-
moneromooo
jwinterm: looks like you never got any blocks from a peer just yet.
-
selsta
.merges
-
xmr-pr
8296 8356 8357 8358
-
sech1
when 0.18 release?
-
sech1
still on track for June 16th?
-
selsta
ledger will be the problem
-
sech1
is anyone in contact with them?
-
selsta
i'm in their discord but i don't have any info myself
-
selsta
they said "ok" over a month ago and then nothing
-
sech1
They still have until July 16th to update their stuff
-
sech1
v0.18.1 (day 1 patch, lol) can have proper ledger support
-
selsta
yes, that's the plan but i would like some confirmation that someone is working on it
-
sech1
there's also GUI that needs to update p2pool hashes to v2.1 to support the fork. But it will be a quick patch from me.
-
selsta
yea, GUI won't be a problem, main issue I'm currently seeing is Ledger
-
selsta
Last time it took them 1 month to release a simple version bump with 0 changes
-
selsta
both previous employees that were responsible for monero either quit or moved to a different position
-
ErCiccione
They were the problem last hard fork too and they were helped greatly by monero devs. Seems to me that they don't care much about their Monero customers
-
woodser[m]
are integrated subaddresses permissible and supportable? monero-wallet-rpc does not support it. one can manually call the same utilities to create integrated subaddresses, but there seems to be a problem when sending funds to self with one of these
-
moneromooo
No.
-
moneromooo
Subaddresses were made to avoid having the two part addresses, which confused users as they had two addresses that looked different but sent to the same address.
-
moneromooo
Well, that's one reason at least.
-
woodser[m]
ok, thanks
-
r4v3r23[m]
<r4v3r23[m]> "is there a way to set a password..." <- would this be at all possible to add in the wallet current structure?
-
r4v3r23[m]
s/wallet/wallets/
-
moneromooo
Passwords for what ?
-
r4v3r23[m]
for specific accounts within the wallet
-
r4v3r23[m]
so different accounts would open up depending on what password you enter
-
moneromooo
It seems possible. Not worth the bother though, unless you can come up with a good reason.
-
r4v3r23[m]
decoy wallets is the first use case that comes to mind
-
moneromooo
For sending, at lesat. For receiving, it seems not too easy.
-
moneromooo
What is a decoy wallet ?
-
r4v3r23[m]
also a way to separate funds within the wallet without having to have different seeds
-
moneromooo
You can do that currently. It does not require passwords.
-
r4v3r23[m]
moneromooo: a wallet that has a minimal amount of money that would be used in case you are ever forced to open your wallet
-
moneromooo
Why would you ever want to do that in the same wallet ?
-
r4v3r23[m]
moneromooo: yes, but all accounts are visible once the wallet is opened
-
r4v3r23[m]
moneromooo: well the password would only open account #2 for example, with 0.1234 XMR in it
-
moneromooo
I assume you'd want it so you cannot tell if an account is "open" or not, then, right ? Otherwise it's self defeating.
-
r4v3r23[m]
basically, main wallet password = opens main wallet with access to all accounts
-
r4v3r23[m]
then account specific password = only open that account without seeing the rest of the wallets funds
-
moneromooo
What you are asking for is:
-
r4v3r23[m]
so, a wallet within a wallet
-
moneromooo
- much more dangerous (bug wise and info leak wise) than just using a seed offset
-
r4v3r23[m]
why is it more dangerous?
-
moneromooo
- self defeating, as someone who wants to steal your stuff can likely tell (if they know where to look) that thre is some encrypted stuff left
-
moneromooo
- not worth the work
-
moneromooo
It is more dangerous because it requires adding a non trivial amount of code, which has to be all correct (or mostly correct).
-
r4v3r23[m]
ok, is it possible today for a wallet dev to implement that, or would that require change to the monero wallet code?
-
moneromooo
It is possible for wallet dev to implement that, and it would require cahnges to the monero wallet code.
-
r4v3r23[m]
ok, thanks for the indo
-
r4v3r23[m]
s/indo/info/
-
wernervasquez[m]
r4v3r23: regarding a decoy wallet, I have thought the truecrypt hidden volume method would be the way to go
-
wernervasquez[m]
Where if you enter a decoy password it decrypts the decoy wallet info from the same file that contains the real wallet.
-
wernervasquez[m]
It is source available and discontinued. But I believe it had a pretty sterling record testified by court cases. Could be worth a look.
-
moneromooo
In any case, placing a decoy wallet right near the real one is a bad idea, *unless* the existence of that particular wallet is known already. Te closer they are, the more likely it is for hte real wallet to be found or suspected, which defeats the purpose.
-
moneromooo
If you have to do this, an offset is much simpler, cleaner, and safer.
-
wernervasquez[m]
moneromooo: If you have an offset, wouldnt the wallet have that data stored somewhere once it was synced?
-
moneromooo
Hmm. I suppose it might not be wiped from memory, but it won't be stored anywhere on disk (beyond swap if unlucky).
-
r4v3r23[m]
<wernervasquez[m]> "r4v3r23: regarding a decoy..." <- im talking in a hypothetical robbery/shakedown
-
r4v3r23[m]
i know there are better way to store funds, and the best security is not having them on you in the first place
-
wernervasquez[m]
moneromooo: doesnt the wallet store known transations when it syncs?
-
r4v3r23[m]
it was more of a technical question, if the wallet could support more than 1 password that would open specific accounts within the same wallet
-
moneromooo
It does. You're not expected to save the cache when using an offset as a hidden wallet though.
-
moneromooo
Whereas if you had a one-password-per-account patch and were to save the cache for the main wallet, your secret stuff would be included.
-
r4v3r23[m]
moneromooo: by hidden wallet you mean the second seed thats generated when adding a passphrase?
-
moneromooo
The one you don't want known by others.
-
moneromooo
And yes.
-
r4v3r23[m]
moneromooo: that doesnt really help in a situation where youre being forced to open your wallet. its more about saving the seed in a safer way in case some one else finds it
-
wernervasquez[m]
moneromooo: can you clarify what is in the cache?
-
HenryHollingwort
can't you just achieve that by storing N wallets in a single file (concat w/ boundary) then the wallet program makes it look like those are 1 thing but underneath it is N wallets... ultimately that is what you'd be doing anyway
-
moneromooo
Many things. Block hashes. Which outputs you received. Record of received/sent txes. Address labels. Settings. Subaddresses.
-
moneromooo
HenryHollingwort: you could, but it seems obvious if you look at file length, no ?
-
wernervasquez[m]
moneromooo: what if you have an offline wallet?
-
moneromooo
Refine this question.
-
wernervasquez[m]
moneromooo: I think truecrypt solved that issue
-
wernervasquez[m]
moneromooo: If you have an offline wallet, the data would likely be saved. Right? Unless the user is expected to recreate an offline wallet every time they use it?
-
moneromooo
(mistake, settings are in the keys file actually, not the cache)
-
moneromooo
I don't understand what you're saying here. Whether your wallet is offline or not does not affect whether a cache is saved.
-
moneromooo
It affects some of the data in the cache (ie, if you mean cold/hot, only one of the pair will have stuff like tx secret keys).
-
wernervasquez[m]
moneromooo: I am imagining the case where an average person of average means wants a decoy. Average joe doesnt want to recreate a wallet everytime they buy a pizza. So the transaction history is going to be saved to disk by the average user for their daily wallet.
-
moneromooo
If the question is "is my statement correct", then yes. I agree with it.
-
moneromooo
To be clear, I meant you do not save the cache to the *hidden* wallet, not the other one.
-
r4v3r23[m]
moneromooo: how is an encrypted seed wallet hidden? if its loaded on your phone or computer, its obvious. and if you have the unencrypted "decoy" seed/wallet there too, the you've got 2 wallets that you can be forced to open
-
r4v3r23[m]
the point of the decoy is giving the illusion that you are giving some one access to your wallet when you really arent
-
moneromooo
Well, I was assuming you would not store them separately. If you do, then yes, it is not hidden.
-
moneromooo
And if it is loaded when your phone/computer is taken, then it is not hidden.
-
moneromooo
If you want to defend against *that*... you'd need a proximity beacon that auto kills the process when not in proximity.
-
moneromooo
(and probably enables screen lock, etc)
-
r4v3r23[m]
so you can see how multiple passwords per wallet would be useful in that situation
-
moneromooo
I'll stop here since it's getting circular, but I never claimed it was not useful, just less useful and more dangerous than a seed offset.
-
moneromooo
The one thing I can see going for it is a way to get an extra safety when spending from a "reserve" account.
-
r4v3r23[m]
moneromooo: yes thats another use case. its just a way to seal off accounts from each other within the same wallet
-
jwinterm
moneromooo: I switched and stagenet got stuck on like block 500k or so in the same way so we are just going to test on mainnet lol
-
moneromooo
How much time did you wait after restart for the log you posted ?
-
moneromooo
It might take a bit to find another peer.
-
moneromooo
Alternatively, it's possible they're kicking you as you connect if you sent bad data.
-
moneromooo
Though I'd expect bad data to be around the recent fork... I'll try to sync to see if anything goes wonky.
-
rbrunner
Is there anything to prepare for the eventuality that we don't get the multisig fixes in #8149 into the hardfork release?
-
rbrunner
I think if we apply the usual principles we can't merge that until a final review happens, as there were quite some changes after the reviews that happened
-
rbrunner
And that review may not happen in time for the release, seems to me
-
rbrunner
Does the "old" multisig signing code even continue to work after the hardfork, regardless of problems with potential vulnerabilities?
-
moneromooo
AFAIK it would still work.
-
rbrunner
And do we see that new "enable multisig experimental" covering the case that we just continue with the old code?
-
UkoeHB
the existing code should be disabled
-
UkoeHB
the patch should be marked experimental until/if there is enough confidence in it
-
rbrunner
So only people able to use git and compile their own version of Monero would be able to do multisig?
-
UkoeHB
correct
-
rbrunner
Well, that's one way to solve the problem ...
-
rbrunner
So, to "prepare for that eventuality", if we go down that route, this would mean at least a mini-PR that disables the current code
-
rbrunner
For good, unlike that switch we recently merged
-
UkoeHB
that's my opinion, yes
-
rbrunner
Let's see whether we get people to chime in later and voice their opinion here. I am a bit disappointed we don't have somebody shouting bloody murder yet about that idea.
-
rbrunner
I mean, a Monero release without working multisig, for maybe a month or two, until we have the first after-hardfork point release ...
-
moneromooo
UkoeHB: the current code's just fine for M/N if at most N-1 are untrusted, right ?
-
moneromooo
M-1
-
UkoeHB
moneromooo: only if you only interact with trusted parties
-
moneromooo
I asked for a blurb about this for enabling multisig. Not sure if I got that. Kinda forgot.
-
moneromooo
Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in.
-
moneromooo
Otherwise, people who use multisig now are fucked, even if it's themselves only, from two machines or something.
-
moneromooo
I suspect an exchange might be a typical user of multisig between itself and itself.
-
rbrunner
Or maybe making an exception from our usual principles and merging 8149 even without final review would be evil, but the lesser evil than the old code
-
rbrunner
Or no multisig at all for "normal" people for months
-
moneromooo
set i-am-not-a-normal-person 1
-
moneromooo
Multisig now enabled.
-
ooo123ooo1234567
moneromooo: `set i-am-ready-to-loss-everything 1`
-
ooo123ooo1234567
s/loss/lose/
-
rbrunner
Well, the message for the `enable-multisig-experimental` switch more or less tells you that already ...
-
rbrunner
ooo123ooo1234567, how about winning some karma points, reviewing UkoeHB's latest changes to 8149 and save the day?
-
jeffro256[m]
> Or maybe making an exception from our usual principles and merging 8149 even without final review would be evil, but the lesser evil than the old code
-
jeffro256[m]
Might be worse because then people think its an improvement and BAM new vulnerability
-
rbrunner
That's the trouble with lesser evils, often it's damned hard to decide which one is it
-
jwinterm
moneromooo: maybe 5-10 min, not too long but not instant close either - anyway, mainnet syncs ok so just gonna sacrifice 0.05 xmr to gods of development
-
jwinterm
fees cheap enough now it doesn't really cost anything
-
ooo123ooo1234567
<rbrunner> "ooo123ooo1234567, how about..." <- One of the reasons that prev researchers aren't here is that you all don't see difference between important and unimportant changes. I'm 100% sure even bigger number of karma points will be sent to the next scammer with beautiful stories, but without actual solutions.
-
moneromooo
I started testnet on a new data dir. It took 9 minutes to find a peer. Just anecdata for sure.
-
rbrunner
Is that a "No" stretched over 3 lines in my IRC window? It's a bit hard to parse.
-
moneromooo
Which lines ? :S
-
moneromooo
I was talking to jwinterm
-
moneromooo
Who was tlaking to me
-
rbrunner
Well, I don't know whether you see ooo123ooo1234567's ... reaction ... to my idea of them giving final review to 8149.
-
moneromooo
Oh. Ignore me then.
-
selsta
what would the security risks be when `--zmq-pub` is by default set to `tcp://127.0.0.1:18083` ?
-
hyc
set to localhost? should be none
-
hyc
no risk, I mean
-
selsta
ok, any downside?
-
moneromooo
A lot more attack surface. Also depends on whether it implements the restricted RPC checks. If not, then you can possbibly start mining etc.
-
hyc
it's not http, so browsers can't surreptitiously connect to it
-
moneromooo
Oh. loopback. Nevermind.
-
moneromooo
I agree with "not much" then.
-
sech1
also, zmq-pub is not an RPC
-
selsta
-
selsta
this feels hacky, but i don't know what the best solution here is
-
sech1
zmq-pub only allows to subscribe to a few notifications, it's a read-only interface
-
sech1
in monerod
-
hyc
ah, zmq-pub just broadcasts
-
sech1
zmq-rpc is an RPC
-
sech1
but it's half-implemented
-
sech1
or less than half
-
hyc
so basically, no security impact. it's just relaying info that was already public on p2p
-
moneromooo
That's just the notifications, without the requests ?
-
moneromooo
Oh, you said it. Well, ignore me then -_-
-
jwinterm
good to know re: 9 min
-
arnuschky[m]
<rbrunner> "Let's see whether we get..." <- We are :) And the Haveno guys too, I assume
-
arnuschky[m]
> Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in.... (full message at
libera.ems.host/_matrix/media/r0/do…4020f094327375a33b6e8ee132331a8f8d7)
-
arnuschky[m]
s/be/me,/
-
arnuschky[m]
-
UkoeHB
arnuschky[m]: mainly that, plus a bunch of rebases and some code quality improvements
-
arnuschky[m]
ah I see. I thought it was only that last commit, as the previous one was about moneromooo's suggested changes
-
UkoeHB
arnuschky[m]: moneromooo did not do a full review, he just checked some stuff that got rolled back for a future PR
-
arnuschky[m]
ok I see. kayabanerve's was complete, as well as vtnerd's but that one is very old. Is that correct?
-
kayabanerve[m]
Mine was notable, yet focused on the cryptography. I have a complete review pending, only partially done, and have discussed it further over time with koe though
-
kayabanerve[m]
> <@arnuschky:matrix.org> > Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in.... (full message at
libera.ems.host/_matrix/media/r0/do…66fcd9d174614b410f022eb1d68719cd8bd)
-
UkoeHB
kayabanerve[m]: I can squash any time
-
kayabanerve[m]
Expected so