Release Notes: Support has been added for accessing the Router Console over IPv6. A new message type enables I2CP applications to query the router's bandwidth limits, and participation of a single peer in too many tunnels is prevented to improve reliability and safety. Besides other maintenance work, several old statistics calculators are dropped to make router profiles smaller and quicker, while new build scripts are supplied for I2P's big integer math library. Updating is highly recommended.
Release Notes: Support for encrypted LeaseSets (for creation of links over I2P that an adversary cannot obstruct by attacking its gateways) is more complete. New tunnel types like IRC server tunnels and new options like delayed start and idling of tunnels also gain support, along with improved usability of the I2P SOCKS proxy mechanism.
Release Notes: Various feature enhancements and bugfixes.
Release Notes: This release introduces new components, drops some old ones (like the old TCP transport), and has been optimized to perform better. The BOB (Basic Open Bridge) protocol is introduced, for use by client applications that cannot import I2CP libraries directly. This deprecates the old SAM protocol that was previously used in such cases. Improved code should be better at preventing congestion.
Release Notes: This release adds performance and stability improvements. Floodfill peers which are already connected are preferred for RouterInfo stores, and references to new floodfill peers are obtained from ordinary peers in case of shortage. Preference for already-connected peers is generally increased by considering them active. Timeouts during tunnel joins are now counted against peer profiles.
Release Notes: LeaseSet data is no longer added to every end-to-end message, reducing protocol overhead. Unreachable peers are avoided as inbound tunnel gateways, which helps reliability and makes it possible to use persistent Lease selection, which in turn helps performance by reducing out-of-order message delivery. The sequence of peers in a tunnel is now kept in a strict order according to XOR distance from a random value, to make it harder for an adversary to gather statistics for a predecessor attack. Improvements to applications like I2PSnark and the Router Console are also introduced.