Commit Graph

137 Commits

Author SHA1 Message Date
orignal
8a52295882 make router real upon successive outgoing NTCP2 session. Eliminate static keys table 2023-05-06 16:43:09 -04:00
orignal
7c535159bc static keys table 2023-04-30 20:05:35 -04:00
orignal
dc265367dc drop unexpected I2NP messages 2023-04-20 14:23:41 -04:00
orignal
c22fc75370 set router properties from incoming connections 2023-04-19 19:48:09 -04:00
orignal
6206616347 don't set unreachable twice 2023-04-18 20:21:22 -04:00
orignal
b77ae08388 exclude previously non-reachable transports 2023-04-18 14:35:13 -04:00
orignal
527ee3b3c5 check if ident is unrechable only once 2023-04-16 08:18:41 -04:00
orignal
cd5bfaabb5 mark and check unreachable ident hashes 2023-04-15 22:16:31 -04:00
weko
354a04f0f6 Up level for some logs to critical 2023-03-31 11:29:04 +00:00
orignal
cd1af85e39 bypass slow transport sessions 2023-03-29 15:54:53 -04:00
R4SAS
86fc12e395
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-02-11 09:41:51 +03:00
orignal
d30d1e8a7d don't set unrechable for routers without published addresses 2023-02-06 14:18:15 -05:00
orignal
21542e8150 select first hop from high bandwidth peer for client tunnels 2023-02-03 15:59:56 -05:00
orignal
bf8eecf407 more attempts to find good peer 2023-02-01 16:04:09 -05:00
R4SAS
503f522cc3
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2023-01-03 21:25:19 +03:00
orignal
6942c20879 don't select overloaded peer 2023-01-01 19:42:40 -05:00
orignal
126dc0ebe0 inseer incoming session into sessions list 2022-12-28 16:47:50 -05:00
R4SAS
3471e6fe16
use deadline_timer for bandwidth calculation timer
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 23:25:16 +03:00
R4SAS
0d523bd2a6
use 15s average bw for transit limits check
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:20 +03:00
R4SAS
8943200ffa
calculate bandwidth every 1 and 15 seconds
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-12-13 22:04:19 +03:00
orignal
8320987124 delete invalid sessions from peers 2022-12-10 19:09:37 -05:00
orignal
fb8be32c28 removed SSU and NTCP transports 2022-11-23 15:45:00 -05:00
orignal
ccfeca728e use only SSU2 for network status 2022-11-22 22:03:19 -05:00
orignal
379075c594 exluded SSU from transports 2022-11-22 19:29:20 -05:00
orignal
e13f151474 ssu2.mtu4 and ssu2.mtu6 2022-10-31 18:11:36 -04:00
orignal
3e3f92c616 set and check proxy status for ipv6 if presented 2022-10-27 15:02:54 -04:00
orignal
016222463d don't run peer test for SSU2 through proxy 2022-10-26 21:14:28 -04:00
orignal
2a703e0844 SSU2 through a socks5 proxy 2022-10-26 16:05:40 -04:00
R4SAS
1d9d89b115
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-10 15:43:37 +03:00
R4SAS
96c4463d39
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-10-09 20:24:43 +03:00
orignal
549dcbee32 don't set port=1 2022-10-03 15:40:25 -04:00
orignal
0a0c2350f2 random seelection between NTCP2 and SSU2 priority 2022-10-01 19:39:08 -04:00
orignal
cef2263a7f Transports priority for peer 2022-09-30 19:24:36 -04:00
orignal
638c376e5b enable SSU2 and disable SSU by default 2022-09-24 16:37:18 -04:00
orignal
8eade86624 moved InitTransports code from Daemon to Transports 2022-09-23 21:27:11 -04:00
orignal
f378119889 5 SSU2 peer tests if no SSU 2022-08-29 21:27:02 -04:00
R4SAS
991e37d0bf
[peertest] fixed ssu2 router exclusion
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-07-27 13:38:28 +03:00
orignal
8feac310af start initial peer test if SSU2 only 2022-07-13 19:56:55 -04:00
orignal
83f43ab166 pick 3 routers for SSU2 peer test 2022-07-06 19:33:02 -04:00
orignal
a2f4e08b00 set testing status for SSU2 peer test 2022-07-05 19:38:24 -04:00
orignal
3ed625f949 don't try SSU peer test if SSU is disabled 2022-07-05 13:07:23 -04:00
orignal
a1e414c3b7 make SSU2 server eligible for peer test 2022-07-05 12:55:11 -04:00
orignal
28db337166 give priority to SSU2 over SSU 2022-06-30 12:53:50 -04:00
orignal
c348736058 send updated local RouterInfo for long sessions 2022-06-19 14:21:35 -04:00
orignal
2cc106b43e bind SSU2 socket to specified interface 2022-06-17 15:16:12 -04:00
orignal
593b9bb6c5 start SSU2 server before peer test 2022-06-02 15:08:38 -04:00
orignal
87a434c377 start peer test for SSU2 2022-06-01 21:51:02 -04:00
R4SAS
6b4ffcff5a cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
2022-05-20 17:44:29 +00:00
orignal
e970deb92b check presense of introducers in SSU2 address 2022-04-28 11:43:33 -04:00
orignal
ee1c4f4fdc internal numeric id for families 2022-03-24 15:50:20 -04:00