aboutsummaryrefslogtreecommitdiffstats
path: root/p2p/discover/node.go
Commit message (Collapse)AuthorAgeFilesLines
* p2p, p2p/discover, p2p/nat: rework logging using context keysFelix Lange2017-02-281-0/+5
|
* crypto: add btcec fallback for sign/recover without cgo (#3680)Felix Lange2017-02-181-1/+1
| | | | | | | | | | | * vendor: add github.com/btcsuite/btcd/btcec * crypto: add btcec fallback for sign/recover without cgo This commit adds a non-cgo fallback implementation of secp256k1 operations. * crypto, core/vm: remove wrappers for sha256, ripemd160
* all: fix issues reported by honnef.co/go/simple/cmd/gosimpleFelix Lange2017-01-071-4/+1
|
* mobile: initial wrappers for mobile supportPéter Szilágyi2016-11-141-2/+2
|
* all: Rename crypto.Sha3{,Hash}() to crypto.Keccak256{,Hash}()Ricardo Catalinas Jiménez2016-02-221-1/+1
| | | | As we aren't really using the standarized SHA-3
* p2p, p2p/discover: track bootstrap state in p2p/discoverFelix Lange2015-12-181-1/+19
| | | | | | This change simplifies the dial scheduling logic because it no longer needs to track whether the discovery table has been bootstrapped.
* p2p/discover: support incomplete node URLs, add ResolveFelix Lange2015-12-181-19/+53
|
* crypto, crypto/ecies, crypto/secp256k1: libsecp256k1 scalar multGustav Simonsson2015-11-301-1/+1
| | | | thanks to Felix Lange (fjl) for help with design & impl
* p2p/discover: don't attempt to replace nodes that are being replacedFelix Lange2015-08-191-0/+4
| | | | | | | | PR #1621 changed Table locking so the mutex is not held while a contested node is being pinged. If multiple nodes ping the local node during this time window, multiple ping packets will be sent to the contested node. The changes in this commit prevent multiple packets by tracking whether the node is being replaced.
* all: fix license headers one more timeFelix Lange2015-07-241-1/+1
| | | | I forgot to update one instance of "go-ethereum" in commit 3f047be5a.
* all: update license headers to distiguish GPL/LGPLFelix Lange2015-07-231-4/+4
| | | | | All code outside of cmd/ is licensed as LGPL. The headers now reflect this by calling the whole work "the go-ethereum library".
* all: update license informationFelix Lange2015-07-071-0/+16
|
* p2p/discover: new distance metric based on sha3(id)Felix Lange2015-05-061-4/+4
| | | | | | | The previous metric was pubkey1^pubkey2, as specified in the Kademlia paper. We missed that EC public keys are not uniformly distributed. Using the hash of the public keys addresses that. It also makes it a bit harder to generate node IDs that are close to a particular node.
* p2p/discover: track sha3(ID) in NodeFelix Lange2015-04-301-20/+35
|
* p2p/discover: new endpoint formatFelix Lange2015-04-301-39/+22
| | | | | | This commit changes the discovery protocol to use the new "v4" endpoint format, which allows for separate UDP and TCP ports and makes it possible to discover the UDP address after NAT.
* cmd/bootnode, eth, p2p, p2p/discover: clean up the seeder and mesh into eth.Péter Szilágyi2015-04-241-114/+0
|
* p2p/discovery: use the seed table for finding nodes, auto drop stale onesPéter Szilágyi2015-04-241-3/+30
|
* cmd, eth, p2p, p2p/discover: init and clean up the seed cachePéter Szilágyi2015-04-241-0/+4
|
* p2p/discover: store nodes in leveldbFelix Lange2015-04-241-12/+71
|
* p2p/discover: remove unused field Node.activeStampFelix Lange2015-04-131-15/+0
|
* p2p/discover: implement node bondingFelix Lange2015-04-011-2/+41
| | | | | | | | | | | | | | | | This a fix for an attack vector where the discovery protocol could be used to amplify traffic in a DDOS attack. A malicious actor would send a findnode request with the IP address and UDP port of the target as the source address. The recipient of the findnode packet would then send a neighbors packet (which is 16x the size of findnode) to the victim. Our solution is to require a 'bond' with the sender of findnode. If no bond exists, the findnode packet is not processed. A bond between nodes α and β is created when α replies to a ping from β. This (initial) version of the bonding implementation might still be vulnerable against replay attacks during the expiration time window. We will add stricter source address validation later.
* %#x => %xobscuren2015-03-201-2/+2
|
* p2p/discover: add NodeID.PubkeyFelix Lange2015-03-041-0/+15
|
* p2p/discover: code review fixesFelix Lange2015-02-131-1/+3
|
* p2p/discover: add node URL functions, distinguish TCP/UDP portsFelix Lange2015-02-071-0/+289
The discovery RPC protocol does not yet distinguish TCP and UDP ports. But it can't hurt to do so in our internal model.