Commit Graph

1751 Commits (f79900653b2f687f6a004377c6ff634f19822487)

Author SHA1 Message Date
orignal 2eb929fe05
Merge pull request #1776 from simonvetter/openssl
leaseset: add missing bound checks
2 years ago
orignal ea0ed9e844 update SSU2 introducers if Firewalled 2 years ago
orignal 4a3e481a83 don't publish introducers for non-published SSU2 address 2 years ago
orignal 2197cd8620 add/remove SSU2 introducers to local RouterInfo 2 years ago
orignal cf0d3b5f61 create new list of SSU2 introducers 2 years ago
orignal 6f7ab49346 moved creation time to TransportSession 2 years ago
orignal 000e0358a7 resend SessionConfirmed immediately if another SessionCreated received 2 years ago
orignal a3e19931f0 insert RouterInfo from SessionConfirmed into netdb immediately 2 years ago
orignal 9fec1a86cf send ack for peer test 2 years ago
orignal ffab29890b created additional ranges if acnt > 255 2 years ago
orignal 206c068d8e don't send termination without address 2 years ago
orignal dc30cd1112 handle SessionConfirmed fragments in reversed order 2 years ago
Simon Vetter 412a245e88 leaseset: add missing bound checks
This builds on ChadF's issue and patch (https://github.com/PurpleI2P/i2pd/issues/1772)
and fixes other potential bound check issues.
2 years ago
orignal 16290bf66f fixed race condition on session termination 2 years ago
orignal 4f8b0e6484 send more SessionConfirmed termination messages. Limit send queue 2 years ago
orignal 5026dbc1b3 receive bigger packets 2 years ago
orignal 014e4b0e1d detect MTU for some known ipv6 tunnel brokers 2 years ago
orignal 14a6947b02 round MTU to multiple of 16 for SSU1 2 years ago
orignal 665a914dc3 set max MTU for ipv4 2 years ago
orignal 8feac310af start initial peer test if SSU2 only 2 years ago
orignal 3394bb4b8d calculate SSU2 session MTU and max payload size 2 years ago
orignal 1dd2bd0013 publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1 2 years ago
orignal 5c62726992 check clock skew and terminate 2 years ago
orignal 90981f628e Send fragmented SessionConfirmed 2 years ago
orignal 0c34189d94 correct buffer size for fragments of SessionConfirmed 2 years ago
orignal f1d3d6a7b5 set max compression for SessionConfirmed 2 years ago
orignal b0d962b49a send ack for retransmitted SessionConfirmed 2 years ago
orignal c50e453af6 check out of sequence messages range 2 years ago
Simon Vetter 3cf809e99d fix SSU2 introducers selection logic 2 years ago
orignal 8b649aaaf8 NACKs and Acks only Ack ranges 2 years ago
orignal fdebbc4498 select sessions for introducers 2 years ago
orignal 3ff3417ff2 send termiation with reason 2 years ago
orignal bb6227281a teminate session after 5 unacked resends 2 years ago
orignal 2f44d99a74 session closing state 2 years ago
orignal ca4414d15a request relay tag if firewalled 2 years ago
orignal fbb961b43c extract correct endpoint from peer test msg 2 2 years ago
orignal fa9c174264 handle first packet from Bob 2 years ago
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2 years ago
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 2 years ago
orignal aa21748e9a set status OK after peer test msg 5 2 years ago
orignal a2f4e08b00 set testing status for SSU2 peer test 2 years ago
orignal 66bc29d075 insert received RouterInfo into netdb immediately 2 years ago
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 2 years ago
orignal a1e414c3b7 make SSU2 server eligible for peer test 2 years ago
r4sas a5a35b1fa6 [daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
2 years ago
orignal 6039cdceb0 correct SSU2 only detection 2 years ago
orignal 473159be0f don't use port from SSU2 address 2 years ago
orignal 0e6ad548b2 invoke SSU2 peer test updates 2 years ago
orignal 6143515ac6 update our IP adress from SSU2 2 years ago
orignal 50419f200d fixed 1 packet off for out of sequence clean up 2 years ago
orignal 455390f121 clean up first out of sequence packet if too many 2 years ago
orignal d375299fa9 send token in relay response block 2 years ago
orignal 28db337166 give priority to SSU2 over SSU 2 years ago
orignal 6ca9a599ff remove session after HolePunch received 2 years ago
orignal 83bd3b6f0b use token from RelayResponse block 2 years ago
orignal a68765e021 fixed off 5 bytes for follow on fragment 2 years ago
orignal f5ed9129cd process retry as reponse to relay request 2 years ago
orignal 5e3115a614 check nonce in HolePunch relay response block 2 years ago
orignal 624c46f925 correct msg offset for follow-on fragment 2 years ago
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2 years ago
orignal d3bc9eb110 update token and conn id after HolePunch 2 years ago
orignal 72b61a29c2 check TokenRequest message size 2 years ago
orignal a99fcfe54f cleanup terminated sessions 2 years ago
orignal b5d139f7b2 process session created after session request sent 2 years ago
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2 years ago
orignal baf74cb582 1 byte off for RelayRequest signature 2 years ago
orignal 63d7cffefe Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2 years ago
orignal d7d74666b2 correct max MTU size 2 years ago
R4SAS 078d76c6f3
fix tabulation, remove long description (to be moved to documentation)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 3539ee9be6
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1
Add SIGTSTP, SIGCONT support
2 years ago
AVAtarMod 437282b148 [config, daemon] catch TSTP, CONT is option 2 years ago
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 2 years ago
orignal ae77d4ad22 correct signed content for peer test msg 3 2 years ago
orignal 821987fed7 don't send peer test for unknown address/port 2 years ago
orignal 18ddba4332 send RouterInfo message to right session in relay request 2 years ago
orignal aaad6dece6 set session request sent status in right place 2 years ago
orignal ed04747b9d resend SessionRequest and SessionCreated 2 years ago
orignal 827a88d772 exclude expired SSU2 introducers 2 years ago
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 2 years ago
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 2 years ago
orignal 578a15bbe5 don't send PeerTest msg 5 if address is not supported 2 years ago
orignal 6b3d7372ae token received session state 2 years ago
orignal 55f7529167 delete pending outgoind session when Retry received 2 years ago
orignal bceae244c1 delete pending outgoind session when SessionCreated received 2 years ago
orignal 5de224d6bf don't connect if pending connection already 2 years ago
orignal 694b936f30 verify signature for PeerTest msg 4 2 years ago
orignal dda25d431c check if we can send HolePunch to partcular address 2 years ago
orignal 22f9abc2f1 send errors for RelayIntro 2 years ago
orignal c6c3de9164 fixed PeerTest signature verification 2 years ago
orignal 58186f0283 handle PeerTest msg 4 if msg 5 was received before 2 years ago
orignal 0253e2d3f6 different nonce location for PeerTest msg 2 and 4 2 years ago
orignal ee20d5b804 sign data for PeerTest msg 3 and 5 2 years ago
orignal b8bc114502 correct source connection id for HolePunch 2 years ago
orignal 74d29770e1 handle unexpected PeerTest message 2 years ago
orignal e4d5788cdc correct endianess for PeerTest mesaage connection id 2 years ago
orignal 2a5cf3e4a8 SSU2 connect timer 2 years ago
orignal c348736058 send updated local RouterInfo for long sessions 2 years ago
orignal 5bb20cb039 token expiration threshold 2 years ago
orignal dd602a27b5 send RelayResponse rejection message 2 years ago
orignal 2067de162a show itag for SSU2 sessions 2 years ago
orignal 2cc106b43e bind SSU2 socket to specified interface 2 years ago
orignal b15bfd99b3 correct layout for peer test masg 2 and 4 2 years ago
orignal 67252b90b3 generate new token with longer expiration time 2 years ago
orignal 079f7e515c correct hangling of Ack ranges 2 years ago
orignal e8c58270c4 Populate router's buffer before sending RouterInfo block 2 years ago
orignal 0c64f278d7 1 byte off for ranges in Ack block 2 years ago
orignal 03518ec94f fixed typo 2 years ago
orignal 93b5dc2dff send new token block in SessionCreated 2 years ago
orignal 3bef6383d9 send update local RouterInfo 2 years ago
orignal 17892238a9 update supported transports for SSU2 2 years ago
orignal b678c989e2 fixed typo 2 years ago
orignal b72d1237d2 correct values for last ack range 2 years ago
orignal f7b6db5dad PeerTest for connection through introducer 2 years ago
orignal b744a0cc38 correct ack ranges calculation 2 years ago
orignal b918499f14 correct SSU2 server termination 2 years ago
orignal 2cfd054f2c publisuh peer test cap for published SSU2 addresses 2 years ago
orignal dddc7ab039 publisuh peer test cap for published SSU2 addresses 2 years ago
orignal 2e4d8cdc8b handle PeerTest msg 1 2 years ago
orignal 0640bec026 corect ack count in ranges 2 years ago
orignal cbcee5fb45 handle peer test messages 4 and 5 2 years ago
orignal 47460d86b2 verify signature and send peer test msg 5 2 years ago
orignal 3cd74f0d4f send PeerTest message 2 years ago
R4SAS 690c9f7c6f
[FS] add support for windows ProgramData path when running as service
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS e2718e5a12
[config] change descriptions for deprecated options
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal d9fefe757e SSU2/SSU2Session split 2 years ago
orignal 55e4bf6b65 set correct statuc code for peer test 2 years ago
orignal 4670b12d49 correct buffer size for token request 2 years ago
orignal 321ec8ae4d correct size for Ack block with ranges 2 years ago
orignal 1ccbb8d10b correct offset for nonce in peer test message 2 years ago
orignal 86c0accdce check nonce for peer test msg 5 2 years ago
orignal 38d6c29ce9 correct timestamp size for peer test message 2 years ago
orignal 0cf9478cd4 create SSU2 session for peer test msgs 5-7 2 years ago
orignal a04abd304a don't send own hash for peer test msg 1 2 years ago
orignal 84aec9fe31 correct msg for first peer test message 2 years ago
orignal 593b9bb6c5 start SSU2 server before peer test 2 years ago
orignal d3a9cc8fde check if session is established before sending peer test 2 years ago
orignal 87a434c377 start peer test for SSU2 2 years ago
orignal 56022c9442 handle garlic messages from tunnels without pool 2 years ago
orignal 593d6bf466 create initial peer test 2 years ago
orignal 1d6104ecf3 addressbook.enabled config param 2 years ago
orignal 14da941ff4 Fixed #1761. Correct section for SSU2 2 years ago
R4SAS 06b87311ea
2.42.1
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal fd7b889a0f 2.42.0 2 years ago
R4SAS 6b4ffcff5a cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS d31cd2e5d6
fix incorrect boolean value parsing
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS ee6bb40736 remove obsolete msvc define
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 2cd3ebbdb3 copy peer test block 2 years ago
orignal 5e25e30330 check if there is only one unacked packet 2 years ago
orignal 5aa2a8f60f handle peer tests 2 years ago
orbea 0a1e302e8a libi2pd: Fix the build with LibreSSL 3.5.2 2 years ago
orignal bb705a77cf handle PeerTest message 2 years ago
orignal cb6155b946 fixed warning 2 years ago
orignal 714d1cc993 close stream if delete requested 2 years ago
orignal bc8e4494c4 random new profiles cleanup interval 2 years ago
R4SAS c3a064f980
change int type
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS eb3feb7dbd [profiles] add daily cleanup
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal da3f3ccac9 connect to reachable introducers only 2 years ago
orignal 1a1871e8cd add RouterInfo block before RelayIntro 2 years ago
orignal c22ab7e1fc use openssl's siphash for 3.0.1 and higher 2 years ago
orignal 436992b069 send and process HolePunch message 2 years ago
orignal 18cb3912e5 fixed imccorect termination 2 years ago
R4SAS 3716b6f988
move TunnelHopVisitor inside Tunnel class
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
R4SAS c9e4e78f41
[webconsole] remove version from title, move tunnel chain print from Tunnel class
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 5aebefe73f connect through introducer 2 years ago
R4SAS 8f2124beab
update reseeds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 1f5ed89a88 set blinded signature type to RedDSA for EdDSA 2 years ago
orignal dc82105226 check status code and verify RelayResponse signature 2 years ago
orignal 5221f3ddc9 one SSU2 session per remote router 2 years ago
orignal e970deb92b check presense of introducers in SSU2 address 2 years ago
orignal 9db7ec6bb0 create and send RelayRequest 2 years ago
orignal 2e691b6655 check if next manage time is too long 2 years ago
orignal f22e10537b fixed typo 2 years ago
orignal 6e532c494c create new published SSU2 addresses 2 years ago
orignal f9ed0d4aa2 fixed crash 2 years ago
orignal 78b1afcc8c publish introducer cap for SSU2 address 2 years ago
orignal 40340cf9c2 handle RelayResponse 2 years ago
orignal eb6437050f SSU2 introducers 2 years ago
orignal 45ebfe378b correct Ack range 2 years ago
R4SAS 1326597226 use ipv6 preference only when netinet headers not used (entware with musl workaround)'
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 751da92c13 send relay response 2 years ago
orignal e10ca637da handle RelayIntro 2 years ago
orignal c5d9d71a8a create relay tag and relay request block 2 years ago
orignal 3e0f5d231d send queue after batch of packets 2 years ago
orignal 6990f177ba window size 2 years ago
orignal 4c91ae0085 check if end of list 2 years ago
orignal 43f74d4d5a resend packet with new packet number 2 years ago
orignal 8c3e716c3f ranges in ack block 2 years ago
orignal 05946125b5 handle single packet 2 years ago
orignal 1e2a0a4549 handle incoming packets in batch 2 years ago
orignal f9d67b28ec handle fragmented SessionConfirmed 2 years ago
orignal 46b77cc280 increase RouterInfo buffer size 2 years ago
orignal 678a1ae0fb send fragmented messages 2 years ago
orignal 51cbffd097 don't lookup session for every sinle packet 2 years ago
orignal 207b13dcab send correct acnt if gaps 2 years ago
orignal 3052dbd1e8 single receive thread for both ipv4 and ipv6 2 years ago
orignal 5891b1ceb2 separate receive thread 2 years ago
orignal 07e14ddda8 check if SSU2 enabled 2 years ago
orignal db5e90787c update I2NP header after all fragments received 2 years ago
orignal 67e501f5c7 correct nonce for SessionCorfirmed part 2 2 years ago
orignal 2160001167 correct non for token request and retry encryption 2 years ago
orignal f5f4150d17 fixed typo 2 years ago
orignal f5f282af97 cost for published SSU2 address 2 years ago
orignal 82f9585b7a handle fragments 2 years ago
orignal eb561bb0c2 handle Ack ranges 2 years ago
orignal 81207999eb check token in SessionRequest 2 years ago
orignal 2fef595b83 resend packets 2 years ago
orignal 2024e790ca send I2NP messages 2 years ago
orignal f9925c7374 hanlde Ack block 2 years ago
orignal dd774b8dfd store out of sequence packet numbers 2 years ago
orignal 064b8042a5 ssu2.published and update SSU2 ipv4 2 years ago
orignal 7923ed9567 publish SSU2 address 2 years ago
orignal 30b83414ef find SSU2 address by address type 2 years ago
orignal 990906c57f insert garlic tag in destination's thread 2 years ago
orignal 4c323a666a show SSU2 transports in web console 2 years ago
orignal a3f165d374 handle and send termination 2 years ago
orignal 7d5f51e357 don't send instant Ack for out-of-sequence message 2 years ago
orignal 371a339b18 encrypt Data header 2 years ago
orignal 7e7aee27b6 handle I2NP message block 2 years ago
orignal 53148fe58f send Ack packet 2 years ago
orignal 56b6de6962 correct header decryption for Data message 2 years ago
orignal 44735681af KDF and process Data message 2 years ago
orignal ee1c4f4fdc internal numeric id for families 2 years ago
orignal fb6ecdde1e handle TokenRequest 2 years ago
orignal 861166d8a9 send TokenRequest message: 2 years ago
R4SAS 70dca81c40 dropped MESHNET build option
Dropping MESHNET build option due to lack of usage. That change won't
affect on usage with currently supported Yggdrasil network.

Signed-off-by: R4SAS <r4sas@i2pmail.org>
2 years ago
orignal 2440ffbfc9 handle SSU2 SessionConfirmed 2 years ago
orignal 77c5dde320 send SessionConfirmed 2 years ago
orignal aa49cad279 correct encrypted payload size for MixHash 2 years ago
orignal f56ae240ab don't delete peding endpoint if Retry received 2 years ago
orignal e871a30a78 initialize connid in constructor 2 years ago
orignal 30e6984889 handle Retry message 2 years ago
orignal 324932c758 separate i and key fields for shared SSU address 2 years ago
orignal 421800bc8f recognize SSU address supporting SSU2 2 years ago
orignal 87bf5c2418 cleanup pending sessions 2 years ago
orignal 5c9af1c613 MixHash with encrypted payload after decryption 2 years ago
orignal 765e0e5c6b correct 'i' size for SSU2 2 years ago
orignal cc296e16dc don't make SSU2 address published is 'i' is presented 2 years ago
orignal ab9901525b separated sockets for ipv4 and ipv6 2 years ago
orignal 3643a46a0c don't update SSU2 port 2 years ago
orignal d467e6869d don't update address for SSU2 2 years ago
orignal 3c5c375f71 connect to SSU2 address 2 years ago
orignal 7473d8c9aa create and handle Address block 2 years ago
orignal 40c8a1bc1d handle payload blocks 2 years ago
orignal 7b72d91549 receive incoming SSU2 packets 2 years ago
orignal b3c2e86436 skip unknown address 2 years ago
orignal 908bdc7624 always publish intro key for SSU2 address 2 years ago
orignal 21c1ec9c8c enable SSU2 server 2 years ago
orignal 6eba061c2a show local SSU2 address 2 years ago
orignal f184f550b9 SSU2 address in config and RouterInfo 2 years ago
orignal bb7c0fef20 SSU2 address in config and RouterInfo 2 years ago