Handle UDP packets with unknown source addresses properly.
authorGuus Sliepen <guus@tinc-vpn.org>
Wed, 10 Aug 2011 15:04:17 +0000 (17:04 +0200)
committerGuus Sliepen <guus@tinc-vpn.org>
Wed, 10 Aug 2011 15:04:17 +0000 (17:04 +0200)
Probably due to a merge, the try_harder() function had duplicated the
rate-limiting code for detecting the sender node based on the HMAC of the
packet. This prevented this detection from running at all. The function is now
identical again to that in the 1.0 branch.

src/net_packet.c

index 3627f31d317bfcc122269b0a84a9eff6327900d5..875a0832bf88cf0fc37a0dd4ce01775faf5b8439 100644 (file)
@@ -570,11 +570,6 @@ static node_t *try_harder(const sockaddr_t *from, const vpn_packet_t *pkt) {
        static time_t last_hard_try = 0;
        time_t now = time(NULL);
 
-       if(last_hard_try == now)
-               return NULL;
-       else
-               last_hard_try = now;
-
        for(node = edge_weight_tree->head; node; node = node->next) {
                e = node->data;