Source code of www.zrythm.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

262 lines
15 KiB

<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://gnunet.org/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>GNUnet.org</title>
<link>https://gnunet.org</link>
<description>News from GNUnet</description>
<language>en</language>
<atom:link href="https://gnunet.org/rss.xml" rel="self" type="application/rss+xml" />
<item>
<title>GNUnet Hacker Meeting 2018 at La Decentrale</title>
<link>https://gnunet.org/#gnunet-hacker-meeting-2018-2</link>
<description>
&lt;a name=&quot;gnunet-hacker-meeting-2018-2&quot;&gt;&lt;/a&gt;
&lt;h3&gt;Second GNUnet Hacker Meeting 2018 at &lt;a href=&quot;https://decentrale.ch/&quot;&gt;La Décentrale&lt;/a&gt;, Switzerland&lt;/h3&gt;
&lt;p&gt;
The GNUnet hackers met for the second time this year. The primary goal
was to squash bugs to bring out a new release. Aside from this we
worked hard on improving the documentation and to launch this new
website.
&lt;/p&gt;
</description>
<pubDate>Fri, 01 Jun 2018 00:00:00 UT</pubDate>
</item>
<item>
<title>2019-02: Topics for GSoC 2019</title>
<link>https://gnunet.org/#gsoc2019</link>
<description>
&lt;h3&gt;
&lt;a NAME=&quot;gsoc2019&quot;&gt;&lt;/a&gt;2019-02: Topics for GSoC 2019
&lt;/h3&gt;
&lt;h4&gt;Android Port&lt;/h4&gt;
&lt;p&gt;
It is time for GNUnet to run properly on Android. Note that
GNUnet is written in C, and this is not about rewriting
GNUnet in Java, but about getting the C code to run on Android.
&lt;/p&gt;
&lt;p&gt;
Mentor: &lt;a href=&quot;https://www.goebel-consult.de/&quot;&gt;Hartmut Goebel&lt;/a&gt;
&lt;/p&gt;
&lt;h4&gt;Help with Continuous Integration setup&lt;/h4&gt;
&lt;p&gt;
There is a push for migrating our CI to Gitlab. The CI should
eventually not just run &quot;make check&quot; on various platforms, but also
perform tests with multiple peers running in different VMs with
specific network topologies (i.e. NAT) between them being simulated.
The CI should also be integrated with Gauger for performance
regression analysis. Running jobs only when dependencies have changed
and scripting more granular triggers or ideally automatic dependency
discovery (as done by the autotools) is also important.
&lt;/p&gt;
&lt;p&gt;
Mentor: TBD
&lt;/p&gt;
&lt;h4&gt;Migrate gnunet-qr from Python 2.7 to C using libzbar&lt;/h4&gt;
&lt;p&gt;
Python 2.7 is reaching its end-of-life, and we want to get rid
of the dependency on Python. The existing gnunet-qr tool is a
rather simple wrapper around python-zbar, which itself wraps
libzbar. The goal of this project is to directly use libzbar
to scan QR codes for GNUnet / the GNU Name System (see
also &lt;a href=&quot;https://bugs.gnunet.org/view.php?id=5562&quot;&gt;#5562&lt;/a&gt;).
&lt;/p&gt;
&lt;p&gt;
Mentor: Christian Grothoff
&lt;/p&gt;
&lt;h4&gt;re:claimID OpenID Connect performance improvements&lt;/h4&gt;
&lt;p&gt;
reclaimID is a decentralized identity system build on top of the GNU
Name System.
Upon authorization, the user provides a requesting party (RP) such as a website
with an authorization ticket (e.g. piggybacked in an OpenID authorization code).
The RP uses information contained in this ticket to
&lt;ol&gt;
&lt;li&gt; Retrieve the decryption key from GNS&lt;/li&gt;
&lt;li&gt; Retrieve the user attributes from GNS&lt;/li&gt;
&lt;/ol&gt;
The GNS lookups ensure that the RP receives up-to-date attributes and functional
decryption keys. However, in particular the RP-specific encryption key
resolution can be slow and even fail depending on the network topology.
We propose that in an initial exchange, in particular OpenID authorization code
flows, we try to incorporate key and maybe even an attribute set in the ticket
exchange.
In order to mitigate this issue, this project is meant to investigate and implement how...
&lt;ol&gt;
&lt;li&gt; ... decryption keys can be added to an initial exchange in OpenID.&lt;/li&gt;
&lt;li&gt; ... initial set(s) of attributes can be piggybacked in OpenID.&lt;/li&gt;
&lt;/ol&gt;
&lt;br/&gt;
Mentor: Martin Schanzenbach
&lt;/p&gt;
&lt;h4&gt;re:claimID alternative GNS-based encryption&lt;/h4&gt;
&lt;p&gt;
re:claimID is a decentralized identity system build on top of the GNU
Name System.
The initial design and implementation of re:claimID includes an attribute-based
encryption module in order to prevent unauthorized access to attributes in the
name system.
Our motivation for re:claimID was for it to be name system agnostic, which
means the design theoretically also works for other name systems such as
namecoin.
Other name systems often do not have built-in mechanisms in order to do this.
Hence, we implemented an ABE access control layer. Our ABE implementation
requires two third party libraries: libpbc and libgabe. While we could merge
libgabe into the gnunet service implementation of re:claimID, libpbc is a
rather large, third party library which lacks packaging in distributions and
for platforms.
On the other hand, GNS supports record data encryption using symmetric keys as
labels.
If we make the access control layer of re:claimID more generic in order to
support both ABE and GNS encryption, we could reduce the required depenencies.
This would result in gnunet packages to include re:claimID by default.
In short, the goals are to...
&lt;ol&gt;
&lt;li&gt; ... improve performance by reducing encryption overhead.&lt;/li&gt;
&lt;li&gt; ... reduce dependencies.&lt;/li&gt;
&lt;/ol&gt;
&lt;br/&gt;
Mentor: Martin Schanzenbach
&lt;/p&gt;
</description>
<pubDate>Fri, 01 Feb 2019 00:00:00 UT</pubDate>
</item>
<item>
<title>2019-02: GNUnet 0.11.0 released</title>
<link>https://gnunet.org/#gnunet-0.11.0-release</link>
<description>
&lt;h3&gt;
&lt;a name=&quot;gnunet-0.11.0-release&quot;&gt;2019-02: GNUnet 0.11.0 released&lt;/a&gt;
&lt;/h3&gt;
&lt;p&gt;
We are pleased to announce the release of GNUnet 0.11.0.
&lt;/p&gt;
&lt;p&gt;
This is a major release after about five years of development. In
terms of usability, users should be aware that there are still a large
number of known open issues in particular with respect to ease of use,
but also some critical privacy issues especially for mobile users.
Also, the nascent network is tiny (about 200 peers) and thus unlikely to
provide good anonymity or extensive amounts of interesting
information. As a result, the 0.11.0 release is still only suitable
for early adopters with some reasonable pain tolerance.
&lt;/p&gt;
&lt;h4&gt;Download links&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-0.11.0.tar.gz&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-0.11.0.tar.gz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-0.11.0.tar.gz.sig&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-0.11.0.tar.gz.sig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.11.0.tar.gz&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.11.0.tar.gz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.11.0.tar.gz.sig&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.11.0.tar.gz.sig&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.11.0.tar.gz&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.11.0.tar.gz&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.11.0.tar.gz.sig&quot;&gt;http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.11.0.tar.gz.sig&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;
Note that due to mirror synchronization, not all links might be functional
early after the release. For direct access try &lt;a href=&quot;http://ftp.gnu.org/gnu/gnunet/&quot;&gt;http://ftp.gnu.org/gnu/gnunet/&lt;/a&gt;
&lt;/p&gt;
&lt;p&gt;
Note that GNUnet is now started using &lt;tt&gt;gnunet-arm -s&lt;/tt&gt;. GNUnet should be
stopped using &lt;tt&gt;gnunet-arm -e&lt;/tt&gt;.
&lt;/p&gt;
&lt;h4&gt;Noteworthy changes in 0.11.0&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;
The Web site and manuals have undergone significant rework. You can find an
archive of the old Web site at &lt;a href=&quot;https://old.gnunet.org/&quot;&gt;old.gnunet.org&lt;/a&gt;.
&lt;/li&gt;
&lt;li&gt;
The code now builds again on macOS. GNUnet on macOS is &lt;i&gt;experimental&lt;/i&gt;.
While it builds and seems to run fine, some tests are known to fail.
&lt;/li&gt;
&lt;li&gt;
Build process now works properly with libidn2
&lt;/li&gt;
&lt;li&gt;
Except for &lt;tt&gt;gnunet-qr&lt;/tt&gt;, all Python code was migrated to Python 3.7.
&lt;/li&gt;
&lt;li&gt;
Fixed security issues in secret sharing cryptography logic
&lt;/li&gt;
&lt;li&gt;
Services running out of file descriptors on &lt;tt&gt;accept()&lt;/tt&gt; no longer busy wait
&lt;/li&gt;
&lt;li&gt;
Fixed crash in gnunet-gns2dns proxy
&lt;/li&gt;
&lt;li&gt;
GNS responses are now padded to minimize information disclosure from the size
&lt;/li&gt;
&lt;li&gt;
Fixed API issues and (rare) crash bugs in CADET
&lt;/li&gt;
&lt;li&gt;
The experimental SecuShare code is not included in the release, you can now find it in the &lt;a href=&quot;https://git.gnunet.org/gnunet-secushare/&quot;&gt;gnunet-secushare&lt;/a&gt; Git repository.
&lt;/li&gt;
&lt;li&gt;
The Ascension tool (separate download) now allows importing DNS zones into GNS via AXFR.
&lt;/li&gt;
&lt;li&gt;
GNUnet now includes a decentralised identity attribute sharing service: reclaimID. A ready-to-use client can be found in an &lt;a href=&quot;https://gitlab.com/reclaimid/client&quot;&gt;external repo&lt;/a&gt;.
&lt;/li&gt;
&lt;li&gt;
The code now builds again on NetBSD. GNUnet on NetBSD is &lt;i&gt;experimental&lt;/i&gt;. While it builds and seems to run fine, full support requires more changes in the core of GNUnet It will soon be available via pkgsrc.
&lt;/li&gt;
&lt;li&gt;
Many things changed on the build system side. If you package GNUnet for an operating system or otherwise package manager, make sure that you read the README.
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;
The above is just the short list, our bugtracker lists
&lt;a href=&quot;https://bugs.gnunet.org/changelog_page.php?version_id=258&quot;&gt;
over 100 individual issues&lt;/a&gt; that were resolved since 0.11.0pre66.
&lt;/p&gt;
&lt;h4&gt;Known Issues&lt;/h4&gt;
&lt;ul&gt;
&lt;li&gt;
There are known major design issues in the TRANSPORT, ATS and CORE subsystems
which will need to be addressed in the future to achieve acceptable usability,
performance and security.
&lt;/li&gt;
&lt;li&gt;
There are known moderate implementation limitations in CADET that
negatively impact performance. Also CADET may unexpectedly deliver messages out-of-order.
&lt;/li&gt;
&lt;li&gt;
There are known moderate design issues in FS that also impact
usability and performance.
&lt;/li&gt;
&lt;li&gt;
There are minor implementation limitations in SET that create
unnecessary attack surface for availability.
&lt;/li&gt;
&lt;li&gt;
The RPS subsystem remains experimental.
&lt;/li&gt;
&lt;li&gt;
Some high-level tests in the test-suite fail non-deterministically due to
the low-level TRANSPORT issues.
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;
In addition to this list, you may also want to consult our bug tracker
at &lt;a href=&quot;https://bugs.gnunet.org/&quot;&gt;bugs.gnunet.org&lt;/a&gt; which lists
about 150 more specific issues.
&lt;/p&gt;
</description>
<pubDate>Thu, 28 Feb 2019 00:00:00 UT</pubDate>
</item>
</channel>
</rss>