Author: toad
Date: 2008-10-28 19:03:07 +0000 (Tue, 28 Oct 2008)
New Revision: 23160

Modified:
   trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties
Log:
Document option better


Modified: trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties
===================================================================
--- trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties   2008-10-28 
18:50:50 UTC (rev 23159)
+++ trunk/freenet/src/freenet/l10n/freenet.l10n.en.properties   2008-10-28 
19:03:07 UTC (rev 23160)
@@ -700,8 +700,8 @@
 Node.opennetEnabledLong=Enable insecure mode (aka opennet)? If this is 
enabled, the node will automatically exchange node references with other 
untrusted nodes (Strangers as opposed to Friends). But this means that the fact 
that you are running a node is no longer private, and many attacks are much 
easier. If you know enough people running Freenet, you should stick to trusted 
(Friends) connections to them, and turn this off.
 Node.outBWLimit=Output bandwidth limit (bytes per second)
 Node.outBWLimitLong=Hard output bandwidth limit (bytes/sec); the node should 
almost never exceed this
-Node.paddDataPackets=Padd data packets sent by the node with random-length 
content?
-Node.paddDataPacketsLong=Padd data packets sent by the node with random-length 
content? It obviously increase the per-packet overhead so some people might 
want to turn it off.
+Node.paddDataPackets=Padd data packets sent by the node with random-length 
content? (READ WARNING!)
+Node.paddDataPacketsLong=Padd data packets sent by the node with random-length 
content? For security, on a single node, this is bad; if a large part of the 
network starts doing it, we become very vulnerable to a passive attacker. 
However, it should improve performance, particularly the payload percentage. 
You have been warned!
 Node.passOpennetPeersThroughDarknet=Relay opennet noderefs through darknet 
peers?
 Node.passOpennetPeersThroughDarknetLong=If true, opennet noderefs (NEVER our 
own darknet noderef) will be relayed through our darknet peers. So a node (this 
node, or its peers) can get opennet peers from its darknet peers. This is 
useful because it allows us to bootstrap new opennet peers after having lost 
our peers due to downtime, for example. However, it may make traffic analysis 
slightly easier, so turn it off if you are paranoid.
 Node.port=FNP port number (UDP)


Reply via email to