[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
GNUnet 0.12.2 released
From: |
Schanzenbach, Martin |
Subject: |
GNUnet 0.12.2 released |
Date: |
Mon, 13 Jan 2020 15:27:57 +0100 |
User-agent: |
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.3.0 |
We are pleased to announce the release of GNUnet 0.12.2.
This is a bugfix release.
In terms of usability, users should be aware that there are still
a large number of known open issues in particular with respect to ease
of use, but also some critical privacy issues especially for mobile users.
Also, the nascent network is tiny and thus unlikely to
provide good anonymity or extensive amounts of interesting information.
As a result, the 0.12.2 release is still only suitable for early adopters
with some reasonable pain tolerance.
Download links:
http://ftpmirror.gnu.org/gnunet/gnunet-0.12.2.tar.gz
http://ftpmirror.gnu.org/gnunet/gnunet-0.12.2.tar.gz.sig
http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.12.0.tar.gz
http://ftpmirror.gnu.org/gnunet/gnunet-gtk-0.12.0.tar.gz.sig
http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.12.0.tar.gz
http://ftpmirror.gnu.org/gnunet/gnunet-fuse-0.12.0.tar.gz.sig
The GPG key used to sign is: 3D11063C10F98D14BD24D1470B0998EF86F59B6A
Note that due to mirror synchronization, not all links might be
functional early after the release. For direct access try
http://ftp.gnu.org/gnu/gnunet/
Noteworthy changes in 0.12.2 (since 0.12.1):
- GNS: Resolver clients are now able to specify a recursion depth limit.
- TRANSPORT/TNG: The transport rewrite (aka TNG) is underway and
various transport components have been worked on, including TCP, UDP
and UDS
communicators.
- RECLAIM: Added preliminary support for third party attested credentials.
- UTIL: The cryptographic changes introduced in 0.12.0 broke ECDSA
ECDH and consequently other components. The offending ECDSA key
normalization
was dropped.
Known Issues
- There are known major design issues in the TRANSPORT, ATS and CORE
subsystems which will need to be addressed in the future to achieve
acceptable usability, performance and security.
- There are known moderate implementation limitations in CADET that
negatively impact performance.
- There are known moderate design issues in FS that also impact
usability and performance.
- There are minor implementation limitations in SET that create
unnecessary attack surface for availability.
- The RPS subsystem remains experimental.
- Some high-level tests in the test-suite fail non-deterministically due
to the low-level TRANSPORT issues.
In addition to this list, you may also want to consult our bug tracker
at bugs.gnunet.org which lists about 190 more specific issues.
Thanks:
This release was the work of many people. The following people
contributed code and were thus easily identified:
Christian Grothoff, Florian Dold, Christian Ulrich, dvn, lynx, Markus
Voggenreiter and Martin Schanzenbach.
signature.asc
Description: OpenPGP digital signature
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- GNUnet 0.12.2 released,
Schanzenbach, Martin <=