03:32:50 ofrnxmr[m]: Tor network is a bit better today, it took me 25s to construct a tx using a remote Tor node. 06:04:14 selsta "Integrated Subaddresses" is a bug. We don't check the address is fully read when we parse it from a string. You can have a KB address pass Monero's address checks right now AFAICT. 06:04:37 It'll fully ignore whatever's past 65 bytes. It just won't be considered invalid either. 06:09:10 *at least, from what I can tell of the cryptonote_basic code. Sounds like monero-wallet-gui may have its own trickery? 07:02:06 How are we moving forward from here on out? What about the release and hardfork dates? 07:02:27 Did anyone hear from ledger in the meantime? That was the other blocker aside from multisig, afaik 07:06:34 arnuschky: [selsta](https://matrix.to/#/%40selsta%3Alibera.chat) time for a dev meeting now that audit is in? 08:38:40 wernervasquez[m]: weird I don't see frankcryptic messages on IRC side. Anyway he's gone now. 09:58:07 please explain: MDEBUG("Sync threshold met, syncing"); 09:59:46 the threshold omits the about 10k tail blocks , about 1 month, reason? 10:04:19 This appears to be for committing to disk anything that's still in the fs cache or something like that. 10:05:49 Hi! Any info when new monero daemon will be released? With hardfork support. 10:06:56 want to test our capability with it on testnet. 10:11:07 Guest57: you can compile master for now if you want to do testing 10:13:21 arnuschky: https://github.com/monero-project/monero/pull/8299#issuecomment-1167104707 10:14:05 Waiting to hear back from Trezor currently if they can split up their firmware update. 10:14:24 r4v3r23[m]: also ^ 10:35:10 "This appears to be for committin..." <- well, the importer aborts sync and dismisses about 10k blocks to current height. why? 10:35:58 Probably because the code assumes the db isn't read only. 10:36:16 "ofrnxmr: Tor network is a bit..." <- If I proxy the entire wallet over tor (including the dns requests),... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/8b77842d8337257ab8942b6e6207f15c3ebda19e) 10:38:33 moneromooo: read only? we are writing to it, and yes it is writing and reading 10:39:14 > <@moneromooo:libera.chat> Probably because the code assumes the db isn't read only. 10:39:15 * read only? we are writing to it, and yes the importer is obviously writing and reading 10:40:02 Oh, I was confused, sorry. I was thinking exporter for some reason. I don't know then. You get to debug. 10:40:44 how to force the importer with --stop-block=myblockend-tostopimportingat 10:45:35 "Oh, I was confused, sorry. I was..." <- reason? 10:45:35 > Towards the ends of synchronization your node will verify Proof of Work, this can be an additional bottleneck on slower (laptop) processors. 10:50:23 "arnuschky: https://github.com/..." <- Thanks selsta. That delays the hardfork, but not the release, right? 10:50:57 yes the firmware does not delay the release 10:51:03 Meaning, we can have the dev meeting and start preparing the release? Just asking because every day spent testing/integrating is useful 10:51:17 independent of hardfork date 10:52:17 any date suggestions for the meeting? 10:52:37 tomorrow usual time? 10:57:39 I am pretty flexible; works for me. But I am probably the least relevant :D 11:00:16 Works for me 11:12:55 usual time is when? 11:14:53 17:00 UTC? 11:33:54 "r4v3r23: also ^" <- if they don't then the hard fork will be at the mercy of whenever they get their act together? 12:53:35 @selsta by tomorrow, did you mean 29 June 17:00 UTC or 30 June ? 13:08:45 is this the preferred way to prove a transaction? https://www.getmonero.org/resources/user-guides/prove-payment.html is it really a good idea to share the private tx_key with others? 13:09:15 There are proofs now, better than sending the secret key. 13:09:30 I think you did mentnion them a couple days ago, or was it someone else ? 13:09:50 Sharing the tx secret key was done before those proofs were added. 13:10:08 spirobel[m]: For proving payment to an address you can/should use an OutProof. 13:10:51 If you need to prove you created a transaction (but not that you sent money to a specific address) use a SpendProof. 13:15:13 "For proving payment to an..." <- the thing I am confused about is this: the check_tx_proof function seems to be using check_tx_key internally: https://github.com/monero-project/monero/blob/9750e1fa103539b3e533455500610aae76e253a5/src/wallet/wallet2.cpp#L11840 does this mean that the outproof contains the private tx_key? 13:28:46 It seemed odd, so I checked, and it doesn't AFAICT. 13:28:59 It calls check_tx_key_helper, is that what makes you think it does ? 13:29:20 If it is, check what parameters are supplied. 14:10:49 "It calls check_tx_key_helper, is..." <- yes. because check_tx_key also calls that and it gets supplied the private tx_key https://github.com/monero-project/monero/blob/9750e1fa103539b3e533455500610aae76e253a5/src/wallet/wallet2.cpp#L11390 this is maybe the last part I need to understand. both check_tx_key and check_tx_proof call this check_tx_key_helper. the check_tx_key function supplies the private tx_key while the 14:10:49 check_tx_proof supplies something else and I need to completely understand what that is and how its possible that the two things can lead to the same result. 14:40:35 monero.conf + --add-peer peer123.onion:28083; is an outgoing connection; 14:40:35 how will monerod resolve this .onion? it seems that --tx-proxy tor,127.0.0.1:9050,10 is mandatory to have tor resolve peer123.onions.. 14:40:35 If this is the case then --tx-proxy is misleading, since it is sets p2p outgoing tor traffic which includes blocks 14:40:51 * monero.conf + `--add-peer peer123.onion:28083`; is an outgoing connection; 14:40:51 how will monerod resolve this .onion? it seems that `--tx-proxy tor,127.0.0.1:9050,10 `is mandatory to have tor resolve peer123.onions.. 14:40:51 If this is the case then `-tx-proxy `is misleading, since it is sets p2p outgoing tor traffic which includes blocks 14:41:25 .onion is resolved by the tor daemon AFAIK. 14:43:00 so it is misleading, since tx-proxy points to the local 9050 torsocket 14:43:19 stretch1: tor doesnt replay blocks. Im confused? 14:43:38 tx-proxy to be specific 14:43:53 --proxy does 14:44:31 Make sure you read ANONYMITY_NETWORKS.mkd. If it still seems broken, file a bug. 14:57:37 "stretch1: tor doesnt replay..." <- mmh? also tor clearnet (torc) and tor onions (toro) are different 14:57:37 torc clearly syncs blocks (with tor hops inbetween) 14:57:37 toro does not sync blocks? 14:57:50 s/also/naming:/ 15:03:48 AFAIK if you use tor to proxy your traffic, it proxies everything (can't do anything else really). 15:04:06 If yo uuse tx-prixy, it proxies txes and not blocks. Kinda what the name is for. 15:05:48 "--proxy does" <- ^ 15:06:15 tx-proxy does not sync blocks. 15:06:15 stretch1: 15:07:06 Handshakes, transactions and peer lists. 15:07:27 sync alias relay, ok. 15:07:48 s/relay/send or forward/ 15:08:17 Only handshakes, peer timed syncs and transaction broadcast messages are supported over anonymity networks. If one --add-exclusive-node p2p address is specified, then no syncing will take place and only transaction broadcasting can occur. It is therefore recommended that --add-exclusive-node be combined with additional exclusive IPv4 address(es). 15:09:03 --proxy is newer then this document 15:09:03 --proxy does blockchain sync over tor. Outgoing only 15:10:13 true?: if --tx-proxy + --add-peer , monerod will only `Handshakes, transactions and peer lists.` 15:10:19 * peer lists.` over tor 15:11:35 Yea 15:11:58 true?: if --proxy and no --tx-proxy, monerod will send tx over tor ? 15:12:16 It will send tx over tor exit nodes, not onions 15:12:33 it proxy all goes over proxy 15:12:36 If you use both tx-proxy and proxy, it will block sync over tor, tx relay over oniob 15:12:36 even sync 15:13:23 * If you use both tx-proxy and proxy, it will block sync over tor exit nodes and tx relay over onions 15:14:06 anon-inbound does tx or blocks? 15:14:12 Tx 15:14:49 missing?: how to sync blocks tor (in or outgoing) 15:14:58 --proxy 15:15:18 * or outgoing) via **onions** 15:15:33 Not possible to sync blocks over onion 15:16:04 why? correlation is big tor deanon tool 15:16:12 Block sync over exit nodes, tx relay over onions (tx proxy for outgoing, anon inbound for incoming) 15:16:23 bounty: if someone can add user:pass support for proxy for monero, current code is based on boost library 15:16:40 ready to pay 1500 USD 15:16:52 MajesticBank: Password for rpc? 15:17:07 for sock5 proxy 15:17:20 Or pass to login to a proxy 15:17:22 when using proxy on wallet init 15:17:41 yeah user:pass to login to proxy 15:18:29 Would like to see this too, it's relevant for tor stream isolation. 15:23:13 "Or pass to login to a proxy" <- https://datatracker.ietf.org/doc/html/rfc1928 15:23:13 method o X'02' USERNAME/PASSWORD builtinto serverside 15:49:43 jeffro256[m]: June 30th, 17:00 UTC 15:55:30 I'm in for that^ 16:06:55 ok 16:12:16 I can probably make the beginning of the meeting 17:41:57 if --tx-proxy and --proxy is set & no onion peer avail, what happens to tx relay and own tx ? 17:42:07 is there fallback or tmp block? 17:46:57 "if --tx-proxy and --proxy is set..." <- Doesn't get relayed until you have peers 17:47:26 mempool peerlists handshakes of forwards? 17:47:38 Until you have onion* peers 17:47:38 Are you running on testnet, mainnet and are you running release binaries or master? 17:48:12 stretch1: The tx will stay on your node until you you have onion peers to relay it to 17:48:42 officl latest binary; i talk about not my, but other txs 17:49:24 will tx-proxy prevent fallback to --proxy exit relays for tx i ask 17:50:11 I believe so 21:41:35 how to balance the 64 peers into 32 ip4 net + 32 tor net ? 21:43:05 monerod has brittle tx-relay warnings due <=2 tor peers 21:51:43 Brittle? 21:52:59 Have you tried the recent patches by jberman[m] ? They improve tor connection stability. 21:54:09 "how to balance the 64 peers into..." <- --out-peers=32 --tx-proxy=tor,127.0.0.1:9050,32 --anonymous-inbound=blablah.onion:18084,127.0.0.1:18084,32 21:55:35 Nice. 22:03:51 "Would like to see this too, it's..." <- checked zcashd:... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/d20af89b153afa4cdb8612fdb9b0a4a73a323de7) 22:04:15 > <@tobtoht:monero.social> Would like to see this too, it's relevant for tor stream isolation.... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/353610ccfd6cb92e3dd8b2496ea7eeb30753875a) 22:04:32 * checked zcashd:... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/8dedd03d7700d79fb836967a9f18c2b6249ef851) 22:07:55 "--out-peers=32 --tx-proxy=tor,12..." <- if outpeer 32 and tx-proxy has 32, howto sync blocks since no leftovers for ip4 blocks 22:07:56 > Set max number of outgoing connections to other nodes. By default 12. Value -1 represents the code default. 22:09:43 * checked zcashd:... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/40a9b4186277532edce4c82972f2317317f82c6d) 22:10:19 stretch1: Out peer = exit node (ipv4) only 22:10:19 tx proxy = out onions 22:10:20 anon inbound = in onions 22:12:23 My setup... (full message at https://libera.ems.host/_matrix/media/r0/download/libera.chat/e94ac5a14c87b84dcf12b367696149480539da8f) 22:12:35 in-peers=0 22:14:25 auto-discover onions or -add-foo-node conf? 22:14:25 also all onions in https://monerodocs.org/infrastructure/tor-onion-p2p-seed-nodes/#config-snippet are 'never' seen so far 22:15:22 if have plenty onions in print_pl but meh on solve via -add.. flags 22:16:03 Build master. The peer issue is fixed 22:17:40 qstotuswqshpfq3tk5ue6ngbx6rge3macsfa7qyt5j4caopixxhckpad.onion:18084 22:17:40 Works and I have alot of peers 22:18:23 yes, it got two nodes on the same onion but 18089 22:19:10 "Have you tried the recent..." <- ack: https://github.com/monero-project/monero/commits?author=j-berman 22:19:10 q2: howto scrub nodeid from onion ? 22:21:17 The peer id is 000...1 for all onions. Im not sure the question here. 22:21:17 Please read 22:21:17 https://xyproblem.info/ 22:23:49 mmh?: add-peer=blz....onion has node id 7f3.... despite seen never (print_pl) 22:25:50 It's "peer_id", mostly in net_node.inl. Add logs to see where it changes. It is supposed to be a predefined constant for tor nodes IIRC. 22:26:03 > <@ofrnxmr:monero.social> qstotuswqshpfq3tk5ue6ngbx6rge3macsfa7qyt5j4caopixxhckpad.onion:18084 22:26:03 > 22:26:03 > Works and I have alot of peers 22:26:03 got nodeid: 02fa4d4ed798d7f5 22:26:33 * got peer_id: 02fa4d4ed798d7f5