1. 02 Sep, 2014 1 commit
  2. 26 Aug, 2014 1 commit
  3. 20 Aug, 2014 1 commit
    • Julien Muchembled's avatar
      Do not fail on unexpected 'route_up' notifications from OpenVPN clients · d7d7b425
      Julien Muchembled authored
      This fixes the following error:
      
        TypeError: unsupported operand type(s) for -: 'NoneType' and 'int'
        Traceback (most recent call last):
          File "/usr/sbin/re6stnet", line 438, in main
            tunnel_manager.handleTunnelEvent(read_pipe.readline())
          File "/usr/lib/python2.7/dist-packages/re6st/tunnel.py", line 389, in handleTunnelEvent
            m(*args)
          File "/usr/lib/python2.7/dist-packages/re6st/tunnel.py", line 412, in _ovpn_route_up
            self._connection_dict[prefix].connected()
          File "/usr/lib/python2.7/dist-packages/re6st/tunnel.py", line 76, in connected
            i = self._retry - 1
      
      What happened is probably that a route_up notification was received just before
      killing/recreating the connection for the same node, and then process twice
      the same OpenVPN notification: in this case, the first was for a previous
      connection and should have been ignored.
      d7d7b425
  4. 31 Jul, 2014 2 commits
  5. 29 Jul, 2014 2 commits
  6. 22 Jul, 2014 1 commit
  7. 18 Jul, 2014 2 commits
  8. 16 Jul, 2014 2 commits
  9. 12 Jul, 2014 1 commit
  10. 11 Jul, 2014 3 commits
  11. 10 Jul, 2014 1 commit
  12. 07 Jul, 2014 1 commit
  13. 03 Jul, 2014 1 commit
  14. 02 Jul, 2014 2 commits
  15. 29 Apr, 2014 1 commit
  16. 20 Feb, 2014 1 commit
  17. 19 Feb, 2014 2 commits
  18. 03 Feb, 2014 1 commit
  19. 01 Feb, 2014 1 commit
    • Julien Muchembled's avatar
      Disable clean up of unused tap interface · d46b09e1
      Julien Muchembled authored
      Current implementation is too aggressive and after some time, babeld stops
      working properly, with log full of:
      
        setsockopt(IPV6_JOIN_GROUP): Cannot allocate memory
        setsockopt(IPV6_LEAVE_GROUP): Cannot assign requested address
      d46b09e1
  20. 16 Jan, 2014 1 commit
  21. 23 Dec, 2013 1 commit
  22. 25 Nov, 2013 1 commit
  23. 21 Nov, 2013 1 commit
  24. 20 Nov, 2013 2 commits
    • Julien Muchembled's avatar
      Disable UDP protocol by default for OpenVPN tunnels · cd653523
      Julien Muchembled authored
      UDP protocol is useless if nothing is done to prevent fragmentation.
      Otherwise, it is at best unefficient.
      
      There exist routers on the internet that filter fragmented packets with specific
      data. This is hard to debug because TCP connections hang randomly when there is
      no OpenVPN encryption.
      
      Now, only TCP is enabled by default. A second protocol should be there for
      better performance when possible, either existing UDP one (provided it is
      guaranteed there is no fragmentation) or something better (GRE ?).
      cd653523
    • Julien Muchembled's avatar
      Apply tun_mtu when starting TAP interfaces · a6be6881
      Julien Muchembled authored
      For the moment, this does nothing since it should always be 1500.
      a6be6881
  25. 13 Nov, 2013 1 commit
  26. 01 Oct, 2013 1 commit
  27. 27 Sep, 2013 1 commit
    • Julien Muchembled's avatar
      Speed up bootstrap and reconnection · c4c04f4b
      Julien Muchembled authored
      The way peer addresses were exchanged polluted caches with information about
      dead nodes. In particular, bootstrapping often took a long time because the
      cache of the primary node was mostly useless.
      
      This also fixes bootstrap of registry.
      c4c04f4b
  28. 09 Aug, 2013 1 commit
  29. 02 Aug, 2013 2 commits
  30. 25 Jun, 2013 1 commit
    • Julien Muchembled's avatar
      Fix OverflowError on Windows · e3874b09
      Julien Muchembled authored
      Traceback (most recent call last):
        File "/opt/re6stnet/re6stnet", line 403, in main
          tunnel_manager.handlePeerEvent()
        File "/cygdrive/d/slapos/opt/git/re6stnet/re6st/tunnel.py", line 472, in handlePeerEvent
          self.sock.sendto('\1' + ''.join(msg), address)
      e3874b09