orignal
ad9c11cd92
correct parsing of addreses containing #
2019-08-10 22:16:26 -04:00
orignal
3872c2a3f5
use published encrypted instead orig type
2019-08-07 16:18:00 -04:00
orignal
e6a09b49c9
published encrypted flag
2019-08-07 15:43:03 -04:00
orignal
db107602bd
handle messages with \r\n
2019-08-02 13:48:39 -04:00
orignal
a6558a61a7
Recognize RedDSA_SHA512_Ed25519 signature type
2019-08-02 12:54:24 -04:00
orignal
254d2b82b3
fixed #1393 . store streams by recvStreamID
2019-07-26 14:23:21 -04:00
Zetok Zalbavar
2c9fa2f738
Fix and update i2pd.service
...
- /var/run on distros with systemd is a symlink to /run , hence the
path changes.
- Remove unnecessary runtime dependency on `/bin/kill` which is
provided by `procps` and might not be available on minimal installs
(e.g. containers). Instead use `/bin/sh` which has a built-in `kill`.
- `PrivateDevices=yes` causes i2pd to fail to start on latest Debian
unstable. Service exits with the following:
```
i2pd.service: Failed to execute command: Operation not permitted
i2pd.service: Failed at step EXEC spawning /usr/sbin/i2pd: Operation not permitted
i2pd.service: Control process exited, code=exited, status=203/EXEC
i2pd.service: Failed with result 'exit-code'.
Failed to start I2P Router written in C++.
```
According to `man systemd.exec` exit code 203 corresponds to the
`execve(2)` system call failing. So it looks like i2pd tries to do
something it shouldn't be doing. The proper fix would be in i2pd, but
who knows how long that would actually take, so to allow people to
actually launch i2pd in meanwhile the line has been removed from the
service file.
Also, surprisingly, right after installing i2pd it started without any
problems, and only after restarting the box i2pd started to fail for no
apparent reason.
2019-07-24 11:48:18 +01:00
orignal
97d9795fc9
pass encrepted LeaseSet auth keys
2019-07-16 16:31:17 -04:00
orignal
54071b0e5d
set and handle unpublished LeaseSet flag
2019-07-16 11:48:30 -04:00
orignal
925e8316c7
read i2cp.leaseSetAuthType, i2cp.leaseSetClient.dh.nnn and i2cp.leaseSetClient.psk.nnn from tunnel config
2019-07-12 20:58:17 -04:00
orignal
99e1b74023
create encrypted LeaseSet2 with authentication
2019-07-12 15:40:59 -04:00
orignal
7d68ccca53
create encrypted LeaseSet2 with authentication
2019-07-12 15:37:32 -04:00
orignal
a090114066
send data message wih raw type fpr raw datagrams
2019-07-10 13:31:49 -04:00
orignal
a204841abb
handle RAW SEND
2019-07-10 13:30:31 -04:00
orignal
cc451809cc
send/receive raw datagrams through the SAM
2019-07-10 11:32:56 -04:00
orignal
a605e4bab6
send and recieve raw datagrams
2019-07-09 21:33:55 -04:00
orignal
3f0534134d
check for malformed b33
2019-07-04 13:05:39 -04:00
orignal
3acfb129cd
2.27.0
2019-07-03 12:38:55 -04:00
orignal
6ccef66920
call shutdown before close
2019-06-26 10:47:16 -04:00
orignal
e9fa4e94a6
Merge pull request #1374 from rszibele/openssl
...
BOB: fix status command.
2019-06-25 18:28:43 -04:00
orignal
fecc0c4640
don't call destructor twice
2019-06-25 16:37:06 -04:00
rszibele
b759294975
BOB: fix status command.
2019-06-25 19:18:40 +02:00
rszibele
a23e845c03
BOB: improve comment and remove error log in list command
2019-06-25 19:04:27 +02:00
rszibele
cb8373e487
BOB: status response now correctly starts with "OK DATA".
2019-06-25 17:59:44 +02:00
orignal
8e919ddc8e
use monotonic clock for uptime
2019-06-19 11:43:04 -04:00
orignal
832a9ab6b5
don't set random NTCP2 port if already set
2019-06-18 15:47:58 -04:00
orignal
13732ac333
fix #1363 try connect in SSU's thread
2019-06-14 15:43:03 -04:00
orignal
3e932a55f4
fixed typo
2019-06-11 15:09:10 -04:00
orignal
74e8610ec9
DH auth for encrypted LeaseSet2
2019-06-11 10:40:53 -04:00
orignal
089a60ded6
Merge pull request #1367 from rszibele/openssl
...
fix build on BSDs, as "isset" is a defined macro.
2019-06-10 19:10:34 -04:00
rszibele
c8eeefe194
fix build on BSDs, as "isset" is a defined macro.
2019-06-10 23:04:59 +02:00
orignal
85eeba14c1
Merge branch 'openssl' of https://github.com/PurpleI2P/i2pd into openssl
2019-06-08 21:24:16 -04:00
orignal
f6f45eab39
flood encrypted LeaseSet2 with store hash
2019-06-08 21:23:25 -04:00
R4SAS
a74065f775
[qt] dont build UnixDaemon.cpp
2019-06-09 01:04:43 +03:00
R4SAS
48d02f7e09
[qt] update headers, fix ChaCha source name, remove duplicates
2019-06-08 22:24:11 +03:00
R4SAS
e60549f8df
[qt] fix build
2019-06-08 21:16:20 +03:00
orignal
41f4f4713e
handle i2cp.leaseSetPrivKey
2019-06-07 14:51:08 -04:00
orignal
213a292fd5
correct offsets for auth data
2019-06-07 11:59:48 -04:00
R4SAS
79630e844b
2.26.0
2019-06-07 17:25:55 +03:00
orignal
1c9e46dbb3
2.26.0
2019-06-07 10:04:57 -04:00
orignal
0a299284f8
correct check for PSK auth
2019-06-06 13:58:31 -04:00
orignal
347a5f7346
pass secret to encrypted LeaseSet2
2019-06-06 12:33:33 -04:00
R4SAS
c6a903572c
[HTTP] add PROFIND support
2019-06-06 18:07:17 +03:00
orignal
14f0d6d26b
extract client auth data
2019-06-05 15:57:20 -04:00
orignal
485f105555
fixed typo
2019-06-04 15:12:19 -04:00
orignal
686c0b776f
common blinding code for public and private keys
2019-06-04 14:47:40 -04:00
orignal
828862ea49
store hash for ECDSA blidning
2019-06-03 12:51:57 -04:00
orignal
c4dffa4dc8
remove obsolete reseeds
2019-06-01 09:37:02 -04:00
orignal
3c1906e3d4
Merge pull request #1360 from khumarahn/openssl
...
link libi2pd to boost and zlib
2019-06-01 09:28:54 -04:00
Alexey Korepanov
7147a3694c
link libi2pd to boost and zlib
2019-06-01 12:57:09 +01:00