Commit graph

1614 commits

Author SHA1 Message Date
orignal 83f43ab166 pick 3 routers for SSU2 peer test 2022-07-06 19:33:02 -04:00
orignal f7e9e6a1c4 set status OK after both peer test msg 4 and 5 2022-07-06 13:35:04 -04:00
orignal aa21748e9a set status OK after peer test msg 5 2022-07-06 12:41:51 -04:00
orignal a2f4e08b00 set testing status for SSU2 peer test 2022-07-05 19:38:24 -04:00
orignal 66bc29d075 insert received RouterInfo into netdb immediately 2022-07-05 19:15:50 -04:00
orignal 3ed625f949 don't try SSU peer test if SSU is disabled 2022-07-05 13:07:23 -04:00
orignal a1e414c3b7 make SSU2 server eligible for peer test 2022-07-05 12:55:11 -04:00
r4sas a5a35b1fa6 [daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
2022-07-05 06:11:23 +00:00
orignal 6039cdceb0 correct SSU2 only detection 2022-07-04 20:01:45 -04:00
orignal 473159be0f don't use port from SSU2 address 2022-07-04 19:32:43 -04:00
orignal 0e6ad548b2 invoke SSU2 peer test updates 2022-07-04 18:54:20 -04:00
orignal 6143515ac6 update our IP adress from SSU2 2022-07-03 09:31:20 -04:00
orignal 50419f200d fixed 1 packet off for out of sequence clean up 2022-07-01 17:35:38 -04:00
orignal 455390f121 clean up first out of sequence packet if too many 2022-07-01 10:52:10 -04:00
orignal d375299fa9 send token in relay response block 2022-06-30 20:00:18 -04:00
orignal 28db337166 give priority to SSU2 over SSU 2022-06-30 12:53:50 -04:00
orignal 6ca9a599ff remove session after HolePunch received 2022-06-30 08:37:50 -04:00
orignal 83bd3b6f0b use token from RelayResponse block 2022-06-29 13:42:57 -04:00
orignal a68765e021 fixed off 5 bytes for follow on fragment 2022-06-29 08:30:11 -04:00
orignal f5ed9129cd process retry as reponse to relay request 2022-06-29 08:09:43 -04:00
orignal 5e3115a614 check nonce in HolePunch relay response block 2022-06-28 18:51:31 -04:00
orignal 624c46f925 correct msg offset for follow-on fragment 2022-06-28 16:09:13 -04:00
orignal 52d1ee161f store RouterInfo in netdb from SessionConfirmed 2022-06-28 10:35:35 -04:00
orignal d3bc9eb110 update token and conn id after HolePunch 2022-06-27 23:03:27 -04:00
orignal 72b61a29c2 check TokenRequest message size 2022-06-27 15:56:47 -04:00
orignal a99fcfe54f cleanup terminated sessions 2022-06-26 21:35:26 -04:00
orignal b5d139f7b2 process session created after session request sent 2022-06-26 14:31:24 -04:00
orignal 463ed12ce8 don't pick same session for PeerTest msg 2 2022-06-26 10:07:39 -04:00
orignal baf74cb582 1 byte off for RelayRequest signature 2022-06-26 09:53:29 -04:00
orignal 63d7cffefe Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl 2022-06-25 18:52:09 -04:00
orignal d7d74666b2 correct max MTU size 2022-06-25 18:51:24 -04:00
R4SAS 078d76c6f3
fix tabulation, remove long description (to be moved to documentation)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-06-26 01:38:42 +03:00
orignal 3539ee9be6
Merge pull request #1769 from AVAtarMod/sigtstp-patch-1
Add SIGTSTP, SIGCONT support
2022-06-25 13:09:57 -04:00
AVAtarMod 437282b148 [config, daemon] catch TSTP, CONT is option 2022-06-25 18:54:54 +03:00
orignal dd1dd3b7cf wait for Ack for SessionConfirmed or resend 2022-06-24 22:06:30 -04:00
orignal ae77d4ad22 correct signed content for peer test msg 3 2022-06-24 18:18:11 -04:00
orignal 821987fed7 don't send peer test for unknown address/port 2022-06-24 15:31:08 -04:00
orignal 18ddba4332 send RouterInfo message to right session in relay request 2022-06-24 14:08:39 -04:00
orignal aaad6dece6 set session request sent status in right place 2022-06-24 13:27:13 -04:00
orignal ed04747b9d resend SessionRequest and SessionCreated 2022-06-24 13:07:02 -04:00
orignal 827a88d772 exclude expired SSU2 introducers 2022-06-23 18:23:25 -04:00
orignal 38e43bc9c8 check Charlie's address for PeerTest msg 4 2022-06-23 08:18:35 -04:00
orignal c3c5c7ae63 forward correct RelayResponse from Charlie to Alice 2022-06-22 16:56:54 -04:00
orignal 578a15bbe5 don't send PeerTest msg 5 if address is not supported 2022-06-22 15:26:23 -04:00
orignal 6b3d7372ae token received session state 2022-06-22 13:58:22 -04:00
orignal 55f7529167 delete pending outgoind session when Retry received 2022-06-22 13:36:01 -04:00
orignal bceae244c1 delete pending outgoind session when SessionCreated received 2022-06-22 13:15:25 -04:00
orignal 5de224d6bf don't connect if pending connection already 2022-06-22 11:59:29 -04:00
orignal 694b936f30 verify signature for PeerTest msg 4 2022-06-21 18:54:13 -04:00
orignal dda25d431c check if we can send HolePunch to partcular address 2022-06-21 16:20:39 -04:00
orignal 22f9abc2f1 send errors for RelayIntro 2022-06-21 15:45:35 -04:00
orignal c6c3de9164 fixed PeerTest signature verification 2022-06-21 14:46:59 -04:00
orignal 58186f0283 handle PeerTest msg 4 if msg 5 was received before 2022-06-21 12:09:58 -04:00
orignal 0253e2d3f6 different nonce location for PeerTest msg 2 and 4 2022-06-21 09:51:49 -04:00
orignal ee20d5b804 sign data for PeerTest msg 3 and 5 2022-06-21 08:12:41 -04:00
orignal b8bc114502 correct source connection id for HolePunch 2022-06-20 15:52:16 -04:00
orignal 74d29770e1 handle unexpected PeerTest message 2022-06-20 13:14:02 -04:00
orignal e4d5788cdc correct endianess for PeerTest mesaage connection id 2022-06-20 08:16:50 -04:00
orignal 2a5cf3e4a8 SSU2 connect timer 2022-06-19 16:40:03 -04:00
orignal c348736058 send updated local RouterInfo for long sessions 2022-06-19 14:21:35 -04:00
orignal 5bb20cb039 token expiration threshold 2022-06-19 08:52:47 -04:00
orignal dd602a27b5 send RelayResponse rejection message 2022-06-17 19:55:58 -04:00
orignal 2067de162a show itag for SSU2 sessions 2022-06-17 18:45:37 -04:00
orignal 2cc106b43e bind SSU2 socket to specified interface 2022-06-17 15:16:12 -04:00
orignal b15bfd99b3 correct layout for peer test masg 2 and 4 2022-06-17 08:34:40 -04:00
orignal 67252b90b3 generate new token with longer expiration time 2022-06-16 22:37:33 -04:00
orignal 079f7e515c correct hangling of Ack ranges 2022-06-16 14:13:28 -04:00
orignal e8c58270c4 Populate router's buffer before sending RouterInfo block 2022-06-15 13:10:49 -04:00
orignal 0c64f278d7 1 byte off for ranges in Ack block 2022-06-14 13:02:39 -04:00
orignal 03518ec94f fixed typo 2022-06-14 08:42:01 -04:00
orignal 93b5dc2dff send new token block in SessionCreated 2022-06-13 17:55:41 -04:00
orignal 3bef6383d9 send update local RouterInfo 2022-06-13 14:02:36 -04:00
orignal 17892238a9 update supported transports for SSU2 2022-06-12 18:26:02 -04:00
orignal b678c989e2 fixed typo 2022-06-12 17:26:19 -04:00
orignal b72d1237d2 correct values for last ack range 2022-06-12 16:54:02 -04:00
orignal f7b6db5dad PeerTest for connection through introducer 2022-06-11 21:26:23 -04:00
orignal b744a0cc38 correct ack ranges calculation 2022-06-11 10:15:27 -04:00
orignal b918499f14 correct SSU2 server termination 2022-06-10 12:50:55 -04:00
orignal 2cfd054f2c publisuh peer test cap for published SSU2 addresses 2022-06-10 10:59:26 -04:00
orignal dddc7ab039 publisuh peer test cap for published SSU2 addresses 2022-06-10 10:33:27 -04:00
orignal 2e4d8cdc8b handle PeerTest msg 1 2022-06-09 18:04:37 -04:00
orignal 0640bec026 corect ack count in ranges 2022-06-08 12:52:56 -04:00
orignal cbcee5fb45 handle peer test messages 4 and 5 2022-06-07 16:09:20 -04:00
orignal 47460d86b2 verify signature and send peer test msg 5 2022-06-07 12:55:58 -04:00
orignal 3cd74f0d4f send PeerTest message 2022-06-06 17:28:39 -04:00
R4SAS 690c9f7c6f
[FS] add support for windows ProgramData path when running as service
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-06-06 18:25:22 +03:00
R4SAS e2718e5a12
[config] change descriptions for deprecated options
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-06-06 17:44:36 +03:00
orignal d9fefe757e SSU2/SSU2Session split 2022-06-05 19:33:36 -04:00
orignal 55e4bf6b65 set correct statuc code for peer test 2022-06-05 14:59:33 -04:00
orignal 4670b12d49 correct buffer size for token request 2022-06-04 08:18:45 -04:00
orignal 321ec8ae4d correct size for Ack block with ranges 2022-06-03 19:16:52 -04:00
orignal 1ccbb8d10b correct offset for nonce in peer test message 2022-06-03 14:02:31 -04:00
orignal 86c0accdce check nonce for peer test msg 5 2022-06-03 13:18:37 -04:00
orignal 38d6c29ce9 correct timestamp size for peer test message 2022-06-03 08:39:54 -04:00
orignal 0cf9478cd4 create SSU2 session for peer test msgs 5-7 2022-06-02 20:12:25 -04:00
orignal a04abd304a don't send own hash for peer test msg 1 2022-06-02 18:23:51 -04:00
orignal 84aec9fe31 correct msg for first peer test message 2022-06-02 15:40:51 -04:00
orignal 593b9bb6c5 start SSU2 server before peer test 2022-06-02 15:08:38 -04:00
orignal d3a9cc8fde check if session is established before sending peer test 2022-06-02 15:04:35 -04:00
orignal 87a434c377 start peer test for SSU2 2022-06-01 21:51:02 -04:00
orignal 56022c9442 handle garlic messages from tunnels without pool 2022-05-31 21:43:31 -04:00
orignal 593d6bf466 create initial peer test 2022-05-31 18:31:05 -04:00
orignal 1d6104ecf3 addressbook.enabled config param 2022-05-27 13:17:06 -04:00
orignal 14da941ff4 Fixed #1761. Correct section for SSU2 2022-05-25 08:37:36 -04:00
R4SAS 06b87311ea
2.42.1
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-24 15:09:26 +03:00
orignal fd7b889a0f 2.42.0 2022-05-22 08:26:14 -04:00
R4SAS 6b4ffcff5a cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-20 17:44:29 +00:00
R4SAS d31cd2e5d6
fix incorrect boolean value parsing
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-17 19:02:12 +03:00
R4SAS ee6bb40736 remove obsolete msvc define
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-15 11:47:10 +03:00
orignal 2cd3ebbdb3 copy peer test block 2022-05-14 19:18:58 -04:00
orignal 5e25e30330 check if there is only one unacked packet 2022-05-14 16:36:16 -04:00
orignal 5aa2a8f60f handle peer tests 2022-05-13 20:38:18 -04:00
orbea 0a1e302e8a libi2pd: Fix the build with LibreSSL 3.5.2 2022-05-12 19:11:17 +00:00
orignal bb705a77cf handle PeerTest message 2022-05-11 17:48:25 -04:00
orignal cb6155b946 fixed warning 2022-05-11 11:44:27 -04:00
orignal 714d1cc993 close stream if delete requested 2022-05-08 11:49:11 -04:00
orignal bc8e4494c4 random new profiles cleanup interval 2022-05-07 09:56:58 -04:00
R4SAS c3a064f980
change int type
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-07 03:40:59 +03:00
R4SAS eb3feb7dbd [profiles] add daily cleanup
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-07 03:19:32 +03:00
orignal da3f3ccac9 connect to reachable introducers only 2022-05-06 19:38:48 -04:00
orignal 1a1871e8cd add RouterInfo block before RelayIntro 2022-05-06 15:02:09 -04:00
orignal c22ab7e1fc use openssl's siphash for 3.0.1 and higher 2022-05-04 18:58:08 -04:00
orignal 436992b069 send and process HolePunch message 2022-05-04 13:58:06 -04:00
orignal 18cb3912e5 fixed imccorect termination 2022-05-02 15:05:44 -04:00
R4SAS 3716b6f988
move TunnelHopVisitor inside Tunnel class
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-01 23:40:00 +03:00
R4SAS c9e4e78f41
[webconsole] remove version from title, move tunnel chain print from Tunnel class
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-01 23:25:08 +03:00
orignal 5aebefe73f connect through introducer 2022-05-01 10:33:25 -04:00
R4SAS 8f2124beab
update reseeds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-04-30 19:33:30 +03:00
orignal 1f5ed89a88 set blinded signature type to RedDSA for EdDSA 2022-04-29 12:48:45 -04:00
orignal dc82105226 check status code and verify RelayResponse signature 2022-04-28 20:41:06 -04:00
orignal 5221f3ddc9 one SSU2 session per remote router 2022-04-28 13:11:51 -04:00
orignal e970deb92b check presense of introducers in SSU2 address 2022-04-28 11:43:33 -04:00
orignal 9db7ec6bb0 create and send RelayRequest 2022-04-27 18:52:44 -04:00
orignal 2e691b6655 check if next manage time is too long 2022-04-26 21:02:39 -04:00
orignal f22e10537b fixed typo 2022-04-26 20:45:10 -04:00
orignal 6e532c494c create new published SSU2 addresses 2022-04-26 20:30:39 -04:00
orignal f9ed0d4aa2 fixed crash 2022-04-26 20:01:32 -04:00
orignal 78b1afcc8c publish introducer cap for SSU2 address 2022-04-26 15:20:57 -04:00
orignal 40340cf9c2 handle RelayResponse 2022-04-26 13:59:59 -04:00
orignal eb6437050f SSU2 introducers 2022-04-25 19:57:46 -04:00
orignal 45ebfe378b correct Ack range 2022-04-23 11:11:49 -04:00
R4SAS 1326597226 use ipv6 preference only when netinet headers not used (entware with musl workaround)'
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-04-23 13:50:34 +03:00
orignal 751da92c13 send relay response 2022-04-22 20:34:19 -04:00
orignal e10ca637da handle RelayIntro 2022-04-22 15:03:49 -04:00
orignal c5d9d71a8a create relay tag and relay request block 2022-04-21 15:47:36 -04:00
orignal 3e0f5d231d send queue after batch of packets 2022-04-18 15:47:35 -04:00
orignal 6990f177ba window size 2022-04-18 13:14:09 -04:00
orignal 4c91ae0085 check if end of list 2022-04-16 17:01:06 -04:00
orignal 43f74d4d5a resend packet with new packet number 2022-04-16 15:42:11 -04:00
orignal 8c3e716c3f ranges in ack block 2022-04-15 16:26:44 -04:00