Just went through the update the the web interface and log still say im
running 5085.
On Sat, Jul 24, 2004 at 12:48:53AM +0100, Toad wrote:
Stable build 5086 is now available. The snapshots have been updated.
Please upgrade ASAP (if you are running the stable branch, which most
Freenet users are). This build fixes a fairly major vulnerability to
passive traffic analysis whereby an attacker could determine (on
uncongested links) the types of messages being transferred, and perhaps
the MRI, and with help from a node from within the network, he could
perhaps trace a message chain's path across much of the network (with a
lot of luck), and perhaps find compromizing information. This is the
initial fix and it may be somewhat wasteful of bandwidth. We will
develop better fixes in the near future, but it is at least backwards
compatible: You should not need to reseed.
How to update:
On POSIX-like systems such as Linux and MacOS/X (or Darwin):
./stop-freenet.sh
./update.sh
./start-freenet.sh
On Windows, you can use the update option on the start menu.
On any platform, you can stop the node, download
http://freenetproject.org/snapshots/freenet-latest.jar over your
existing freenet.jar, and then start the node up again.
The next build, 5087, will probably contain a significant CPU usage
improvement by means of using native code to speed up some of the
heaviest crypto and routing operations. That code is not quite ready
yet; look for a release later on Saturday, or perhaps Monday.
--
Matthew J Toseland - [EMAIL PROTECTED]
Freenet Project Official Codemonkey - http://freenetproject.org/
ICTHUS - Nothing is impossible. Our Boss says so.
___
Support mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]
pgp3r2m3KkRZI.pgp
Description: PGP signature
___
Support mailing list
[EMAIL PROTECTED]
http://news.gmane.org/gmane.network.freenet.support
Unsubscribe at http://dodo.freenetproject.org/cgi-bin/mailman/listinfo/support
Or mailto:[EMAIL PROTECTED]