Commit graph

150 commits

Author SHA1 Message Date
orignal d96803a290 always request through tunnels in case of restricted routes 2024-02-09 15:24:48 -05:00
orignal 8f28cee32f drop earlier if delayed queue is semi-full 2024-02-01 18:55:10 -05:00
orignal 1e5604ed43 check if peer is connected before trying to connect 2024-01-18 19:18:51 -05:00
orignal 7cfcb12c7b don't create peer for unreachable router 2024-01-16 14:33:36 -05:00
Vort 34d75b08dd handle 'reservedrange' param properly 2024-01-12 17:17:16 +02:00
orignal ca9782dd0d handle 'reservedrange' param properly 2024-01-11 15:39:42 -05:00
orignal 083034fa35 send peer tests with random delays 2023-11-09 21:56:32 -05:00
orignal 0cc91dd2d2 don't pick too active peer 2023-10-15 08:31:55 -04:00
orignal efdbe26755 try peer test again if Unknown 2023-09-28 18:40:51 -04:00
Vort 68f4961f1a separate test status from network status 2023-07-30 15:44:16 +03:00
orignal c620fc1232 clear unreachable flag upon succesive connect 2023-07-17 18:44:51 -04:00
Chad Fraleigh 638e9b4d7f
Fixed division by zero due to thread race condition. 2023-07-08 17:07:04 -07:00
orignal bb52056aec correct index for connected transport 2023-06-11 06:48:47 -04:00
orignal 8a52295882 make router real upon successive outgoing NTCP2 session. Eliminate static keys table 2023-05-06 16:43:09 -04:00
orignal 7c535159bc static keys table 2023-04-30 20:05:35 -04:00
orignal dc265367dc drop unexpected I2NP messages 2023-04-20 14:23:41 -04:00
orignal c22fc75370 set router properties from incoming connections 2023-04-19 19:48:09 -04:00
orignal 6206616347 don't set unreachable twice 2023-04-18 20:21:22 -04:00
orignal b77ae08388 exclude previously non-reachable transports 2023-04-18 14:35:13 -04:00
orignal 527ee3b3c5 check if ident is unrechable only once 2023-04-16 08:18:41 -04:00
orignal cd5bfaabb5 mark and check unreachable ident hashes 2023-04-15 22:16:31 -04:00
weko 354a04f0f6 Up level for some logs to critical 2023-03-31 11:29:04 +00:00
orignal cd1af85e39 bypass slow transport sessions 2023-03-29 15:54:53 -04:00
R4SAS 86fc12e395
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-11 09:41:51 +03:00
orignal d30d1e8a7d don't set unrechable for routers without published addresses 2023-02-06 14:18:15 -05:00
orignal 21542e8150 select first hop from high bandwidth peer for client tunnels 2023-02-03 15:59:56 -05:00
orignal bf8eecf407 more attempts to find good peer 2023-02-01 16:04:09 -05:00
R4SAS 503f522cc3
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
orignal 6942c20879 don't select overloaded peer 2023-01-01 19:42:40 -05:00
orignal 126dc0ebe0 inseer incoming session into sessions list 2022-12-28 16:47:50 -05:00
R4SAS 3471e6fe16
use deadline_timer for bandwidth calculation timer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 23:25:16 +03:00
R4SAS 0d523bd2a6
use 15s average bw for transit limits check
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:20 +03:00
R4SAS 8943200ffa
calculate bandwidth every 1 and 15 seconds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:19 +03:00
orignal 8320987124 delete invalid sessions from peers 2022-12-10 19:09:37 -05:00
orignal fb8be32c28 removed SSU and NTCP transports 2022-11-23 15:45:00 -05:00
orignal ccfeca728e use only SSU2 for network status 2022-11-22 22:03:19 -05:00
orignal 379075c594 exluded SSU from transports 2022-11-22 19:29:20 -05:00
orignal e13f151474 ssu2.mtu4 and ssu2.mtu6 2022-10-31 18:11:36 -04:00
orignal 3e3f92c616 set and check proxy status for ipv6 if presented 2022-10-27 15:02:54 -04:00
orignal 016222463d don't run peer test for SSU2 through proxy 2022-10-26 21:14:28 -04:00
orignal 2a703e0844 SSU2 through a socks5 proxy 2022-10-26 16:05:40 -04:00
R4SAS 1d9d89b115
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-10 15:43:37 +03:00
R4SAS 96c4463d39
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-09 20:24:43 +03:00
orignal 549dcbee32 don't set port=1 2022-10-03 15:40:25 -04:00
orignal 0a0c2350f2 random seelection between NTCP2 and SSU2 priority 2022-10-01 19:39:08 -04:00
orignal cef2263a7f Transports priority for peer 2022-09-30 19:24:36 -04:00
orignal 638c376e5b enable SSU2 and disable SSU by default 2022-09-24 16:37:18 -04:00
orignal 8eade86624 moved InitTransports code from Daemon to Transports 2022-09-23 21:27:11 -04:00
orignal f378119889 5 SSU2 peer tests if no SSU 2022-08-29 21:27:02 -04:00
R4SAS 991e37d0bf
[peertest] fixed ssu2 router exclusion
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-27 13:38:28 +03:00