orignal
|
ea0ed9e844
|
update SSU2 introducers if Firewalled
|
2 years ago |
orignal
|
4a3e481a83
|
don't publish introducers for non-published SSU2 address
|
2 years ago |
orignal
|
2197cd8620
|
add/remove SSU2 introducers to local RouterInfo
|
2 years ago |
orignal
|
cf0d3b5f61
|
create new list of SSU2 introducers
|
2 years ago |
orignal
|
6f7ab49346
|
moved creation time to TransportSession
|
2 years ago |
orignal
|
000e0358a7
|
resend SessionConfirmed immediately if another SessionCreated received
|
2 years ago |
orignal
|
a3e19931f0
|
insert RouterInfo from SessionConfirmed into netdb immediately
|
2 years ago |
orignal
|
9fec1a86cf
|
send ack for peer test
|
2 years ago |
orignal
|
ffab29890b
|
created additional ranges if acnt > 255
|
2 years ago |
orignal
|
206c068d8e
|
don't send termination without address
|
2 years ago |
orignal
|
dc30cd1112
|
handle SessionConfirmed fragments in reversed order
|
2 years ago |
Simon Vetter
|
412a245e88
|
leaseset: add missing bound checks
This builds on ChadF's issue and patch (https://github.com/PurpleI2P/i2pd/issues/1772)
and fixes other potential bound check issues.
|
2 years ago |
orignal
|
16290bf66f
|
fixed race condition on session termination
|
2 years ago |
orignal
|
4f8b0e6484
|
send more SessionConfirmed termination messages. Limit send queue
|
2 years ago |
orignal
|
5026dbc1b3
|
receive bigger packets
|
2 years ago |
orignal
|
014e4b0e1d
|
detect MTU for some known ipv6 tunnel brokers
|
2 years ago |
orignal
|
14a6947b02
|
round MTU to multiple of 16 for SSU1
|
2 years ago |
orignal
|
665a914dc3
|
set max MTU for ipv4
|
2 years ago |
orignal
|
8feac310af
|
start initial peer test if SSU2 only
|
2 years ago |
orignal
|
3394bb4b8d
|
calculate SSU2 session MTU and max payload size
|
2 years ago |
orignal
|
1dd2bd0013
|
publish MTU for ipv6 SSU2 address. Max MTU of 1488 for SSU1
|
2 years ago |
orignal
|
5c62726992
|
check clock skew and terminate
|
2 years ago |
orignal
|
90981f628e
|
Send fragmented SessionConfirmed
|
2 years ago |
orignal
|
0c34189d94
|
correct buffer size for fragments of SessionConfirmed
|
2 years ago |
orignal
|
f1d3d6a7b5
|
set max compression for SessionConfirmed
|
2 years ago |
orignal
|
b0d962b49a
|
send ack for retransmitted SessionConfirmed
|
2 years ago |
orignal
|
c50e453af6
|
check out of sequence messages range
|
2 years ago |
Simon Vetter
|
3cf809e99d
|
fix SSU2 introducers selection logic
|
2 years ago |
orignal
|
8b649aaaf8
|
NACKs and Acks only Ack ranges
|
2 years ago |
orignal
|
fdebbc4498
|
select sessions for introducers
|
2 years ago |
orignal
|
3ff3417ff2
|
send termiation with reason
|
2 years ago |
orignal
|
bb6227281a
|
teminate session after 5 unacked resends
|
2 years ago |
orignal
|
2f44d99a74
|
session closing state
|
2 years ago |
orignal
|
ca4414d15a
|
request relay tag if firewalled
|
2 years ago |
orignal
|
fbb961b43c
|
extract correct endpoint from peer test msg 2
|
2 years ago |
orignal
|
fa9c174264
|
handle first packet from Bob
|
2 years ago |
orignal
|
83f43ab166
|
pick 3 routers for SSU2 peer test
|
2 years ago |
orignal
|
f7e9e6a1c4
|
set status OK after both peer test msg 4 and 5
|
2 years ago |
orignal
|
aa21748e9a
|
set status OK after peer test msg 5
|
2 years ago |
orignal
|
a2f4e08b00
|
set testing status for SSU2 peer test
|
2 years ago |
orignal
|
66bc29d075
|
insert received RouterInfo into netdb immediately
|
2 years ago |
orignal
|
3ed625f949
|
don't try SSU peer test if SSU is disabled
|
2 years ago |
orignal
|
a1e414c3b7
|
make SSU2 server eligible for peer test
|
2 years ago |
R4SAS
|
a5a35b1fa6
|
[daemon] check for SSU2 transport at start
Signed-off-by: r4sas <r4sas@i2pmail.org>
|
2 years ago |
orignal
|
6039cdceb0
|
correct SSU2 only detection
|
2 years ago |
orignal
|
473159be0f
|
don't use port from SSU2 address
|
2 years ago |
orignal
|
0e6ad548b2
|
invoke SSU2 peer test updates
|
2 years ago |
orignal
|
6143515ac6
|
update our IP adress from SSU2
|
2 years ago |
orignal
|
50419f200d
|
fixed 1 packet off for out of sequence clean up
|
2 years ago |
orignal
|
455390f121
|
clean up first out of sequence packet if too many
|
2 years ago |