diff --git a/www.i2p2/pages/i2cp_spec.html b/www.i2p2/pages/i2cp_spec.html index dc267d47..9541a9a4 100644 --- a/www.i2p2/pages/i2cp_spec.html +++ b/www.i2p2/pages/i2cp_spec.html @@ -789,7 +789,7 @@ As of release 0.7.1. Tell the other party (client or router) that they are under attack, potentially with reference to a particular messageId. If the router is under attack, the client may decide to migrate to another router, and if a client is under attack, the router may rebuild -its routers or shitlist some of the peers that sent it messages delivering the attack. +its routers or banlist some of the peers that sent it messages delivering the attack. Sent either from router to client or from client to router.

Contents

diff --git a/www.i2p2/pages/performance-history.html b/www.i2p2/pages/performance-history.html index a65fe726..458dcef5 100644 --- a/www.i2p2/pages/performance-history.html +++ b/www.i2p2/pages/performance-history.html @@ -54,7 +54,7 @@ going through the full (expensive) Diffie-Hellman handshaking to negotiate a private session key. This means that if someone's clock is really wrong, or their NAT/firewall/etc is improperly configured (or they're just running an incompatible version of the router), they're going to consistently (though not -constantly, thanks to the shitlist) cause a futile expensive cryptographic +constantly, thanks to the banlist) cause a futile expensive cryptographic operation on all the peers they know about. While we will want to keep some verification/validation within the encryption boundary, we'll want to update the protocol to do some of it first, so that we can reject them cleanly diff --git a/www.i2p2/pages/ratestats.html b/www.i2p2/pages/ratestats.html index e51b0c01..44adb58b 100644 --- a/www.i2p2/pages/ratestats.html +++ b/www.i2p2/pages/ratestats.html @@ -135,7 +135,7 @@ netDb.writeOut netDb.writePending netDb.writeTime ntcp.accept -ntcp.attemptShitlistedPeer +ntcp.attemptBanlistedPeer ntcp.attemptUnreachablePeer ntcp.bidRejectedLocalAddress ntcp.bidRejectedNoNTCPAddress @@ -288,7 +288,7 @@ swarm." + getConnectionId() + ".totalReceived transport.bidFailAllTransports transport.bidFailNoTransports transport.bidFailSelf -transport.bidFailShitlisted +transport.bidFailBanlisted transport.expiredOnQueueLifetime transport.getBidsJobTime transport.noBidsYetNotAllUnreachable @@ -304,7 +304,7 @@ transport.sendMessageMedium transport.sendMessageSize transport.sendMessageSmall transport.sendProcessingTime -transport.shitlistOnUnreachable +transport.banlistOnUnreachable tunnel.acceptLoad tunnel.batchCount tunnel.batchDelay