-
drflashd[m]
does monero blockchain import tool support symlink, it seems not: file not found
-
jeffro256[m]
> because p2pool can generate transactions with much more than 16 outputs
-
jeffro256[m]
Isn't the number of outputs limited to 16, or is that only for non-coinbase transactions?
-
UkoeHB
non-coinbase
-
UkoeHB
the limit was imposed due to how bulletproofs are constructed
-
UkoeHB
I got AES working with jamtis address tags, but... my test show it is 10x slower than blowfish for decrypting a single block (blowfish is a 64-bit block, AES is 128-bit, so it's 5x slower per bit).
-
jeffro256[m]
> the limit was imposed due to how bulletproofs are constructed
-
jeffro256[m]
Interesting, I always thought it was so that decoy flooding attacks were harder to pull off
-
UkoeHB
Ok I tried tiny AES (
github.com/kokke/tiny-AES-c ) but only got ~20% faster. Looking at mbedtls and openssl but their code looks really annoying to extract... hmm
-
jeffro256[m]
Is twofish on table or no?
-
jeffro256[m]
Sorry if this discussion was already had
-
jeffro256[m]
*on the
-
jeffro256[m]
Or cha cha?
-
jeffro256[m]
AES is definitely the most battle hardened
-
UkoeHB
twofish is a possibility, the code just looks like a pita so I've been avoiding it lol
-
UkoeHB
all this c makes my head hurt
-
UkoeHB
(I found better code with a license that can actually maybe be used... pending)
-
jeffro256[m]
> (I found better code with a license that can actually maybe be used... pending)
-
jeffro256[m]
For twofish?
-
jeffro256[m]
> all this c makes my head hurt
-
jeffro256[m]
I really felt that
-
UkoeHB
yeah twofish
-
UkoeHB
jeffro256[m]: whoo twofish is way faster than aes (and probably a lot of optimizations on the table in this code I found)
-
jeffro256[m]
Yay! Twofish is a "newer" (1998) cipher but it has stood up pretty well so far
-
jeffro256[m]
Should blow AES out of the water in terms of performace. Also it's very tunable!
-
jeffro256[m]
I don't think we have any twofish code in the code tree though
-
jeffro256[m]
But didn't you mention that we didn't have AES encryption code anyways either?
-
UkoeHB
we have oaes (open aes)
-
UkoeHB
that's what I tested first, then tiny aes which was faster
-
UkoeHB
I have already added blake2b, blowfish, siphash, tiny aes, and now twofish to my branch (most of those can be removed). Getting good at this lol
-
jeffro256[m]
Is your branch on your GitHub (I can test out performace later if you'd like)
-
jeffro256[m]
How much better was Twofish? I'm kind of surpised Twofish did so well since a lot of hardware has acceleration for AES
-
UkoeHB
well the aes I was using is just raw c
-
UkoeHB
-
UkoeHB
the perf test I run: ./build/Darwin/seraphis_lib/release/tests/performance_tests/performance_tests --filter=\*test_remote_scanner_client_scan_sp\* --stats
-
UkoeHB
-
UkoeHB
I'm not doing a direct performance test of the ciphers (that would probably be more robust).
-
UkoeHB
jeffro256[m]: twofish was ~5x faster than my fastest run with tiny aes (using a 16-byte key)
-
jeffro256[m]
Wow that's pretty good!
-
jeffro256[m]
The real test would be to compare it against a heavy-hitter native library like OpenSSL's implementation
-
jeffro256[m]
For reference, I compared the speed of our in-tree MD5 hash function to OpenSSL's on my machine and OpenSSL was 4x faster
-
jeffro256[m]
I'll definittely take a look later. right now I'm trying to finish this homework before midnight lol
-
UkoeHB
no worries and no rush :) it's pretty plug-and-play for this usecase
-
monerobull[m]
Great job on the GUI, can confirm long close-times are fixed.
-
sech1
UkoeHB AES can't be slower, CPUs have dedicated instructions for it. You probably tested software implementation
-
moneromooo
jberman[m]: 8046, do you want the first commit removed then if it seldom applies ?
-
selsta
this person keeps opening nonsense issues and then complains when I close them lol
monero-project/monero #8303
-
monerobull[m]
<selsta> "this person keeps opening..." <- Tell them to go back to Bitcoin if they hate updates so much
-
rbrunner
Any time you think things can't possibly get any crazier, something like this comes along.
-
monerobull[m]
Watch 5 new coins getting created on the uncontested v18 :P
-
monerobull[m]
s/getting/get/
-
hyc
can we ban web-sharp from the repo please
-
jeffro256[m]
-- Doesn't understand how to run tests
-
jeffro256[m]
-- Wants a release rollback
-
hyc
-- doesn't read carefully, even his own writing
-
jeffro256[m]
-- Accuses selsta of a "51%" attack by *checks notes* tagging a new release
-
hyc
dunno what a dumbshit like that is doing paying for a pro github acct
-
jeffro256[m]
-- Doesn't understand make targets
-
jeffro256[m]
-- Doubles down
-
jeffro256[m]
-- Yet still wants to distribute their binaries as "official"
-
w[m]
Im surprised he didnt ask to speak with the manager..
-
jeffro256[m]
Does anyone here have any expereince with valgrind's massif tool?
-
moneromooo
I've used it a few times. Got me to kill the ugly spike in a game when switching levels. A bit hard to see what's going on for sure though. There are a couple GUIs for its outputs.
-
moneromooo
The GUIs are real helpful there, you can see the evolution of the main hogs with time.
-
moneromooo
Much more helpful than for, say, perf.
-
drflashd[m]
-
drflashd[m]
i will not punch port holes, so only outgoing
-
drflashd[m]
how?
-
cryptogrampy[m]
> <@flashd:matrix.org> nice, i want sync/relay over clear&tor idgaf,... (full message at
libera.ems.host/_matrix/media/r0/do…51057842d2e67d9471e9a00892357cca335)
-
w[m]
Whoops yes jeffro, meet me over there
-
jeffro256[m]
moneromooo Nice! I'm going to try to use to see what is taking up so much RAM with with monerod, but I keep getting invalid callstack errors when running with massif. Isn't there a callstack library that the monero code is using, and is it possible to turn if off?
-
selsta
unwind?
-
w[m]
* Whoops yes dr flash*****, meet me over there
-
selsta
-
selsta
do you mean that?
-
moneromooo
Hmm. Not sure. I have a custom patch for stack trace, never got PR'd. Might help, but IIRC these things tend to stop in a huff very easily...
-
moneromooo
If you look in my crash branch, git log and grep for "stack" and you'll find it.
-
moneromooo
It uses boost's stack trace system IIRC.
-
moneromooo
Make sure you build with -g, don't use -s at link time, -fno-omit-frame-pointer might help, though I think it's off at -O2 and below...
-
moneromooo
-g should not be needed per se, but doesn't hurt.
-
» FenderQ compiled master 67e5ca9ad, and v0.17.3.2 ok on OpenBSD amd64
-
FenderQ
I had to do a non -static build for the tag though
-
FenderQ
so it would link with libunbound from packages
-
FenderQ
catering to liberssl
-
FenderQ
yet master has unbound removed afaik (submodule)
-
FenderQ
libressl*
-
moneromooo
(note that I dunno whether this patch would help, I'm not sure why boost and/or unwind and/or builtin give good traces or not)
-
drflashd[m]
E exceptin in main! failed to init p2p server... why?
-
drflashd[m]
--anonymous-inbound= is not eaten it seems but why
-
drflashd[m]
how to get verbose logging
-
drflashd[m]
* verbose logging (where is monerod.log file?)
-
w[m]
Anonymous inbound have to set an unused port, not 18080
-
w[m]
Use 18084
-
w[m]
18083 is used for p2pool
-
w[m]
Log file should be in .bitmonero folder in home directory
-
drflashd[m]
w[m]: no more output comapred to console print = bad!
-
w[m]
Hey, wrong chat room!
-
drflashd[m]
i use 18083 p2p only (no 18081 for wallet rpc for now)
-
w[m]
This is -dev
-
drflashd[m]
hey dev, why --tx-proxy= mandatory for p2pserver?
-
jberman[m]
<moneromooo> "jberman: 8046, do you want the..." <- responded, didn't consider the case of reusing across attempts, approved as is