merge of '384014264cd2376fc07d142dde94d1dc14170f15'
and '5d13fc9ee6f008b5dcb354705ce749b0de8454bc'
This commit is contained in:
@@ -96,8 +96,11 @@ no routers get the plaintext, ever),</strike> garlic encryption (used to verify
|
||||
the recipient), tunnel encryption (all messages passing through a tunnel is encrypted by the tunnel
|
||||
gateway to the tunnel endpoint), and interrouter transport layer encryption (e.g. the TCP transport
|
||||
uses AES256 with ephemeral keys):</p>
|
||||
<p>End-to-end (I2CP) encryption was disabled in I2P release 0.6; end-to-end (garlic) encryption
|
||||
from Alice's router "a" to Bob's router "h" remains. Disregard the "Alice-to-Bob" encryption in the picture below.
|
||||
<p>End-to-end (I2CP) encryption (client application to server application) was disabled in I2P release 0.6;
|
||||
end-to-end (garlic) encryption (I2P client router to I2P server router) from Alice's router "a" to Bob's router "h" remains.
|
||||
Notice the different use of terms! All data from a to h is end-to-end encrypted, but the I2CP connection
|
||||
between the I2P router and the applications is not end-to-end encrypted!
|
||||
A and h are the routers of alice and bob, while alice and bob in following chart are the applications running atop of I2P.</p>
|
||||
|
||||
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
|
||||
|
||||
|
@@ -107,9 +107,12 @@ Station-zu-Station Authentifizierung und <a href="how_elgamalaes">ElGamal / AES+
|
||||
Nachrichten, die durch einen Tunnel gehen, sind vom Tunnel Gateway bis zum Tunnel Endpunkt
|
||||
verschlüsselt) und Zwischen-den-Routern-Transport-Schicht Verschlüsselung (z.B. benutzt der TCP
|
||||
Transport AES256 mit Ephemeral Schlüssel).</p>
|
||||
<p>Ende-zu-Ende (I2CP) Verschlüsselung wurde in der I2P Version 0.6 deaktiviert; Ende-zu-Ende
|
||||
(garlic) Verschlüsselung von Alice Router "a" zu Bobs Router "h" existiert weiterhin.
|
||||
Bitte beachte nicht die "Alice" zu "Bob" Verschlüsselung im folgedem Bild.</p>
|
||||
<p>Ende-zu-Ende (I2CP) Verschlüsselung (von Programm zu Programm) wurde in der I2P Version 0.6 deaktiviert;
|
||||
Ende-zu-Ende (garlic) Verschlüsselung von Alice Router "a" zu Bobs Router "h" existiert weiterhin.
|
||||
Bitte beachte im foglendem Bild den anderen Gebrauch der Wörter! a und h sind die I2P Router mit
|
||||
der Ende-zu-Ende Verschlüsselung von Router zu Router, Alice und Bob hingegen sind die Programme
|
||||
die mittels(unverschlüsseltem) I2CP mit den I2P Routern kommunizieren! Sprich: bis zum I2P Router
|
||||
sind die Daten unverschlüsselt, ab dem I2P Router ist alles Ende-zu-Ende verschlüsselt.</p>
|
||||
|
||||
<p><img src="/_static/images/endToEndEncryption.png" alt="end to end layered encryption" /></p>
|
||||
|
||||
|
Reference in New Issue
Block a user