Commit Graph

144 Commits

Author SHA1 Message Date
mailchuck
ce764b6c95
Sensible default maximum difficulty
Fixes #144
2015-12-15 12:14:36 +01:00
mailchuck
ebee02d773
Typos
Still regarding portable mode path fixes
2015-12-13 22:18:48 +01:00
mailchuck
6d0fed0b13
Portable mode fixes
Fixes Bitmessage#379, Bitmessage#341
2015-12-13 21:36:59 +01:00
mailchuck
89bd401183
Version bump 2015-11-29 18:22:53 +01:00
mailchuck
d48af87b14
Initialise inventorySets earlier
In corner cases, they may be referenced before they are populated.
Probably fixes Bitmessage#530
2015-11-27 14:45:56 +01:00
mailchuck
0b53abf39c
Allow bootstrap from a Tor hidden service
I run a modified node as a Tor hidden service for bootstrapping node
addresses, and PyBitmessage can now connect to it.
2015-11-27 12:28:30 +01:00
mailchuck
9f4cdaf82b
Cleaner shutdown
Addresses Bitmessage#549
2015-11-24 21:29:17 +01:00
mailchuck
8931f69fb7
Version bump 2015-11-23 07:20:07 +01:00
mailchuck
8f7bd6f4a0
Typo 2015-11-23 06:58:32 +01:00
mailchuck
3e723969a7
SSL fixes
Handle old Python compatibility better.
2015-11-22 16:43:57 +01:00
mailchuck
97586c50b7
outgoingSynSender thread reaping disabled
It was causing delays on shutdown, worse on linux/osx
2015-11-22 16:42:47 +01:00
mailchuck
9065910a38
Threads close better
- UPnP and outgoingSynSender threads close slightly better.
- extPort initialisation was missing
2015-11-22 16:19:05 +01:00
mailchuck
24d8ffcd54
Make UPnP into a thread
- UPnP is now a separate thread that will continue to setup UPnP
- shutdown waits for threads that shutdown correctly (Addresses
Bitmessage#549)
2015-11-21 11:59:52 +01:00
mailchuck
b93308d7ab
UPnP support merged and fixed
Fixes Bitmessage#373
Fixes Bitmessage#79
Fixes #4

Needs to be turned on in the config file (keys.dat) by adding "upnp =
true" into the main section
It needs some cleanup (e.g. if you have multiple routers, it will not
correctly handle failure of one of them)
2015-11-20 23:07:28 +01:00
mailchuck
c37fbd40ea
Version bump
We have 0.5.3 now
2015-11-15 02:23:11 +01:00
mailchuck
dd6de5210f
SSL workaround
Python < 2.7.9 does not support anonymous SSL server through
ssl.wrap_socket, so we have to disable it. Works fine as client.
Try to prefer secp256k1 curve (again, requires python >= 2.7.9)
2015-11-15 02:20:25 +01:00
mailchuck
b0b01efd59
SSL fixes
- uses constants for service flags
- requires SSL to use TLSv1 version (protection against POODLE-style
attacks)
- retry if sock.recv incomplete
2015-11-13 17:01:17 +01:00
mailchuck
8685449556
Opportunistic encryption with TLS (1 of 2)
Fixes Bitmessage#264
Fixes Bitmessage#648
2015-11-13 12:32:17 +01:00
mailchuck
cdaedaac0b
Unified code for finding source code location
It is already used in 3 places so I put it into a function
2015-11-13 12:26:02 +01:00
mailchuck
bfd64bb93f
Bump version
get ready for 0.5.2
2015-11-08 23:03:34 +01:00
mailchuck
0de75079df
Version bump 2015-11-01 12:09:08 +01:00
mailchuck
386094f1ad
Version bump
Just for development
2015-10-19 21:26:53 +02:00
mailchuck
dad14b0cb8
Bump up version 2015-10-18 14:51:59 +02:00
lightrabbit
cfae964761 Add UPnP support. 2015-08-22 16:48:49 +08:00
Jonathan Warren
cc712cb8ff finished work on specifyTTL 2015-03-09 02:35:32 -04:00
Jonathan Warren
bd9286ef41 msg objects now contain an objectVersion 2015-01-28 14:14:28 -05:00
Jonathan Warren
5b87bc26ec Fix #758 2015-01-21 12:38:25 -05:00
Jonathan Warren
8b95ad1659 updated settings.ui file for Czech translation 2014-12-25 23:24:09 -05:00
Jonathan Warren
9b6bc26144 fix bug in #715 2014-12-25 21:06:10 -05:00
Jonathan Warren
50c392c197 resolve merge conflict 2014-12-25 20:37:04 -05:00
Jonathan Warren
e898b40203 Removed obsolete Protocol v2 code 2014-12-25 04:06:57 -05:00
Jonathan Warren
e096c37f7e save debug.log in correct directory 2014-10-13 01:59:16 -04:00
Yuri
5beaeff2e2 TImestamped the keys.dat backup file. 2014-09-16 10:04:56 -07:00
Yuri
d3c91eea3b Added backup copy creation during keys.dat write to prevent an accidental file loss due to the disk failure. 2014-09-14 23:53:21 -07:00
Yuri
34824c044e Moved all keys.dat writing code into writeKeysFile in shared.py 2014-09-14 23:34:33 -07:00
Jonathan Warren
0865e863ec Added ability to limit network transfer rate 2014-09-10 16:47:51 -04:00
Jonathan Warren
c84cdecba4 Normalize the noncetrialsperbyte and payloadlengthextrabytes for each of the user's existing addresses 2014-09-02 19:25:03 -04:00
Jonathan Warren
c306062282 Bitmessage Protocol Version Three 2014-08-27 03:14:32 -04:00
Jonathan Warren
ea6f34ade6 removed use of memoryview so that we can support python 2.7.3 2014-08-06 15:54:59 -04:00
Jonathan Warren
807f2fee8a increment version number to 0.4.3 2014-08-04 18:35:26 -04:00
Jonathan Warren
9e16e81283 resolve merge conflict and show transfer rate 2014-08-01 17:25:47 -04:00
Yuri
f107b0fbd9 Addition of bytes received/sent counts on the network information tab. 2014-07-07 13:30:23 -07:00
bmng-dev
947f7655ab Refactor generation of packet headers
Added global variable Header - a compiled Struct to pack/unpack headers so as to avoid repeatedly compiling the same format string
Add a new method CreatePacket to simply and efficiently construct a packet that is ready to be sent
Modify assembleVersionMessage to use CreatePacket
2014-05-22 12:30:51 +00:00
Jonathan Warren
38d7db24ad Merge pull request #639 from bpeel/wip/trusted-peer
Add a 'trustedpeer' option to keys.dat
2014-04-30 17:42:28 -04:00
Neil Roberts
7da6ea958f Add support for IPv6
It will now listen on an IPv6 socket if possible or fall back to IPv4
if that doesn't work. It will no longer filter out all IPv6 addresses
and instead it will only filter out those that point to the local
network.

It looks like the DNS bootstrapping should just automatically work
because getaddrinfo already returns IPv6 addresses from the AAAA
record.

In order to convert from the ASCII representation of IPv6 addresses
and back we need inet_ntop and inet_pton. Python 2 doesn't currently
provide these for Windows so instead this patch provides a hot patch
to the socket module which wraps WSAStringToAddress and
WSAAddressToString using ctypes.
2014-03-12 01:48:48 +00:00
Neil Roberts
03263156de Add a 'trustedpeer' option to keys.dat
If this option is specified in keys.dat then Bitmessage will connect
to the host specified there instead of connecting to the hosts in the
list of known nodes. It will also stop listening for incoming
connections and the timing attack mitigation will be disabled.

The expected use case is for example where a user is running a daemon
on a dedicated machine in their local network and they occasionally
want to check for messages using a second instance of the client on
their laptop. In that case it would be much faster to catch up with
the messages by directly downloading from the dedicated machine over
the LAN. There is no need to connect to multiple peers or to do the
timing attack mitigation because the daemon is trusted.

The host is specified as hostname:port. Eg, ‘192.168.1.8:8444’.
2014-02-06 13:16:07 +00:00
Jonathan Warren
7983a14754 Increment version number to 0.4.2 2014-01-20 23:04:41 -05:00
Jonathan Warren
85a409636a Fix #611; also swap print statements out for loggers 2014-01-16 20:10:04 -05:00
Jonathan Warren
534e98e816 Merge pull request #578 from b4tman/master
fix AppdataFolder encoding on windows
2013-12-24 21:53:41 -08:00
Jonathan Warren
99738e88aa Merge pull request #574 from yurivict/compatibility_FreeBSD
FreeBSD compatibility
2013-12-15 21:58:45 -08:00