forked from I2P_Developers/i2p.i2p
Router: Consistent logging for network ID check
Log level change for peer test IP
This commit is contained in:
@ -1062,7 +1062,7 @@ public abstract class KademliaNetworkDatabaseFacade extends NetworkDatabaseFacad
|
||||
if (routerInfo.getNetworkId() != _networkID){
|
||||
_context.banlist().banlistRouterForever(key, "Not in our network: " + routerInfo.getNetworkId());
|
||||
if (_log.shouldLog(Log.WARN))
|
||||
_log.warn("Bad network: " + routerInfo);
|
||||
_log.warn("Not in our network: " + routerInfo, new Exception());
|
||||
return "Not in our network";
|
||||
}
|
||||
FamilyKeyCrypto fkc = _context.router().getFamilyKeyCrypto();
|
||||
|
@ -591,7 +591,7 @@ class InboundEstablishState extends EstablishBase implements NTCP2Payload.Payloa
|
||||
if (!rv) {
|
||||
Hash aliceHash = alice.getHash();
|
||||
if (_log.shouldLog(Log.WARN))
|
||||
_log.warn("Dropping inbound connection from wrong network: " + aliceID + ' ' + aliceHash);
|
||||
_log.warn("Not in our network: " + alice, new Exception());
|
||||
// So next time we will not accept the con from this IP,
|
||||
// rather than doing the whole handshake
|
||||
InetAddress addr = _con.getChannel().socket().getInetAddress();
|
||||
|
@ -531,6 +531,8 @@ public class NTCPTransport extends TransportImpl {
|
||||
}
|
||||
if (toAddress.getNetworkId() != _networkID) {
|
||||
_context.banlist().banlistRouterForever(peer, "Not in our network: " + toAddress.getNetworkId());
|
||||
if (_log.shouldWarn())
|
||||
_log.warn("Not in our network: " + toAddress, new Exception());
|
||||
markUnreachable(peer);
|
||||
return null;
|
||||
}
|
||||
|
@ -253,8 +253,10 @@ class EstablishmentManager {
|
||||
Hash toHash = toIdentity.calculateHash();
|
||||
if (toRouterInfo.getNetworkId() != _networkID) {
|
||||
_context.banlist().banlistRouterForever(toHash, "Not in our network: " + toRouterInfo.getNetworkId());
|
||||
if (_log.shouldWarn())
|
||||
_log.warn("Not in our network: " + toRouterInfo, new Exception());
|
||||
_transport.markUnreachable(toHash);
|
||||
_transport.failed(msg, "Remote peer is on the wrong network, cannot establish");
|
||||
_transport.failed(msg, "Not in our network");
|
||||
return;
|
||||
}
|
||||
UDPAddress addr = new UDPAddress(ra);
|
||||
|
@ -393,8 +393,8 @@ class PeerTestManager {
|
||||
if (test.getReceiveBobTime() > 0)
|
||||
testComplete(true);
|
||||
} catch (UnknownHostException uhe) {
|
||||
if (_log.shouldLog(Log.ERROR))
|
||||
_log.error("Charlie @ " + from + " said we were an invalid IP address: " + uhe.getMessage(), uhe);
|
||||
if (_log.shouldWarn())
|
||||
_log.warn("Charlie @ " + from + " said we were an invalid IP address: " + uhe.getMessage(), uhe);
|
||||
_context.statManager().addRateData("udp.testBadIP", 1);
|
||||
}
|
||||
} else {
|
||||
|
@ -1542,9 +1542,9 @@ public class UDPTransport extends TransportImpl implements TimedWeightedPriority
|
||||
//_context.banlist().banlistRouter(peerHash, "Part of the wrong network", STYLE);
|
||||
if (peer != null)
|
||||
sendDestroy(peer);
|
||||
dropPeer(peerHash, false, "wrong network");
|
||||
dropPeer(peerHash, false, "Not in our network");
|
||||
if (_log.shouldLog(Log.WARN))
|
||||
_log.warn("Dropping the peer " + peerHash + " because they are in the wrong net: " + entry);
|
||||
_log.warn("Not in our network: " + entry, new Exception());
|
||||
return;
|
||||
} else {
|
||||
if (entry.getType() == DatabaseEntry.KEY_TYPE_ROUTERINFO) {
|
||||
|
Reference in New Issue
Block a user