orignal
|
39a86ce5c9
|
handle UDP packet from proxy relay
|
2022-10-16 22:16:16 -04:00 |
|
orignal
|
fe25260ee2
|
send UDP request to proxy relay
|
2022-10-16 21:23:28 -04:00 |
|
R4SAS
|
96c4463d39
|
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:24:43 +03:00 |
|
orignal
|
3bdef5f58d
|
update remote endpoint and send path challenge
|
2022-09-07 19:11:33 -04:00 |
|
orignal
|
4634bff9f0
|
limit number of resent packets. Resend interval variance
|
2022-09-03 15:38:52 -04:00 |
|
orignal
|
df92a85159
|
set SSU2 port +1 if not specified
|
2022-08-09 14:08:13 -04:00 |
|
orignal
|
ab606a1121
|
adjust clock from SSU2
|
2022-08-08 19:57:48 -04:00 |
|
orignal
|
b9970e1908
|
cleanup introducers upon reschedule
|
2022-08-07 09:50:30 -04:00 |
|
orignal
|
8bb9a57908
|
re-insert introducer back
|
2022-08-06 20:05:08 -04:00 |
|
orignal
|
f43e860998
|
cleanup introducers if router is not longer firewalled
|
2022-08-05 21:23:23 -04:00 |
|
orignal
|
3e40852999
|
memory pool for sent packets
|
2022-08-04 18:13:44 -04:00 |
|
orignal
|
ed5c533982
|
recgnize symmetric NAT from SSU2
|
2022-08-02 20:02:55 -04:00 |
|
orignal
|
98d2ce5845
|
Respond to path challenge. Correct termination reason for duplicated session
|
2022-08-02 13:35:18 -04:00 |
|
orignal
|
71766ecd16
|
select introducers randomly. More logging for RelayIntro
|
2022-07-30 16:31:44 -04:00 |
|
orignal
|
9afe3b5f39
|
fixed typo
|
2022-07-29 18:27:21 -04:00 |
|
orignal
|
01fe642beb
|
don't create another session for peer test
|
2022-07-29 12:48:23 -04:00 |
|
orignal
|
e70d57dcb4
|
resend intervals in milliseconds
|
2022-07-28 19:30:08 -04:00 |
|
orignal
|
4b1f5c9c9b
|
terminate session in separate task
|
2022-07-26 19:56:30 -04:00 |
|
orignal
|
b574aaf99c
|
fix SSU2 crash on shutdown
|
2022-07-26 18:46:05 -04:00 |
|
orignal
|
f8a609f692
|
respond to termination
|
2022-07-25 18:46:25 -04:00 |
|
orignal
|
fe744f8f81
|
more routine cleanup
|
2022-07-24 16:44:02 -04:00 |
|
orignal
|
dbb9295063
|
set MTU if local address is specified explicitly. update MTU for ipv6 if not set
|
2022-07-24 15:24:01 -04:00 |
|
orignal
|
4d0047ae7c
|
request termination for existing session
|
2022-07-23 18:48:53 -04:00 |
|
orignal
|
6ff64352d3
|
don't create and oublish duplicates
|
2022-07-23 14:32:16 -04:00 |
|
orignal
|
d33aeb4bb2
|
set unreachable if firewalled. Store router's hash of introducer instead session
|
2022-07-21 19:38:18 -04:00 |
|
orignal
|
ea0ed9e844
|
update SSU2 introducers if Firewalled
|
2022-07-20 21:55:48 -04:00 |
|
orignal
|
2197cd8620
|
add/remove SSU2 introducers to local RouterInfo
|
2022-07-20 16:01:08 -04:00 |
|
orignal
|
cf0d3b5f61
|
create new list of SSU2 introducers
|
2022-07-19 18:38:58 -04:00 |
|
orignal
|
5026dbc1b3
|
receive bigger packets
|
2022-07-14 20:12:27 -04:00 |
|
orignal
|
0c34189d94
|
correct buffer size for fragments of SessionConfirmed
|
2022-07-12 12:17:58 -04:00 |
|
Simon Vetter
|
3cf809e99d
|
fix SSU2 introducers selection logic
|
2022-07-11 08:16:07 +00:00 |
|
orignal
|
fdebbc4498
|
select sessions for introducers
|
2022-07-10 17:13:25 -04:00 |
|
orignal
|
3ff3417ff2
|
send termiation with reason
|
2022-07-09 17:05:23 -04:00 |
|
orignal
|
2f44d99a74
|
session closing state
|
2022-07-08 19:06:09 -04:00 |
|
orignal
|
83f43ab166
|
pick 3 routers for SSU2 peer test
|
2022-07-06 19:33:02 -04:00 |
|
orignal
|
6ca9a599ff
|
remove session after HolePunch received
|
2022-06-30 08:37:50 -04:00 |
|
orignal
|
f5ed9129cd
|
process retry as reponse to relay request
|
2022-06-29 08:09:43 -04:00 |
|
orignal
|
d3bc9eb110
|
update token and conn id after HolePunch
|
2022-06-27 23:03:27 -04:00 |
|
orignal
|
a99fcfe54f
|
cleanup terminated sessions
|
2022-06-26 21:35:26 -04:00 |
|
orignal
|
b5d139f7b2
|
process session created after session request sent
|
2022-06-26 14:31:24 -04:00 |
|
orignal
|
463ed12ce8
|
don't pick same session for PeerTest msg 2
|
2022-06-26 10:07:39 -04:00 |
|
orignal
|
dd1dd3b7cf
|
wait for Ack for SessionConfirmed or resend
|
2022-06-24 22:06:30 -04:00 |
|
orignal
|
ed04747b9d
|
resend SessionRequest and SessionCreated
|
2022-06-24 13:07:02 -04:00 |
|
orignal
|
827a88d772
|
exclude expired SSU2 introducers
|
2022-06-23 18:23:25 -04:00 |
|
orignal
|
bceae244c1
|
delete pending outgoind session when SessionCreated received
|
2022-06-22 13:15:25 -04:00 |
|
orignal
|
5de224d6bf
|
don't connect if pending connection already
|
2022-06-22 11:59:29 -04:00 |
|
orignal
|
dda25d431c
|
check if we can send HolePunch to partcular address
|
2022-06-21 16:20:39 -04:00 |
|
orignal
|
2a5cf3e4a8
|
SSU2 connect timer
|
2022-06-19 16:40:03 -04:00 |
|
orignal
|
5bb20cb039
|
token expiration threshold
|
2022-06-19 08:52:47 -04:00 |
|
orignal
|
2cc106b43e
|
bind SSU2 socket to specified interface
|
2022-06-17 15:16:12 -04:00 |
|
orignal
|
67252b90b3
|
generate new token with longer expiration time
|
2022-06-16 22:37:33 -04:00 |
|
orignal
|
93b5dc2dff
|
send new token block in SessionCreated
|
2022-06-13 17:55:41 -04:00 |
|
orignal
|
f7b6db5dad
|
PeerTest for connection through introducer
|
2022-06-11 21:26:23 -04:00 |
|
orignal
|
b918499f14
|
correct SSU2 server termination
|
2022-06-10 12:50:55 -04:00 |
|
orignal
|
2e4d8cdc8b
|
handle PeerTest msg 1
|
2022-06-09 18:04:37 -04:00 |
|
orignal
|
47460d86b2
|
verify signature and send peer test msg 5
|
2022-06-07 12:55:58 -04:00 |
|
orignal
|
d9fefe757e
|
SSU2/SSU2Session split
|
2022-06-05 19:33:36 -04:00 |
|
orignal
|
55e4bf6b65
|
set correct statuc code for peer test
|
2022-06-05 14:59:33 -04:00 |
|
orignal
|
4670b12d49
|
correct buffer size for token request
|
2022-06-04 08:18:45 -04:00 |
|
orignal
|
321ec8ae4d
|
correct size for Ack block with ranges
|
2022-06-03 19:16:52 -04:00 |
|
orignal
|
1ccbb8d10b
|
correct offset for nonce in peer test message
|
2022-06-03 14:02:31 -04:00 |
|
orignal
|
86c0accdce
|
check nonce for peer test msg 5
|
2022-06-03 13:18:37 -04:00 |
|
orignal
|
38d6c29ce9
|
correct timestamp size for peer test message
|
2022-06-03 08:39:54 -04:00 |
|
orignal
|
0cf9478cd4
|
create SSU2 session for peer test msgs 5-7
|
2022-06-02 20:12:25 -04:00 |
|
orignal
|
a04abd304a
|
don't send own hash for peer test msg 1
|
2022-06-02 18:23:51 -04:00 |
|
orignal
|
84aec9fe31
|
correct msg for first peer test message
|
2022-06-02 15:40:51 -04:00 |
|
orignal
|
d3a9cc8fde
|
check if session is established before sending peer test
|
2022-06-02 15:04:35 -04:00 |
|
orignal
|
87a434c377
|
start peer test for SSU2
|
2022-06-01 21:51:02 -04:00 |
|
orignal
|
593d6bf466
|
create initial peer test
|
2022-05-31 18:31:05 -04:00 |
|
R4SAS
|
6b4ffcff5a
|
cleanup code (spaces, tabs)
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-05-20 17:44:29 +00:00 |
|
orignal
|
2cd3ebbdb3
|
copy peer test block
|
2022-05-14 19:18:58 -04:00 |
|
orignal
|
5e25e30330
|
check if there is only one unacked packet
|
2022-05-14 16:36:16 -04:00 |
|
orignal
|
5aa2a8f60f
|
handle peer tests
|
2022-05-13 20:38:18 -04:00 |
|
orignal
|
bb705a77cf
|
handle PeerTest message
|
2022-05-11 17:48:25 -04:00 |
|
orignal
|
da3f3ccac9
|
connect to reachable introducers only
|
2022-05-06 19:38:48 -04:00 |
|
orignal
|
1a1871e8cd
|
add RouterInfo block before RelayIntro
|
2022-05-06 15:02:09 -04:00 |
|
orignal
|
436992b069
|
send and process HolePunch message
|
2022-05-04 13:58:06 -04:00 |
|
orignal
|
18cb3912e5
|
fixed imccorect termination
|
2022-05-02 15:05:44 -04:00 |
|
orignal
|
5aebefe73f
|
connect through introducer
|
2022-05-01 10:33:25 -04:00 |
|
orignal
|
dc82105226
|
check status code and verify RelayResponse signature
|
2022-04-28 20:41:06 -04:00 |
|
orignal
|
5221f3ddc9
|
one SSU2 session per remote router
|
2022-04-28 13:11:51 -04:00 |
|
orignal
|
e970deb92b
|
check presense of introducers in SSU2 address
|
2022-04-28 11:43:33 -04:00 |
|
orignal
|
9db7ec6bb0
|
create and send RelayRequest
|
2022-04-27 18:52:44 -04:00 |
|
orignal
|
40340cf9c2
|
handle RelayResponse
|
2022-04-26 13:59:59 -04:00 |
|
orignal
|
45ebfe378b
|
correct Ack range
|
2022-04-23 11:11:49 -04:00 |
|
orignal
|
751da92c13
|
send relay response
|
2022-04-22 20:34:19 -04:00 |
|
orignal
|
e10ca637da
|
handle RelayIntro
|
2022-04-22 15:03:49 -04:00 |
|
orignal
|
c5d9d71a8a
|
create relay tag and relay request block
|
2022-04-21 15:47:36 -04:00 |
|
orignal
|
3e0f5d231d
|
send queue after batch of packets
|
2022-04-18 15:47:35 -04:00 |
|
orignal
|
6990f177ba
|
window size
|
2022-04-18 13:14:09 -04:00 |
|
orignal
|
4c91ae0085
|
check if end of list
|
2022-04-16 17:01:06 -04:00 |
|
orignal
|
43f74d4d5a
|
resend packet with new packet number
|
2022-04-16 15:42:11 -04:00 |
|
orignal
|
8c3e716c3f
|
ranges in ack block
|
2022-04-15 16:26:44 -04:00 |
|
orignal
|
05946125b5
|
handle single packet
|
2022-04-13 12:33:59 -04:00 |
|
orignal
|
1e2a0a4549
|
handle incoming packets in batch
|
2022-04-12 11:42:51 -04:00 |
|
orignal
|
f9d67b28ec
|
handle fragmented SessionConfirmed
|
2022-04-09 19:56:57 -04:00 |
|
orignal
|
678a1ae0fb
|
send fragmented messages
|
2022-04-09 11:42:34 -04:00 |
|
orignal
|
51cbffd097
|
don't lookup session for every sinle packet
|
2022-04-07 10:57:57 -04:00 |
|
orignal
|
207b13dcab
|
send correct acnt if gaps
|
2022-04-05 18:23:52 -04:00 |
|
orignal
|
3052dbd1e8
|
single receive thread for both ipv4 and ipv6
|
2022-04-05 16:27:52 -04:00 |
|