Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  nodelist  faq  login

I have a VISION! It's a RANCID double-FISHWICH on an ENRICHED BUN!!


rocksolid / Security / Re: predicted place scan

SubjectAuthor
* predicted place scanJohn Doe
+* Re: predicted place scan294384023948
|`* Re: predicted place scanJohn Doe
| `- Re: predicted place scanAnonUser
+* Re: predicted place scanNeodome Admin
|`- Re: predicted place scanJohn Doe
`* Re: predicted place scan90238209348
 `* Re: predicted place scanJohn Doe
  `* Re: predicted place scantrw
   `* Re: predicted place scanJohn Doe
    `* Re: predicted place scan3232342342
     `* Re: predicted place scanJohn Doe
      `- Re: predicted place scan394820498029

1
Subject: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Tue, 26 Feb 2019 16:22 UTC
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: predicted place scan
Date: Tue, 26 Feb 2019 16:22:21 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q53p3s$iuh$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Tue, 26 Feb 2019 16:22:21 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="19409"; mail-complaints-to="usenet@novabbs.com"
View all headers
How to protect hidden service from such scan?

"GET /test/
"GET /status
"GET /stats/
"GET /sql.tgz
"GET /sql.zip
"GET /sql.tar.gz
"GET /site/
"GET /site.zip
"GET /site.tgz
"GET /site.tar.gz
"GET /shell.php
"GET /settings.php
"GET /server-status
"GET /server-info
"GET /secret/
"GET /register.php
"GET /register
"GET /private_key
"GET /private/
"GET /priv/
"GET /pma/
"GET /phpmyadmin/
"GET /phpinfo.php
"GET /phpinfo
"GET /phpbb/
"GET /old/
"GET /new/
"GET /mysql.zip
"GET /mysql.tgz
"GET /mysql.tar.gz
"GET /logs/
"GET /login/
"GET /login.php
"GET /log/
"GET /install/
"GET /install.php
"GET /includes/
"GET /include/
"GET /inc/
"GET /home.php
"GET /home/
"GET /hidden/
"GET /fr/
"GET /forums/
"GET /forum/
"GET /foro/
"GET /files/
"GET /file/
"GET /FCKeditor/
"GET /file.php
"GET /etc/
"GET /es/
"GET /en/
"GET /dump.zip
"GET /dump.tgz
"GET /dump.tar.gz
"GET /dump.sql.zip
"GET /dump.sql.gz
"GET /dump.sql.bz2
"GET /dump.sql
"GET /dump.gz
"GET /downloads/
"GET /download.php
"GET /demo/
"GET /de/
"GET /db.sql
"GET /data/
"GET /cpanel/
"GET /controlpanel/
"GET /content/
"GET /config.php
"GET /config/
"GET /conf/
"GET /c99.php
"GET /board/
"GET /bitcoin.php
"GET /backups/
"GET /backup/
"GET /backup.zip
"GET /backup.tgz
"GET /backup.tar.gz
"GET /ar/
"GET /administrator/
"GET /admin/
"GET /admin.php
"GET /adm/
"GET /accounts/
"GET /account/
"GET /.svn/
"GET /.ssh/
"GET /.htaccess
"GET /.git/index
"GET /.bash_history
"GET /files/


Subject: Re: predicted place scan
From: 294384023948
Newsgroups: rocksolid.shared.security
Organization: def5
Date: Tue, 26 Feb 2019 22:28 UTC
References: 1
Path: i2pn2.org!rocksolid2!def5!POSTED.localhost!not-for-mail
From: 29438402...@anon.com (294384023948)
Newsgroups: rocksolid.shared.security
Message-ID: <5b22094d656107ae8a82304ae725f1f1@def4>
Subject: Re: predicted place scan
Date: Tue, 26 Feb 2019 22:28:39+0000
Organization: def5
In-Reply-To: <q53p3s$iuh$1@novabbs.com>
References: <q53p3s$iuh$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
View all headers

depends what server you run, and what (on that server).
let's say you run a static site with /$webroot/index.html as the only document, you could either forbid everything else or you could redirect everything else (every request which is not index.html) to index.html.
directory listing must be turned off, of course. it is possible to replace the 404 with the 403 error message (or vice versa). this way, it is not revealed if the requested does not exist or is just forbidden.
if you have several documents (like usual), you can extend the scheme. how you implement the rights is depending on the server system you run, i think on apache you could use htaccess for this. if you have something dynamic (like a forum or a blog), you could limit or redirect all requests to the application (the cgi or php script, or whatever you use).
if you have a script, you could also do something more sophisticated and try to check the requests for such scans and then react somehow (shutting down the connection for one minute or displaying a (possibly misleading) error page, writing to a log, trying to dos the scanner...).
and of course, you could also construct a spider/bottrap with endless redirects or something else funny (malicious files like zip bombs, obscure error messages or just some random garbage).

hope this helps

Posted on def4


Subject: Re: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Thu, 28 Feb 2019 09:12 UTC
References: 1 2
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 09:12:15 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q588ld$10f1$1@novabbs.com>
References: <q53p3s$iuh$1@novabbs.com> <5b22094d656107ae8a82304ae725f1f1@def4>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Feb 2019 09:12:15 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="33249"; mail-complaints-to="usenet@novabbs.com"
View all headers
On 2019-02-26 22:28, you wrote:


depends what server you run, and what (on that server).

I run static site with sthttpd. sthttpd seem does not support ".htaccess" file
- he ignore every string there.

let's say you run a static site with /$webroot/index.html as the only
document, you could either forbid everything else or you could redirect
everything else (every request which is not index.html) to index.html.
directory listing must be turned off, of course. it is possible to replace
the 404 with the 403 error message (or vice versa). this way, it is not
revealed if the requested does not exist or is just forbidden.
if you have several documents (like usual), you can extend the scheme. how
you implement the rights is depending on the server system you run, i think
on apache you could use htaccess for this. if you have something dynamic
(like a forum or a blog), you could limit or redirect all requests to the
application (the cgi or php script, or whatever you use).
if you have a script, you could also do something more sophisticated and try
to check the requests for such scans and then react somehow (shutting down
the connection for one minute or displaying a (possibly misleading) error
page, writing to a log, trying to dos the scanner...).
and of course, you could also construct a spider/bottrap with endless
redirects or something else funny (malicious files like zip bombs, obscure
error messages or just some random garbage).


Subject: Re: predicted place scan
From: AnonUser
Newsgroups: rocksolid.shared.security
Organization: NovaBBS
Date: Thu, 28 Feb 2019 12:24 UTC
References: 1 2 3
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: AnonU...@rslight.i2p (AnonUser)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 12:24:27 -0000 (UTC)
Organization: NovaBBS
Message-ID: <0f66c8035b7c4520e89f0a920061208b$1@www.novabbs.com>
References: <q53p3s$iuh$1@novabbs.com> <5b22094d656107ae8a82304ae725f1f1@def4> <q588ld$10f1$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Feb 2019 12:24:27 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="AnonUser"; posting-host="localhost:127.0.0.1";
logging-data="5873"; mail-complaints-to="usenet@novabbs.com"
View all headers
John Doe wrote:

On 2019-02-26 22:28, you wrote:


depends what server you run, and what (on that server).

I run static site with sthttpd. sthttpd seem does not support ".htaccess"
file
- he ignore every string there.

Previous post covers a good amount of good ideas. I haven't used sthttpd, looks interesting https://blogs.gentoo.org/blueness/2014/10/03/sthttpd-a-very-tiny-and-very-fast-http-server-with-a-mature-codebase/

Maybe mess with the throttling feature and refuse connections instead of just throttle them for predicted locations
http://www.acme.com/software/thttpd/thttpd_man.html#THROTTLING

--
Posted on Rocksolid Light.




Subject: Re: predicted place scan
From: Neodome Admin
Newsgroups: rocksolid.shared.security
Organization: Neodome
Date: Thu, 28 Feb 2019 16:06 UTC
References: 1
Path: i2pn2.org!i2pn.org!news.neodome.net!.POSTED!not-for-mail
From: adm...@neodome.net (Neodome Admin)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 16:06:19 +0000 (UTC)
Organization: Neodome
Message-ID: <q590tq$vli$1@neodome.net>
References: <q53p3s$iuh$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Feb 2019 16:06:19 +0000 (UTC)
Injection-Info: neodome.net;
posting-account="j+pDYmApIMLG8Ndo1g7kf68kK5tjOzj0/16XBDxAzugT1xJx4Zn++Q7Jju
uD4Y/H+Mu8Av0mXxiw48PEZJW8pC8C0+54NbqW+B3w3EHcWtKyTQufjeWy9MHE4+JkQLyl5U1Py
jz+lA6rgHECrYzg2Y9GnstRUFnc/veSn6eo2TaLdseNFyB/hfnrKB3Z0Smpz3tLNzfbuG1nPv0Y
WEFJ4Wek9pjngI4+r0slSdckZFMh8wbY94ZXTyi5YOkDVOTFPtlGVoOJdzy5zmH0QTMr1HV+j0P
74fs0cuet7CpOikDwsqN5YKgjAE3pT0fEIO7Tor/rYzCmWyHpa/zrWoKcPA==";
posting-host="yP7v6f3tQofhJMNK2rl2KmT55Nh0jf39zoYxpbpRxV47K+1byIENJ2mYfCqEZ
JNt9+mI6jUBEItiCsckeM6n+iTsWzaiV/Jvw/KHvvcinPguG61eQJthIbS4fzlw3m00QkkAHt3r
cCtAb/FMd4Ronpz9ovthTxsTUG8BdgBHV03scs8dtuDuNlyJpbL98gCdUlzs927/dQX3fLtPTky
D/IYnvS2VEGj0Xb2a7qq84iZNQQdAQ9HeiyzRNnVexugqVulXXvR19jHHFZ3EHPNwlF+rAcMgkt
acWBdfnNf2cKsra6MOmpySOFMoVernm8MwanGRDHPs6fRdJe6kB2ugcA==";
logging-data="32434";
mail-complaints-to="abuse@neodome.net"
User-Agent: NewsTap/5.3.3 (iPhone/iPod Touch)
Cancel-Lock: sha1:ZkFIhwCstCJyW/8a3ct6F2HukJE=
View all headers
John Doe <invalid@invalid.invalid> wrote:
How to protect hidden service from such scan?

"GET /test/
"GET /status
"GET /stats/
"GET /sql.tgz
"GET /sql.zip
"GET /sql.tar.gz
"GET /site/
"GET /site.zip
"GET /site.tgz
"GET /site.tar.gz
"GET /shell.php
"GET /settings.php
"GET /server-status
"GET /server-info
"GET /secret/
"GET /register.php
"GET /register
"GET /private_key
"GET /private/
"GET /priv/
"GET /pma/
"GET /phpmyadmin/
"GET /phpinfo.php
"GET /phpinfo
"GET /phpbb/
"GET /old/
"GET /new/
"GET /mysql.zip
"GET /mysql.tgz
"GET /mysql.tar.gz
"GET /logs/
"GET /login/
"GET /login.php
"GET /log/
"GET /install/
"GET /install.php
"GET /includes/
"GET /include/
"GET /inc/
"GET /home.php
"GET /home/
"GET /hidden/
"GET /fr/
"GET /forums/
"GET /forum/
"GET /foro/
"GET /files/
"GET /file/
"GET /FCKeditor/
"GET /file.php
"GET /etc/
"GET /es/
"GET /en/
"GET /dump.zip
"GET /dump.tgz
"GET /dump.tar.gz
"GET /dump.sql.zip
"GET /dump.sql.gz
"GET /dump.sql.bz2
"GET /dump.sql
"GET /dump.gz
"GET /downloads/
"GET /download.php
"GET /demo/
"GET /de/
"GET /db.sql
"GET /data/
"GET /cpanel/
"GET /controlpanel/
"GET /content/
"GET /config.php
"GET /config/
"GET /conf/
"GET /c99.php
"GET /board/
"GET /bitcoin.php
"GET /backups/
"GET /backup/
"GET /backup.zip
"GET /backup.tgz
"GET /backup.tar.gz
"GET /ar/
"GET /administrator/
"GET /admin/
"GET /admin.php
"GET /adm/
"GET /accounts/
"GET /account/
"GET /.svn/
"GET /.ssh/
"GET /.htaccess
"GET /.git/index
"GET /.bash_history
"GET /files/


I, personally, just ignore it.

--
Neodome


Subject: Re: predicted place scan
From: 90238209348
Newsgroups: rocksolid.shared.security
Organization: def5
Date: Thu, 28 Feb 2019 18:06 UTC
References: 1
Path: i2pn2.org!rocksolid2!def5!POSTED.localhost!not-for-mail
From: 90238209...@anon.com (90238209348)
Newsgroups: rocksolid.shared.security
Message-ID: <fd6fdb86da2225ce870a151ce4da2a50@def4>
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 18:06:35+0000
Organization: def5
In-Reply-To: <q53p3s$iuh$1@novabbs.com>
References: <q53p3s$iuh$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
View all headers

sthttpd - a fork of thttpd, a tiny/turbo/throttling HTTP server
version 2.27.0 Oct 3, 2014 sthttpd is a fork of Jef Poskanzer's
popular thttpd server. This fork aims to simply maintain the
original codebase as bugs or security issues are found.

oh yeah, thttpd is back, how cool is that ? i think for minimalistic sites it is just the best server there is.




Posted on def4


Subject: Re: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Thu, 28 Feb 2019 20:18 UTC
References: 1 2
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 20:18:42 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q59fmr$tvh$1@novabbs.com>
References: <q53p3s$iuh$1@novabbs.com> <q590tq$vli$1@neodome.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Feb 2019 20:18:42 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="30705"; mail-complaints-to="usenet@novabbs.com"
View all headers
On 2019-02-28 16:06, you wrote:

John Doe <invalid@invalid.invalid> wrote:
How to protect hidden service from such scan?

"GET /sql.tgz
"GET /sql.zip
"GET /sql.tar.gz
"GET /db.sql
"GET /backup.zip

I, personally, just ignore it.

He overload low bandwidth tor/i2p tunnel.


Subject: Re: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Thu, 28 Feb 2019 20:22 UTC
References: 1 2
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Thu, 28 Feb 2019 20:22:17 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q59ftn$utg$1@novabbs.com>
References: <q53p3s$iuh$1@novabbs.com> <fd6fdb86da2225ce870a151ce4da2a50@def4>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Thu, 28 Feb 2019 20:22:17 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="31664"; mail-complaints-to="usenet@novabbs.com"
View all headers
On 2019-02-28 18:06, you wrote:


sthttpd - a fork of thttpd, a tiny/turbo/throttling HTTP server
version 2.27.0 Oct 3, 2014 sthttpd is a fork of Jef Poskanzer's
popular thttpd server. This fork aims to simply maintain the
original codebase as bugs or security issues are found.

oh yeah, thttpd is back, how cool is that ? i think for minimalistic sites it
is just the best server there is.

it is fast and secure. best choice for static site.


Subject: Re: predicted place scan
From: trw
Newsgroups: rocksolid.shared.security
Organization: Dancing elephants
Date: Fri, 1 Mar 2019 10:12 UTC
References: 1
Path: i2pn2.org!rocksolid2!def5!.POSTED.bogusentry!not-for-mail
From: trw...@i2pmail.org (trw)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Fri, 01 Mar 2019 05:12:38 -0500
Organization: Dancing elephants
Lines: 7
Message-ID: <q5b0jn$mk4$1@def5.org>
References: <q59ftn$utg$1@novabbs.com>
Reply-To: trw <trw@i2pmail.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Fri, 1 Mar 2019 10:13:11 -0000 (UTC)
Injection-Info: def5.org; posting-host="bogusentry:192.168.1.189";
logging-data="23172"; mail-complaints-to="usenet@def5.org"
User-Agent: FUDforum 3.0.7
X-FUDforum: e4062714e2d275bd0cc7c3ee636428b0 <8793>
View all headers
He overload low bandwidth tor/i2p tunnel.

on tor, you are on your own. but on i2p, you can avoid such attacks pretty easily by finetuning the tunnels properties.
has worked like a charm for def3, which was subject to heavy spider and inproxy traffic.

cheers

trw
Posted on: def3.i2p


Subject: Re: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Sun, 3 Mar 2019 10:06 UTC
References: 1 2
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Sun, 3 Mar 2019 10:06:56 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q5g8vu$ngj$1@novabbs.com>
References: <q59ftn$utg$1@novabbs.com> <q5b0jn$mk4$1@def5.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 3 Mar 2019 10:06:56 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="24083"; mail-complaints-to="usenet@novabbs.com"
View all headers
On 2019-03-01 05:12, you wrote:

He overload low bandwidth tor/i2p tunnel.

on tor, you are on your own. but on i2p, you can avoid such attacks pretty
easily by finetuning the tunnels properties.

which one properties exactly?

has worked like a charm for def3, which was subject to heavy spider and
inproxy traffic.


Subject: Re: predicted place scan
From: 3232342342
Newsgroups: rocksolid.shared.security
Organization: def5
Date: Sun, 3 Mar 2019 11:10 UTC
References: 1
Path: i2pn2.org!rocksolid2!def5!POSTED.localhost!not-for-mail
From: 3232342...@anon.com (3232342342)
Newsgroups: rocksolid.shared.security
Message-ID: <15ac46f5fb11f90bac68c1053e650e60@def4>
Subject: Re: predicted place scan
Date: Sun, 03 Mar 2019 11:10:21+0000
Organization: def5
In-Reply-To: <q5g8vu$ngj$1@novabbs.com>
References: <q5g8vu$ngj$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
View all headers

which one properties exactly?

The headline is "Server throttling", then edit the points "Inbound connection limits" and "Max concurrent connections". In "Inbound connection limits" you can set max values per client.

Posted on def4


Subject: Re: predicted place scan
From: John Doe
Newsgroups: rocksolid.shared.security
Organization: rocksolid2 (news.novabbs.com)
Date: Sun, 3 Mar 2019 12:37 UTC
References: 1 2
Path: i2pn2.org!rocksolid2!.POSTED.localhost!not-for-mail
From: inva...@invalid.invalid (John Doe)
Newsgroups: rocksolid.shared.security
Subject: Re: predicted place scan
Date: Sun, 3 Mar 2019 12:37:48 -0000 (UTC)
Organization: rocksolid2 (news.novabbs.com)
Message-ID: <q5ghqq$1l9u$1@novabbs.com>
References: <q5g8vu$ngj$1@novabbs.com> <15ac46f5fb11f90bac68c1053e650e60@def4>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 3 Mar 2019 12:37:48 -0000 (UTC)
Injection-Info: novabbs.com; posting-account="1f1792"; posting-host="localhost:127.0.0.1";
logging-data="54590"; mail-complaints-to="usenet@novabbs.com"
View all headers
On 2019-03-03 11:10, you wrote:


which one properties exactly?

The headline is "Server throttling", then edit the points "Inbound connection
limits" and "Max concurrent connections". In "Inbound connection limits" you
can set max values per client.

This is i2p option I guess. I have use i2pd. Most relevant option there is
"inbound.quantity". But I'm not sure.
https://i2pd.readthedocs.io/en/latest/user-guide/tunnels/


Subject: Re: predicted place scan
From: 394820498029
Newsgroups: rocksolid.shared.security
Organization: def5
Date: Sun, 3 Mar 2019 13:03 UTC
References: 1
Path: i2pn2.org!rocksolid2!def5!POSTED.localhost!not-for-mail
From: 39482049...@anon.com (394820498029)
Newsgroups: rocksolid.shared.security
Message-ID: <a29b7d9fcba12f0f23910fdd1286ed6c@def4>
Subject: Re: predicted place scan
Date: Sun, 03 Mar 2019 13:03:13+0000
Organization: def5
In-Reply-To: <q5ghqq$1l9u$1@novabbs.com>
References: <q5ghqq$1l9u$1@novabbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
View all headers

https://i2pd.readthedocs.io/en/latest/user-guide/tunnels/

according to this link "inbound.quantity" is the number of inbound tunnels. seems like i2pd does not offer that option.

Posted on def4


1
rocksolid light 0.7.2
clearneti2ptor