No central > directory for routing. > *I2P incorporates applications in the form of webapps. > *Webapps plugins (*.su3) can be loaded easily through the console. > *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, > and Jetty (webserver). Or host with your own webserver. *Allows anonymous > chats through IRC tunnel service. > *Plugins for blogging, chatting, file sharing have already been written. > *Every service(plugin) works within the i2p network itself(Except mail). > *Not supposed to be used as an outproxy, still an outproxy is included. > *I2P source code includes a java-service-wrapper compiled for specific > targets but is not compatible with OpenBSD. So I've included a new port > tanukiwrapper, and configured I2P to use it. > *Very exhaustive(functionality) but easy to use router console. > > > Testing: > *Run the rc service, point browser to localhost:7657. > *Set HTTP proxy to localhost: to view eepsites. > https://geti2p.net/en/about/browser-config > *Been running the router for a week now, with no problems. > *Personally tested the default and external plugins(e.g muwire). > *Test dependencies not present in ports, will add to it. > *Mount separate partition for /var/i2p if you do heavy transfers. > > > Index: infrastructure/db/user.list > === > RCS file: /cvs/ports/infrastructure/db/user.list,v > retrieving revision 1.372 diff -u -p -r1.372 user.list --- > infrastructure/db/user.list13 Aug 2020 14:02:18 - 1.372 > +++ infrastructure/db/user.list 27 Aug 2020 18:02:01 - > @@ -367,3 +367,4 @@ id user group port > 856 _return _return telephony/resiprocate > 857 _web2ldap _web2ldap sysutils/web2ldap > 858 _purritobin _purritobin www/purritobin > +859 _i2p _i2pnet/i2p > > > Any comments?
Re: NEW: net/i2p
I2P software bundle, includes the standard I2P implementation. https://geti2p.net/ Updated to 0.9.47 *Enables our new end-to-end encryption protocol by default for some services. The Sybil analysis and blocking tool is now enabled by default. About: *I2P is an anonymous overlay network - a network within a network. *It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. *Is decentralised completely unlike tor. Each client routes anonymous and encrypted traffic from other clients by default. No central directory for routing. *I2P incorporates applications in the form of webapps. *Webapps plugins (*.su3) can be loaded easily through the console. *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and Jetty (webserver). Or host with your own webserver. *Allows anonymous chats through IRC tunnel service. *Plugins for blogging, chatting, file sharing have already been written. *Every service(plugin) works within the i2p network itself(Except mail). *Not supposed to be used as an outproxy, still an outproxy is included. *I2P source code includes a java-service-wrapper compiled for specific targets but is not compatible with OpenBSD. So I've included a new port tanukiwrapper, and configured I2P to use it. *Very exhaustive(functionality) but easy to use router console. Testing: *Run the rc service, point browser to localhost:7657. *Set HTTP proxy to localhost: to view eepsites. https://geti2p.net/en/about/browser-config *Been running the router for a week now, with no problems. *Personally tested the default and external plugins(e.g muwire). *Test dependencies not present in ports, will add to it. *Mount separate partition for /var/i2p if you do heavy transfers. Index: infrastructure/db/user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.372 diff -u -p -r1.372 user.list --- infrastructure/db/user.list 13 Aug 2020 14:02:18 - 1.372 +++ infrastructure/db/user.list 27 Aug 2020 18:02:01 - @@ -367,3 +367,4 @@ id usergroup port 856 _return_return telephony/resiprocate 857 _web2ldap _web2ldap sysutils/web2ldap 858 _purritobin_purritobin www/purritobin +859 _i2p _i2pnet/i2p Any comments? i2p.tar.gz Description: application/gzip tanukiwrapper.tar.gz Description: application/gzip diff Description: Binary data
Re: NEW: net/i2p
On Sat, August 22, 2020 15:57, Solene Rapenne wrote: > On Sat, 22 Aug 2020 14:59:11 - > "Dimitri Karamazov" : > > >> Ping, is there nobody with time to review this? >> >> >> On Sun, August 16, 2020 09:57, Dimitri Karamazov wrote: >> >>> Ping >>> >>> >>> >>> On Sun, August 09, 2020 09:55, Dimitri Karamazov wrote: >>> >>> Ping On Sun, August 2, 2020 18:44, Dimitri Karamazov wrote: > I2P software bundle, includes the standard I2P implementation. > https://geti2p.net/ > > > > > > About: > *I2P is an anonymous overlay network - a network within a network. > *It is intended to protect communication from dragnet surveillance > and monitoring by third parties such as ISPs. *Is decentralised > completely unlike tor. Each client routes > anonymous and encrypted traffic from other clients by default. No central > directory for routing. > *I2P incorporates applications in the form of webapps. > *Webapps plugins (*.su3) can be loaded easily through the console. > *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, > and Jetty (webserver). > Or host with your own webserver. > *Allows anonymous chats through IRC tunnel service. > *Plugins for blogging, chatting, file sharing have already been written. > *Every service(plugin) works within the i2p network itself(Except mail). > *Not supposed to be used as an outproxy, still an outproxy is included. > *I2P source code includes a java-service-wrapper compiled for specific > targets > but is not compatible with OpenBSD. So I've included a new port > tanukiwrapper, and configured I2P to use it. > *Very exhaustive(functionality) but easy to use router console. > > > > > > Testing: > *Run the rc service, point browser to localhost:7657. > *Set HTTP proxy to localhost: to view eepsites. > https://geti2p.net/en/about/browser-config > *Been running the router for a week now, with no problems. > *Personally tested the default and external plugins(e.g muwire). > *Test dependencies not present in ports, will add to it. > *Mount separate partition for /var/i2p if you do heavy transfers. > > > > > > Index: user.list > === > RCS file: /cvs/ports/infrastructure/db/user.list,v > retrieving revision 1.371 diff -u -p -r1.371 user.list --- user.list > 12 Jun 2020 11:27:08 - 1.371 +++ > user.list 2 Aug 2020 18:16:51 - @@ -366,3 +366,4 @@ id user > group port > 855 _repro_repro telephony/resiprocate > 856 _return _return telephony/resiprocate > 857 _web2ldap _web2ldap sysutils/web2ldap > +858 _i2p _i2pnet/i2p > > > > > > Any comments? > > > >>> >>> >> >> > > Hi, I plan to review it but I currently have no time. > > There will be a new release on 24th August according to upstream discussion. I'll post again.
Re: NEW: net/i2p
Ping, is there nobody with time to review this? On Sun, August 16, 2020 09:57, Dimitri Karamazov wrote: > Ping > > > On Sun, August 09, 2020 09:55, Dimitri Karamazov wrote: > >> Ping >> >> >> >> On Sun, August 2, 2020 18:44, Dimitri Karamazov wrote: >> >> >>> I2P software bundle, includes the standard I2P implementation. >>> https://geti2p.net/ >>> >>> >>> >>> >>> About: >>> *I2P is an anonymous overlay network - a network within a network. >>> *It is intended to protect communication from dragnet surveillance >>> and monitoring by third parties such as ISPs. >>> *Is decentralised completely unlike tor. Each client routes >>> anonymous and encrypted traffic from other clients by default. >>> No central directory for routing. >>> *I2P incorporates applications in the form of webapps. >>> *Webapps plugins (*.su3) can be loaded easily through the console. >>> *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and >>> Jetty (webserver). >>> Or host with your own webserver. >>> *Allows anonymous chats through IRC tunnel service. >>> *Plugins for blogging, chatting, file sharing have already been written. >>> *Every service(plugin) works within the i2p network itself(Except mail). >>> *Not supposed to be used as an outproxy, still an outproxy is included. >>> *I2P source code includes a java-service-wrapper compiled for specific >>> targets >>> but is not compatible with OpenBSD. So I've included a new port >>> tanukiwrapper, and configured I2P >>> to use it. >>> *Very exhaustive(functionality) but easy to use router console. >>> >>> >>> >>> >>> Testing: >>> *Run the rc service, point browser to localhost:7657. >>> *Set HTTP proxy to localhost: to view eepsites. >>> https://geti2p.net/en/about/browser-config >>> *Been running the router for a week now, with no problems. >>> *Personally tested the default and external plugins(e.g muwire). >>> *Test dependencies not present in ports, will add to it. >>> *Mount separate partition for /var/i2p if you do heavy transfers. >>> >>> >>> >>> >>> Index: user.list >>> === >>> RCS file: /cvs/ports/infrastructure/db/user.list,v >>> retrieving revision 1.371 diff -u -p -r1.371 user.list --- user.list >>> 12 Jun 2020 11:27:08 - 1.371 +++ >>> user.list 2 Aug 2020 18:16:51 - >>> @@ -366,3 +366,4 @@ id usergroup port >>> 855 _repro _repro telephony/resiprocate >>> 856 _return _return telephony/resiprocate >>> 857 _web2ldap _web2ldap sysutils/web2ldap >>> +858 _i2p _i2pnet/i2p >>> >>> >>> >>> >>> Any comments? >>> >>> >> > >
Re: NEW: net/i2p
Ping On Sun, August 09, 2020 09:55, Dimitri Karamazov wrote: > Ping > > > On Sun, August 2, 2020 18:44, Dimitri Karamazov wrote: > >> I2P software bundle, includes the standard I2P implementation. >> https://geti2p.net/ >> >> >> >> About: >> *I2P is an anonymous overlay network - a network within a network. >> *It is intended to protect communication from dragnet surveillance >> and monitoring by third parties such as ISPs. *Is decentralised completely >> unlike tor. Each client routes anonymous >> and encrypted traffic from other clients by default. No central directory >> for routing. *I2P incorporates >> applications in the form of webapps. *Webapps plugins (*.su3) can be loaded >> easily through the console. >> *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, >> and Jetty (webserver). Or host with your own webserver. *Allows anonymous >> chats through IRC tunnel service. *Plugins >> for blogging, chatting, file sharing have already been written. *Every >> service(plugin) works within the i2p network >> itself(Except mail). *Not supposed to be used as an outproxy, still an >> outproxy is included. >> *I2P source code includes a java-service-wrapper compiled for specific >> targets but is not compatible with OpenBSD. So I've included a new port >> tanukiwrapper, and configured I2P to use it. >> *Very exhaustive(functionality) but easy to use router console. >> >> >> >> Testing: >> *Run the rc service, point browser to localhost:7657. >> *Set HTTP proxy to localhost: to view eepsites. >> https://geti2p.net/en/about/browser-config >> *Been running the router for a week now, with no problems. >> *Personally tested the default and external plugins(e.g muwire). >> *Test dependencies not present in ports, will add to it. >> *Mount separate partition for /var/i2p if you do heavy transfers. >> >> >> >> Index: user.list >> === >> RCS file: /cvs/ports/infrastructure/db/user.list,v >> retrieving revision 1.371 diff -u -p -r1.371 user.list --- user.list 12 Jun >> 2020 11:27:08 - 1.371 +++ user.list 2 >> Aug 2020 18:16:51 - >> @@ -366,3 +366,4 @@ id user group port >> 855 _repro _repro telephony/resiprocate >> 856 _return _return telephony/resiprocate >> 857 _web2ldap_web2ldap sysutils/web2ldap >> +858 _i2p_i2pnet/i2p >> >> >> >> Any comments? >> >
Re: NEW: net/i2p
Ping On Sun, August 2, 2020 18:44, Dimitri Karamazov wrote: > I2P software bundle, includes the standard I2P implementation. > https://geti2p.net/ > > > About: > *I2P is an anonymous overlay network - a network within a network. > *It is intended to protect communication from dragnet surveillance > and monitoring by third parties such as ISPs. *Is decentralised completely > unlike tor. Each client routes > anonymous and encrypted traffic from other clients by default. No central > directory for routing. > *I2P incorporates applications in the form of webapps. > *Webapps plugins (*.su3) can be loaded easily through the console. > *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, > and Jetty (webserver). Or host with your own webserver. *Allows anonymous > chats through IRC tunnel service. > *Plugins for blogging, chatting, file sharing have already been written. > *Every service(plugin) works within the i2p network itself(Except mail). > *Not supposed to be used as an outproxy, still an outproxy is included. > *I2P source code includes a java-service-wrapper compiled for specific > targets but is not compatible with OpenBSD. So I've included a new port > tanukiwrapper, and configured I2P to use it. > *Very exhaustive(functionality) but easy to use router console. > > > Testing: > *Run the rc service, point browser to localhost:7657. > *Set HTTP proxy to localhost: to view eepsites. > https://geti2p.net/en/about/browser-config > *Been running the router for a week now, with no problems. > *Personally tested the default and external plugins(e.g muwire). > *Test dependencies not present in ports, will add to it. > *Mount separate partition for /var/i2p if you do heavy transfers. > > > Index: user.list > === > RCS file: /cvs/ports/infrastructure/db/user.list,v > retrieving revision 1.371 diff -u -p -r1.371 user.list --- user.list 12 Jun > 2020 11:27:08 - 1.371 > +++ user.list 2 Aug 2020 18:16:51 - > @@ -366,3 +366,4 @@ id user group port > 855 _repro_repro telephony/resiprocate > 856 _return _return telephony/resiprocate > 857 _web2ldap _web2ldap sysutils/web2ldap > +858 _i2p _i2pnet/i2p > > > Any comments?
NEW: net/i2p
I2P software bundle, includes the standard I2P implementation. https://geti2p.net/ About: *I2P is an anonymous overlay network - a network within a network. *It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. *Is decentralised completely unlike tor. Each client routes anonymous and encrypted traffic from other clients by default. No central directory for routing. *I2P incorporates applications in the form of webapps. *Webapps plugins (*.su3) can be loaded easily through the console. *Includes a ready mail(smtp pop3) client, i2psnark (bittorrent) client, and Jetty (webserver). Or host with your own webserver. *Allows anonymous chats through IRC tunnel service. *Plugins for blogging, chatting, file sharing have already been written. *Every service(plugin) works within the i2p network itself(Except mail). *Not supposed to be used as an outproxy, still an outproxy is included. *I2P source code includes a java-service-wrapper compiled for specific targets but is not compatible with OpenBSD. So I've included a new port tanukiwrapper, and configured I2P to use it. *Very exhaustive(functionality) but easy to use router console. Testing: *Run the rc service, point browser to localhost:7657. *Set HTTP proxy to localhost: to view eepsites. https://geti2p.net/en/about/browser-config *Been running the router for a week now, with no problems. *Personally tested the default and external plugins(e.g muwire). *Test dependencies not present in ports, will add to it. *Mount separate partition for /var/i2p if you do heavy transfers. Index: user.list === RCS file: /cvs/ports/infrastructure/db/user.list,v retrieving revision 1.371 diff -u -p -r1.371 user.list --- user.list 12 Jun 2020 11:27:08 - 1.371 +++ user.list 2 Aug 2020 18:16:51 - @@ -366,3 +366,4 @@ id usergroup port 855 _repro _repro telephony/resiprocate 856 _return_return telephony/resiprocate 857 _web2ldap _web2ldap sysutils/web2ldap +858 _i2p _i2pnet/i2p Any comments? i2p.tar.gz Description: application/gzip tanukiwrapper.tar.gz Description: application/gzip diff Description: Binary data