[Broken server] v1.3.0
Issues
- Server is leaking UDP associations when the packet has an invalid address due to #83.
Features
- Reduce memory usage in client and server.
- Refactor client and server packages.
Changelog
d5da8bd Add an integration test for the entire server
2b2558d Add early length check
6762cc3 Avoid UDP cipher search if a NAT mapping exists
5f22a55 Fix buffer size
afda20a Fix geoip db path
408112f Improvements suggested by fortuna@
c0bc713 Measure more probe buckets
0a649b4 Merge branch 'master' into fortuna-refactor
7298816 Merge pull request #81 from Jigsaw-Code/bemasc-test
cf615e8 Merge pull request #82 from Jigsaw-Code/fortuna-probes
ac58257 Merge pull request #83 from Jigsaw-Code/bemasc-udp-buffer
fdfc52a Merge pull request #84 from Jigsaw-Code/fortuna-refactor
f625a9f Merge pull request #86 from Jigsaw-Code/bemasc-unpack
f57f555 Merge pull request #87 from Jigsaw-Code/bemasc-unpack
4a79431 Rename unpack
to findAccessKeyUDP
45a9303 Rename isTagetIPValid
35e6b79 Rename randomServerSaltGenerator
3fed19c Restore 51, 52, and add 220, 221
e44d8f6 Revert UDP buffer size to 16KiB
3ccf0cc Revert client test to maxUDPBufferSize
2abf39e Revert model.go
76c976c Separate client and server code
3e9da3f Update dependencies
6d53eab Update udo imports
fa6b7ac Use onet.IPPolicy
bb76e73 Use onet.IPPolicy
34a60e1 Use onet.TargetIPValidator
5f16090 Use our own implementation of Pack for UDP
616163e Use our own implementation of Unpack for UDP
b0ce0fc Use ss namespace consistently
04656b9 Use ss.TestCipher