Commit graph

1633 commits

Author SHA1 Message Date
orignal fc63ca6982 correct excluded routers size for exploratory request 2022-07-30 14:28:09 -04:00
orignal 0e6d888ed3 changed some retransmission params 2022-07-29 18:45:02 -04:00
orignal 9afe3b5f39 fixed typo 2022-07-29 18:27:21 -04:00
orignal 3bd40fc8b3 calculate RTT and RTO 2022-07-29 15:24:24 -04:00
orignal 01fe642beb don't create another session for peer test 2022-07-29 12:48:23 -04:00
orignal e70d57dcb4 resend intervals in milliseconds 2022-07-28 19:30:08 -04:00
orignal fd41fba069 variable retranmission window 2022-07-27 20:00:03 -04:00
orignal 8a6fe0f321 check if address type matches peer's address type for peer test msg 1 2022-07-27 10:55:08 -04:00
orignal ae73e8a305 find SSU2 address with static key if supports both ipv4 and ipv6 2022-07-27 10:19:25 -04:00
R4SAS a344c09d0d
[util] add inet_ntop for XP
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-27 15:44:30 +03:00
R4SAS 991e37d0bf
[peertest] fixed ssu2 router exclusion
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-27 13:38:28 +03:00
R4SAS fdeb884fe5
fixed getting MTU on windows, add address to log messages with MTU
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-27 13:24:07 +03:00
orignal 4b1f5c9c9b terminate session in separate task 2022-07-26 19:56:30 -04:00
orignal b574aaf99c fix SSU2 crash on shutdown 2022-07-26 18:46:05 -04:00
orignal f9106b77bb add SSU2 introducer if SSU2 only 2022-07-26 13:57:37 -04:00
orignal a0419e4f34 add SSU2 introducer if SSU2 only 2022-07-26 13:55:31 -04:00
orignal 46a549c875 random size of fragments 2022-07-26 13:00:41 -04:00
orignal f8a609f692 respond to termination 2022-07-25 18:46:25 -04:00
orignal 987497bb10 don't publish invalid host/port 2022-07-25 15:23:52 -04:00
orignal e537878b8a check Ack block bufer size and shrink ranges if necessary 2022-07-25 13:42:59 -04:00
orignal 617f45bc59 try to send I2NP message in one packet, reduce or drop Ack block if necessary 2022-07-24 19:44:49 -04:00
orignal fe744f8f81 more routine cleanup 2022-07-24 16:44:02 -04:00
orignal 93d879b297 more tunnel brokers ranges 2022-07-24 15:39:46 -04:00
orignal dbb9295063 set MTU if local address is specified explicitly. update MTU for ipv6 if not set 2022-07-24 15:24:01 -04:00
orignal 09aa96e486 always bring to closing state if termination requested 2022-07-23 19:48:37 -04:00
orignal 4d0047ae7c request termination for existing session 2022-07-23 18:48:53 -04:00
orignal b860a4799d testing cap for published SSU2 address 2022-07-23 16:17:30 -04:00
orignal 6ff64352d3 don't create and oublish duplicates 2022-07-23 14:32:16 -04:00
orignal 3683ec6a95 fixed race condition 2022-07-22 15:16:42 -04:00
orignal 454fa9ee9b update SSU2 port 2022-07-22 14:52:24 -04:00
orignal d33aeb4bb2 set unreachable if firewalled. Store router's hash of introducer instead session 2022-07-21 19:38:18 -04:00
R4SAS 5ff34b93c0
print detected MTU
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-21 23:53:12 +03:00
orignal 2eb929fe05
Merge pull request #1776 from simonvetter/openssl
leaseset: add missing bound checks
2022-07-21 16:23:48 -04:00
orignal ea0ed9e844 update SSU2 introducers if Firewalled 2022-07-20 21:55:48 -04:00
orignal 4a3e481a83 don't publish introducers for non-published SSU2 address 2022-07-20 16:13:00 -04:00
orignal 2197cd8620 add/remove SSU2 introducers to local RouterInfo 2022-07-20 16:01:08 -04:00
orignal cf0d3b5f61 create new list of SSU2 introducers 2022-07-19 18:38:58 -04:00
orignal 6f7ab49346 moved creation time to TransportSession 2022-07-19 17:02:37 -04:00
orignal 000e0358a7 resend SessionConfirmed immediately if another SessionCreated received 2022-07-19 16:09:16 -04:00
orignal a3e19931f0 insert RouterInfo from SessionConfirmed into netdb immediately 2022-07-19 14:06:00 -04:00
orignal 9fec1a86cf send ack for peer test 2022-07-18 19:58:19 -04:00
orignal ffab29890b created additional ranges if acnt > 255 2022-07-17 15:22:41 -04:00
orignal 206c068d8e don't send termination without address 2022-07-17 07:44:11 -04:00
orignal dc30cd1112 handle SessionConfirmed fragments in reversed order 2022-07-16 16:08:55 -04:00
Simon Vetter 412a245e88 leaseset: add missing bound checks
This builds on ChadF's issue and patch (https://github.com/PurpleI2P/i2pd/issues/1772)
and fixes other potential bound check issues.
2022-07-16 18:00:20 +02:00
orignal 16290bf66f fixed race condition on session termination 2022-07-15 18:22:18 -04:00
orignal 4f8b0e6484 send more SessionConfirmed termination messages. Limit send queue 2022-07-15 15:01:46 -04:00
orignal 5026dbc1b3 receive bigger packets 2022-07-14 20:12:27 -04:00
orignal 014e4b0e1d detect MTU for some known ipv6 tunnel brokers 2022-07-14 13:48:28 -04:00
orignal 14a6947b02 round MTU to multiple of 16 for SSU1 2022-07-14 07:58:55 -04:00
orignal 665a914dc3 set max MTU for ipv4 2022-07-13 20:08:57 -04:00
orignal 8feac310af start initial peer test if SSU2 only 2022-07-13 19:56:55 -04:00
orignal 3394bb4b8d calculate SSU2 session MTU and max payload size 2022-07-13 19:35:18 -04:00
orignal 1dd2bd0013 publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1 2022-07-13 15:52:19 -04:00
orignal 5c62726992 check clock skew and terminate 2022-07-13 12:45:20 -04:00
orignal 90981f628e Send fragmented SessionConfirmed 2022-07-12 19:04:03 -04:00
orignal 0c34189d94 correct buffer size for fragments of SessionConfirmed 2022-07-12 12:17:58 -04:00
orignal f1d3d6a7b5 set max compression for SessionConfirmed 2022-07-12 10:50:21 -04:00
orignal b0d962b49a send ack for retransmitted SessionConfirmed 2022-07-11 19:00:23 -04:00
orignal c50e453af6 check out of sequence messages range 2022-07-11 18:16:05 -04:00
Simon Vetter 3cf809e99d fix SSU2 introducers selection logic 2022-07-11 08:16:07 +00:00
orignal 8b649aaaf8 NACKs and Acks only Ack ranges 2022-07-10 18:50:02 -04:00
orignal fdebbc4498 select sessions for introducers 2022-07-10 17:13:25 -04:00
orignal 3ff3417ff2 send termiation with reason 2022-07-09 17:05:23 -04:00
orignal bb6227281a teminate session after 5 unacked resends 2022-07-08 21:31:44 -04:00
orignal 2f44d99a74 session closing state 2022-07-08 19:06:09 -04:00
orignal ca4414d15a request relay tag if firewalled 2022-07-08 13:52:09 -04:00
orignal fbb961b43c extract correct endpoint from peer test msg 2 2022-07-07 13:23:51 -04:00
orignal fa9c174264 handle first packet from Bob 2022-07-06 21:28:53 -04:00
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2022-07-06 19:33:02 -04:00
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 2022-07-06 13:35:04 -04:00
orignal aa21748e9a set status OK after peer test msg 5 2022-07-06 12:41:51 -04:00
orignal a2f4e08b00 set testing status for SSU2 peer test 2022-07-05 19:38:24 -04:00
orignal 66bc29d075 insert received RouterInfo into netdb immediately 2022-07-05 19:15:50 -04:00
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 2022-07-05 13:07:23 -04:00
orignal a1e414c3b7 make SSU2 server eligible for peer test 2022-07-05 12:55:11 -04:00
r4sas a5a35b1fa6 [daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
2022-07-05 06:11:23 +00:00
orignal 6039cdceb0 correct SSU2 only detection 2022-07-04 20:01:45 -04:00
orignal 473159be0f don't use port from SSU2 address 2022-07-04 19:32:43 -04:00
orignal 0e6ad548b2 invoke SSU2 peer test updates 2022-07-04 18:54:20 -04:00
orignal 6143515ac6 update our IP adress from SSU2 2022-07-03 09:31:20 -04:00
orignal 50419f200d fixed 1 packet off for out of sequence clean up 2022-07-01 17:35:38 -04:00
orignal 455390f121 clean up first out of sequence packet if too many 2022-07-01 10:52:10 -04:00
orignal d375299fa9 send token in relay response block 2022-06-30 20:00:18 -04:00
orignal 28db337166 give priority to SSU2 over SSU 2022-06-30 12:53:50 -04:00
orignal 6ca9a599ff remove session after HolePunch received 2022-06-30 08:37:50 -04:00
orignal 83bd3b6f0b use token from RelayResponse block 2022-06-29 13:42:57 -04:00
orignal a68765e021 fixed off 5 bytes for follow on fragment 2022-06-29 08:30:11 -04:00
orignal f5ed9129cd process retry as reponse to relay request 2022-06-29 08:09:43 -04:00
orignal 5e3115a614 check nonce in HolePunch relay response block 2022-06-28 18:51:31 -04:00
orignal 624c46f925 correct msg offset for follow-on fragment 2022-06-28 16:09:13 -04:00
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2022-06-28 10:35:35 -04:00
orignal d3bc9eb110 update token and conn id after HolePunch 2022-06-27 23:03:27 -04:00
orignal 72b61a29c2 check TokenRequest message size 2022-06-27 15:56:47 -04:00
orignal a99fcfe54f cleanup terminated sessions 2022-06-26 21:35:26 -04:00
orignal b5d139f7b2 process session created after session request sent 2022-06-26 14:31:24 -04:00
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2022-06-26 10:07:39 -04:00
orignal baf74cb582 1 byte off for RelayRequest signature 2022-06-26 09:53:29 -04:00
orignal 63d7cffefe Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2022-06-25 18:52:09 -04:00
orignal d7d74666b2 correct max MTU size 2022-06-25 18:51:24 -04:00