orignal
|
eb75eb0e55
|
reset port value before parsing
|
2022-10-26 18:35:56 -04:00 |
|
orignal
|
2a703e0844
|
SSU2 through a socks5 proxy
|
2022-10-26 16:05:40 -04:00 |
|
orignal
|
2b6d9eaa8b
|
disable compressible padding for now
|
2022-10-26 13:26:16 -04:00 |
|
orignal
|
f9b0bb0383
|
I2PTunnel/UDPTunnel split
|
2022-10-25 15:30:12 -04:00 |
|
orignal
|
c6e8873d57
|
always compress SYN packet
|
2022-10-24 19:21:58 -04:00 |
|
orignal
|
b2767304e9
|
correct padding offset
|
2022-10-24 18:07:04 -04:00 |
|
orignal
|
3d4d3ce80d
|
compressable crypto key and padding for routers and destination
|
2022-10-24 15:12:07 -04:00 |
|
orignal
|
f3aada9e1a
|
Proxy connection and UDP associate request
|
2022-10-18 21:11:06 -04:00 |
|
orignal
|
08fd32b3bf
|
allow different ports from RelayReponse and HolePunch
|
2022-10-17 18:38:44 -04:00 |
|
orignal
|
39a86ce5c9
|
handle UDP packet from proxy relay
|
2022-10-16 22:16:16 -04:00 |
|
orignal
|
fe25260ee2
|
send UDP request to proxy relay
|
2022-10-16 21:23:28 -04:00 |
|
orignal
|
63fd05c7d3
|
SOCKS5 constants
|
2022-10-15 21:37:00 -04:00 |
|
orignal
|
e5553f7528
|
milliseconds for peer test send time
|
2022-10-11 18:21:04 -04:00 |
|
orignal
|
6e3cec653d
|
resend PeerTest msg 2
|
2022-10-11 15:27:19 -04:00 |
|
orignal
|
55976fd9dc
|
resend PeerTest msg 1
|
2022-10-10 16:34:08 -04:00 |
|
R4SAS
|
1d9d89b115
|
[transports] get addresses on interfaeces before initializing RouterContext
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-10 15:43:37 +03:00 |
|
orignal
|
3544f77e90
|
terminate peer session if Charlie's RouterInfo not found
|
2022-10-09 15:03:32 -04:00 |
|
R4SAS
|
96c4463d39
|
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:24:43 +03:00 |
|
R4SAS
|
650b7abef6
|
[SSU2] add log messages about peertest
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:12:22 +03:00 |
|
R4SAS
|
714b3856a2
|
[SSU2] print to log when peer test is sent
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 18:59:53 +03:00 |
|
orignal
|
69ca3bc75d
|
catch lexical_cast exceptions
|
2022-10-06 18:48:17 -04:00 |
|
orignal
|
549dcbee32
|
don't set port=1
|
2022-10-03 15:40:25 -04:00 |
|
orignal
|
0a0c2350f2
|
random seelection between NTCP2 and SSU2 priority
|
2022-10-01 19:39:08 -04:00 |
|
orignal
|
cef2263a7f
|
Transports priority for peer
|
2022-09-30 19:24:36 -04:00 |
|
orignal
|
638c376e5b
|
enable SSU2 and disable SSU by default
|
2022-09-24 16:37:18 -04:00 |
|
orignal
|
8eade86624
|
moved InitTransports code from Daemon to Transports
|
2022-09-23 21:27:11 -04:00 |
|
orignal
|
24ae8d5443
|
don't handle more than 2 fragments in SessionConfirmed
|
2022-09-20 18:32:29 -04:00 |
|
orignal
|
030af11d86
|
don't merge duppicated fragment of SessionConfirmed
|
2022-09-18 21:13:38 -04:00 |
|
orignal
|
857a2bc399
|
verify path response
|
2022-09-14 19:08:14 -04:00 |
|
orignal
|
09e6e2940f
|
correct max paddign size
|
2022-09-09 07:23:46 -04:00 |
|
orignal
|
23e18a34d4
|
check if new address is in reserved range
|
2022-09-08 18:46:48 -04:00 |
|
orignal
|
3bdef5f58d
|
update remote endpoint and send path challenge
|
2022-09-07 19:11:33 -04:00 |
|
orignal
|
cf27581c76
|
check min MTU 1280
|
2022-09-05 15:27:38 -04:00 |
|
orignal
|
4634bff9f0
|
limit number of resent packets. Resend interval variance
|
2022-09-03 15:38:52 -04:00 |
|
orignal
|
1a9c658836
|
immediate ack request flag
|
2022-09-01 18:40:54 -04:00 |
|
orignal
|
1a32c55ca3
|
delete routers with expired SSU2 introducers
|
2022-08-31 13:10:52 -04:00 |
|
orignal
|
9b5a885b3b
|
check if I2NP message to send is not null
|
2022-08-30 08:48:28 -04:00 |
|
orignal
|
f378119889
|
5 SSU2 peer tests if no SSU
|
2022-08-29 21:27:02 -04:00 |
|
orignal
|
8fd466c5a9
|
separate network status and errors
|
2022-08-29 21:11:17 -04:00 |
|
orignal
|
95f19a5fb2
|
send Retry instead SessionCreated if clock skew
|
2022-08-26 10:14:30 -04:00 |
|
orignal
|
f98780b1d7
|
check timestamp for token request
|
2022-08-25 18:48:26 -04:00 |
|
orignal
|
150c89e48a
|
don't request session if zero token received
|
2022-08-25 15:14:45 -04:00 |
|
R4SAS
|
63227ab2f1
|
fix log message
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-08-24 11:25:14 +03:00 |
|
orignal
|
b40f1b67b9
|
2.43.0
|
2022-08-21 14:52:55 -04:00 |
|
orignal
|
f875823357
|
copy path challenge to response
|
2022-08-15 15:32:55 -04:00 |
|
orignal
|
75611866eb
|
update router's transports when SSU or NTCP address was deleted
|
2022-08-14 10:43:16 -04:00 |
|
orignal
|
c3dd7ed73a
|
try to resend if window is full
|
2022-08-12 18:56:58 -04:00 |
|
orignal
|
3ae885d120
|
change status back to Testing from Unknow if next test was accepted
|
2022-08-12 16:12:30 -04:00 |
|
orignal
|
81f53d313c
|
alsways set some port to SSU2 address
|
2022-08-11 20:16:08 -04:00 |
|
orignal
|
9d123fa5ad
|
select random port if port not found or specified
|
2022-08-10 22:00:11 -04:00 |
|