orignal
94255ebaf4
STREAM ACCEPT queue
2023-11-17 13:44:30 -05:00
orignal
a6ee1e648e
recognize trailing padding as part of base64 address
2023-10-31 09:10:56 -04:00
orignal
69b0bef206
fixed possible invalid pointer when send error response
2023-10-30 10:09:47 -04:00
orignal
3286bdb4a7
verify jump link for valid characters
2023-10-29 22:11:38 -04:00
orignal
1e6edf06a2
send already accepting error response
2023-09-28 16:05:13 -04:00
orignal
17c4038c60
select router with ipv4 for endpoint
2023-07-11 13:16:35 -04:00
orignal
b8f998f76a
don't delete BOBDestination if used by another BOBSession
2023-07-06 13:08:39 -04:00
orignal
5f43026986
check if local destination is not null
2023-07-06 12:30:33 -04:00
orignal
07c529173e
send current version of the subnegotiation in user/password response
2023-06-17 10:08:04 -04:00
orignal
fee940238a
handle SOCK5 authrosation with empty user/password
2023-06-17 07:52:06 -04:00
r4sas
a0795d8534
set server tunnel inport in ClientContext from port ( #1936 )
...
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 05:12:07 +03:00
r4sas
03cc6e0524
use uint16_t for ports
...
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 05:10:32 +03:00
r4sas
3af1f4bc76
Use of 'server' type tunnel port as inport ( #1936 )
...
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-06-12 00:32:44 +03:00
r4sas
fdf38f45d9
more debug messages at destinations stop
...
Signed-off-by: r4sas <r4sas@i2pmail.org>
2023-05-23 00:44:47 +03:00
orignal
e95fb3ab89
allow user/password authentication
2023-05-22 08:58:04 -04:00
orignal
0ce15ffc91
check for incomplete HTTP header
2023-04-26 21:34:22 -04:00
orignal
7a12b5ca4b
handle incomplete HTTP header lines
2023-04-18 19:25:15 -04:00
orignal
132557f941
don't return default destination if port is specified explicitly
2023-04-12 13:33:20 -04:00
orignal
b8d21a1282
create non-default port destination explicitly
2023-04-12 07:46:50 -04:00
orignal
922e5915b1
rename SendTunnelDataMsg to SendTunnelDataMsgs for multiple messages
2023-04-04 13:19:08 -04:00
orignal
7c2da75197
don't recreate existing streaming destination
2023-04-03 19:05:35 -04:00
weko
a3bdc4ddc1
change some log levels back
2023-03-31 12:40:38 +00:00
weko
710a35993d
change some log level to error back
2023-03-31 12:16:32 +00:00
weko
354a04f0f6
Up level for some logs to critical
2023-03-31 11:29:04 +00:00
orignal
98f06e3ba1
Merge pull request #1889 from polistern/feat/sam-udp-port
...
Added SAM UDP port parameter
2023-03-10 11:11:27 -05:00
Vort
64f0a545fd
Improve MSVC 2015 compatibility
2023-02-28 19:41:17 +02:00
polistern
3ff1adf597
feat: Added SAM UDP port parameter.
2023-02-26 16:51:56 +00:00
R4SAS
77142e59ee
[http] fix query detection, addresshelper processing, update tests
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-14 18:51:14 +00:00
orignal
21542e8150
select first hop from high bandwidth peer for client tunnels
2023-02-03 15:59:56 -05:00
R4SAS
84d4e074ce
add loglevel checker, fix fields passing to translated string formatter
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-19 08:33:03 +03:00
R4SAS
a0e71c4173
[i18n] update strings and translation file
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-19 07:46:54 +03:00
acetone
d105ab11af
Joining two strings to one and correct comments
2023-01-17 08:45:18 +03:00
acetone
013d5ff74f
Addresshelper request validation by Refer-header
2023-01-16 16:16:16 +03:00
acetone
9af5a90757
Copyright year updated
2023-01-16 13:57:15 +03:00
acetone
d8b6f5438c
log typo
2023-01-16 13:56:36 +03:00
acetone
10030a4e0d
Addresshelper updating: referer check
2023-01-16 13:31:13 +03:00
orignal
7146a4dbae
check if session socket was closed before tunnels were built
2023-01-12 15:41:57 -05:00
R4SAS
503f522cc3
[style] clean trailing spaces and tabs
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
R4SAS
2c19da9aa7
fix warnings about unused code
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-01 13:48:41 +03:00
R4SAS
6376328c98
[http proxy] do not remove X-Requested-With for *HttpRequest ( #1816 )
...
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-22 17:55:51 +00:00
Jigen
519c0fe81d
Remove "X-Requested-With"
...
When any app uses Android’s WebView to load a web page, WebView attaches an extra header, named X-Requested-With, with the value set to the application ID.
That include Lightning-I2P browser by R4SAS.
Google doesn’t want to make it easy to get rid of the X-Requested-With header. However, there is a mechanism for replacing header information. This doesn’t allow a program to stop sending the X-Requested-With header.
More info on: https://www.stoutner.com/the-x-requested-with-header/
2022-12-02 16:09:23 +00:00
Dimitris Apostolou
73b9c0302b
Fix typos
2022-11-25 22:37:52 +02:00
orignal
39b3996596
added notbob.i2p to jump services
2022-11-14 15:29:16 -05:00
orignal
9fd60b52f1
sync StreamCreate
2022-11-08 19:52:43 -05:00
orignal
c6a6a4e0e8
sync Receive from stream
2022-11-08 18:34:59 -05:00
orignal
8299f80ea5
correct assignment of remote address
2022-11-04 12:55:53 -04:00
orignal
b8ce0b0838
store Address instead IdentHash for UDP tunnel
2022-11-03 20:02:43 -04:00
orignal
f9b0bb0383
I2PTunnel/UDPTunnel split
2022-10-25 15:30:12 -04:00
orignal
3d4d3ce80d
compressable crypto key and padding for routers and destination
2022-10-24 15:12:07 -04:00
Jigen
01ea1854bc
Update HTTPProxy.cpp ( #1794 )
...
Remove DoNotTrack flag from HTTP Request header.
2022-10-23 21:33:52 +03:00