Custom Query (1841 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (10 - 12 of 1841)

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Ticket Resolution Summary Owner Reporter
#2624 not a bug Warning: apt-key should not be used in scripts zzz anonymous maybe
Description

Updating i2p-keyring resulted in:

The following packages will be upgraded:
  i2p-keyring
1 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.
Need to get 14.5 kB of archives.
After this operation, 1,024 B of additional disk space will be used.
Do you want to continue? [Y/n] y
Get:1 https://deb.i2p2.de buster/main amd64 i2p-keyring all 2019.09.21 [14.5 kB]
Fetched 14.5 kB in 1s (16.8 kB/s)                    
(Reading database ... 38569 files and directories currently installed.)
Preparing to unpack .../i2p-keyring_2019.09.21_all.deb ...
Unpacking i2p-keyring (2019.09.21) over (2018.09.16) ...
Setting up i2p-keyring (2019.09.21) ...
Adding/refreshing keys:
  67ECE5605BCF1346 1381446626  [ expires 1633876597 ]
... Warning: apt-key should not be used in scripts (called from postinst maintainerscript of the package i2p-keyring)
OK
Reading package lists... Done
Building dependency tree       
Reading state information... Done
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded
#2623 fixed I2PSnark: Start with minimum tunnels and then scale according to need zzz Reportage
Description

Currently I2PSnark will start with the configured number of tunnels open, and then after a period of inactivity will reduce the number of tunnels according to usage. This can sometimes result in a delayed build for other service tunnels if a high number of tunnels is configured, and more resource usage than necessary.

Snark should start with the minimum number of tunnels and then scale up according to need, which should result in less resource usage in many cases, and potentially faster build time for other service tunnels at startup in the event Snark tunnels are being built before other tunnels.

#2622 not a bug CA-validated Cloudflare TLS Certificate is not recognized during reseed process. backup np-tokumei
Description

I am implementing a reseed server with its traffic routed through Cloudflare. Therefore, the TLS certificate being used to encrypt the traffic between the I2P client and Cloudflare is provided by Cloudflare and is certified by CA. Therefore, apart from the reseed certificate that I have to put in ~/.i2p/certificates/reseed, I think I wouldn't need to put the TLS crt from Cloudflare to ~/.i2p/certificates/ssl as it's certified by CA.

Without the TLS crt in $HOME/.i2p/certificates/ssl, I could successfully reseed from my reseed server. However, there was this error message in the log:

9/12/19 11:12:19 PM ERROR [Reseed ] net.i2p.crypto.KeyStoreUtil : Error reading X509 Certificate: /Users/username/Library/Application Support/i2p/certificates/ssl/.DS_Store
     java.security.cert.CertificateException: Could not parse certificate: java.io.IOException: Empty input
     at sun.security.provider.X509Factory.engineGenerateCertificate(X509Factory.java:110)
     at java.security.cert.CertificateFactory.generateCertificate(CertificateFactory.java:339)
     at net.i2p.crypto.CertUtil.loadCert(CertUtil.java:295)
     at net.i2p.crypto.KeyStoreUtil.addCert(KeyStoreUtil.java:529)
     at net.i2p.crypto.KeyStoreUtil.addCerts(KeyStoreUtil.java:495)
     at net.i2p.util.SSLEepGet.initSSLContext(SSLEepGet.java:390)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:249)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:146)
     at net.i2p.util.SSLEepGet.<init>(SSLEepGet.java:136)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.fetchURL(Reseeder.java:1041)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseedSU3OrZip(Reseeder.java:785)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseedSU3(Reseeder.java:747)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseed(Reseeder.java:594)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.reseed(Reseeder.java:569)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.run2(Reseeder.java:355)
     at net.i2p.router.networkdb.reseed.Reseeder$ReseedRunner.run(Reseeder.java:326)
     at java.lang.Thread.run(Thread.java:745)
     at net.i2p.util.I2PThread.run(I2PThread.java:103)
     Caused by: java.io.IOException: Empty input
     at sun.security.provider.X509Factory.engineGenerateCertificate(X509Factory.java:106)
     ... 17 more

I then capture the Cloudflare TLS certificate from my traffic with Wireshark, put it in ~/.i2p/certificates/ssl, then the error message gone. Can anyone tell me what's going wrong here? Isn't the Cloudflare crt already certified? Below is the Cloudflate TLS crt. You can download it to your machine and see that it's validated by COMODO CA.

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Note: See TracQuery for help on using queries.