[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-developers] GNUnet 0.11.6 released

From: Schanzenbach, Martin
Subject: [GNUnet-developers] GNUnet 0.11.6 released
Date: Wed, 24 Jul 2019 22:05:31 +0200

Dear all,

We are pleased to announce the release of GNUnet 0.11.6.

This is a bugfix release for 0.11.5, fixing a lot of minor bugs, improving 
stability and code quality. Further, our videos are back on the homepage. In 
this release, we again improved the webpage in general and updated our 
documentation. As always: In terms of usability, users should be aware that 
there are still a large number of known open issues in particular with respect 
to ease of use, but also some critical privacy issues especially for mobile 
users. Also, the nascent network is tiny (about 200 peers) and thus unlikely to 
provide good anonymity or extensive amounts of interesting information. As a 
result, the 0.11.6 release is still only suitable for early adopters with some 
reasonable pain tolerance.

Download links

gnunet-fuse was not released again, as there were no changes and the 0.11.0 
versions are expected to continue to work fine with gnunet-0.11.6.

Note that due to mirror synchronization, not all links might be functional 
early after the release. For direct access try

Noteworthy changes

* gnunet-identity can now print private keys.
* The REST service can be configured to echo the HTTP Origin header value for 
Cross-Origin-Resource-Sharing (CORS) when it is called by a browser plugin. 
Optionally, a CORS Origin to echo can be also be directly configured.
* re:claimID tickets are now re-used whenever possible.
* SUID binary detection mechanisms implemented to improve compatiblity with 
some distributions.
* TRANSPORT, TESTBED and CADET tests now pass again on macOS.
* The GNS proxy Certification Authority is now generated using gnutls-certtool, 
if available, with opennssl/certtool as fallback.
* Documentation, comments and code quality was improved.

Known Issues

* There are known major design issues in the TRANSPORT, ATS and CORE
 subsystems which will need to be addressed in the future to achieve
 acceptable usability, performance and security.
* There are known moderate implementation limitations in CADET that
 negatively impact performance. Also CADET may unexpectedly deliver
 messages out-of-order.
* There are known moderate design issues in FS that also impact
 usability and performance.
* There are minor implementation limitations in SET that create
 unnecessary attack surface for availability.
* The RPS subsystem remains experimental.
* Some high-level tests in the test-suite fail non-deterministically due
 to the low-level TRANSPORT issues.

In addition to this list, you may also want to consult our bug tracker
 which lists about 190 more specific issues.


This release was the work of many people. The following people contributed code 
and were thus easily identified: Martin Schanzenbach, Julius B√ľnger, ng0, 
Christian Grothoff, Alexia Pagkopoulou, rexxnor, xrs, lurchi and t3sserakt.


Attachment: signature.asc
Description: Message signed with OpenPGP

reply via email to

[Prev in Thread] Current Thread [Next in Thread]