Custom Query (1833 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (7 - 9 of 1833)

1 2 3 4 5 6 7 8 9 10 11 12 13
Ticket Resolution Summary Owner Reporter
#2622 not a bug CA-validated Cloudflare TLS Certificate is not recognized during reseed process. backup np-tokumei
Description

I am implementing a reseed server with its traffic routed through Cloudflare. Therefore, the TLS certificate being used to encrypt the traffic between the I2P client and Cloudflare is provided by Cloudflare and is certified by CA. Therefore, apart from the reseed certificate that I have to put in ~/.i2p/certificates/reseed, I think I wouldn't need to put the TLS crt from Cloudflare to ~/.i2p/certificates/ssl as it's certified by CA.

Without the TLS crt in $HOME/.i2p/certificates/ssl, I could successfully reseed from my reseed server. However, there was this error message in the log:

9/12/19 11:12:19 PM ERROR [Reseed ] net.i2p.crypto.KeyStoreUtil : Error reading X509 Certificate: /Users/username/Library/Application Support/i2p/certificates/ssl/.DS_Store
     java.security.cert.CertificateException: Could not parse certificate: java.io.IOException: Empty input
     at sun.security.provider.X509Factory.engineGenerateCertificate(X509Factory.java:110)
     at java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:339)
     at net.i2p.crypto.CertUtil.loadCert(CertUtil.java:295)
     at net.i2p.crypto.KeyStoreUtil.addCert(KeyStoreUtil.java:529)
     at net.i2p.crypto.KeyStoreUtil.addCerts(KeyStoreUtil.java:495)
     at net.i2p.util.SSLEepGet.initSSLContext(SSLEepGet.java:390)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:249)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:146)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:136)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.fetchURL(Reseeder.java:1041)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseedSU3OrZip(Reseeder.java:785)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseedSU3(Reseeder.java:747)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseed(Reseeder.java:594)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseed(Reseeder.java:569)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.run2(Reseeder.java:355)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.run(Reseeder.java:326)
     at java.lang.Thread.run(Thread.java:745)
     at net.i2p.util.I2PThread.run(I2PThread.java:103)
     Caused by: java.io.IOException: Empty input
     at sun.security.provider.X509Factory.engineGenerateCertificate(X509Factory.java:106)
     ... 17 more

I then capture the Cloudflare TLS certificate from my traffic with Wireshark, put it in ~/.i2p/certificates/ssl, then the error message gone. Can anyone tell me what's going wrong here? Isn't the Cloudflare crt already certified? Below is the Cloudflate TLS crt. You can download it to your machine and see that it's validated by COMODO CA.

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

#2621 fixed Reseed from URL stops working when upgrading to 0.9.42 backup np-tokumei
Description

I was setting up a reseed server and testing it using the reseed tutorial here (https://geti2p.net/en/get-involved/guides/reseed). Everything was working fine with my previous I2P router console (v0.9.41), especially when I submit the URL in the form of https://<my_reseed_host_name.tld>:8443/i2pseeds.su3 to Reseed from URL. However, after upgrading to 0.9.42, this testing function stop working, and in the log console, there was this error:

9/12/19 10:29:00 PM WARN [Reseed ] uter.networkdb.reseed.Reseeder: EepGet? failed on https://<my_reseed_host_name.tld>:8443/i2pseeds.su3i2pseeds.su3?netid=2 : java.lang.Exception: Attempt failed

At my reseed server side, I saw this log:

"GET /i2pseeds.su3i2pseeds.su3?netid=2 HTTP/1.1" 404 0 "" "Wget/1.11.4"

So, it looks like the URL of the reseed server was appended with i2pseeds.su3?netid=2, which is not neccessary.

#2618 not a bug DifTracker inaccessible lulu69
Description

I use I2PSnark and for several days , DifTracker? is inaccessible . The eepsite "http://tracker2.postman.i2p" works normally . Where is the problem ?

I2P version : 0.9.42.0 Java version : 1.8.0_73 Platform : Windows 7 amd64 6.1

1 2 3 4 5 6 7 8 9 10 11 12 13
Note: See TracQuery for help on using queries.