Commit Graph

2121 Commits (20a5e19ea16ed307376e2faf4f17f41f0e9f2b0c)

Author SHA1 Message Date
orignal 02a36a9fa8 don't populate buffer of unreachable router 2 years ago
R4SAS 77142e59ee
[http] fix query detection, addresshelper processing, update tests
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
weko 76d39cc7c9 changed to tabs, move tor port to function 2 years ago
weko 9e0c5d67c7 Don't use reversed port for choise random port. (by whothefuckami) 2 years ago
orignal 03111ad0df don't save profiles under mutex 2 years ago
orignal abb81c353d fixed race condition 2 years ago
orignal 1ad38c0b95 fixed typo 2 years ago
orignal 532a29b0c4 don't reply with unreachable router 2 years ago
orignal 4f3a416e37 send DateTime together with RouterInfo 2 years ago
orignal 4d0ad47491 GetBit for IdentHash 2 years ago
orignal 7b632bd03d set minimal floodfill version to 0.9.51 2 years ago
orignal c2faa5c614 don't try to save RouterInfo if no buffer 2 years ago
orignal d15581d95e delete invalid router after update 2 years ago
orignal 7bde4de1f5 don't try to save unreachable routers 2 years ago
orignal 88f19f551d don't save RouterInfo buffer if invalid 2 years ago
orignal d79bdc9f66 send datetime block after approximately every 250 packets 2 years ago
orignal 48a3c767e5 in-meory storage for router profiles 2 years ago
R4SAS 86fc12e395
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 3c65012a63
[ssu2] close socket if it was opened on OpenSocket
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 97b7ea0da5 create separate new ipv4 and ipv6 published addresses 2 years ago
orignal 1c4cc02c23 drop garlic message in garlic clove 2 years ago
orignal ac94341203 disconnect established session if clock skew detected 2 years ago
orignal 234540f9e7
Merge pull request #1873 from Vort/ntp_desc
Fix description for nettime.enabled option
2 years ago
Vort cb44a35fde Fix description for nettime.enabled option 2 years ago
Vort 0829b186b7 Fix debug log output 2 years ago
orignal 993900aa77 terminate sessions if clock was adjusted backwards too much 2 years ago
orignal aac9a8d18f check if clock was adjusted backwards 2 years ago
orignal 2baaa8bb8f fixed typo 2 years ago
orignal f29ef2c057 don't compare first byte for yggdrasil addresses 2 years ago
orignal d1c98c58b9 update status before deleting session 2 years ago
orignal 4930157e93 don't innsert back unreachable router 2 years ago
orignal d30d1e8a7d don't set unrechable for routers without published addresses 2 years ago
orignal 80a55c5b75 store unrechable in profile 2 years ago
orignal 3c02cade58 compare only first 8 bytes for temporary addreses 2 years ago
orignal 21123e2afa compare published address and actual endpoint 2 years ago
orignal f1415c2234 compare published address and actual endpoint 2 years ago
orignal 212a1156a1 filter our addresses with invalid hosts 2 years ago
orignal 54fb234424 limit number of acked packets to 510 2 years ago
orignal 5a6b50ae51 fixed typo 2 years ago
orignal 21542e8150 select first hop from high bandwidth peer for client tunnels 2 years ago
orignal 02e7f6b0c3 cleanup out of sequence packet nums in one call 2 years ago
orignal f7101cc260 fixed warning 2 years ago
orignal e9f0ed6473 cleanup out-of-sequnce list more aggressivly 2 years ago
orignal 4960587f46 cleanup out-of-sequnce list more aggressivly 2 years ago
orignal bf8eecf407 more attempts to find good peer 2 years ago
weko 7df2ed6114 rename and refactor 2 years ago
weko 22b1066b0a Add parameter for show TCSR with old algorithm and it's realization 2 years ago
orignal fafdb0c590 drop too long or too short LeaseSet 2 years ago
R4SAS 3cee8bfcb2
Update tests and corresponding makefiles (#1862) 2 years ago
orignal 86dbfdb536 mutex for encrypted LeaseSet update 2 years ago
orignal 70fec2bc99 don't publish localhost addresses in RouterInfo 2 years ago
orignal 8a106eb09e fixed test-http-req 2 years ago
orignal ad5540c9f3 delete address if corresponding transport is disabled 2 years ago
orignal e91d0bbec8 delete address if corresponding transport is disabled 2 years ago
orignal 8ee461f60a enable all ipv4 adresses even if one is already enabled 2 years ago
orignal 4de6201b84 update RouuterInfo if NTCP2 or SSU2 keys were recreated 2 years ago
orignal 273aa31b1e try another floodfill if it's incompatible with tunnels 2 years ago
R4SAS b31f52e332
[http] keep query even if it was empty (closes #1844)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 4fae7b8d65 don't update local RouterInfo addresses in Load but in InitTransports only 2 years ago
orignal 5479ddd03c publish NTCP2 addreses by index 2 years ago
orignal 1f23584c24 update all SSU2 addresses 2 years ago
orignal 067fb45a25 exclude router from tunnel build for 2.5 minutes if doesn't reply too often 2 years ago
orignal d4426118c5 exclude router from tunnel build for 2.5 minutes if declined 2 years ago
orignal cd6d86c8c3 make sure that async CreateStream complete 2 years ago
R4SAS 84d4e074ce
add loglevel checker, fix fields passing to translated string formatter
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal e8be39af17 memrory pool for SSU2IncompleteMessage 2 years ago
orignal bc888167a7 use linked list for out of sequence fragments 2 years ago
orignal 993dc72ce6 use separate pointer to second fragment of incomplete message 2 years ago
orignal 324ace103b memoery pool for fragments 2 years ago
orignal d530269e4f try to insert received msgid instead lookup 2 years ago
orignal f172f44f32
Merge pull request #1833 from TomasGlgg/feature
Использование скользящего среднего для рассчета tunnel creation success rate
2 years ago
orignal f34abe60fa 2.45.1 2 years ago
orignal a3c305032a don't set Firewalled upon SessionCreated if ports mismatch 2 years ago
orignal 2921eaa055 differentiate symmetric and full cone NAT 2 years ago
orignal 1cc68ea402 differentiate symmetric and full cone NAT 2 years ago
orignal c18e8f6c78 drop too long LeaseSet without processing 2 years ago
orignal a6f9a56e40 support C++20 2 years ago
orignal acd6af709e don't use netdb memory pool for local RouterInfo 2 years ago
orignal 55704ece3a drop duplicated I2NP messages 2 years ago
orignal 0d3ede56cb reject duplicated trnsit tunnel 2 years ago
R4SAS 503f522cc3
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 22179400c7
2.45.0
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
Tomas Globis 66f82cb43f
Use moving average to calculate tunnel creation success rate 2 years ago
orignal 1df67bd43c 2.45.0 2 years ago
orignal 6942c20879 don't select overloaded peer 2 years ago
orignal 7b341d5d30 update and show send queue size for transports 2 years ago
R4SAS 2c19da9aa7
fix warnings about unused code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 3e3e2c41bd unlock mutex for good after wait 2 years ago
orignal cb139226df ilimit umner of simultaneous tunnel build requests per pool 2 years ago
orignal 84d6028454 limit number of message to handle at the time 2 years ago
orignal 126dc0ebe0 inseer incoming session into sessions list 2 years ago
orignal 099d9d977f terminate duplcated session properly 2 years ago
orignal 5a167316cb don't filter yggdrasil address 2 years ago
orignal 85e31f84ec reset termination timer for new incoming connection 2 years ago
orignal edb7a0e23c Refuse dulicated incoming pending session from same IP 2 years ago
Dimitris Apostolou 9f9e8bfa14
Fix typos 2 years ago
orignal 99356fd24d make sure that AsycReceive complete 2 years ago
orignal 5ef5f5a170 don't create encryption for new transit tunnel immediately 2 years ago
orignal b6f83dfe9f set error before status 2 years ago
orignal 3f728149ab bump default max number of transit tunnels to 5000 2 years ago
orignal 36501fe31e change network status back to OK if port in msg 7 matches 2 years ago
orignal e4ddc883d2 drop future RouterInfo and LeaseSet upon receive 2 years ago
orignal 5ac01ddce8 delete routers with timestmep from future 2 years ago
orignal d3656fcb3f don't publish ::1 2 years ago
orignal d6c101d261 try to handle RelayIntro again is Alice's RouterInfo not found 2 years ago
orignal eeea02d834 rounded to seconds timestamps 2 years ago
R4SAS c210553a39
getting rid of old c99 array designators
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS a315e4ce62
more overrides
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 96cfd9acc2
fix override
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS d869bb25ed
fix missing override warning
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 476e6aae35 don't iterate through addresses when it's not necessary 2 years ago
orignal d30ee99cf1 fixed crash 2 years ago
orignal 84d9c8f1b8 access to RouterInfo's addresses by index 2 years ago
orignal df737a65b2 SessionRequest must be min 88 bytes 2 years ago
orignal c5230ca44b don't accept incoming session from invalid endpoint 2 years ago
R4SAS 3471e6fe16
use deadline_timer for bandwidth calculation timer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS f1437feede
SSU2: handle standard network errors more correctly
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 0d523bd2a6
use 15s average bw for transit limits check
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 8943200ffa
calculate bandwidth every 1 and 15 seconds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal a902d68669 enable compressible padding 2 years ago
orignal f6ca7c19af allow zero length padding 2 years ago
orignal 3458665df8 don't delete unreachable routers if tunnel creation success rate is too low 2 years ago
orignal 8320987124 delete invalid sessions from peers 2 years ago
orignal 648b09d45f try to restart acceptors after termination of expired NTCP2 if no descriptors 2 years ago
R4SAS 857df5c734
prevent log spamming with no_descriptors error
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 737603e81b No descriptors error 2 years ago
orignal 53ca5dc67a memory pool for address vectors 2 years ago
orignal 8ad5696e50 don't send termination again if termination received block received 2 years ago
orignal 2bb5ff7184 eliminate RTT self-reduction 2 years ago
orignal 410d2c2fa9 use shared pointer for RouterInfo's addreses list 2 years ago
orignal 6a743f66e8 eliminate RTT self-reduction 2 years ago
orignal 709c451400 disable MemoryPool for RouterInfo's address 2 years ago
orignal cb73c7c72e make sure that only *Mt method can be called for MemoryPoolMt 2 years ago
orignal 50abeea82a print endpoint if more than two fragments of SessionConfirmed 2 years ago
orignal 8db352b4d0 recognize symmetric NAT from peer test msg 7 2 years ago
orignal 6589bdf6b5 delete expired token right away 2 years ago
orignal 1ac171152a don't print error message if incomplete 2 years ago
orignal 629c718527 fixed races condition with pending outgoing sessions 2 years ago
orignal 949c38f5f0 reuse list of addresses 2 years ago
orignal 2a6f906177 print separate message for introducer timeout 2 years ago
orignal 64c3282aae check minimal message size 2 years ago
orignal f5d511ae0f
Merge pull request #1811 from rex4539/typos
Fix typos
2 years ago
orignal aa9a9ef18d memory pool for addreses 2 years ago
Dimitris Apostolou 73b9c0302b
Fix typos 2 years ago
orignal aead9db971 Read local RouterInfo from file 2 years ago
orignal fb8be32c28 removed SSU and NTCP transports 2 years ago
orignal a298588943 SSU2 only introducers 2 years ago
orignal ccfeca728e use only SSU2 for network status 2 years ago
orignal 7705423c42 remove SSU 2 years ago
orignal 379075c594 exluded SSU from transports 2 years ago
orignal 6a23153c0b don't read SSU addresses 2 years ago
orignal 9e02c99db5 check and limit LeaseSet's buffer size 2 years ago
orignal 9f59ff2df4 2.44.0 2 years ago
orignal 78357baca4 sync AcceptStream 2 years ago
orignal 85b78dfb9b call stream request callback after CreateStream 2 years ago
orignal 9fd60b52f1 sync StreamCreate 2 years ago
orignal c6a6a4e0e8 sync Receive from stream 2 years ago
orignal c88638afe4 reconnect to proxy if receive error 2 years ago
Sergey Fedorov 7f98a8b972
Fix definitions for Darwin PPC; do not use pthread_setname_np on unsupported OS versions (#1797)
* Correct define for Darwin PPC is __POWERPC__

* util.cpp: do not use pthread_setname_np on unsupported macOS versions
2 years ago
orignal e13f151474 ssu2.mtu4 and ssu2.mtu6 2 years ago
orignal 4ed4e8708e close relay socket if associate socket gets closed 2 years ago
orignal 1738d118f7 recconnect to proxy 2 years ago
orignal f1f66d7b8f handle SOCKS connect reply for ipv6 address 2 years ago
orignal 4ed5e44de7 correct buffer size for ipv6 SOCKS proxy reply 2 years ago
orignal 3e3f92c616 set and check proxy status for ipv6 if presented 2 years ago
orignal 5fb1247b87 correct MTU calculation through proxy 2 years ago
orignal 016222463d don't run peer test for SSU2 through proxy 2 years ago
orignal 0e477bf938 set min MTU if through proxy 2 years ago
orignal eb75eb0e55 reset port value before parsing 2 years ago
orignal 2a703e0844 SSU2 through a socks5 proxy 2 years ago
orignal 2b6d9eaa8b disable compressible padding for now 2 years ago
orignal f9b0bb0383 I2PTunnel/UDPTunnel split 2 years ago
orignal c6e8873d57 always compress SYN packet 2 years ago
orignal b2767304e9 correct padding offset 2 years ago
orignal 3d4d3ce80d compressable crypto key and padding for routers and destination 2 years ago
orignal f3aada9e1a Proxy connection and UDP associate request 2 years ago
orignal 08fd32b3bf allow different ports from RelayReponse and HolePunch 2 years ago
orignal 39a86ce5c9 handle UDP packet from proxy relay 2 years ago
orignal fe25260ee2 send UDP request to proxy relay 2 years ago
orignal 63fd05c7d3 SOCKS5 constants 2 years ago
orignal e5553f7528 milliseconds for peer test send time 2 years ago
orignal 6e3cec653d resend PeerTest msg 2 2 years ago
orignal 55976fd9dc resend PeerTest msg 1 2 years ago
R4SAS 1d9d89b115
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 3544f77e90 terminate peer session if Charlie's RouterInfo not found 2 years ago
R4SAS 96c4463d39
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 650b7abef6
[SSU2] add log messages about peertest
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 714b3856a2
[SSU2] print to log when peer test is sent
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 69ca3bc75d catch lexical_cast exceptions 2 years ago
orignal 549dcbee32 don't set port=1 2 years ago
orignal 0a0c2350f2 random seelection between NTCP2 and SSU2 priority 2 years ago
orignal cef2263a7f Transports priority for peer 2 years ago
orignal 638c376e5b enable SSU2 and disable SSU by default 2 years ago
orignal 8eade86624 moved InitTransports code from Daemon to Transports 2 years ago
orignal 24ae8d5443 don't handle more than 2 fragments in SessionConfirmed 2 years ago
orignal 030af11d86 don't merge duppicated fragment of SessionConfirmed 2 years ago
orignal 857a2bc399 verify path response 2 years ago
orignal 09e6e2940f correct max paddign size 2 years ago
orignal 23e18a34d4 check if new address is in reserved range 2 years ago
orignal 3bdef5f58d update remote endpoint and send path challenge 2 years ago
orignal cf27581c76 check min MTU 1280 2 years ago
orignal 4634bff9f0 limit number of resent packets. Resend interval variance 2 years ago
orignal 1a9c658836 immediate ack request flag 2 years ago
orignal 1a32c55ca3 delete routers with expired SSU2 introducers 2 years ago
orignal 9b5a885b3b check if I2NP message to send is not null 2 years ago
orignal f378119889 5 SSU2 peer tests if no SSU 2 years ago
orignal 8fd466c5a9 separate network status and errors 2 years ago
orignal 95f19a5fb2 send Retry instead SessionCreated if clock skew 2 years ago
orignal f98780b1d7 check timestamp for token request 2 years ago
orignal 150c89e48a don't request session if zero token received 2 years ago
R4SAS 63227ab2f1
fix log message
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal b40f1b67b9 2.43.0 2 years ago
orignal f875823357 copy path challenge to response 2 years ago
orignal 75611866eb update router's transports when SSU or NTCP address was deleted 2 years ago
orignal c3dd7ed73a try to resend if window is full 2 years ago
orignal 3ae885d120 change status back to Testing from Unknow if next test was accepted 2 years ago
orignal 81f53d313c alsways set some port to SSU2 address 2 years ago
orignal 9d123fa5ad select random port if port not found or specified 2 years ago
orignal f4d6a08d57 create separate addresses for published SSU2 2 years ago
orignal 8f5768f85b memory pool for leases 2 years ago
orignal 3dd78a2589 remove SSU address if SSU is off 2 years ago
orignal df92a85159 set SSU2 port +1 if not specified 2 years ago
orignal ab606a1121 adjust clock from SSU2 2 years ago
orignal c6f898b8ca connect to Charlie if RelayResponse from Bob was received before HolePunch 2 years ago
orignal b9970e1908 cleanup introducers upon reschedule 2 years ago
orignal 8bb9a57908 re-insert introducer back 2 years ago
orignal 53934a470b update keys for NTCP2 and SSU2 addreses 2 years ago
orignal a94ae7d77d update keys for NTCP2 and SSU2 addreses 2 years ago
orignal f43e860998 cleanup introducers if router is not longer firewalled 2 years ago
orignal 3e40852999 memory pool for sent packets 2 years ago
orignal df073bb306 send local address in RelayResponse block 2 years ago
orignal 771c4a0d02 allocate smaller I2NP buffer for fragmented message. Limit number of fragments by 64 2 years ago
orignal cb959ab14c allocate tunnel message buffer for I2NP block with tunnel data message type 2 years ago
orignal ed5c533982 recgnize symmetric NAT from SSU2 2 years ago
orignal 98d2ce5845 Respond to path challenge. Correct termination reason for duplicated session 2 years ago
orignal eba4626589 kappa for RTO culculation 2 years ago
orignal ff5fa1d137 3 bytes off for token in RelayResponse 2 years ago
orignal 71766ecd16 select introducers randomly. More logging for RelayIntro 2 years ago
orignal fc63ca6982 correct excluded routers size for exploratory request 2 years ago
orignal 0e6d888ed3 changed some retransmission params 2 years ago
orignal 9afe3b5f39 fixed typo 2 years ago
orignal 3bd40fc8b3 calculate RTT and RTO 2 years ago
orignal 01fe642beb don't create another session for peer test 2 years ago
orignal e70d57dcb4 resend intervals in milliseconds 2 years ago
orignal fd41fba069 variable retranmission window 2 years ago
orignal 8a6fe0f321 check if address type matches peer's address type for peer test msg 1 2 years ago
orignal ae73e8a305 find SSU2 address with static key if supports both ipv4 and ipv6 2 years ago
R4SAS a344c09d0d
[util] add inet_ntop for XP
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS 991e37d0bf
[peertest] fixed ssu2 router exclusion
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS fdeb884fe5
fixed getting MTU on windows, add address to log messages with MTU
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 4b1f5c9c9b terminate session in separate task 2 years ago
orignal b574aaf99c fix SSU2 crash on shutdown 2 years ago
orignal f9106b77bb add SSU2 introducer if SSU2 only 2 years ago
orignal a0419e4f34 add SSU2 introducer if SSU2 only 2 years ago
orignal 46a549c875 random size of fragments 2 years ago
orignal f8a609f692 respond to termination 2 years ago
orignal 987497bb10 don't publish invalid host/port 2 years ago
orignal e537878b8a check Ack block bufer size and shrink ranges if necessary 2 years ago
orignal 617f45bc59 try to send I2NP message in one packet, reduce or drop Ack block if necessary 2 years ago
orignal fe744f8f81 more routine cleanup 2 years ago
orignal 93d879b297 more tunnel brokers ranges 2 years ago
orignal dbb9295063 set MTU if local address is specified explicitly. update MTU for ipv6 if not set 2 years ago
orignal 09aa96e486 always bring to closing state if termination requested 2 years ago
orignal 4d0047ae7c request termination for existing session 2 years ago
orignal b860a4799d testing cap for published SSU2 address 2 years ago
orignal 6ff64352d3 don't create and oublish duplicates 2 years ago
orignal 3683ec6a95 fixed race condition 2 years ago
orignal 454fa9ee9b update SSU2 port 2 years ago
orignal d33aeb4bb2 set unreachable if firewalled. Store router's hash of introducer instead session 2 years ago
R4SAS 5ff34b93c0
print detected MTU
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 2eb929fe05
Merge pull request #1776 from simonvetter/openssl
leaseset: add missing bound checks
2 years ago
orignal ea0ed9e844 update SSU2 introducers if Firewalled 2 years ago
orignal 4a3e481a83 don't publish introducers for non-published SSU2 address 2 years ago
orignal 2197cd8620 add/remove SSU2 introducers to local RouterInfo 2 years ago
orignal cf0d3b5f61 create new list of SSU2 introducers 2 years ago
orignal 6f7ab49346 moved creation time to TransportSession 2 years ago
orignal 000e0358a7 resend SessionConfirmed immediately if another SessionCreated received 2 years ago
orignal a3e19931f0 insert RouterInfo from SessionConfirmed into netdb immediately 2 years ago
orignal 9fec1a86cf send ack for peer test 2 years ago
orignal ffab29890b created additional ranges if acnt > 255 2 years ago
orignal 206c068d8e don't send termination without address 2 years ago
orignal dc30cd1112 handle SessionConfirmed fragments in reversed order 2 years ago
Simon Vetter 412a245e88 leaseset: add missing bound checks
This builds on ChadF's issue and patch (https://github.com/PurpleI2P/i2pd/issues/1772)
and fixes other potential bound check issues.
2 years ago
orignal 16290bf66f fixed race condition on session termination 2 years ago
orignal 4f8b0e6484 send more SessionConfirmed termination messages. Limit send queue 2 years ago
orignal 5026dbc1b3 receive bigger packets 2 years ago
orignal 014e4b0e1d detect MTU for some known ipv6 tunnel brokers 2 years ago
orignal 14a6947b02 round MTU to multiple of 16 for SSU1 2 years ago
orignal 665a914dc3 set max MTU for ipv4 2 years ago
orignal 8feac310af start initial peer test if SSU2 only 2 years ago
orignal 3394bb4b8d calculate SSU2 session MTU and max payload size 2 years ago
orignal 1dd2bd0013 publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1 2 years ago
orignal 5c62726992 check clock skew and terminate 2 years ago
orignal 90981f628e Send fragmented SessionConfirmed 2 years ago
orignal 0c34189d94 correct buffer size for fragments of SessionConfirmed 2 years ago
orignal f1d3d6a7b5 set max compression for SessionConfirmed 2 years ago
orignal b0d962b49a send ack for retransmitted SessionConfirmed 2 years ago
orignal c50e453af6 check out of sequence messages range 2 years ago
Simon Vetter 3cf809e99d fix SSU2 introducers selection logic 2 years ago
orignal 8b649aaaf8 NACKs and Acks only Ack ranges 2 years ago
orignal fdebbc4498 select sessions for introducers 2 years ago
orignal 3ff3417ff2 send termiation with reason 2 years ago
orignal bb6227281a teminate session after 5 unacked resends 2 years ago
orignal 2f44d99a74 session closing state 2 years ago
orignal ca4414d15a request relay tag if firewalled 2 years ago
orignal fbb961b43c extract correct endpoint from peer test msg 2 2 years ago
orignal fa9c174264 handle first packet from Bob 2 years ago
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2 years ago
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 2 years ago
orignal aa21748e9a set status OK after peer test msg 5 2 years ago
orignal a2f4e08b00 set testing status for SSU2 peer test 2 years ago
orignal 66bc29d075 insert received RouterInfo into netdb immediately 2 years ago
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 2 years ago
orignal a1e414c3b7 make SSU2 server eligible for peer test 2 years ago
r4sas a5a35b1fa6 [daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
2 years ago
orignal 6039cdceb0 correct SSU2 only detection 2 years ago
orignal 473159be0f don't use port from SSU2 address 2 years ago
orignal 0e6ad548b2 invoke SSU2 peer test updates 2 years ago
orignal 6143515ac6 update our IP adress from SSU2 2 years ago
orignal 50419f200d fixed 1 packet off for out of sequence clean up 2 years ago
orignal 455390f121 clean up first out of sequence packet if too many 2 years ago
orignal d375299fa9 send token in relay response block 2 years ago
orignal 28db337166 give priority to SSU2 over SSU 2 years ago
orignal 6ca9a599ff remove session after HolePunch received 2 years ago
orignal 83bd3b6f0b use token from RelayResponse block 2 years ago
orignal a68765e021 fixed off 5 bytes for follow on fragment 2 years ago
orignal f5ed9129cd process retry as reponse to relay request 2 years ago
orignal 5e3115a614 check nonce in HolePunch relay response block 2 years ago
orignal 624c46f925 correct msg offset for follow-on fragment 2 years ago
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2 years ago
orignal d3bc9eb110 update token and conn id after HolePunch 2 years ago
orignal 72b61a29c2 check TokenRequest message size 2 years ago
orignal a99fcfe54f cleanup terminated sessions 2 years ago
orignal b5d139f7b2 process session created after session request sent 2 years ago
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2 years ago
orignal baf74cb582 1 byte off for RelayRequest signature 2 years ago
orignal 63d7cffefe Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2 years ago
orignal d7d74666b2 correct max MTU size 2 years ago
R4SAS 078d76c6f3
fix tabulation, remove long description (to be moved to documentation)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 3539ee9be6
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1
Add SIGTSTP, SIGCONT support
2 years ago
AVAtarMod 437282b148 [config, daemon] catch TSTP, CONT is option 2 years ago
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 2 years ago
orignal ae77d4ad22 correct signed content for peer test msg 3 2 years ago
orignal 821987fed7 don't send peer test for unknown address/port 2 years ago
orignal 18ddba4332 send RouterInfo message to right session in relay request 2 years ago
orignal aaad6dece6 set session request sent status in right place 2 years ago
orignal ed04747b9d resend SessionRequest and SessionCreated 2 years ago
orignal 827a88d772 exclude expired SSU2 introducers 2 years ago
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 2 years ago
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 2 years ago