06:50:33 jwinterm: looks like you never got any blocks from a peer just yet. 08:44:33 .merges 08:44:33 -xmr-pr- 8296 8356 8357 8358 08:54:24 when 0.18 release? 08:54:51 still on track for June 16th? 08:56:18 ledger will be the problem 08:57:46 is anyone in contact with them? 08:59:09 i'm in their discord but i don't have any info myself 08:59:20 they said "ok" over a month ago and then nothing 09:00:23 They still have until July 16th to update their stuff 09:00:39 v0.18.1 (day 1 patch, lol) can have proper ledger support 09:01:14 yes, that's the plan but i would like some confirmation that someone is working on it 09:02:49 there's also GUI that needs to update p2pool hashes to v2.1 to support the fork. But it will be a quick patch from me. 09:06:13 yea, GUI won't be a problem, main issue I'm currently seeing is Ledger 09:06:31 Last time it took them 1 month to release a simple version bump with 0 changes 09:08:34 both previous employees that were responsible for monero either quit or moved to a different position 09:16:07 They were the problem last hard fork too and they were helped greatly by monero devs. Seems to me that they don't care much about their Monero customers 10:54:19 are integrated subaddresses permissible and supportable? monero-wallet-rpc does not support it. one can manually call the same utilities to create integrated subaddresses, but there seems to be a problem when sending funds to self with one of these 10:55:24 No. 10:56:03 Subaddresses were made to avoid having the two part addresses, which confused users as they had two addresses that looked different but sent to the same address. 10:56:30 Well, that's one reason at least. 11:03:47 ok, thanks 12:12:38 "is there a way to set a password..." <- would this be at all possible to add in the wallet current structure? 12:12:53 s/wallet/wallets/ 12:14:53 Passwords for what ? 12:15:22 for specific accounts within the wallet 12:16:09 so different accounts would open up depending on what password you enter 12:16:17 It seems possible. Not worth the bother though, unless you can come up with a good reason. 12:16:53 decoy wallets is the first use case that comes to mind 12:17:03 For sending, at lesat. For receiving, it seems not too easy. 12:17:12 What is a decoy wallet ? 12:17:48 also a way to separate funds within the wallet without having to have different seeds 12:18:05 You can do that currently. It does not require passwords. 12:18:28 moneromooo: a wallet that has a minimal amount of money that would be used in case you are ever forced to open your wallet 12:18:50 Why would you ever want to do that in the same wallet ? 12:18:53 moneromooo: yes, but all accounts are visible once the wallet is opened 12:19:30 moneromooo: well the password would only open account #2 for example, with 0.1234 XMR in it 12:20:04 I assume you'd want it so you cannot tell if an account is "open" or not, then, right ? Otherwise it's self defeating. 12:20:51 basically, main wallet password = opens main wallet with access to all accounts 12:21:18 then account specific password = only open that account without seeing the rest of the wallets funds 12:21:32 What you are asking for is: 12:21:36 so, a wallet within a wallet 12:21:55 - much more dangerous (bug wise and info leak wise) than just using a seed offset 12:22:18 why is it more dangerous? 12:22:32 - self defeating, as someone who wants to steal your stuff can likely tell (if they know where to look) that thre is some encrypted stuff left 12:22:42 - not worth the work 12:23:19 It is more dangerous because it requires adding a non trivial amount of code, which has to be all correct (or mostly correct). 12:23:38 ok, is it possible today for a wallet dev to implement that, or would that require change to the monero wallet code? 12:24:03 It is possible for wallet dev to implement that, and it would require cahnges to the monero wallet code. 12:28:38 ok, thanks for the indo 12:28:41 s/indo/info/ 12:43:04 r4v3r23: regarding a decoy wallet, I have thought the truecrypt hidden volume method would be the way to go 12:44:37 Where if you enter a decoy password it decrypts the decoy wallet info from the same file that contains the real wallet. 12:45:17 It is source available and discontinued. But I believe it had a pretty sterling record testified by court cases. Could be worth a look. 12:48:41 In any case, placing a decoy wallet right near the real one is a bad idea, *unless* the existence of that particular wallet is known already. Te closer they are, the more likely it is for hte real wallet to be found or suspected, which defeats the purpose. 12:49:20 If you have to do this, an offset is much simpler, cleaner, and safer. 12:50:28 moneromooo: If you have an offset, wouldnt the wallet have that data stored somewhere once it was synced? 12:52:38 Hmm. I suppose it might not be wiped from memory, but it won't be stored anywhere on disk (beyond swap if unlucky). 12:53:15 "r4v3r23: regarding a decoy..." <- im talking in a hypothetical robbery/shakedown 12:54:13 i know there are better way to store funds, and the best security is not having them on you in the first place 12:54:35 moneromooo: doesnt the wallet store known transations when it syncs? 12:54:55 it was more of a technical question, if the wallet could support more than 1 password that would open specific accounts within the same wallet 12:56:19 It does. You're not expected to save the cache when using an offset as a hidden wallet though. 12:57:31 Whereas if you had a one-password-per-account patch and were to save the cache for the main wallet, your secret stuff would be included. 12:57:34 moneromooo: by hidden wallet you mean the second seed thats generated when adding a passphrase? 12:57:45 The one you don't want known by others. 12:58:08 And yes. 12:58:59 moneromooo: that doesnt really help in a situation where youre being forced to open your wallet. its more about saving the seed in a safer way in case some one else finds it 12:59:08 moneromooo: can you clarify what is in the cache? 12:59:09 can't you just achieve that by storing N wallets in a single file (concat w/ boundary) then the wallet program makes it look like those are 1 thing but underneath it is N wallets... ultimately that is what you'd be doing anyway 13:00:02 Many things. Block hashes. Which outputs you received. Record of received/sent txes. Address labels. Settings. Subaddresses. 13:00:40 HenryHollingwort: you could, but it seems obvious if you look at file length, no ? 13:00:50 moneromooo: what if you have an offline wallet? 13:01:08 Refine this question. 13:01:13 moneromooo: I think truecrypt solved that issue 13:03:21 moneromooo: If you have an offline wallet, the data would likely be saved. Right? Unless the user is expected to recreate an offline wallet every time they use it? 13:03:35 (mistake, settings are in the keys file actually, not the cache) 13:04:17 I don't understand what you're saying here. Whether your wallet is offline or not does not affect whether a cache is saved. 13:05:09 It affects some of the data in the cache (ie, if you mean cold/hot, only one of the pair will have stuff like tx secret keys). 13:05:16 moneromooo: I am imagining the case where an average person of average means wants a decoy. Average joe doesnt want to recreate a wallet everytime they buy a pizza. So the transaction history is going to be saved to disk by the average user for their daily wallet. 13:07:17 If the question is "is my statement correct", then yes. I agree with it. 13:09:21 To be clear, I meant you do not save the cache to the *hidden* wallet, not the other one. 13:13:47 moneromooo: how is an encrypted seed wallet hidden? if its loaded on your phone or computer, its obvious. and if you have the unencrypted "decoy" seed/wallet there too, the you've got 2 wallets that you can be forced to open 13:14:08 the point of the decoy is giving the illusion that you are giving some one access to your wallet when you really arent 13:14:42 Well, I was assuming you would not store them separately. If you do, then yes, it is not hidden. 13:15:22 And if it is loaded when your phone/computer is taken, then it is not hidden. 13:15:52 If you want to defend against *that*... you'd need a proximity beacon that auto kills the process when not in proximity. 13:16:10 (and probably enables screen lock, etc) 13:17:08 so you can see how multiple passwords per wallet would be useful in that situation 13:20:31 I'll stop here since it's getting circular, but I never claimed it was not useful, just less useful and more dangerous than a seed offset. 13:21:26 The one thing I can see going for it is a way to get an extra safety when spending from a "reserve" account. 13:22:05 moneromooo: yes thats another use case. its just a way to seal off accounts from each other within the same wallet 15:08:58 moneromooo: I switched and stagenet got stuck on like block 500k or so in the same way so we are just going to test on mainnet lol 15:38:59 How much time did you wait after restart for the log you posted ? 15:39:15 It might take a bit to find another peer. 15:39:44 Alternatively, it's possible they're kicking you as you connect if you sent bad data. 15:40:27 Though I'd expect bad data to be around the recent fork... I'll try to sync to see if anything goes wonky. 16:17:22 Is there anything to prepare for the eventuality that we don't get the multisig fixes in #8149 into the hardfork release? 16:17:57 I think if we apply the usual principles we can't merge that until a final review happens, as there were quite some changes after the reviews that happened 16:18:14 And that review may not happen in time for the release, seems to me 16:19:03 Does the "old" multisig signing code even continue to work after the hardfork, regardless of problems with potential vulnerabilities? 16:19:42 AFAIK it would still work. 16:19:51 And do we see that new "enable multisig experimental" covering the case that we just continue with the old code? 16:21:42 the existing code should be disabled 16:22:13 the patch should be marked experimental until/if there is enough confidence in it 16:23:02 So only people able to use git and compile their own version of Monero would be able to do multisig? 16:23:08 correct 16:23:32 Well, that's one way to solve the problem ... 17:00:27 So, to "prepare for that eventuality", if we go down that route, this would mean at least a mini-PR that disables the current code 17:00:49 For good, unlike that switch we recently merged 17:01:04 that's my opinion, yes 17:02:30 Let's see whether we get people to chime in later and voice their opinion here. I am a bit disappointed we don't have somebody shouting bloody murder yet about that idea. 17:03:00 I mean, a Monero release without working multisig, for maybe a month or two, until we have the first after-hardfork point release ... 17:36:30 UkoeHB: the current code's just fine for M/N if at most N-1 are untrusted, right ? 17:36:58 M-1 17:39:25 moneromooo: only if you only interact with trusted parties 17:40:14 I asked for a blurb about this for enabling multisig. Not sure if I got that. Kinda forgot. 17:40:32 Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in. 17:40:55 Otherwise, people who use multisig now are fucked, even if it's themselves only, from two machines or something. 17:41:47 I suspect an exchange might be a typical user of multisig between itself and itself. 17:49:13 Or maybe making an exception from our usual principles and merging 8149 even without final review would be evil, but the lesser evil than the old code 17:49:31 Or no multisig at all for "normal" people for months 17:49:51 set i-am-not-a-normal-person 1 17:50:00 Multisig now enabled. 17:50:51 moneromooo: `set i-am-ready-to-loss-everything 1` 17:50:53 s/loss/lose/ 17:52:19 Well, the message for the `enable-multisig-experimental` switch more or less tells you that already ... 17:54:19 ooo123ooo1234567, how about winning some karma points, reviewing UkoeHB's latest changes to 8149 and save the day? 17:54:41 > Or maybe making an exception from our usual principles and merging 8149 even without final review would be evil, but the lesser evil than the old code 17:54:41 Might be worse because then people think its an improvement and BAM new vulnerability 17:55:17 That's the trouble with lesser evils, often it's damned hard to decide which one is it 18:09:29 moneromooo: maybe 5-10 min, not too long but not instant close either - anyway, mainnet syncs ok so just gonna sacrifice 0.05 xmr to gods of development 18:09:56 fees cheap enough now it doesn't really cost anything 18:16:14 "ooo123ooo1234567, how about..." <- One of the reasons that prev researchers aren't here is that you all don't see difference between important and unimportant changes. I'm 100% sure even bigger number of karma points will be sent to the next scammer with beautiful stories, but without actual solutions. 18:16:38 I started testnet on a new data dir. It took 9 minutes to find a peer. Just anecdata for sure. 18:18:33 Is that a "No" stretched over 3 lines in my IRC window? It's a bit hard to parse. 18:19:05 Which lines ? :S 18:19:36 I was talking to jwinterm 18:19:42 Who was tlaking to me 18:20:24 Well, I don't know whether you see ooo123ooo1234567's ... reaction ... to my idea of them giving final review to 8149. 18:20:43 Oh. Ignore me then. 18:20:53 what would the security risks be when `--zmq-pub` is by default set to `tcp://127.0.0.1:18083` ? 18:21:19 set to localhost? should be none 18:21:24 no risk, I mean 18:21:43 ok, any downside? 18:21:45 A lot more attack surface. Also depends on whether it implements the restricted RPC checks. If not, then you can possbibly start mining etc. 18:21:54 it's not http, so browsers can't surreptitiously connect to it 18:22:32 Oh. loopback. Nevermind. 18:22:57 I agree with "not much" then. 18:24:02 also, zmq-pub is not an RPC 18:24:12 sech1: https://github.com/monero-project/monero-gui/pull/3936/files 18:24:19 this feels hacky, but i don't know what the best solution here is 18:24:38 zmq-pub only allows to subscribe to a few notifications, it's a read-only interface 18:24:42 in monerod 18:24:42 ah, zmq-pub just broadcasts 18:24:47 zmq-rpc is an RPC 18:24:52 but it's half-implemented 18:24:57 or less than half 18:25:46 so basically, no security impact. it's just relaying info that was already public on p2p 18:27:03 That's just the notifications, without the requests ? 18:27:21 Oh, you said it. Well, ignore me then -_- 18:46:49 good to know re: 9 min 19:48:11 "Let's see whether we get..." <- We are :) And the Haveno guys too, I assume 20:00:39 > Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in.... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/d46ad4020f094327375a33b6e8ee132331a8f8d7) 20:01:13 s/be/me,/ 20:11:49 UkoeHB: what are the unreviewed changes? AFAIK it's only https://github.com/monero-project/monero/pull/8149/commits/f5e33479d656bc95001d2f135651e9fe9194681a right? 20:12:45 arnuschky[m]: mainly that, plus a bunch of rebases and some code quality improvements 20:21:14 ah I see. I thought it was only that last commit, as the previous one was about moneromooo's suggested changes 20:22:56 arnuschky[m]: moneromooo did not do a full review, he just checked some stuff that got rolled back for a future PR 20:29:29 ok I see. kayabanerve's was complete, as well as vtnerd's but that one is very old. Is that correct? 20:34:04 Mine was notable, yet focused on the cryptography. I have a complete review pending, only partially done, and have discussed it further over time with koe though 20:35:07 > <@arnuschky:matrix.org> > Anyway, I think multisig should be enable-able by this setting even if 8149 doesn't get in.... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/0fdf166fcd9d174614b410f022eb1d68719cd8bd) 20:37:42 kayabanerve[m]: I can squash any time 20:41:08 Expected so