-
ooo123ooo1234567
monero-project/monero #8299#issuecomment-1169235856, "If not we will have to ask the monero community if they prefer to delay the hardfork or if they are okay with leaving Trezor users unable to transact for about 2 weeks. ..."
-
ooo123ooo1234567
merge of multisig cryptography without security analysis - no question to the monero community
-
ooo123ooo1234567
* merge of multisig cryptography without security analysis - no need to ask the monero community
-
ooo123ooo1234567
is it enough to rely on audit by those who failed to notice trivial problems in implementation and removed their names in 2nd audit ? - no need to ask the monero community
-
ofrnxmr[m]
ooo123ooo1234567: So... do what? Asking ooo
-
ofrnxmr[m]
What to do*?
-
ooo123ooo1234567
is it ok to not fix privacy issue with subaddresses (
monero-project/research-lab #62) in this hardfork ? - no need to ask the monero community
-
kayabanerve[m]
<ooo123ooo1234567> "merge of multisig cryptography..." <- Considering the standing code is fundamentally broken in multiple ways, and both your PR and 8149 would be explicit improvements, no, it doesn't require asking everyone for their personal opinions on the matter since it will solely benefit them
-
kayabanerve[m]
Losing trezor would be a major detriment however, potentially bricking important workflows
-
kayabanerve[m]
This shouldn't even be a question if you weren't just constantly obnoxious about things you feel personally enraged about despite frequently not helping to actually resolve your perceived issues.
-
ooo123ooo1234567
<kayabanerve[m]> "Considering the standing code is..." <-
monero-project/monero #2134#issuecomment-312050442, "This needs review from a qualified cryptographer and/or the cryptography community (i.e. the latter by writing it up in a paper and seeking review) before being deployed live but enabling it for testnet would be fine. (Comment on cryptography not code)"
-
ooo123ooo1234567
see ?
-
ooo123ooo1234567
this step wasn't done at that time and you all are skipping it now too
-
ooo123ooo1234567
call at least 1 user who would agree to rely on cryptocurrency that is avoiding proper verification of used cryptography ?
-
ooo123ooo1234567
<kayabanerve[m]> "Considering the standing code is..." <-
monero-project/research-lab #100, you were supposed to push this task but decided to work on your serai dex, do it, but don't teach what to do it monero and how
-
ooo123ooo1234567
<kayabanerve[m]> "Considering the standing code is..." <- I've spent time on deep verification of important parts in cryptography, UkoeHB resubmitted my patch in order to add unimportant changes (all of them aren't related to security); see difference ?
-
ooo123ooo1234567
<kayabanerve[m]> "This shouldn't even be a..." <- merge of resubmitted patch with shitty audit without cryptography security analysis, it's already more than enough to hate everyone involved into it
-
ooo123ooo1234567
whether to do retrospective analysis for discovered deep issues in order to identify their source and prevent similar issues in future ? - no need to ask the monero community
-
ooo123ooo1234567
is it ok to write implementation for seraphis without cryptography security analysis (which will be even more complex than multisig one) - no need to ask the monero community
-
ooo123ooo1234567
<arnuschky> "The aim was to make sure that..." <- or wasn't achieved, who is responsible for this conclusion ?
-
ooo123ooo1234567
<arnuschky> "The aim was to make sure that..." <- Judging by incorrect details in audit report it looks like auditors have no idea what they were doing.
-
ooo123ooo1234567
it's interesting who is going to take responsibility for merge of that code
-
ooo123ooo1234567
In general, you can push arbitrary code into repo, but someone should be responsible for failure, otherwise it's a system without feedback loop
-
ooo123ooo1234567
<gingeropolous> "selsta,
termbin.com/g2b8..." <- request for competent developers: how to fix this deadlock ?
-
sech1
Compile with thread sanitizer and run: "TSAN_OPTIONS=second_deadlock_stack=1 ./monerod ..."
-
sech1
then search for "Writer::initializeLogger" in tsan reports
-
sech1
or search for "LogDispatcher::dispatch"
-
ooo123ooo1234567
is it applicable to static stack trace ?
-
sech1
what do you mean
-
ooo123ooo1234567
I mean I've solved that deadlock already via stack trace + code reading -> reproduce it locally -> write patch to fix it; asking others to do the same
-
sech1
those stack traces only hint at some circular lock dependency in logger or in how Monero uses the logger
-
sech1
running it with tsan will quickly find this dependency even without reproducing
-
ooo123ooo1234567
<sech1> "those stack traces only hint..." <- ~4 hours
-
sethforprivacy
Trezor firmware will be out July 20th now, in time for the delayed HF:
monero-project/monero #8299#issuecomment-1171167355
-
sethforprivacy
Thanks for all of the work on that communication, selsta!
-
ooo123ooo1234567
Seth For Privacy: thanks for pushing hardfork date forward without having actual code
-
ooo123ooo1234567
<sech1> "running it with tsan will..." <- yes, but proper code fix would require code knowledge anyway
-
ooo123ooo1234567
s/code//
-
sethforprivacy
<ooo123ooo1234567> "Seth For Privacy: thanks for..." <- Man you're a fun guy to be around, aren't you?
-
ooo123ooo1234567
I'm just hiding deep hate with this jokes
-
sethforprivacy
That's obvious, not hidden at all.
-
sethforprivacy
I know you've done some things for Monero in the past but your approach is absolutely idiotic if you actually care about improving Monero as a whole.
-
ooo123ooo1234567
* I'm just hiding deep anger about whole situation with these jokes
-
ooo123ooo1234567
and waiting for the decision of others
-
ooo123ooo1234567
it looks like they don't want to change anything
-
sethforprivacy
Nothing in your approach is helpful or useful, even if technical contributions and knowledge are solid. Learn a useful way to actually communicate with other people and you'd accomplish 10000% more.
-
ooo123ooo1234567
but don't want to admit it and trying to be somewhere between
-
sethforprivacy
Attacking literally everyone who is not you is quite the approach if you actually care about Monero.
-
ooo123ooo1234567
Hey, 2 months ago they were ignoring that scammer and still didn't publish any conclusion about that situation
-
ooo123ooo1234567
now they are dodging problems with multisig cryptography
-
ooo123ooo1234567
Do you know any way to communicate with such people ?
-
ofrnxmr[m]
ooo123ooo1234567: I do
-
sethforprivacy
Yeah, lay out a rational and reasonable argument with facts and a useful tone and voila, you're much more effective!
-
sethforprivacy
Being a massive asshole to everyone just makes your useful arguments and points get lost in the assholery.
-
ooo123ooo1234567
sethforprivacy: Hey, risking with money due to incompetent developers
-
ofrnxmr[m]
ooo123ooo1234567: Giving away money to incompetent developers.
-
ofrnxmr[m]
Ooo, we all see it! You cant change anything by being angry
-
moneromooo
Please be trolled somewhere that's not -dev.
-
ooo123ooo1234567
sethforprivacy: asshole ? I'm pointing problems in development process and they don't change anything
-
ooo123ooo1234567
Is it being asshole ?
-
sethforprivacy
moneromooo: -dev is where he's harrassing everyone but good point.
-
ooo123ooo1234567
I didn't even use swear language in pblic
-
ooo123ooo1234567
s/pblic/public/
-
ooo123ooo1234567
see ?
-
moneromooo
Yes, but I don't see it, so that doesn't annoy me :D
-
sethforprivacy
Take it to -community if you want to continue the convo ooo123ooo1234567
-
ofrnxmr[m]
ooo123ooo1234567: Ooo, come over to community
-
sethforprivacy
moneromooo: Glad to hear that 🙂
-
ooo123ooo1234567
moneromooo: I can discuss purely technical problems
-
ooo123ooo1234567
moneromooo:
termbin.com/g2b8, request for competent developers: how to fix this deadlock ?
-
sech1
but you already fixed it, submit a patch and let's move on
-
ooo123ooo1234567
This split of whole environment into community and dev allows to do ping-pong
-
ooo123ooo1234567
How to discuss incorrect patch that was written by another incompetent developer and merged without proper review: any questions about development process in -dev - offtopic, any technical questions to that person in -community - offtopic; see ?
-
ooo123ooo1234567
ping-pong
-
ofrnxmr[m]
sech1: ^
-
sech1
stop using two accounts ooo123ooo1234567 ofrnxmr[m]
-
ofrnxmr[m]
Sech.. im not ooo
-
ooo123ooo1234567
hahahahaha
-
sech1
now ooo asks all developers to waste time on some deadlock debugging which he already fixed. It's straight up malicious practice of stalling the development. Devs have other stuff to do right now.
-
ooo123ooo1234567
It's ok to use already solved task for educational process
-
sech1
are you a self-proclaimed teacher?
-
ooo123ooo1234567
it isn't waste of time
-
sech1
Monero devs are not your interns. Submit a patch with description of the issue or stop mentoring everyone here
-
ooo123ooo1234567
"It's straight up malicious practice of stalling the development." asking someone else to try to solve some real problem is stalling the development ?
-
ooo123ooo1234567
What's about incompetent developer introducing another incorrect patch that was merged and it's a consequence of it ?
-
ooo123ooo1234567
<sech1> "but you already fixed it, submit..." <- I've submitted 3 patches and all of them are not merged
-
ooo123ooo1234567
<sethforprivacy> "Yeah, lay out a rational and..." <- There are examples when others are stubborn even in front of reasonable arguments with facts
-
ooo123ooo1234567
<sethforprivacy> "I know you've done some things..." <- p2pool - dead end of development; do you know how much time I will waste debating with you all about it ?
-
ooo123ooo1234567
<sethforprivacy> "I know you've done some things..." <- updating cryptography without doing security analysis is way to introduce another vulnerability; the same deep problem
-
ooo123ooo1234567
funny how you all are ignoring problems in monero repo, but attacking me personally; at the same time no one was attacking that scammer;
-
woodser[m]
I'm getting errors syncing wallets with the latest testnet blocks (using public nodes from rino and sethforprivacy): 2022-06-30 13:47:55.709 0x70000afa7000 ERROR cn src/cryptonote_basic/cryptonote_format_utils.cpp:215 Failed to parse transaction from blob
-
woodser[m]
first the wallet syncs for a while, then it pauses and logs show that error. confirmed using v0.17.3.2 gui. any ideas?
-
sech1
testnet forked already
-
sech1
you need wallet compiled from master branch
-
woodser[m]
will the next release be based on master instead of the current release branches?
-
ooo123ooo1234567
testnet is based on release branch
-
ooo123ooo1234567
s/release/master/
-
woodser[m]
ah ok
-
ooo123ooo1234567
the next release is undefined currently
-
r4v3r23[m]
selsta: "...but good news is, we considered this and decided to go ahead with July release. So the new firmware should be out by July 20."
-
r4v3r23[m]
* July 20." - matejcik
-
» hyc considers adding tor and i2pd to our build process, since people are talking about attacking unencrypted p2p links
-
ooo123ooo1234567
what kind of attacks do you mean ?
-
ooo123ooo1234567
and why these attacks aren't working with p2p over tor/i2p ?
-
w[m]
ooo123ooo1234567: "Did anyone read the DARPA paper recently about how government actors could disrupt Bitcoin/Eth by blocking unencrypted transaction data between nodes via ISPs blocking/filtering traffic?
-
w[m]
How susceptible is Monero to such an attack? If the US wanted to nuke Monero from orbit by ordering ISPs to block any packet that looked like a Monero block, would they be able to disrupt the network?"
-
hyc
the attacks start by identifying the unencrypted traffic. if using tor/i2p then the nature of the traffic is hidden.
-
hyc
just using TLS for encryption alone isn't enough, since IP addr:port would still be visible
-
hyc
unless we stop using default port numbers...
-
jeffro256[m]
@w : The levin protocol has a very unique fingerprint, as well as happening over basically one port b/c convention. Any amateur could write a trivial packet filter to block 99% of clear net Monero node traffic
-
hyc
it seems pretty obvious that we should not continue using clearnet for p2p
-
hyc
and also that just using TLS for p2p isn't sufficient, since our port numbers will still be visible
-
jeffro256[m]
if (tcp_packet.startswith(BENDERS_NIGHTMARE) { drop(tcp_packet); add_to_no_fly_list(tcp_packet.sender); }
-
ooo123ooo1234567
hyc, it would be much more effective to block few major mining pools instead of filtering p2p packets
-
ooo123ooo1234567
you're focusing on minor problem
-
w[m]
ooo123ooo1234567: "Or if they started blocking the traffic from the largest mining pool nodes to reduce the hashrate so they could 51% attack."
-
w[m]
Sorry... I left that part out
-
hyc
blocking mining pools would work for a short while. then the remaining miners would adopt p2pool
-
jeffro256[m]
ooo123ooo123[m]: I disagree, miners have economic incentive to stay up and can easily pass block thru anonymity network. Clear net p2p as it stands is trivial to completely block all together. That would truely cripple Monero
-
hyc
an attack on the big mining pools would be a good thing for us, if it forces miners onto p2pool
-
jeffro256[m]
Tor p2p is kinda garbage still, unfortunately
-
jeffro256[m]
As much as I hate to say it
-
ooo123ooo1234567
hahahahaha, you're talking about p2p behind anonymization network to someone did research for the best way to do it
-
ooo123ooo1234567
while you all were busy with p2pool
-
hyc
what are you talking about?
-
w[m]
ooo123ooo1234567: Share?
-
hyc
"you all were busy with p2pool" - pretty sure that was 99% sech1, with a little help from me
-
gingeropolous
so busy
-
jeffro256[m]
@hyc I think recently (last 1.5 years) BTC went thru the grueling process of rewriting the p2p code to have E2E encryption and hiding port info etc
-
jeffro256[m]
We could do this and overhaul connection code along the way since we need to do it anyways (7760 comes to mind)
-
hyc
I don't see how you can effectively hide the port info since you must advertise it in peer lists
-
hyc
you need an anonymizing network, not just E2E encryption
-
jeffro256[m]
Yes of course, but if the port was a commonly used port like 443 then it would start to be hard to write trivial packet filters
-
hyc
would also interfere with running thos other common services
-
jeffro256[m]
I think the idea was that you just use a port everyone else uses / switch it between multiple to make it look like normal web traffic
-
hyc
unless of course, you multiplex it
-
hyc
so we would need to write an apache or nginx module to forward the traffic we want into monerod
-
r4v3r23[m]
hyc: how about NYM?
-
ooo123ooo1234567
jeffro256[m]: you're following path of least resistance, while ideal solution is to have p2p over anonymization network;
-
ooo123ooo1234567
hyc: you're inventing another pluggable transport for tor, why ?
-
hyc
does tor already mimic an https server? I didn't know.
-
jeffro256[m]
Full anonymity networks are expensive computationally and in network time. There can be middle ground between complete clearnet and Tor
-
hyc
yeah, if we can hide in existing https traffic I think that'd be sufficient
-
jeffro256[m]
Also Tor network has its own fingerprint
-
selsta
dev meeting in 1.5h
-
ooo123ooo1234567
it doesn't matter what anonymization network will be used, choose the one with the best latency/privacy/bandwidth properties
-
hyc
the point is whether we need full anonymity for node addresses. in most cases I think not. so, no need for all the overhead of multilayer routing
-
gingeropolous
just a lot of average folk running their own websites at home
-
jeffro256[m]
As long as it quacks like an HTTPS server from an observer standpoint, that would be loads better than current situation
-
jeffro256[m]
Like @hyc said
-
ooo123ooo1234567
jeffro256[m]: HTTPS server isn't the best pluggable transport for tor
-
ooo123ooo1234567
funny that no one reviewed patch for p2p connection, but everyone wants to add E2E encryption for p2p
-
gingeropolous
could maybe include a random homepage generator so it actually serves up a webpage
-
jeffro256[m]
I’m talking Tor besides
-
ooo123ooo1234567
are you sure that you're starting from the right end ?
-
jeffro256[m]
gingeropolous: Yeah give it the default Apache index.html would be funny
-
ooo123ooo1234567
hyc: it's either full anonymity or cleanet, nothing in between since list of p2p peers is easily obtainable
-
hyc
hm, good point
-
ooo123ooo1234567
but current p2p protocol isn't working even on clearnet
-
ooo123ooo1234567
too early to move behind anonymization network
-
hyc
well. if we're using 443, then can legitimately protest an ISP block
-
ooo123ooo1234567
you will just heat easy DDoS via sybil nodes and end of the game
-
ooo123ooo1234567
s/heat/hit/
-
stretch1
ooo123ooo1234567: gl with sync and flag `--hide-my-port` on tor
-
stretch1
close to nothing coming through
-
stretch1
s/tor/exit relays/
-
jeffro256[m]
ooo123ooo123[m]: there can be middle ground. Connection integrity is a big part of protocols like TLS. These malicious ISPs/routers can mangle our clearnet packets at a whim
-
ooo123ooo1234567
I'm not interested in short-term heuristics which require regular manual support
-
jeffro256[m]
Having some sort of p2p identity / integrity would make a more robust network
-
ooo123ooo1234567
100% your solution is crackable
-
ooo123ooo1234567
can you explain in detail ?
-
jeffro256[m]
Define “crackable”
-
ooo123ooo1234567
describe what how and for what you're going to use tLS
-
ooo123ooo1234567
s/tLS/TLS/
-
ooo123ooo1234567
s/what//, s/tLS/TLS/
-
jeffro256[m]
Well p2p can include not just address but pubkeys, will Peers can verify they are talkIng on secure channels to a large portion of the network of their choosing
-
ooo123ooo1234567
DSP may block plain/SSL ports, useless
-
ooo123ooo1234567
in clearnet encryption of p2p is useless, in tor there is already built-in e2e encryption bounded to hostname
-
ooo123ooo1234567
conclusion: don't waste time on TLS for p2p
-
w[m]
ooo123ooo1234567: How about i2p?
-
w[m]
Tor can be blocked too, no?
-
ooo123ooo1234567
i2p/tor both has e2e for hidden services
-
ooo123ooo1234567
* has e2e encryption for hidden
-
ooo123ooo1234567
how to bypass block of anonymization network is a separate problem (pluggable transports / gateways / ...)
-
ooo123ooo1234567
but once you're behind it you have e2e encryption
-
jeffro256[m]
ISP can block anything they want because they are out overlords. Is a question of how much collateral the block creates b/c they have an incentive to keep “normal” protocols like HTTPS intact for their customers
-
stretch1
jeffro256[m]: i recc to use a dns solution:
hnsnetwork.com/names/getmonero
-
stretch1
you can set an identity and lease out subdomains; this can be auto done;
-
stretch1
what monerod needs is hsd spv node; efficent in C:
github.com/handshake-org/hnsd
-
stretch1
problem is hns censorship, which might not happen if adopted
-
ooo123ooo1234567
jeffro256[m]: not anything, otherwise it's physical link disconnect
-
jeffro256[m]
<ooo123ooo1234567> "describe what how and for what..." <- TLS ensures your connection is not tampered with by a middleman
-
ooo123ooo1234567
jeffro256[m]: all p2p peers are not trusted by default
-
ooo123ooo1234567
* by default, everything must be verified
-
ooo123ooo1234567
so TLS is useless
-
ooo123ooo1234567
only centralized list of nodes benefit from TLS, but it isn't a proper solution for decentralized project
-
jeffro256[m]
ooo123ooo1234567: Yeah, but they can just as easily block all Tor connections as they can clearnet Monero connections because they both are identifyably part of a certain network. If you mix Monero protocol in with a “normal” network like HTTPS, then trying to block Monero all of the sudden becomes much more painful and noticeable
-
ooo123ooo1234567
jeffro256[m]: No, there are tor bridges that help to bypass censorship
-
ooo123ooo1234567
certainly not as easily
-
w[m]
ooo123ooo1234567: Is I2p more robust against censorship compared to tor?
-
ooo123ooo1234567
I've read i2p design and it's quite shitty, there are a lot of heuristics to prevent sybil and all of them are crackable
-
jeffro256[m]
ooo123ooo1234567: And how do those bridges work? They add a layer which makes it look like “normal” traffic, which is what adding TLS to Monero p2p would do
-
ooo123ooo1234567
client <-pluggable transport -> bridge <-> tor network
-
ooo123ooo1234567
jeffro256: "it's either full anonymity or cleanet, nothing in between since list of p2p peers is easily obtainable"
-
ooo123ooo1234567
tor bridges aren't public, otherwise any DPI will block them easily
-
ooo123ooo1234567
monero nodes are public
-
ooo123ooo1234567
unbelievable waste of time
-
w[m]
Is 7760 review close to being finished? Any blockers? ooo123ooo1234567: jberman:
-
jberman[m]
Will approve once merge conflicts are resolved, I approved 7759
-
ooo123ooo1234567
w[m]: 1 year delay, few months of discussion, merge conflict due to placebo PR, finally 1 particle in this universe may be moved from 0 to 1, very efficient
-
ooo123ooo1234567
it's interesting what else more important was blocking progress in the meantime
-
jeffro256[m]
Why not just resolve the merge conflict ? We can verify after the fact if anything on substance has changed
-
ooo123ooo1234567
jeffro256: because I'm 100% sure that merge of placebo PRs instead of focusing on important things was a mistake
-
ooo123ooo1234567
and the same happening right now with multisig / seraphis / mining centralization problem
-
ofrnxmr[m]
So lets fixxxxx it. Jberman approves, lets get it done.
-
ofrnxmr[m]
Cant change the past
-
ooo123ooo1234567
disconnect CCS from development or change it firstly
-
ooo123ooo1234567
then changes for review process
-
ooo123ooo1234567
then explicit focus on important topics
-
ooo123ooo1234567
and finally development may continue in the right direction
-
jeffro256[m]
That has nothing to do with “git rebase -i master”
-
ofrnxmr[m]
2, show us how you would do it (who does the reviews? Core? Contributors? You?)
-
ofrnxmr[m]
3, of course
-
ofrnxmr[m]
4, would hope so
-
ooo123ooo1234567
most of the noise currently is generated by participants of CCS that use argument like "since we are doing paid work, our arbitrary patches must be merged"
-
ofrnxmr[m]
Yeah, and enough about tjat
-
ofrnxmr[m]
You said focus on important work
-
jeffro256[m]
we can discuss CCS anytime, but you keep complaining about merge limbo but won’t fix merge conflicts
-
ooo123ooo1234567
it's interconnected problem, to avoid any potential ping-pong I don't do further actions
-
ofrnxmr[m]
Jberman approves.... where you have the pingpong ball.
-
ooo123ooo1234567
I have no control over jberman, the next time it will not work
-
ofrnxmr[m]
It took a too long to be prioritized ? Yes. But were here now and youre the blocker? That doesnt add up
-
ooo123ooo1234567
I'm not a blocker, currently the most important thing is multisig, not p2p
-
ofrnxmr[m]
How about both?
-
ooo123ooo1234567
firstly multisig, order is important
-
jeffro256[m]
ooo123ooo1234567: I don’t see the “ping-pong” here. Your PR is pretty old, and thus has merge conflicts. You need to fix merge conflicts before we can move forward
-
ofrnxmr[m]
Ok, so what to do?
-
ooo123ooo1234567
jeffro256[m]: there are many things that you don't see, but they exist
-
ofrnxmr[m]
Merge? Reaudit?
-
ofrnxmr[m]
What is the correct path
-
jberman[m]
multisig is going to be discussed in the dev meeting today
-
hyc
in an open source project, prioritization is a nice-to-have. you can't dictate where volunteers will spend their time
-
ooo123ooo1234567
ofrnxmr[m]: waiting for meeting to discuss something
-
jberman[m]
in 40 minutes
-
hyc
if you want to make progress, you accept and merge what you can when you can. you don't sit back and say "these are not being done with the right priority"
-
ooo123ooo1234567
I've said already that most of the noise is coming from CCS
-
ooo123ooo1234567
disconnect it (to /dev/null or whatever is suitable for luigi) or change it firstly
-
jeffro256[m]
Before meeting starts, just to poll, what does everyone think top 3 priorities should be at this very moment ?
-
hyc
afaik multisig is the #1 blocker for new release
-
ofrnxmr[m]
Multisig merge blockers
-
ofrnxmr[m]
Hard fork date
-
ofrnxmr[m]
....
-
ofrnxmr[m]
is ooo going to fix merge conflicts on 7760 so we can move onto 7999
-
jeffro256[m]
For me 1. Multisig 2. p2p in general 3. Seraphis
-
ooo123ooo1234567
hyc: prioritization / focus is important for a project to be competitive
-
hyc
sure. but this isn't a company, you can't expect to enforce it.
-
hyc
nice-to-have. that's all.
-
ooo123ooo1234567
There are very strong arguments in favour and as i said current lack of focus is mostly due to broken CCS which adds a lot of noise
-
ooo123ooo1234567
I'm ok to force whatever others think is important currently, but I'm not ok when others changing topic without focusing on anything
-
hyc
what's important currently is getting the new release out
-
hyc
since the hardfork is a little over 2 weeks away now
-
hyc
I mentioned p2p encryption as a matter of curiosity, not as an urgent priority
-
jeffro256[m]
> I mentioned p2p encryption as a matter of curiosity, not as an urgent priority
-
jeffro256[m]
Right, getting HF is highest priority, not implying it was an urgent matter
-
hyc
there are a lot of people here, we can have a bunch of side discussions ongoing without detracting from the urgent stuff.
-
ooo123ooo1234567
hardfork in isolation isn't a priority, upgrade to bulletproofs+ / tx fee changes / view tag / multisig / increased ring size may be a priority, but incorrect code isn't acceptable
-
ooo123ooo1234567
and there are some problems
-
kayabanerve[m]
I may or may not be available, despite being here now
-
kayabanerve[m]
Friendly reminder 8149 is incomplete without the burning bug fix
-
hyc
meeting time now
-
selsta
yep, hi
-
jeffro256[m]
Was the burning bug mentioned in the audit report or did it slip past them?
-
jberman[m]
hello
-
tobtoht[m]
hey
-
ooo123ooo1234567
jeffro256[m]: (read audit report)
-
ooo123ooo1234567
hello
-
jeffro256[m]
howdy
-
UkoeHB
hi
-
selsta
i don't really have a meeting template, should we start with multisig?
-
binaryFate
heyo
-
Rucknium[m]
Hi
-
rbrunner
Hello
-
xmr-ack[m]
Hi
-
sech1
Hello
-
jberman[m]
seems reasonable to start with multisig :)
-
binaryFate
selsta: before starting, can you recap the items we should cover? Besides multisig
-
selsta
multisig, and we should set a final fork date, as 2 weeks from now is too early
-
selsta
we now have a definite date from trezor so that should be possible
-
selsta
let's start with multisig, what would your recommendation be UkoeHB?
-
UkoeHB
multisig: I am fine with squashing 8149 whenever. vtnerd__ said he is working on a follow-up review, but his last message was a couple weeks ago so idk what to think about that (in the past he has always followed through despite sparse irc activity).
-
kayabanerve[m]
selsta: It was
-
kayabanerve[m]
*sorry, meant to reply to the question about the burning bug
-
UkoeHB
as soon as 8149 is merged I want to expedite this branch (the 'burning bug'):
github.com/UkoeHB/monero/tree/multi…sig_signfixes_deterministic_secrets
-
UkoeHB
it's a 150 diff commit on top of 8149
-
UkoeHB
last update from vtnerd__ 3 weeks ago*
-
SerHack
Hi
-
arnuschky[m]
hey there
-
binaryFate
UkoeHB: what would "expedite" entail? What level of review is needed? It's "just" code and doesn't touch crypto right?
-
ooo123ooo1234567
"code doesn't touch crypto" interesting statement
-
UkoeHB
binaryFate: it changes how tx private keys are computed, so there is some crypto involved
-
UkoeHB
expedite as in, let's not take 6 months to merge it...
-
luigi1112
seems fine
-
jeffro256[m]
> binaryFate: it changes how tx private keys are computed, so there is some crypto involved
-
jeffro256[m]
Does it utilize something similar to "guaranteed addresses" like kayabaNerve proposed?
-
UkoeHB
yes, you generate the keys from a hash chain starting with entropy provided by the tx initiator + the input key images
-
arnuschky[m]
the burning bug PR used to be part of 8149, and is pretty self-contained
-
arnuschky[m]
it's essentially this commit:
UkoeHB/monero ee28a22
-
jeffro256[m]
for miner txs, it would just be the previous block hash right? (or whatever block hash)
-
arnuschky[m]
Kayaba spoke about it in his talk at Monerokon
-
UkoeHB
it changes the serialization of the pending_tx struct or whatever it's called, so it's a breaking change (but could be released in a post-fork update if necessary I suppose)
-
ooo123ooo1234567
<UkoeHB> "multisig: I am fine with..." <- not fine with 8149, not fine with multisig_signfixes_deterministic_secrets
-
UkoeHB
jeffro256[m]: multisig does not make coinbase txs
-
UkoeHB
kayabanerve[m]:'s proposal requires a change to view scanning, this just changes the tx author's ephemeral key
-
jberman[m]
ooo123ooo1234567: can you cleanly elaborate what it is about both you are not fine with
-
ooo123ooo1234567
what's the final goal regarding multisig features ?
-
ooo123ooo1234567
unsafe implementation with experimental flag ?
-
ooo123ooo1234567
if yes, then it doesn't matter whether 8149 will be merged or not
-
ooo123ooo1234567
if the goal is to have working multisig then there is a need for additional changes
-
selsta
can you give an example of what you thought was incorrect in the audit?
-
arnuschky
I feel we'd be more productive by taking this one at a time. So before moving onto the burning bug discussion or other discussions, can we agree that 8149 is ready to be merged?
-
ooo123ooo1234567
why does it matter if it doesn't cover multisig completely ?
-
kayabanerve[m]
It's the same uniqueness principle, yet it moves generated from the shared secret to r specifically
-
arnuschky
8149 has been thoroughly reviewed, audited, and Koe already implemented everyone's remarks
-
kayabanerve[m]
Sorry, few minutes behind
-
arnuschky
once 8149 is merged, we can use this as a new basis of discussion for further improvments
-
ooo123ooo1234567
arnuschky: thorough review of C++ isn't for cryptography, audit is poor, minor remars are not important
-
kayabanerve[m]
ooo123ooo1234567: No one is saying we don't want formal review. We're saying the existing is definitively broken, and no one has come forth saying this is broken. Therefore, regarding the code alone, it's a definitive benefit.
-
kayabanerve[m]
Regardless, yes, obviously, it would be a major issue if this was also broken.
-
ooo123ooo1234567
arnuschky: no, it isn't a basis; cryptography shouldn't be implemented with partial changes without having overall design; it's a way to add more vulnerabilities
-
kayabanerve[m]
That's why we've gotten it reviewed by multiple people who contribute regarding cryptography, and multiple people regarding C++
-
kayabanerve[m]
May I recommend instead of shutting down progress, forcing people to use known insecure code, you instead work to be the progress you want?
-
jeffro256[m]
ooo123ooo1234567 Are you saying that the scope of the audit should have been expanded?
-
kayabanerve[m]
I believe they want formal security proofs comparable to bulletproofs/clsags
-
ooo123ooo1234567
kayabanerve[m]: I'm saying that 8149 isn't enough for safe multisig; if the goal is to have unsafe + experimental then it doesn't matter whether 8149 is merged or not
-
kayabanerve[m]
It's a formal theoretical spec and tens of pages of documentation, combined with more months of review
-
rbrunner
Even if repeated, that's a strange opinion to have IMHO
-
kayabanerve[m]
You're welcome to that opinion. We can keep the experimental label accordingly, to make it clear this isn't safe. But it DOES matter if it's merged
-
rbrunner
"bad or worse does not matter, if nothing perfect is available". Really
-
UkoeHB
If ooo123ooo1234567 can't convince anyone that 8149 should be stalled further by the end of the meeting, I would like to squash and merge 8149 this week.
-
ooo123ooo1234567
kayabanerve[m]: it's needed to catch all details in one place
-
kayabanerve[m]
I won't completely disagree, yet I will disagree it's required
-
ooo123ooo1234567
kayabanerve[m]: it's a necessity whether it's moths or not
-
kayabanerve[m]
UkoeHB: ACK
-
jberman[m]
ooo123ooo1234567: are you aware of additional vulnerabilities in multisig that require more code changes to patch? Or is your position that it isn't "enough" to reach the bar of "safe"?
-
ooo123ooo1234567
s/moths/months/
-
kayabanerve[m]
I'd close my "unsafe" PR in that case, giving precedence to the experimental one
-
jeffro256[m]
> If ooo123ooo1234567 can't convince anyone that 8149 should be stalled further by the end of the meeting, I would like to squash and merge 8149 this week.
-
jeffro256[m]
It would be a different matter if ooo123ooo1234567 had a specific gripe, but it seems that ooo123ooo1234567 wants 8149 to be the be all, end all PR for multisig and *only* then merge it
-
kayabanerve[m]
Assuming the burning bug addition is successfully merged
-
ooo123ooo1234567
UkoeHB: in this meeting nobody cares about cryptography security analysis, so technical defeat ?
-
rbrunner
Who or what is defeated?
-
binaryFate
I think if things are agreed as they are in that meeting, and as it generally goes with community decision, we'll all take collective responsibility for the good and the bad
-
arnuschky
I think merging iterative improvements to software doesn't conflict with analysis of the system as a whole
-
binaryFate
sorry wrong window
-
rbrunner
Still true?
-
ooo123ooo1234567
jberman[m]: yes, but it was already said
-
kayabanerve[m]
> <@jeffro256:monero.social> > If ooo123ooo1234567 can't convince anyone that 8149 should be stalled further by the end of the meeting, I would like to squash and merge 8149 this week.
-
kayabanerve[m]
>
-
kayabanerve[m]
> It would be a different matter if ooo123ooo1234567 had a specific gripe, but it seems that ooo123ooo1234567 wants 8149 to be the be all, end all PR for multisig and *only* then merge it
-
kayabanerve[m]
While leaving the community in a known critically vulnerable state in the meantime
-
kayabanerve[m]
Friendly reminder they submitted their own PR, which they've yelled wasn't merged, without these specs
-
ooo123ooo1234567
binaryFate: collective responsibility means no one will be responsible
-
kayabanerve[m]
I truly believe they're just a pissed off obstructionist, not that I believe there's anyone else left to convince
-
ooo123ooo1234567
kayabanerve[m]: not leaving, I was busy with security proof since it's the most important port
-
ooo123ooo1234567
s/port/part/
-
kayabanerve[m]
ooo123ooo1234567: So they've claimed this, there's been no evidence, no one else has found them, and it's obvious they don't actually want to help. I won't say there isn't. I will say we can't trust them
-
kayabanerve[m]
And while formal spec would certainly help... It doesn't guarantee
-
ooo123ooo1234567
can someone explicitly say what is supposed to be placed into hardfork release ? unsafe multisig + experimental / safe multisig without experimental ?
-
kayabanerve[m]
ooo123ooo1234567: Great. I don't believe you've ever shared that that's why you ghosted the PR. Would you like to contribute now? We'd appreciate it
-
arnuschky
I think the only way forward is to do this how any collective open software project is driven forward. Agree on set of changes, merge them, invite people to suggest further improvements.
-
selsta
merge 8149 -> merge burning bug -> keep experimental -> try to get more formal security proofs before removing experimental flag
-
arnuschky
So I think we got all reviews and changes we gonna get for 8149. Let's merge it, as monero will be in a better state afterwards.
-
jeffro256[m]
> merge 8149 -> merge burning bug -> keep experimental -> try to get more formal security proofs before removing experimental flag
-
jeffro256[m]
+1
-
ooo123ooo1234567
selsta: ok, I want add additional changes to my own PRs -> merge it -> remove experimental
-
arnuschky
ooo is then invited to propose a new PR on top of it if he wants to prove that there's more to fix
-
ooo123ooo1234567
arnuschky: why on top ?
-
tobtoht[m]
ooo123ooo1234567: so no formal security proof then?
-
kayabanerve[m]
If ooo actually wants security, and actually knows of issues, they're welcome to contribute them
-
kayabanerve[m]
ooo123ooo1234567: Code style/myriad of other edits towards form and function?
-
ooo123ooo1234567
tobtoht[m]: including security proof
-
rbrunner
And about the time frame, in a first rough estimate?
-
ooo123ooo1234567
kayabanerve[m]: there are controversial style/myriad changes, not important
-
ooo123ooo1234567
8149 can be rebased on top my prs with all that style changes
-
kayabanerve[m]
Controversial to you. Not to the project
-
arnuschky
@ooo123ooo1234567: because that's how you develop incrementally using git, in a group of people
-
ooo123ooo1234567
kayabanerve[m]: No, controversial objectively, do you want to discuss ?
-
ooo123ooo1234567
arnuschky: yes, that's why 8149 can be rebased on top my PR one more time and submit all miner changes
-
ooo123ooo1234567
s/miner/minor/
-
kayabanerve[m]
I think we have community consensus 8149 is the proper PR for the fundamental set of changes both PRs contain. Therefore, it's the one not controversial to the community. If yours was fine, it would've been merged without requested edits
-
rbrunner
And how is this better than merging, and then continue to develop from that point onward?
-
binaryFate
ooo123ooo1234567: wouldn't it be faster to explain publicly what the remaining issues to be fixed are, in plain english?
-
ooo123ooo1234567
kayabanerve[m]: community consensus ?
-
kayabanerve[m]
Fuck it. If it gets ooo to shut up, if they want to edit their PR to have the same HEAD as 8149, fine. Let's merge theirs
-
binaryFate
Then you can either do it on your own or get help
-
jberman[m]
ooo123ooo1234567: I would argue for keeping 8149 unmerged, we proceed with multisig disabled until we reach the bar of safe, if you prove you're aware of additional vulnerabilities
-
kayabanerve[m]
But no one will step up to maintain your PR.
-
ooo123ooo1234567
binaryFate: it's vulnerabilities, can't publicly
-
kayabanerve[m]
Lol
-
binaryFate
you can always talk to me or hacker one team privately
-
binaryFate
if it's your worry
-
tobtoht[m]
vulnerabilities in unmerged code
-
ooo123ooo1234567
binaryFate: no, there are no competent people behind hackerone, not ok
-
binaryFate
whoever you would give your updated PR to review, then why not tell these people now what the issues are?
-
rbrunner
It seems it's always only black and white ...
-
arnuschky[m]
let's move onto discussing how to move forward with a release. I see two open PRs for multisig:
-
arnuschky[m]
- 8149 (consensus to be merged)
-
arnuschky[m]
- burning bug (small PR, but needs review)
-
arnuschky[m]
what else should go into that release?
-
kayabanerve[m]
Are we doing to have a closed source ooo monero daemon?
-
kayabanerve[m]
Like that seems to be the only path they'll accept at this point
-
ooo123ooo1234567
kayabanerve[m]: PRs are public, why closed source ?
-
arnuschky[m]
Once the new release is out, ooo (or anyone else) is invited to report vulnerabilities using the usual channels.
-
arnuschky[m]
I don't find it productive to turn in circles on hypotheticals.
-
kayabanerve[m]
Because that'd disclose the vulnerabilities because we're all incompetent and can't be trusted, apparently
-
jberman[m]
ooo123ooo1234567: why not DM vulns to koe?
-
kayabanerve[m]
arnuschky[m]: Exactly
-
ooo123ooo1234567
arnuschky[m]: no circles yet
-
UkoeHB
jberman[m]: sure, he'll need a new account though
-
kayabanerve[m]
The ironic thing is responding to that would be yet another iteration of the circle
-
luigi1111
😏
-
rbrunner
:)
-
kayabanerve[m]
8149. Burning bug. "Experimental". It seems like everyone except ooo agrees on that.
-
sech1
yes
-
sech1
mark it as experimental
-
kayabanerve[m]
From maintainers, to the acknowledged cryptographer of the project, to people who are willing to bet their business on multisig
-
jeffro256[m]
Does anyone else have objections ?
-
sgp_
I don't see it being super actionable to not merge something because it's experimental and could have flaws, without person who says it's flawed being able to articulate them
-
rbrunner
Not to mention that everything always can have more flaws
-
sgp_
by all means be cautious, but I think in this case the community's caution is just being taken advantage of to stall. or at least that's the side effect
-
arnuschky[m]
word
-
ooo123ooo1234567
<kayabanerve[m]> "Fuck it. If it gets ooo to..." <- it isn't just edit, there are important changes
-
ooo123ooo1234567
jeffro256[m]: no one understands what is it about, not clear what's the purpose of such voting
-
sgp_
if the current code has reviews from competent people and we don't know of any vulnerabilities, then ok to merge as experimental. my 2c
-
tobtoht[m]
sgp_: agree
-
rbrunner
Purpose of voting? Reaching a decision, maybe
-
ooo123ooo1234567
sgp_: those competent people removed their names and failed 1st time
-
ooo123ooo1234567
it's like strong sign that we don't want to participate in it from side of auditors
-
jberman[m]
If ooo123ooo1234567 discloses a single vuln to koe that was previously unknown, I would argue for keeping multisig disabled and we give them time to continue work on their patch
-
sgp_
can't we just put out as experimental and commission audits as necessary later? I don't see what's the big deal
-
kayabanerve[m]
ooo123ooo1234567: I believe the competency referred to koe and others, not just the auditors who are grey
-
selsta
sgp_: we would ideally need formal security proof, not audit
-
sgp_
okay, so just say formal security proof doesn't exist then
-
rbrunner
Keyword is probably "ideally"
-
sgp_
work on this can continue outside of the hardfork and release
-
selsta
UkoeHB: what was your opinion on how in depth the audit was compared to your knowledge?
-
kayabanerve[m]
jberman[m]: If it lead to any loss of funds/denial of service of fund access that isn't just the rpc routes being manual, sure
-
binaryFate
playing devil's advocate but where do we draw the line between "experimental" or not? There is surely more to Monero crypto and code that isn't as security proved as ooo123ooo1234567 would wish for to deserve being non-experimental
-
r4v3r23[m]
do the multisig changes in question even require a hard fork?
-
jeffro256[m]
r4v3r23: no
-
kayabanerve[m]
rbrunner: Fuck it, I'll add a 10 XMR bounty on 8149. If any loss of funds are submitted, outside of the rpc routes being manual, and UkoeHB: confirms... Stands until the hf
-
ooo123ooo1234567
binaryFate: MuSig2 paper - not experimental, no paper - experimental
-
kayabanerve[m]
Sorry, did not mean to reply to rbrunner. My client is acting up
-
r4v3r23[m]
jeffro256[m]: then why is a feature that can be hased out later holding up an entire network upgrade?
-
selsta
r4v3r23[m]: it's not holding up the network upgrade
-
kayabanerve[m]
ooo123ooo1234567: Tell koe one new loss of keys/funds. Prove you're superior and help monero. I'll pay you 10 xmr
-
ooo123ooo1234567
binaryFate: previous researchers were writing security proofs since it's necessary in cryptography and done everywhere
-
kayabanerve[m]
Or yes, we go back to ignoring you
-
UkoeHB
selsta: I'd say it wasn't as thorough as my own review, but at the same time the auditor(s) brought a different set of expertise/experience to the table, which always improves the venn-diagram of concept coverage (e.g. hightlighting the bias issue in hash_to_scalar(), which prompted me to update my seraphis lib).
-
ooo123ooo1234567
kayabanerve[m]: 1000xmr ?
-
sgp_
hey that's enough of this please
-
hyc
meh. mercenaries have no place here.
-
hyc
help improve things or go away.\
-
sgp_
people need these upgrades for better wallets and privacy. move past this discussion or else monero won't ever improve
-
jberman[m]
ooo123ooo1234567: are you going to disclose a vuln or not?
-
r4v3r23[m]
selsta: some people here are under the impression that it is
-
kayabanerve[m]
hyc: Based. I just want to iterate I don't believe they have anything
-
arnuschky[m]
We're going in circles again. Let's take it one at a time. Merge 8149, merge the burning bug fix, reevaluate
-
r4v3r23[m]
if not, giving some clarity to the community on the path forward to this network upgrade would be great
-
selsta
ok, let's do like I said before
-
selsta
19:28 <+selsta> merge 8149 -> merge burning bug -> keep experimental -> try to get more formal security proofs before removing experimental flag
-
sech1
48 minutes into the meeting and nothing has been decided yet. What's the date of v15 network upgrade?
-
ooo123ooo1234567
jberman[m]: yes I can
-
arnuschky[m]
I'll happily badger ooo to prove to us that he indeed knows of more vulnerabilities
-
sgp_
selsta: seems perfect
-
selsta
ooo123ooo1234567: if you want to change that you have to disclose your patch or your vulnerabilities to _someone_
-
selsta
otherwise we don't get anywhere
-
arnuschky[m]
indeed.
-
sgp_
selsta: besides ooo, does anyone else oppose this
-
hyc
sech1: apparently we're now actually blocked waiting for trezor?
-
UkoeHB
yes, the only thing worse than hearsay is 'Isay'
-
kayabanerve[m]
Trezor said they'd be ready on the 20
-
sech1
I agree with selsta's plan for 8149
-
binaryFate
I +1 selsta plan
-
hyc
+1
-
UkoeHB
+1
-
rbrunner
+1
-
tobtoht[m]
+1
-
jeffro256[m]
+1
-
sech1
Can we just be done with disussing 8149 now (in this meeting)?
-
sech1
if everyone agreees
-
selsta
yes, so fork date next
-
hyc
so how about July 23, 1 week delay
-
SerHack
+1 for selsta
-
ooo123ooo1234567
sgp_: In this meeting only UkoeHB has some knowledge, not sure what's the purpose to ask others
-
kayabanerve[m]
+1, as obvious
-
kayabanerve[m]
hyc: Bit tight to trezor release but I'm not against it
-
selsta
I'd like to delay the hardfork 2 weeks, so that we hardfork around August 1st
-
luigi1111
Should be longer
-
arnuschky[m]
+1
-
hyc
ok
-
selsta
so that we gave people at least 1 month to update
-
luigi1111
Oh longer than one week
-
selsta
give*
-
sech1
yes, +1 on July 30th release
-
jberman[m]
+1 give at least 1 month to update
-
luigi1111
1month to update for august first means release tomorrow?
-
selsta
luigi1111: what would you suggest?
-
sech1
there's no release branch yet
-
selsta
August 7th?
-
sech1
which PRs need to be merged before release?
-
binaryFate
when tag?
-
binaryFate
first thing to consider before fork date
-
luigi1111
1month after tag is my preference
-
sech1
.merges
-
xmr-pr
7774 8296 8356 8357 8358 8384
-
luigi1111
Tag being moving target so just best guess
-
selsta
we need a new fork height first before tag
-
sech1
if it's 2 weeks delay, just add 10000 blocks
-
jberman[m]
We also need the Ledger code in the repo
-
selsta
jberman[m]: we gave ledger everything
-
sech1
height 2678888?
-
selsta
i will update them on the new fork height, if they aren't ready until then it's not our fault
-
selsta
last hardfork they also were 1 week late
-
hyc
sounds fine then
-
jberman[m]
ok, makes sense
-
luigi1111
So we are proposing merging this stuff today and branching like tomorrow?
-
selsta
sech1: can you do August 3rd or so? we need a couple days to merge and tag
-
selsta
and releasde
-
ArticMine[m]
So the final date for HF?
-
kayabanerve[m]
Tag after 8149, Ms burning bug, and I have a PR I'd insist is critical :p
-
kayabanerve[m]
*and then other people's submissions, ofc
-
kayabanerve[m]
That's just my list
-
sech1
August 3rd is 4 more days, so 2681720
-
arnuschky[m]
what else needs to go into this release? Is all the rest ready?
-
selsta
arnuschky[m]: there are a couple unreviewed patches
-
selsta
but we will have a second release before the hardfork anyway
-
selsta
to include hardware wallet support
-
kayabanerve[m]
I have a PR unmerged yet reviewed by moneromoooo: and I think selsta: :/
-
tobtoht[m]
I badly want the DNS leak fix in (8408)
-
ooo123ooo1234567
kayabanerve[m]: wow, crowd based voting on whether to merge cryptography changes or not
-
hyc
july 16 was a Saturday, push 4 weeks would be August 13.
-
ofrnxmr[m]
Selsta, Jberman is ok w 7760.. can we rebase and merge without ooo? Or 😅
-
dEBRUYNE
4 weeks would basically be adding 20k blocks, also an option I suppose
-
dEBRUYNE
Would put the fork date around the 13th of August
-
selsta
sounds good
-
jberman[m]
I'll add reviews to those 2 kayabanerve and tobtoht today
-
selsta
tobtoht[m]: I didn't add things to the merge queue yet, 8408 will be included
-
tobtoht[m]
ok, great
-
dEBRUYNE
In case of having a date in the middle of August, we should release binaries in 1-2 weeks
-
selsta
ofrnxmr[m]: not sure if a rebase is even needed, no actual merge conflicts have to be solved
-
selsta
it's just git being confused, you have to tell it to take the patch side, have to look up the exact command
-
rbrunner
"we should release binaries in 1-2 weeks" sounds realistic, no?
-
ooo123ooo1234567
should i leave now or wait for release ?
-
jeffro256[m]
@selsta that won’t work because some macros included in 7760 were removed in one of my PRs
-
ooo123ooo1234567
Do i get it right that you will release 8149 + experimental flag in hardfork ?
-
ooo123ooo1234567
and this decision can't be changed
-
ooo123ooo1234567
correct ?
-
selsta
ooo123ooo1234567: it can be changed if you point out any remaining issues
-
ofrnxmr[m]
ooo123ooo1234567: Wrong
-
kayabanerve[m]
ooo123ooo1234567: Not unless we're provided with a literal reason why not
-
hyc
so this meeting has run over an hour now. congrats ooo on successfully DOSing development
-
gingeropolous
^
-
ooo123ooo1234567
there is unresolved conflict with UkoeHB (maybe will resolve later via pm) but he is the most competent in current meeting, how to solve this issue ?
-
ooo123ooo1234567
hyc: meething is for discussion, not development
-
ooo123ooo1234567
s/meething/meeting/
-
ooo123ooo1234567
work is done silenly when someone is thinking and reading/writing code
-
ooo123ooo1234567
s/silenly/silently/
-
selsta
ooo123ooo1234567: pm him with new account if you want to resolve things with him
-
ooo123ooo1234567
hyc: excuse me, but merge of incorrect code is a regress, not progress
-
rbrunner
It's not incorrect, just not perfect
-
ooo123ooo1234567
if it's exploitable then it's incorrect
-
rbrunner
Show
-
sgp_
anyway let's not waste even more time please
-
sgp_
is there anything else
-
selsta
no, we will add 20k blocks to the fork height
-
hyc
great
-
sgp_
for the blog post announcing the delay, 1) who will write it, and 2) what is the stated reason for the delay
-
hyc
delay for trezor
-
selsta
-
binaryFate
lol perfect
-
jeffro256[m]
If we are moving on to less pertinent issues, has anyone looked at
monero-project/monero #8385?
-
jeffro256[m]
It just gives better control over whether persistent SSL keys are used
-
selsta
jeffro256[m]: we need 7760 first
-
binaryFate
sgp_ why do you think a blog post is necessary? We didn't have one to announce temptative date
-
selsta
ideally
-
jeffro256[m]
Ideally , yes but 7760 is unrelated to the SSL files
-
sgp_
-
r4v3r23[m]
selstaso tag+release in next few days?
-
ooo123ooo1234567
<kayabanerve[m]> "Not unless we're provided with a..." <- I don't like that crowd of incompetent people say me what to do
-
dEBRUYNE
sgp_: I'd say the delay is caused by having to wait for the Trezor firmware update + mulsitig audit results
-
sech1
binaryFate I'm not sure where and how it was announced, but many picked up:
nicehash.com/countdown/xmr-forking-2022-07-16-12-00
-
binaryFate
sgp_ ah right, forgot about that. We should add adendum to this post then (regardless of new post or not), in case people just land on it via direct link
-
sethforprivacy
sgp_: We announced it via a post
-
sethforprivacy
And on Twitter
-
sethforprivacy
And on Reddit
-
sethforprivacy
I will edit the post, what's the new height?
-
ooo123ooo1234567
<kayabanerve[m]> "Not unless we're provided with a..." <- and expected scenario is the following: I point out issues, you all are grabing them and merging instantly skipping long discussion and kick me after, correct ?
-
sethforprivacy
I can get a PR submitted in a few minutes
-
w[m]
ooo123ooo1234567: Kick you????? What?
-
sgp_
ooo123ooo1234567: please leave this alone, your comments are entirely unproductive
-
sech1
sethforprivacy " we will add 20k blocks to the fork height"
-
sethforprivacy
sech1: Thanks, sorry, missed most of the meeting due to work
-
sech1
20k blocks is approx. 4 weeks
-
ooo123ooo1234567
* kick me out after, correct
-
sgp_
any other topics?
-
hyc
looks like we're done
-
ofrnxmr[m]
sgp_: Wallet2 dns issue?
-
ofrnxmr[m]
Are we prioritizing this? The PR is done
-
ooo123ooo1234567
jeffro256[m]: hahahah, you're suggesting to remove something from PR; facepalm
-
hyc
doh... I'm done, gotta go. ttyl
-
jeffro256[m]
> <@ofrnxmr:monero.social> Wallet2 dns issue?
-
jeffro256[m]
> Are we prioritizing this? The PR is done
-
jeffro256[m]
I’m all for removing that DNS code, good find tobtoht
-
sgp_
<selsta> "tobtoht: I didn't add things..." <- this is the DNS leak, will be included
-
jeffro256[m]
ooo123ooo1234567: No I’m not
-
selsta
I only wanted to discuss multisig and fork date
-
sgp_
* DNS leak, patch will be
-
ooo123ooo1234567
jeffro256[m]: what's the value in stupid parroting of already said statements ? facepalm
-
ofrnxmr[m]
ooo123ooo1234567: I asked. Missed it earlier.
-
ofrnxmr[m]
Ooo, chill.
-
sgp_
seems like there's nothing else
-
sethforprivacy
New tag date?
-
ofrnxmr[m]
selsta and SGP, thanks for hosting
-
sethforprivacy
Fork is approx August 13th
-
sethforprivacy
tag/binary release/etc.
-
sgp_
I encourage a certain someone to wise up and learn to have a productive conversation with a group, and encourage everyone else to be more aggressive at changing discussions to get back on topic when someone is clearly trying to derail. Thank you.
-
selsta
sethforprivacy: release 1 month before, so tag before that
-
sethforprivacy
Would like an estimate date for the blog post but can leave it out if we don't want to commit to one
-
UkoeHB
selsta: thanks for the meeting. I will squash 8149 in 2hr unless I get a solid pm justifying more delays.
-
sethforprivacy
Err, nvm, can just roll with release date estimate of July 13th
-
selsta
we also have to delay the stagenet fork date
-
binaryFate
thanks selsta and everyone for the meeting
-
sethforprivacy
-
sethforprivacy
luigi1111 ErCiccione ^
-
luigi1111
Tag next week, hopefully
-
selsta
luigi1111: are you available again?
-
ooo123ooo1234567
<sgp_> "please leave this alone, your..." <- incorrect code is unproductive too, but who cares
-
ooo123ooo1234567
<UkoeHB> "selsta: thanks for the meeting..." <- merge now
-
ooo123ooo1234567
no need to wait
-
ooo123ooo1234567
good bye
-
luigi1111
selsta: yes
-
sethforprivacy
<sethforprivacy> "PR for blog post update:
https:..." <- luigi1111 ErCiccione if both of you can please review this and then merge/publish, would be great to be able to use this to get the word out about the shifted timetable ASAP. Very simple update to the blog post.
-
luigi1111
Ok
-
sethforprivacy
Or even just luigi1111, sgp_ has already reviewed/approved.
-
luigi1112
done
-
sethforprivacy
Thanks!
-
selsta
luigi1112: can you remove "firmware" from hardware wallet delays?
-
selsta
we kinda delayed it for both ledger and trezor and firmware is only trezor relevant
-
luigi1112
just hardware wallet delays?
-
selsta
yes, or hardware wallet related delays
-
sethforprivacy
Sure
-
sethforprivacy
Well its merged now -- want a new PR?
-
sethforprivacy
oops, just realized that comment was for luigi -- let me know if I can help with anything.
-
UkoeHB
selsta: I squashed 8149
-
selsta
thanks
-
sgp_[m]
-
sgp_[m]
we weren't able to get it to work with the example, but we were able to get it to work with
-
sgp_[m]
'{"params": {"tx_as_hex": "<hex>", "do_not_relay": "true"}}'
-
sgp_[m]
difference is we needed to include `params`. Can someone else reproduce?
-
tobtoht[m]
"do_not_relay": "true" <- should be true, not a string. Not sure if it matters.
-
tobtoht[m]
The curl example in the docs works for me.
-
sgp_[m]
okay, thanks for checking. I'll check on the string