orignal
|
083034fa35
|
send peer tests with random delays
|
2023-11-09 21:56:32 -05:00 |
|
orignal
|
0cc91dd2d2
|
don't pick too active peer
|
2023-10-15 08:31:55 -04:00 |
|
orignal
|
efdbe26755
|
try peer test again if Unknown
|
2023-09-28 18:40:51 -04:00 |
|
Vort
|
68f4961f1a
|
separate test status from network status
|
2023-07-30 15:44:16 +03:00 |
|
orignal
|
c620fc1232
|
clear unreachable flag upon succesive connect
|
2023-07-17 18:44:51 -04:00 |
|
Chad Fraleigh
|
638e9b4d7f
|
Fixed division by zero due to thread race condition.
|
2023-07-08 17:07:04 -07:00 |
|
orignal
|
bb52056aec
|
correct index for connected transport
|
2023-06-11 06:48:47 -04:00 |
|
orignal
|
8a52295882
|
make router real upon successive outgoing NTCP2 session. Eliminate static keys table
|
2023-05-06 16:43:09 -04:00 |
|
orignal
|
7c535159bc
|
static keys table
|
2023-04-30 20:05:35 -04:00 |
|
orignal
|
dc265367dc
|
drop unexpected I2NP messages
|
2023-04-20 14:23:41 -04:00 |
|
orignal
|
c22fc75370
|
set router properties from incoming connections
|
2023-04-19 19:48:09 -04:00 |
|
orignal
|
6206616347
|
don't set unreachable twice
|
2023-04-18 20:21:22 -04:00 |
|
orignal
|
b77ae08388
|
exclude previously non-reachable transports
|
2023-04-18 14:35:13 -04:00 |
|
orignal
|
527ee3b3c5
|
check if ident is unrechable only once
|
2023-04-16 08:18:41 -04:00 |
|
orignal
|
cd5bfaabb5
|
mark and check unreachable ident hashes
|
2023-04-15 22:16:31 -04:00 |
|
weko
|
354a04f0f6
|
Up level for some logs to critical
|
2023-03-31 11:29:04 +00:00 |
|
orignal
|
cd1af85e39
|
bypass slow transport sessions
|
2023-03-29 15:54:53 -04:00 |
|
R4SAS
|
86fc12e395
|
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2023-02-11 09:41:51 +03:00 |
|
orignal
|
d30d1e8a7d
|
don't set unrechable for routers without published addresses
|
2023-02-06 14:18:15 -05:00 |
|
orignal
|
21542e8150
|
select first hop from high bandwidth peer for client tunnels
|
2023-02-03 15:59:56 -05:00 |
|
orignal
|
bf8eecf407
|
more attempts to find good peer
|
2023-02-01 16:04:09 -05:00 |
|
R4SAS
|
503f522cc3
|
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2023-01-03 21:25:19 +03:00 |
|
orignal
|
6942c20879
|
don't select overloaded peer
|
2023-01-01 19:42:40 -05:00 |
|
orignal
|
126dc0ebe0
|
inseer incoming session into sessions list
|
2022-12-28 16:47:50 -05:00 |
|
R4SAS
|
3471e6fe16
|
use deadline_timer for bandwidth calculation timer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-12-13 23:25:16 +03:00 |
|
R4SAS
|
0d523bd2a6
|
use 15s average bw for transit limits check
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-12-13 22:04:20 +03:00 |
|
R4SAS
|
8943200ffa
|
calculate bandwidth every 1 and 15 seconds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-12-13 22:04:19 +03:00 |
|
orignal
|
8320987124
|
delete invalid sessions from peers
|
2022-12-10 19:09:37 -05:00 |
|
orignal
|
fb8be32c28
|
removed SSU and NTCP transports
|
2022-11-23 15:45:00 -05:00 |
|
orignal
|
ccfeca728e
|
use only SSU2 for network status
|
2022-11-22 22:03:19 -05:00 |
|
orignal
|
379075c594
|
exluded SSU from transports
|
2022-11-22 19:29:20 -05:00 |
|
orignal
|
e13f151474
|
ssu2.mtu4 and ssu2.mtu6
|
2022-10-31 18:11:36 -04:00 |
|
orignal
|
3e3f92c616
|
set and check proxy status for ipv6 if presented
|
2022-10-27 15:02:54 -04:00 |
|
orignal
|
016222463d
|
don't run peer test for SSU2 through proxy
|
2022-10-26 21:14:28 -04:00 |
|
orignal
|
2a703e0844
|
SSU2 through a socks5 proxy
|
2022-10-26 16:05:40 -04:00 |
|
R4SAS
|
1d9d89b115
|
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-10 15:43:37 +03:00 |
|
R4SAS
|
96c4463d39
|
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:24:43 +03:00 |
|
orignal
|
549dcbee32
|
don't set port=1
|
2022-10-03 15:40:25 -04:00 |
|
orignal
|
0a0c2350f2
|
random seelection between NTCP2 and SSU2 priority
|
2022-10-01 19:39:08 -04:00 |
|
orignal
|
cef2263a7f
|
Transports priority for peer
|
2022-09-30 19:24:36 -04:00 |
|
orignal
|
638c376e5b
|
enable SSU2 and disable SSU by default
|
2022-09-24 16:37:18 -04:00 |
|
orignal
|
8eade86624
|
moved InitTransports code from Daemon to Transports
|
2022-09-23 21:27:11 -04:00 |
|
orignal
|
f378119889
|
5 SSU2 peer tests if no SSU
|
2022-08-29 21:27:02 -04:00 |
|
R4SAS
|
991e37d0bf
|
[peertest] fixed ssu2 router exclusion
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-07-27 13:38:28 +03:00 |
|
orignal
|
8feac310af
|
start initial peer test if SSU2 only
|
2022-07-13 19:56:55 -04:00 |
|
orignal
|
83f43ab166
|
pick 3 routers for SSU2 peer test
|
2022-07-06 19:33:02 -04:00 |
|
orignal
|
a2f4e08b00
|
set testing status for SSU2 peer test
|
2022-07-05 19:38:24 -04:00 |
|
orignal
|
3ed625f949
|
don't try SSU peer test if SSU is disabled
|
2022-07-05 13:07:23 -04:00 |
|
orignal
|
a1e414c3b7
|
make SSU2 server eligible for peer test
|
2022-07-05 12:55:11 -04:00 |
|
orignal
|
28db337166
|
give priority to SSU2 over SSU
|
2022-06-30 12:53:50 -04:00 |
|