Add draft blog post, less checksums
This commit is contained in:
@ -7,7 +7,7 @@ New Release I2P 2.5.0
|
||||
:author: idk
|
||||
:date: 2024-04-08
|
||||
:category: release
|
||||
:excerpt: {% trans %}{% endtrans %}
|
||||
:excerpt: {% trans %}I2P 2.5.0 release{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
This release, I2P 2.5.0, provides more user-facing improvements than the 2.4.0 release, which was focused on implementing the NetDB isolation strategy.
|
||||
|
23
i2p2www/blog/2024/5/6/i2p_2.5.1_released.rst.draft
Normal file
23
i2p2www/blog/2024/5/6/i2p_2.5.1_released.rst.draft
Normal file
@ -0,0 +1,23 @@
|
||||
{% trans -%}
|
||||
=====================
|
||||
New Release I2P 2.5.1
|
||||
=====================
|
||||
{%- endtrans %}
|
||||
.. meta::
|
||||
:author: idk
|
||||
:date: 2024-04-08
|
||||
:category: release
|
||||
:excerpt: {% trans %}I2P 2.5.1 Release{% endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
I2P 2.5.1 is being released to address Denial-of-Service Attacks affecting the I2P network and services.
|
||||
With this release we disable the IP-basedparts of the sybil attack detection tool which were targeted to amplify the effect and duration of the attack.
|
||||
This should help the network return to normal operation.
|
||||
Those of you who have disabled the sybil attack detection tool may safely re-enable it.
|
||||
Adjustments to other subsystems to improve RouterInfo validation and peer-selection have also been made.
|
||||
{%- endtrans %}
|
||||
|
||||
{% trans -%}
|
||||
As usual, we recommend that you update to this release.
|
||||
The best way to maintain security and help the network is to run the latest release.
|
||||
{%- endtrans %}
|
Reference in New Issue
Block a user