orignal
|
084663d6ea
|
mediam size I2NP messages
|
2023-03-18 15:32:05 -04:00 |
|
orignal
|
5ad9c8e740
|
create I2NP tunnel message for first fragment
|
2023-03-13 19:19:57 -04:00 |
|
orignal
|
4db643aa8e
|
limited number of acked packets to 511
|
2023-03-02 16:18:25 -05:00 |
|
orignal
|
02a36a9fa8
|
don't populate buffer of unreachable router
|
2023-02-14 15:44:35 -05:00 |
|
orignal
|
d79bdc9f66
|
send datetime block after approximately every 250 packets
|
2023-02-11 20:11:34 -05:00 |
|
|
86fc12e395
|
[style] clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2023-02-11 09:41:51 +03:00 |
|
orignal
|
ac94341203
|
disconnect established session if clock skew detected
|
2023-02-10 11:48:11 -05:00 |
|
Vort
|
0829b186b7
|
Fix debug log output
|
2023-02-10 01:57:43 +02:00 |
|
orignal
|
d1c98c58b9
|
update status before deleting session
|
2023-02-06 19:31:31 -05:00 |
|
orignal
|
3c02cade58
|
compare only first 8 bytes for temporary addreses
|
2023-02-05 19:19:20 -05:00 |
|
orignal
|
21123e2afa
|
compare published address and actual endpoint
|
2023-02-05 18:26:09 -05:00 |
|
orignal
|
f1415c2234
|
compare published address and actual endpoint
|
2023-02-05 15:42:46 -05:00 |
|
orignal
|
54fb234424
|
limit number of acked packets to 510
|
2023-02-03 19:17:46 -05:00 |
|
orignal
|
02e7f6b0c3
|
cleanup out of sequence packet nums in one call
|
2023-02-02 13:52:48 -05:00 |
|
orignal
|
e9f0ed6473
|
cleanup out-of-sequnce list more aggressivly
|
2023-02-01 19:05:04 -05:00 |
|
orignal
|
4960587f46
|
cleanup out-of-sequnce list more aggressivly
|
2023-02-01 18:37:31 -05:00 |
|
orignal
|
e8be39af17
|
memrory pool for SSU2IncompleteMessage
|
2023-01-17 21:32:36 -05:00 |
|
orignal
|
bc888167a7
|
use linked list for out of sequence fragments
|
2023-01-16 21:40:23 -05:00 |
|
orignal
|
993dc72ce6
|
use separate pointer to second fragment of incomplete message
|
2023-01-15 22:50:54 -05:00 |
|
orignal
|
324ace103b
|
memoery pool for fragments
|
2023-01-14 17:05:09 -05:00 |
|
orignal
|
d530269e4f
|
try to insert received msgid instead lookup
|
2023-01-13 19:23:26 -05:00 |
|
orignal
|
a3c305032a
|
don't set Firewalled upon SessionCreated if ports mismatch
|
2023-01-08 08:25:23 -05:00 |
|
orignal
|
1cc68ea402
|
differentiate symmetric and full cone NAT
|
2023-01-07 12:06:26 -05:00 |
|
orignal
|
a6f9a56e40
|
support C++20
|
2023-01-06 14:08:39 -05:00 |
|
orignal
|
55704ece3a
|
drop duplicated I2NP messages
|
2023-01-05 15:33:41 -05:00 |
|
|
503f522cc3
|
[style] clean trailing spaces and tabs
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2023-01-03 21:25:19 +03:00 |
|
|
22179400c7
|
2.45.0
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2023-01-03 18:16:34 +00:00 |
|
orignal
|
7b341d5d30
|
update and show send queue size for transports
|
2023-01-01 16:03:53 -05:00 |
|
Dimitris Apostolou
|
9f9e8bfa14
|
Fix typos
|
2022-12-27 10:44:23 +02:00 |
|
orignal
|
b6f83dfe9f
|
set error before status
|
2022-12-22 08:36:07 -05:00 |
|
orignal
|
36501fe31e
|
change network status back to OK if port in msg 7 matches
|
2022-12-21 18:14:19 -05:00 |
|
orignal
|
d6c101d261
|
try to handle RelayIntro again is Alice's RouterInfo not found
|
2022-12-19 13:28:21 -05:00 |
|
orignal
|
eeea02d834
|
rounded to seconds timestamps
|
2022-12-19 12:56:19 -05:00 |
|
orignal
|
df737a65b2
|
SessionRequest must be min 88 bytes
|
2022-12-15 15:08:56 -05:00 |
|
orignal
|
f6ca7c19af
|
allow zero length padding
|
2022-12-12 14:18:36 -05:00 |
|
orignal
|
8ad5696e50
|
don't send termination again if termination received block received
|
2022-12-06 21:40:33 -05:00 |
|
orignal
|
2bb5ff7184
|
eliminate RTT self-reduction
|
2022-12-05 15:48:11 -05:00 |
|
orignal
|
50abeea82a
|
print endpoint if more than two fragments of SessionConfirmed
|
2022-12-04 17:08:38 -05:00 |
|
orignal
|
8db352b4d0
|
recognize symmetric NAT from peer test msg 7
|
2022-12-04 16:30:45 -05:00 |
|
orignal
|
2a6f906177
|
print separate message for introducer timeout
|
2022-11-27 17:14:33 -05:00 |
|
orignal
|
64c3282aae
|
check minimal message size
|
2022-11-27 09:13:24 -05:00 |
|
Dimitris Apostolou
|
73b9c0302b
|
Fix typos
|
2022-11-25 22:37:52 +02:00 |
|
orignal
|
ccfeca728e
|
use only SSU2 for network status
|
2022-11-22 22:03:19 -05:00 |
|
orignal
|
e5553f7528
|
milliseconds for peer test send time
|
2022-10-11 18:21:04 -04:00 |
|
orignal
|
6e3cec653d
|
resend PeerTest msg 2
|
2022-10-11 15:27:19 -04:00 |
|
orignal
|
55976fd9dc
|
resend PeerTest msg 1
|
2022-10-10 16:34:08 -04:00 |
|
orignal
|
3544f77e90
|
terminate peer session if Charlie's RouterInfo not found
|
2022-10-09 15:03:32 -04:00 |
|
|
96c4463d39
|
clean code
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:24:43 +03:00 |
|
|
650b7abef6
|
[SSU2] add log messages about peertest
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 20:12:22 +03:00 |
|
|
714b3856a2
|
[SSU2] print to log when peer test is sent
Signed-off-by: R4SAS <r4sas@i2pmail.org>
|
2022-10-09 18:59:53 +03:00 |
|
orignal
|
24ae8d5443
|
don't handle more than 2 fragments in SessionConfirmed
|
2022-09-20 18:32:29 -04:00 |
|
orignal
|
030af11d86
|
don't merge duppicated fragment of SessionConfirmed
|
2022-09-18 21:13:38 -04:00 |
|
orignal
|
857a2bc399
|
verify path response
|
2022-09-14 19:08:14 -04:00 |
|
orignal
|
09e6e2940f
|
correct max paddign size
|
2022-09-09 07:23:46 -04:00 |
|
orignal
|
23e18a34d4
|
check if new address is in reserved range
|
2022-09-08 18:46:48 -04:00 |
|
orignal
|
3bdef5f58d
|
update remote endpoint and send path challenge
|
2022-09-07 19:11:33 -04:00 |
|
orignal
|
cf27581c76
|
check min MTU 1280
|
2022-09-05 15:27:38 -04:00 |
|
orignal
|
4634bff9f0
|
limit number of resent packets. Resend interval variance
|
2022-09-03 15:38:52 -04:00 |
|
orignal
|
1a9c658836
|
immediate ack request flag
|
2022-09-01 18:40:54 -04:00 |
|
orignal
|
9b5a885b3b
|
check if I2NP message to send is not null
|
2022-08-30 08:48:28 -04:00 |
|
orignal
|
8fd466c5a9
|
separate network status and errors
|
2022-08-29 21:11:17 -04:00 |
|
orignal
|
95f19a5fb2
|
send Retry instead SessionCreated if clock skew
|
2022-08-26 10:14:30 -04:00 |
|
orignal
|
f98780b1d7
|
check timestamp for token request
|
2022-08-25 18:48:26 -04:00 |
|
orignal
|
150c89e48a
|
don't request session if zero token received
|
2022-08-25 15:14:45 -04:00 |
|
orignal
|
f875823357
|
copy path challenge to response
|
2022-08-15 15:32:55 -04:00 |
|
orignal
|
c3dd7ed73a
|
try to resend if window is full
|
2022-08-12 18:56:58 -04:00 |
|
orignal
|
3ae885d120
|
change status back to Testing from Unknow if next test was accepted
|
2022-08-12 16:12:30 -04:00 |
|
orignal
|
ab606a1121
|
adjust clock from SSU2
|
2022-08-08 19:57:48 -04:00 |
|
orignal
|
c6f898b8ca
|
connect to Charlie if RelayResponse from Bob was received before HolePunch
|
2022-08-08 13:08:12 -04:00 |
|
orignal
|
3e40852999
|
memory pool for sent packets
|
2022-08-04 18:13:44 -04:00 |
|
orignal
|
df073bb306
|
send local address in RelayResponse block
|
2022-08-04 15:15:19 -04:00 |
|
orignal
|
771c4a0d02
|
allocate smaller I2NP buffer for fragmented message. Limit number of fragments by 64
|
2022-08-03 16:06:07 -04:00 |
|
orignal
|
cb959ab14c
|
allocate tunnel message buffer for I2NP block with tunnel data message type
|
2022-08-03 10:26:55 -04:00 |
|
orignal
|
ed5c533982
|
recgnize symmetric NAT from SSU2
|
2022-08-02 20:02:55 -04:00 |
|
orignal
|
98d2ce5845
|
Respond to path challenge. Correct termination reason for duplicated session
|
2022-08-02 13:35:18 -04:00 |
|
orignal
|
eba4626589
|
kappa for RTO culculation
|
2022-07-31 09:45:18 -04:00 |
|
orignal
|
ff5fa1d137
|
3 bytes off for token in RelayResponse
|
2022-07-30 18:50:43 -04:00 |
|
orignal
|
71766ecd16
|
select introducers randomly. More logging for RelayIntro
|
2022-07-30 16:31:44 -04:00 |
|
orignal
|
3bd40fc8b3
|
calculate RTT and RTO
|
2022-07-29 15:24:24 -04:00 |
|
orignal
|
e70d57dcb4
|
resend intervals in milliseconds
|
2022-07-28 19:30:08 -04:00 |
|
orignal
|
fd41fba069
|
variable retranmission window
|
2022-07-27 20:00:03 -04:00 |
|
orignal
|
8a6fe0f321
|
check if address type matches peer's address type for peer test msg 1
|
2022-07-27 10:55:08 -04:00 |
|
orignal
|
4b1f5c9c9b
|
terminate session in separate task
|
2022-07-26 19:56:30 -04:00 |
|
orignal
|
46a549c875
|
random size of fragments
|
2022-07-26 13:00:41 -04:00 |
|
orignal
|
f8a609f692
|
respond to termination
|
2022-07-25 18:46:25 -04:00 |
|
orignal
|
e537878b8a
|
check Ack block bufer size and shrink ranges if necessary
|
2022-07-25 13:42:59 -04:00 |
|
orignal
|
617f45bc59
|
try to send I2NP message in one packet, reduce or drop Ack block if necessary
|
2022-07-24 19:44:49 -04:00 |
|
orignal
|
09aa96e486
|
always bring to closing state if termination requested
|
2022-07-23 19:48:37 -04:00 |
|
orignal
|
ea0ed9e844
|
update SSU2 introducers if Firewalled
|
2022-07-20 21:55:48 -04:00 |
|
orignal
|
000e0358a7
|
resend SessionConfirmed immediately if another SessionCreated received
|
2022-07-19 16:09:16 -04:00 |
|
orignal
|
a3e19931f0
|
insert RouterInfo from SessionConfirmed into netdb immediately
|
2022-07-19 14:06:00 -04:00 |
|
orignal
|
9fec1a86cf
|
send ack for peer test
|
2022-07-18 19:58:19 -04:00 |
|
orignal
|
ffab29890b
|
created additional ranges if acnt > 255
|
2022-07-17 15:22:41 -04:00 |
|
orignal
|
206c068d8e
|
don't send termination without address
|
2022-07-17 07:44:11 -04:00 |
|
orignal
|
dc30cd1112
|
handle SessionConfirmed fragments in reversed order
|
2022-07-16 16:08:55 -04:00 |
|
orignal
|
16290bf66f
|
fixed race condition on session termination
|
2022-07-15 18:22:18 -04:00 |
|
orignal
|
4f8b0e6484
|
send more SessionConfirmed termination messages. Limit send queue
|
2022-07-15 15:01:46 -04:00 |
|
orignal
|
5026dbc1b3
|
receive bigger packets
|
2022-07-14 20:12:27 -04:00 |
|
orignal
|
665a914dc3
|
set max MTU for ipv4
|
2022-07-13 20:08:57 -04:00 |
|
orignal
|
3394bb4b8d
|
calculate SSU2 session MTU and max payload size
|
2022-07-13 19:35:18 -04:00 |
|
orignal
|
5c62726992
|
check clock skew and terminate
|
2022-07-13 12:45:20 -04:00 |
|
orignal
|
90981f628e
|
Send fragmented SessionConfirmed
|
2022-07-12 19:04:03 -04:00 |
|
orignal
|
0c34189d94
|
correct buffer size for fragments of SessionConfirmed
|
2022-07-12 12:17:58 -04:00 |
|
orignal
|
f1d3d6a7b5
|
set max compression for SessionConfirmed
|
2022-07-12 10:50:21 -04:00 |
|
orignal
|
b0d962b49a
|
send ack for retransmitted SessionConfirmed
|
2022-07-11 19:00:23 -04:00 |
|
orignal
|
c50e453af6
|
check out of sequence messages range
|
2022-07-11 18:16:05 -04:00 |
|
orignal
|
8b649aaaf8
|
NACKs and Acks only Ack ranges
|
2022-07-10 18:50:02 -04:00 |
|
orignal
|
fdebbc4498
|
select sessions for introducers
|
2022-07-10 17:13:25 -04:00 |
|
orignal
|
3ff3417ff2
|
send termiation with reason
|
2022-07-09 17:05:23 -04:00 |
|
orignal
|
bb6227281a
|
teminate session after 5 unacked resends
|
2022-07-08 21:31:44 -04:00 |
|
orignal
|
2f44d99a74
|
session closing state
|
2022-07-08 19:06:09 -04:00 |
|
orignal
|
ca4414d15a
|
request relay tag if firewalled
|
2022-07-08 13:52:09 -04:00 |
|
orignal
|
fbb961b43c
|
extract correct endpoint from peer test msg 2
|
2022-07-07 13:23:51 -04:00 |
|
orignal
|
fa9c174264
|
handle first packet from Bob
|
2022-07-06 21:28:53 -04:00 |
|
orignal
|
83f43ab166
|
pick 3 routers for SSU2 peer test
|
2022-07-06 19:33:02 -04:00 |
|
orignal
|
f7e9e6a1c4
|
set status OK after both peer test msg 4 and 5
|
2022-07-06 13:35:04 -04:00 |
|
orignal
|
aa21748e9a
|
set status OK after peer test msg 5
|
2022-07-06 12:41:51 -04:00 |
|
orignal
|
66bc29d075
|
insert received RouterInfo into netdb immediately
|
2022-07-05 19:15:50 -04:00 |
|
orignal
|
0e6ad548b2
|
invoke SSU2 peer test updates
|
2022-07-04 18:54:20 -04:00 |
|
orignal
|
6143515ac6
|
update our IP adress from SSU2
|
2022-07-03 09:31:20 -04:00 |
|
orignal
|
50419f200d
|
fixed 1 packet off for out of sequence clean up
|
2022-07-01 17:35:38 -04:00 |
|
orignal
|
455390f121
|
clean up first out of sequence packet if too many
|
2022-07-01 10:52:10 -04:00 |
|
orignal
|
d375299fa9
|
send token in relay response block
|
2022-06-30 20:00:18 -04:00 |
|
orignal
|
6ca9a599ff
|
remove session after HolePunch received
|
2022-06-30 08:37:50 -04:00 |
|
orignal
|
83bd3b6f0b
|
use token from RelayResponse block
|
2022-06-29 13:42:57 -04:00 |
|
orignal
|
a68765e021
|
fixed off 5 bytes for follow on fragment
|
2022-06-29 08:30:11 -04:00 |
|
orignal
|
5e3115a614
|
check nonce in HolePunch relay response block
|
2022-06-28 18:51:31 -04:00 |
|
orignal
|
624c46f925
|
correct msg offset for follow-on fragment
|
2022-06-28 16:09:13 -04:00 |
|
orignal
|
52d1ee161f
|
store RouterInfo in netdb from SessionConfirmed
|
2022-06-28 10:35:35 -04:00 |
|
orignal
|
d3bc9eb110
|
update token and conn id after HolePunch
|
2022-06-27 23:03:27 -04:00 |
|
orignal
|
72b61a29c2
|
check TokenRequest message size
|
2022-06-27 15:56:47 -04:00 |
|
orignal
|
463ed12ce8
|
don't pick same session for PeerTest msg 2
|
2022-06-26 10:07:39 -04:00 |
|
orignal
|
baf74cb582
|
1 byte off for RelayRequest signature
|
2022-06-26 09:53:29 -04:00 |
|
orignal
|
d7d74666b2
|
correct max MTU size
|
2022-06-25 18:51:24 -04:00 |
|
orignal
|
dd1dd3b7cf
|
wait for Ack for SessionConfirmed or resend
|
2022-06-24 22:06:30 -04:00 |
|
orignal
|
ae77d4ad22
|
correct signed content for peer test msg 3
|
2022-06-24 18:18:11 -04:00 |
|
orignal
|
821987fed7
|
don't send peer test for unknown address/port
|
2022-06-24 15:31:08 -04:00 |
|
orignal
|
18ddba4332
|
send RouterInfo message to right session in relay request
|
2022-06-24 14:08:39 -04:00 |
|
orignal
|
aaad6dece6
|
set session request sent status in right place
|
2022-06-24 13:27:13 -04:00 |
|
orignal
|
ed04747b9d
|
resend SessionRequest and SessionCreated
|
2022-06-24 13:07:02 -04:00 |
|
orignal
|
38e43bc9c8
|
check Charlie's address for PeerTest msg 4
|
2022-06-23 08:18:35 -04:00 |
|
orignal
|
c3c5c7ae63
|
forward correct RelayResponse from Charlie to Alice
|
2022-06-22 16:56:54 -04:00 |
|
orignal
|
578a15bbe5
|
don't send PeerTest msg 5 if address is not supported
|
2022-06-22 15:26:23 -04:00 |
|
orignal
|
6b3d7372ae
|
token received session state
|
2022-06-22 13:58:22 -04:00 |
|
orignal
|
55f7529167
|
delete pending outgoind session when Retry received
|
2022-06-22 13:36:01 -04:00 |
|
orignal
|
bceae244c1
|
delete pending outgoind session when SessionCreated received
|
2022-06-22 13:15:25 -04:00 |
|
orignal
|
5de224d6bf
|
don't connect if pending connection already
|
2022-06-22 11:59:29 -04:00 |
|
orignal
|
694b936f30
|
verify signature for PeerTest msg 4
|
2022-06-21 18:54:13 -04:00 |
|
orignal
|
dda25d431c
|
check if we can send HolePunch to partcular address
|
2022-06-21 16:20:39 -04:00 |
|
orignal
|
22f9abc2f1
|
send errors for RelayIntro
|
2022-06-21 15:45:35 -04:00 |
|