Commit Graph

2231 Commits

Author SHA1 Message Date
orignal
e068a3cf22 store 'connected' in 'usage' section 2023-05-05 19:58:58 -04:00
weko
2e2cbe7803 save profile if has connected 2023-05-05 22:46:48 +00:00
weko
1c1452e06b Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2023-05-05 22:42:46 +00:00
orignal
c757b6d020 reset floodfill cap for unknown floodfills 2023-05-05 18:22:11 -04:00
weko
8fcab7b0c1 fix incorrect merge conflict resolve 2023-05-05 21:55:31 +00:00
weko
7646147ed2 save only non-default peer profile 2023-05-05 21:44:54 +00:00
orignal
b6de474fda don't include unconfirmed floodfill to the list if we have enough floodfills already 2023-05-05 16:14:54 -04:00
orignal
2f74e670a5 invalidate routers with incorrect family signature 2023-05-04 15:32:19 -04:00
orignal
c1168c2aa0 don't catch RouterInfo at OBEP 2023-05-04 09:39:37 -04:00
orignal
1bd6390f78 check if s is x25519 public key 2023-05-04 08:20:38 -04:00
orignal
a9e9e14c42
Merge pull request #1921 from contextswap/openssl
limit aes-ni assembly to x86
2023-05-03 12:21:00 -04:00
SidorKozlov
3b13a3f2a1 Configurable minimum successful tunnels 2023-05-03 16:13:03 +02:00
orignal
4ce2ef1d83 make router unreachable if AEAD fails in SessionCreated 2023-05-03 07:43:28 -04:00
contextswap
12d0abda55
[
Signed-off-by: contextswap <ctxswp@proton.me>
2023-05-03 19:10:16 +09:00
contextswap
7418f11651
limit aesni inline asm to x86
Signed-off-by: contextswap <ctxswp@proton.me>
2023-05-03 19:04:16 +09:00
weko
dab34e9051 get indent hash directly 2023-05-01 20:08:08 +00:00
weko
ec2297ed9d Recognize invalid static key 2023-05-01 19:28:32 +00:00
orignal
7c535159bc static keys table 2023-04-30 20:05:35 -04:00
orignal
2af4a2b58d override reply token only if non-zero 2023-04-28 08:01:02 -04:00
orignal
ead6a6dca3 correct parsing of caught RouterInfo at IBGW and OBEP 2023-04-27 21:37:30 -04:00
orignal
76adac31c3 enrcrypt lookup if being sent through a tunnel 2023-04-24 19:25:26 -04:00
r4sas
edfcd23b01
[webconsole] added a button to prematurely release a leaseset
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-04-24 14:01:21 +03:00
orignal
f21e1c75d5 check tagset for null 2023-04-23 15:31:24 -04:00
orignal
786c27c8ec publish encrypted RouterInfo 2023-04-21 22:27:55 -04:00
orignal
c34df2090c don't reply to DatabaseStore messages extracted from transit 2023-04-21 21:31:14 -04:00
orignal
5769a41208 use unordered_map for LeaseSets 2023-04-21 14:54:54 -04:00
orignal
dc265367dc drop unexpected I2NP messages 2023-04-20 14:23:41 -04:00
orignal
c22fc75370 set router properties from incoming connections 2023-04-19 19:48:09 -04:00
orignal
6206616347 don't set unreachable twice 2023-04-18 20:21:22 -04:00
orignal
b77ae08388 exclude previously non-reachable transports 2023-04-18 14:35:13 -04:00
orignal
527ee3b3c5 check if ident is unrechable only once 2023-04-16 08:18:41 -04:00
orignal
cd5bfaabb5 mark and check unreachable ident hashes 2023-04-15 22:16:31 -04:00
orignal
e20acb93cf don't lookup streaming destination for each message 2023-04-12 15:28:15 -04:00
orignal
132557f941 don't return default destination if port is specified explicitly 2023-04-12 13:33:20 -04:00
orignal
4ebc7c970a bypass medium congestion(D) routers for client tunnels 2023-04-10 23:04:38 -04:00
orignal
572694b141 check routers' congestion before recreating a tunnel 2023-04-09 21:32:44 -04:00
orignal
c1f19cb258 fixed typo 2023-04-06 16:19:56 -04:00
orignal
caff003a85 check for published ipv4 addresses for floodfills and IBGW 2023-04-06 16:03:15 -04:00
orignal
d580c0155a fixed typo 2023-04-05 21:49:49 -04:00
orignal
9475a22728 update introducers. cleanup unreachable routers 2023-04-05 21:30:36 -04:00
orignal
e3fb9d8483 fixed warning 2023-04-04 13:57:46 -04:00
orignal
220ef283de rename SendTunnelDataMsg to SendTunnelDataMsgTo for router tunnel delivery types 2023-04-04 13:48:00 -04:00
orignal
8178df752b fixed warning 2023-04-04 13:42:54 -04:00
orignal
922e5915b1 rename SendTunnelDataMsg to SendTunnelDataMsgs for multiple messages 2023-04-04 13:19:08 -04:00
orignal
dc6499aa98 fixed warnings 2023-04-03 22:50:31 -04:00
orignal
0c8a80b6f8 fixed warnings 2023-04-03 21:35:10 -04:00
orignal
b8032e7fbf publish congestion cap G 2023-04-02 11:27:51 -04:00
weko
a3bdc4ddc1 change some log levels back 2023-03-31 12:40:38 +00:00
weko
2abc997af8 change some log levels back 2023-03-31 12:29:13 +00:00
weko
710a35993d change some log level to error back 2023-03-31 12:16:32 +00:00
weko
354a04f0f6 Up level for some logs to critical 2023-03-31 11:29:04 +00:00
weko
a80aeb6715 add critical log level 2023-03-30 21:31:12 +00:00
orignal
cd1af85e39 bypass slow transport sessions 2023-03-29 15:54:53 -04:00
orignal
60e648bf9a set cap 6 for unspecified ipv6 address 2023-03-29 13:40:12 -04:00
orignal
c45e31b1b2 validate new router 2023-03-28 22:00:17 -04:00
orignal
6d204b4d7b shorter streaming I2NP data messages 2023-03-26 22:12:43 -04:00
Dimitris Apostolou
d91d734b5c Fix typos 2023-03-26 01:48:22 +00:00
orignal
5fee6df87a handle reset in reposnse to SYN 2023-03-23 19:52:39 -04:00
orignal
644d65054d create smaller I2NP packets 2023-03-21 21:25:00 -04:00
orignal
f41563a700 check packet number for SessionConfirmed 2023-03-19 17:42:53 -04:00
orignal
32b54fa1f8 handle i2p.streaming.answerPings properly 2023-03-19 15:47:50 -04:00
orignal
084663d6ea mediam size I2NP messages 2023-03-18 15:32:05 -04:00
orignal
55b2f2c625 memory pool for IdentityEx 2023-03-16 21:32:53 -04:00
orignal
5ad9c8e740 create I2NP tunnel message for first fragment 2023-03-13 19:19:57 -04:00
R4SAS
e96f0bfb14
[msvc] fix warnings, revert cmake boost libs linking list
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-03-13 18:34:45 +00:00
orignal
a6bd8275ca 2.47.0 2023-03-11 10:35:55 -05:00
orignal
6f01ebc0a5 check target destination 2023-03-11 08:44:07 -05:00
orignal
98f06e3ba1
Merge pull request #1889 from polistern/feat/sam-udp-port
Added SAM UDP port parameter
2023-03-10 11:11:27 -05:00
R4SAS
7b35c793f3
[reseed] support domains in yggdrasil reseeder, fix IPv6 URL host parsing
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-03-10 01:19:09 +00:00
R4SAS
58ef08310d
[reseed] skip records in reserved IP ranges, check Yggdrasil avalability if domain resolves in ygg address
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-03-09 18:50:28 +03:00
orignal
ec5c13a95e add back i2p.novg.net with new certificate 2023-03-08 18:38:49 -05:00
orignal
0a564d153a reseed update 2023-03-08 18:23:32 -05:00
orignal
46e4f4aea5 update RouterInfo if congestion cap changed 2023-03-07 13:09:07 -05:00
orignal
6d7f20961f
Merge pull request #1902 from Vort/pool_leak
Prevent leaking of ExploratoryPool
2023-03-07 10:06:45 -05:00
Vort
4b7fcdc719 Prevent leaking of ExploratoryPool 2023-03-07 12:06:50 +02:00
orignal
716926f0d7 publish high congestion cap 2023-03-06 19:48:04 -05:00
orignal
24a14e3440 moved max num transit tunnels to Tunnels 2023-03-05 20:08:15 -05:00
orignal
3154eda6a6 fixed typos 2023-03-04 15:46:44 -05:00
orignal
d50cf0ad83 recognize congestion caps 2023-03-03 20:21:56 -05:00
Vort
a4759694c8 Prevent out of bounds array access 2023-03-03 21:28:22 +02:00
Vort
6610af08c2 Correct processing of reseed.floodfill option 2023-03-03 21:26:38 +02:00
orignal
4db643aa8e limited number of acked packets to 511 2023-03-02 16:18:25 -05:00
Vort
064c013a72 Remove unreachable reseed 2023-03-02 21:25:29 +02:00
Vort
9e0389df1b Fix several warnings 2023-03-02 12:22:24 +02:00
orignal
1b921a2eac removed some SSU1 code 2023-03-01 22:05:24 -05:00
Vort
64f0a545fd Improve MSVC 2015 compatibility 2023-02-28 19:41:17 +02:00
Vort
34617bcb44 Code style unification across file 2023-02-27 20:00:43 +00:00
Vort
5f8820d9d6 Silence several compiler warnings 2023-02-27 20:00:43 +00:00
R4SAS
b7f0d87daf
GHA and Cmake changes (#1888)
Done with Vort's (https://github.com/Vort) cooperation

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-26 23:38:23 +03:00
polistern
3ff1adf597
feat: Added SAM UDP port parameter. 2023-02-26 16:51:56 +00:00
orignal
93d89a1fe0 fixed typo 2023-02-26 09:07:53 -05:00
orignal
3c9a574e90 create io_service after daemonization 2023-02-26 08:46:01 -05:00
orignal
de82b3ae19 don't publish non-reachable router 2023-02-25 17:19:14 -05:00
orignal
f84d88ac63 publish own RouterInfo in router's thread 2023-02-24 18:28:30 -05:00
orignal
2e62f9532f separate thread for processing router's messages 2023-02-23 13:58:06 -05:00
orignal
d40cd00cdb use DHT table for floodfills 2023-02-22 15:58:20 -05:00
Vort
95cc544c92 Check for null pointer before dereferencing it 2023-02-22 19:39:32 +02:00
orignal
8544283110 don't expire connected routers 2023-02-21 21:33:30 -05:00
orignal
abf687ff09 store RouterInfo in DHT 2023-02-21 19:08:12 -05:00
orignal
3adff82d4a don't handle ack request for router 2023-02-20 14:55:59 -05:00
R4SAS
82ac0aa492
2.46.1
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-20 05:50:14 +03:00
orignal
b8a99878b6 don't create profile for every new non-floodfill 2023-02-19 10:30:07 -05:00
orignal
eaca435a5b find multiple closest hashes 2023-02-18 19:45:31 -05:00
orignal
ce05cce331 validate LeaseSet if signature verification was not requested 2023-02-18 08:54:36 -05:00
orignal
e190dab7d6 fixed crash when shows leasesets 2023-02-17 21:13:50 -05:00
orignal
289c308600 set proper caps if host is unspecified 2023-02-17 20:08:05 -05:00
orignal
bff12b06f4 fixed race condition 2023-02-17 10:34:14 -05:00
orignal
b8590075e6 initial commit for Kademlia DHT 2023-02-16 22:14:02 -05:00
orignal
182a721674 2.46.0 2023-02-15 14:47:02 -05:00
orignal
fa286a6fb3 faster GetBit 2023-02-14 19:49:29 -05:00
orignal
02a36a9fa8 don't populate buffer of unreachable router 2023-02-14 15:44:35 -05:00
R4SAS
77142e59ee
[http] fix query detection, addresshelper processing, update tests
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-14 18:51:14 +00:00
weko
76d39cc7c9 changed to tabs, move tor port to function 2023-02-14 20:46:24 +03:00
weko
9e0c5d67c7 Don't use reversed port for choise random port. (by whothefuckami) 2023-02-14 20:46:24 +03:00
orignal
03111ad0df don't save profiles under mutex 2023-02-14 09:50:32 -05:00
orignal
abb81c353d fixed race condition 2023-02-14 09:33:10 -05:00
orignal
1ad38c0b95 fixed typo 2023-02-13 19:37:11 -05:00
orignal
532a29b0c4 don't reply with unreachable router 2023-02-13 19:18:02 -05:00
orignal
4f3a416e37 send DateTime together with RouterInfo 2023-02-13 15:44:20 -05:00
orignal
4d0ad47491 GetBit for IdentHash 2023-02-13 13:45:06 -05:00
orignal
7b632bd03d set minimal floodfill version to 0.9.51 2023-02-13 13:25:02 -05:00
orignal
c2faa5c614 don't try to save RouterInfo if no buffer 2023-02-12 19:10:22 -05:00
orignal
d15581d95e delete invalid router after update 2023-02-12 18:02:16 -05:00
orignal
7bde4de1f5 don't try to save unreachable routers 2023-02-12 15:28:06 -05:00
orignal
88f19f551d don't save RouterInfo buffer if invalid 2023-02-12 09:21:59 -05:00
orignal
d79bdc9f66 send datetime block after approximately every 250 packets 2023-02-11 20:11:34 -05:00
orignal
48a3c767e5 in-meory storage for router profiles 2023-02-11 16:22:02 -05:00
R4SAS
86fc12e395
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-11 09:41:51 +03:00
R4SAS
3c65012a63
[ssu2] close socket if it was opened on OpenSocket
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-11 06:29:37 +00:00
orignal
97b7ea0da5 create separate new ipv4 and ipv6 published addresses 2023-02-10 22:04:42 -05:00
orignal
1c4cc02c23 drop garlic message in garlic clove 2023-02-10 18:21:12 -05:00
orignal
ac94341203 disconnect established session if clock skew detected 2023-02-10 11:48:11 -05:00
orignal
234540f9e7
Merge pull request #1873 from Vort/ntp_desc
Fix description for nettime.enabled option
2023-02-10 10:12:11 -05:00
Vort
cb44a35fde Fix description for nettime.enabled option 2023-02-10 16:58:42 +02:00
Vort
0829b186b7 Fix debug log output 2023-02-10 01:57:43 +02:00
orignal
993900aa77 terminate sessions if clock was adjusted backwards too much 2023-02-09 18:49:35 -05:00
orignal
aac9a8d18f check if clock was adjusted backwards 2023-02-09 18:32:18 -05:00
orignal
2baaa8bb8f fixed typo 2023-02-07 18:01:24 -05:00
orignal
f29ef2c057 don't compare first byte for yggdrasil addresses 2023-02-07 15:28:33 -05:00
orignal
d1c98c58b9 update status before deleting session 2023-02-06 19:31:31 -05:00
orignal
4930157e93 don't innsert back unreachable router 2023-02-06 16:18:16 -05:00
orignal
d30d1e8a7d don't set unrechable for routers without published addresses 2023-02-06 14:18:15 -05:00
orignal
80a55c5b75 store unrechable in profile 2023-02-06 13:19:41 -05:00
orignal
3c02cade58 compare only first 8 bytes for temporary addreses 2023-02-05 19:19:20 -05:00
orignal
21123e2afa compare published address and actual endpoint 2023-02-05 18:26:09 -05:00
orignal
f1415c2234 compare published address and actual endpoint 2023-02-05 15:42:46 -05:00
orignal
212a1156a1 filter our addresses with invalid hosts 2023-02-05 11:00:00 -05:00
orignal
54fb234424 limit number of acked packets to 510 2023-02-03 19:17:46 -05:00
orignal
5a6b50ae51 fixed typo 2023-02-03 17:32:43 -05:00
orignal
21542e8150 select first hop from high bandwidth peer for client tunnels 2023-02-03 15:59:56 -05:00
orignal
02e7f6b0c3 cleanup out of sequence packet nums in one call 2023-02-02 13:52:48 -05:00
orignal
f7101cc260 fixed warning 2023-02-01 21:28:05 -05:00
orignal
e9f0ed6473 cleanup out-of-sequnce list more aggressivly 2023-02-01 19:05:04 -05:00
orignal
4960587f46 cleanup out-of-sequnce list more aggressivly 2023-02-01 18:37:31 -05:00
orignal
bf8eecf407 more attempts to find good peer 2023-02-01 16:04:09 -05:00
weko
7df2ed6114 rename and refactor 2023-02-01 19:14:56 +03:00
weko
22b1066b0a Add parameter for show TCSR with old algorithm and it's realization 2023-02-01 14:06:28 +03:00
orignal
fafdb0c590 drop too long or too short LeaseSet 2023-01-30 15:06:40 -05:00
R4SAS
3cee8bfcb2
Update tests and corresponding makefiles (#1862) 2023-01-30 04:17:49 +03:00
orignal
86dbfdb536 mutex for encrypted LeaseSet update 2023-01-29 09:19:12 -05:00
orignal
70fec2bc99 don't publish localhost addresses in RouterInfo 2023-01-28 22:33:44 -05:00
orignal
8a106eb09e fixed test-http-req 2023-01-28 17:18:54 -05:00
orignal
ad5540c9f3 delete address if corresponding transport is disabled 2023-01-26 11:32:59 -05:00
orignal
e91d0bbec8 delete address if corresponding transport is disabled 2023-01-26 11:21:08 -05:00
orignal
8ee461f60a enable all ipv4 adresses even if one is already enabled 2023-01-25 18:11:26 -05:00
orignal
4de6201b84 update RouuterInfo if NTCP2 or SSU2 keys were recreated 2023-01-25 13:23:46 -05:00
orignal
273aa31b1e try another floodfill if it's incompatible with tunnels 2023-01-25 12:43:46 -05:00
R4SAS
b31f52e332
[http] keep query even if it was empty (closes #1844)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-25 08:54:45 +00:00
orignal
4fae7b8d65 don't update local RouterInfo addresses in Load but in InitTransports only 2023-01-24 18:20:16 -05:00
orignal
5479ddd03c publish NTCP2 addreses by index 2023-01-24 14:07:22 -05:00
orignal
1f23584c24 update all SSU2 addresses 2023-01-23 21:24:01 -05:00
orignal
067fb45a25 exclude router from tunnel build for 2.5 minutes if doesn't reply too often 2023-01-21 19:40:43 -05:00
orignal
d4426118c5 exclude router from tunnel build for 2.5 minutes if declined 2023-01-20 15:34:40 -05:00
orignal
cd6d86c8c3 make sure that async CreateStream complete 2023-01-19 13:40:12 -05:00
R4SAS
84d4e074ce
add loglevel checker, fix fields passing to translated string formatter
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-19 08:33:03 +03:00
orignal
e8be39af17 memrory pool for SSU2IncompleteMessage 2023-01-17 21:32:36 -05:00
orignal
bc888167a7 use linked list for out of sequence fragments 2023-01-16 21:40:23 -05:00
orignal
993dc72ce6 use separate pointer to second fragment of incomplete message 2023-01-15 22:50:54 -05:00
orignal
324ace103b memoery pool for fragments 2023-01-14 17:05:09 -05:00
orignal
d530269e4f try to insert received msgid instead lookup 2023-01-13 19:23:26 -05:00
orignal
f172f44f32
Merge pull request #1833 from TomasGlgg/feature
Использование скользящего среднего для рассчета tunnel creation success rate
2023-01-11 15:36:37 -05:00
orignal
f34abe60fa 2.45.1 2023-01-11 13:52:20 -05:00
orignal
a3c305032a don't set Firewalled upon SessionCreated if ports mismatch 2023-01-08 08:25:23 -05:00
orignal
2921eaa055 differentiate symmetric and full cone NAT 2023-01-07 12:11:51 -05:00
orignal
1cc68ea402 differentiate symmetric and full cone NAT 2023-01-07 12:06:26 -05:00
orignal
c18e8f6c78 drop too long LeaseSet without processing 2023-01-07 10:54:49 -05:00
orignal
a6f9a56e40 support C++20 2023-01-06 14:08:39 -05:00
orignal
acd6af709e don't use netdb memory pool for local RouterInfo 2023-01-05 18:16:36 -05:00
orignal
55704ece3a drop duplicated I2NP messages 2023-01-05 15:33:41 -05:00
orignal
0d3ede56cb reject duplicated trnsit tunnel 2023-01-05 11:59:47 -05:00
R4SAS
503f522cc3
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
R4SAS
22179400c7
2.45.0
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 18:16:34 +00:00
Tomas Globis
66f82cb43f
Use moving average to calculate tunnel creation success rate 2023-01-03 03:07:07 +03:00
orignal
1df67bd43c 2.45.0 2023-01-02 18:59:13 -05:00
orignal
6942c20879 don't select overloaded peer 2023-01-01 19:42:40 -05:00
orignal
7b341d5d30 update and show send queue size for transports 2023-01-01 16:03:53 -05:00
R4SAS
2c19da9aa7
fix warnings about unused code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-01 13:48:41 +03:00
orignal
3e3e2c41bd unlock mutex for good after wait 2022-12-30 22:12:49 -05:00
orignal
cb139226df ilimit umner of simultaneous tunnel build requests per pool 2022-12-30 18:06:47 -05:00
orignal
84d6028454 limit number of message to handle at the time 2022-12-29 17:26:57 -05:00
orignal
126dc0ebe0 inseer incoming session into sessions list 2022-12-28 16:47:50 -05:00
orignal
099d9d977f terminate duplcated session properly 2022-12-28 16:47:12 -05:00
orignal
5a167316cb don't filter yggdrasil address 2022-12-27 22:24:20 -05:00
orignal
85e31f84ec reset termination timer for new incoming connection 2022-12-27 22:07:26 -05:00
orignal
edb7a0e23c Refuse dulicated incoming pending session from same IP 2022-12-27 21:54:32 -05:00
Dimitris Apostolou
9f9e8bfa14
Fix typos 2022-12-27 10:44:23 +02:00
orignal
99356fd24d make sure that AsycReceive complete 2022-12-25 15:35:00 -05:00
orignal
5ef5f5a170 don't create encryption for new transit tunnel immediately 2022-12-25 09:36:16 -05:00
orignal
b6f83dfe9f set error before status 2022-12-22 08:36:07 -05:00
orignal
3f728149ab bump default max number of transit tunnels to 5000 2022-12-21 18:27:42 -05:00
orignal
36501fe31e change network status back to OK if port in msg 7 matches 2022-12-21 18:14:19 -05:00
orignal
e4ddc883d2 drop future RouterInfo and LeaseSet upon receive 2022-12-20 18:41:19 -05:00
orignal
5ac01ddce8 delete routers with timestmep from future 2022-12-20 15:23:54 -05:00
orignal
d3656fcb3f don't publish ::1 2022-12-20 14:16:23 -05:00
orignal
d6c101d261 try to handle RelayIntro again is Alice's RouterInfo not found 2022-12-19 13:28:21 -05:00
orignal
eeea02d834 rounded to seconds timestamps 2022-12-19 12:56:19 -05:00
R4SAS
c210553a39
getting rid of old c99 array designators
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-18 23:26:18 +03:00
R4SAS
a315e4ce62
more overrides
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-18 22:53:14 +03:00
R4SAS
96cfd9acc2
fix override
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-18 22:37:26 +03:00
R4SAS
d869bb25ed
fix missing override warning
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-18 22:32:23 +03:00
orignal
476e6aae35 don't iterate through addresses when it's not necessary 2022-12-16 19:57:19 -05:00
orignal
d30ee99cf1 fixed crash 2022-12-16 15:33:56 -05:00
orignal
84d9c8f1b8 access to RouterInfo's addresses by index 2022-12-16 15:12:30 -05:00
orignal
df737a65b2 SessionRequest must be min 88 bytes 2022-12-15 15:08:56 -05:00
orignal
c5230ca44b don't accept incoming session from invalid endpoint 2022-12-14 15:44:31 -05:00
R4SAS
3471e6fe16
use deadline_timer for bandwidth calculation timer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 23:25:16 +03:00
R4SAS
f1437feede
SSU2: handle standard network errors more correctly
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:21 +03:00
R4SAS
0d523bd2a6
use 15s average bw for transit limits check
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:20 +03:00
R4SAS
8943200ffa
calculate bandwidth every 1 and 15 seconds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:19 +03:00
orignal
a902d68669 enable compressible padding 2022-12-12 18:36:29 -05:00
orignal
f6ca7c19af allow zero length padding 2022-12-12 14:18:36 -05:00
orignal
3458665df8 don't delete unreachable routers if tunnel creation success rate is too low 2022-12-11 17:03:53 -05:00
orignal
8320987124 delete invalid sessions from peers 2022-12-10 19:09:37 -05:00
orignal
648b09d45f try to restart acceptors after termination of expired NTCP2 if no descriptors 2022-12-10 15:44:37 -05:00
R4SAS
857df5c734
prevent log spamming with no_descriptors error
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-10 21:57:23 +03:00
orignal
737603e81b No descriptors error 2022-12-10 13:22:37 -05:00
orignal
53ca5dc67a memory pool for address vectors 2022-12-07 14:08:27 -05:00
orignal
8ad5696e50 don't send termination again if termination received block received 2022-12-06 21:40:33 -05:00
orignal
2bb5ff7184 eliminate RTT self-reduction 2022-12-05 15:48:11 -05:00
orignal
410d2c2fa9 use shared pointer for RouterInfo's addreses list 2022-12-04 19:21:51 -05:00
orignal
6a743f66e8 eliminate RTT self-reduction 2022-12-04 17:52:44 -05:00
orignal
709c451400 disable MemoryPool for RouterInfo's address 2022-12-04 17:49:59 -05:00
orignal
cb73c7c72e make sure that only *Mt method can be called for MemoryPoolMt 2022-12-04 17:43:29 -05:00
orignal
50abeea82a print endpoint if more than two fragments of SessionConfirmed 2022-12-04 17:08:38 -05:00
orignal
8db352b4d0 recognize symmetric NAT from peer test msg 7 2022-12-04 16:30:45 -05:00
orignal
6589bdf6b5 delete expired token right away 2022-12-03 15:05:27 -05:00
orignal
1ac171152a don't print error message if incomplete 2022-12-03 14:27:52 -05:00
orignal
629c718527 fixed races condition with pending outgoing sessions 2022-12-03 14:18:40 -05:00
orignal
949c38f5f0 reuse list of addresses 2022-11-28 19:16:21 -05:00
orignal
2a6f906177 print separate message for introducer timeout 2022-11-27 17:14:33 -05:00
orignal
64c3282aae check minimal message size 2022-11-27 09:13:24 -05:00
orignal
f5d511ae0f
Merge pull request #1811 from rex4539/typos
Fix typos
2022-11-26 14:25:31 -05:00
orignal
aa9a9ef18d memory pool for addreses 2022-11-25 19:18:53 -05:00
Dimitris Apostolou
73b9c0302b
Fix typos 2022-11-25 22:37:52 +02:00
orignal
aead9db971 Read local RouterInfo from file 2022-11-25 14:53:40 -05:00
orignal
fb8be32c28 removed SSU and NTCP transports 2022-11-23 15:45:00 -05:00
orignal
a298588943 SSU2 only introducers 2022-11-23 13:44:03 -05:00
orignal
ccfeca728e use only SSU2 for network status 2022-11-22 22:03:19 -05:00
orignal
7705423c42 remove SSU 2022-11-22 20:05:52 -05:00
orignal
379075c594 exluded SSU from transports 2022-11-22 19:29:20 -05:00
orignal
6a23153c0b don't read SSU addresses 2022-11-22 18:28:56 -05:00
orignal
9e02c99db5 check and limit LeaseSet's buffer size 2022-11-22 15:40:48 -05:00
orignal
9f59ff2df4 2.44.0 2022-11-20 08:56:05 -05:00
orignal
78357baca4 sync AcceptStream 2022-11-11 13:31:54 -05:00
orignal
85b78dfb9b call stream request callback after CreateStream 2022-11-09 18:26:16 -05:00
orignal
9fd60b52f1 sync StreamCreate 2022-11-08 19:52:43 -05:00
orignal
c6a6a4e0e8 sync Receive from stream 2022-11-08 18:34:59 -05:00
orignal
c88638afe4 reconnect to proxy if receive error 2022-11-08 10:37:34 -05:00
Sergey Fedorov
7f98a8b972
Fix definitions for Darwin PPC; do not use pthread_setname_np on unsupported OS versions (#1797)
* Correct define for Darwin PPC is __POWERPC__

* util.cpp: do not use pthread_setname_np on unsupported macOS versions
2022-11-06 13:48:02 +03:00
orignal
e13f151474 ssu2.mtu4 and ssu2.mtu6 2022-10-31 18:11:36 -04:00
orignal
4ed4e8708e close relay socket if associate socket gets closed 2022-10-28 18:54:04 -04:00
orignal
1738d118f7 recconnect to proxy 2022-10-28 14:06:45 -04:00
orignal
f1f66d7b8f handle SOCKS connect reply for ipv6 address 2022-10-27 19:47:24 -04:00
orignal
4ed5e44de7 correct buffer size for ipv6 SOCKS proxy reply 2022-10-27 15:22:24 -04:00
orignal
3e3f92c616 set and check proxy status for ipv6 if presented 2022-10-27 15:02:54 -04:00
orignal
5fb1247b87 correct MTU calculation through proxy 2022-10-27 13:56:42 -04:00
orignal
016222463d don't run peer test for SSU2 through proxy 2022-10-26 21:14:28 -04:00
orignal
0e477bf938 set min MTU if through proxy 2022-10-26 18:55:13 -04:00
orignal
eb75eb0e55 reset port value before parsing 2022-10-26 18:35:56 -04:00
orignal
2a703e0844 SSU2 through a socks5 proxy 2022-10-26 16:05:40 -04:00
orignal
2b6d9eaa8b disable compressible padding for now 2022-10-26 13:26:16 -04:00
orignal
f9b0bb0383 I2PTunnel/UDPTunnel split 2022-10-25 15:30:12 -04:00
orignal
c6e8873d57 always compress SYN packet 2022-10-24 19:21:58 -04:00
orignal
b2767304e9 correct padding offset 2022-10-24 18:07:04 -04:00
orignal
3d4d3ce80d compressable crypto key and padding for routers and destination 2022-10-24 15:12:07 -04:00
orignal
f3aada9e1a Proxy connection and UDP associate request 2022-10-18 21:11:06 -04:00
orignal
08fd32b3bf allow different ports from RelayReponse and HolePunch 2022-10-17 18:38:44 -04:00
orignal
39a86ce5c9 handle UDP packet from proxy relay 2022-10-16 22:16:16 -04:00
orignal
fe25260ee2 send UDP request to proxy relay 2022-10-16 21:23:28 -04:00
orignal
63fd05c7d3 SOCKS5 constants 2022-10-15 21:37:00 -04:00
orignal
e5553f7528 milliseconds for peer test send time 2022-10-11 18:21:04 -04:00
orignal
6e3cec653d resend PeerTest msg 2 2022-10-11 15:27:19 -04:00
orignal
55976fd9dc resend PeerTest msg 1 2022-10-10 16:34:08 -04:00
R4SAS
1d9d89b115
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-10 15:43:37 +03:00
orignal
3544f77e90 terminate peer session if Charlie's RouterInfo not found 2022-10-09 15:03:32 -04:00
R4SAS
96c4463d39
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-09 20:24:43 +03:00
R4SAS
650b7abef6
[SSU2] add log messages about peertest
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-09 20:12:22 +03:00
R4SAS
714b3856a2
[SSU2] print to log when peer test is sent
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-09 18:59:53 +03:00
orignal
69ca3bc75d catch lexical_cast exceptions 2022-10-06 18:48:17 -04:00
orignal
549dcbee32 don't set port=1 2022-10-03 15:40:25 -04:00
orignal
0a0c2350f2 random seelection between NTCP2 and SSU2 priority 2022-10-01 19:39:08 -04:00
orignal
cef2263a7f Transports priority for peer 2022-09-30 19:24:36 -04:00
orignal
638c376e5b enable SSU2 and disable SSU by default 2022-09-24 16:37:18 -04:00
orignal
8eade86624 moved InitTransports code from Daemon to Transports 2022-09-23 21:27:11 -04:00
orignal
24ae8d5443 don't handle more than 2 fragments in SessionConfirmed 2022-09-20 18:32:29 -04:00
orignal
030af11d86 don't merge duppicated fragment of SessionConfirmed 2022-09-18 21:13:38 -04:00
orignal
857a2bc399 verify path response 2022-09-14 19:08:14 -04:00
orignal
09e6e2940f correct max paddign size 2022-09-09 07:23:46 -04:00
orignal
23e18a34d4 check if new address is in reserved range 2022-09-08 18:46:48 -04:00
orignal
3bdef5f58d update remote endpoint and send path challenge 2022-09-07 19:11:33 -04:00
orignal
cf27581c76 check min MTU 1280 2022-09-05 15:27:38 -04:00
orignal
4634bff9f0 limit number of resent packets. Resend interval variance 2022-09-03 15:38:52 -04:00
orignal
1a9c658836 immediate ack request flag 2022-09-01 18:40:54 -04:00
orignal
1a32c55ca3 delete routers with expired SSU2 introducers 2022-08-31 13:10:52 -04:00
orignal
9b5a885b3b check if I2NP message to send is not null 2022-08-30 08:48:28 -04:00
orignal
f378119889 5 SSU2 peer tests if no SSU 2022-08-29 21:27:02 -04:00
orignal
8fd466c5a9 separate network status and errors 2022-08-29 21:11:17 -04:00
orignal
95f19a5fb2 send Retry instead SessionCreated if clock skew 2022-08-26 10:14:30 -04:00
orignal
f98780b1d7 check timestamp for token request 2022-08-25 18:48:26 -04:00
orignal
150c89e48a don't request session if zero token received 2022-08-25 15:14:45 -04:00
R4SAS
63227ab2f1
fix log message
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-08-24 11:25:14 +03:00
orignal
b40f1b67b9 2.43.0 2022-08-21 14:52:55 -04:00
orignal
f875823357 copy path challenge to response 2022-08-15 15:32:55 -04:00
orignal
75611866eb update router's transports when SSU or NTCP address was deleted 2022-08-14 10:43:16 -04:00
orignal
c3dd7ed73a try to resend if window is full 2022-08-12 18:56:58 -04:00
orignal
3ae885d120 change status back to Testing from Unknow if next test was accepted 2022-08-12 16:12:30 -04:00
orignal
81f53d313c alsways set some port to SSU2 address 2022-08-11 20:16:08 -04:00
orignal
9d123fa5ad select random port if port not found or specified 2022-08-10 22:00:11 -04:00
orignal
f4d6a08d57 create separate addresses for published SSU2 2022-08-10 15:50:30 -04:00
orignal
8f5768f85b memory pool for leases 2022-08-09 19:40:07 -04:00
orignal
3dd78a2589 remove SSU address if SSU is off 2022-08-09 19:12:11 -04:00
orignal
df92a85159 set SSU2 port +1 if not specified 2022-08-09 14:08:13 -04:00
orignal
ab606a1121 adjust clock from SSU2 2022-08-08 19:57:48 -04:00
orignal
c6f898b8ca connect to Charlie if RelayResponse from Bob was received before HolePunch 2022-08-08 13:08:12 -04:00
orignal
b9970e1908 cleanup introducers upon reschedule 2022-08-07 09:50:30 -04:00
orignal
8bb9a57908 re-insert introducer back 2022-08-06 20:05:08 -04:00
orignal
53934a470b update keys for NTCP2 and SSU2 addreses 2022-08-06 16:30:49 -04:00
orignal
a94ae7d77d update keys for NTCP2 and SSU2 addreses 2022-08-06 16:25:46 -04:00
orignal
f43e860998 cleanup introducers if router is not longer firewalled 2022-08-05 21:23:23 -04:00
orignal
3e40852999 memory pool for sent packets 2022-08-04 18:13:44 -04:00
orignal
df073bb306 send local address in RelayResponse block 2022-08-04 15:15:19 -04:00
orignal
771c4a0d02 allocate smaller I2NP buffer for fragmented message. Limit number of fragments by 64 2022-08-03 16:06:07 -04:00
orignal
cb959ab14c allocate tunnel message buffer for I2NP block with tunnel data message type 2022-08-03 10:26:55 -04:00
orignal
ed5c533982 recgnize symmetric NAT from SSU2 2022-08-02 20:02:55 -04:00
orignal
98d2ce5845 Respond to path challenge. Correct termination reason for duplicated session 2022-08-02 13:35:18 -04:00
orignal
eba4626589 kappa for RTO culculation 2022-07-31 09:45:18 -04:00
orignal
ff5fa1d137 3 bytes off for token in RelayResponse 2022-07-30 18:50:43 -04:00
orignal
71766ecd16 select introducers randomly. More logging for RelayIntro 2022-07-30 16:31:44 -04:00
orignal
fc63ca6982 correct excluded routers size for exploratory request 2022-07-30 14:28:09 -04:00
orignal
0e6d888ed3 changed some retransmission params 2022-07-29 18:45:02 -04:00