-
ooo123ooo1234567
<kayabanerve[m]> "From maintainers, to the..." <- For some reason I didn't notice this comment, it says in clear text who agrees on those changes
-
ooo123ooo1234567
<hyc> "help improve things or go away.\" <- funny how voters don't go away without improving anything
-
ooo123ooo1234567
<jeffro256[m]> "> <@jeffro256:monero.social> I’m..." <- "good find", hahahaha
-
lo[m]
telegram-bot that supports XMR, can transfer XMR on app. Who is interested in participating in this project?
-
r4v3r23[m]
lo[m]: [#monero-community-dev:monero.social](https://matrix.to/#/%23monero-community-dev%3Amonero.social)
-
stretch1
-
stretch1
* ty;
-
stretch1
Q2: what about DNS on udp since torsocks is outdated (thus no use)
-
ofrnxmr[m]
DNS goes over tor (let me recheck)
-
stretch1
no proxy: clear;
-
stretch1
--proxy ?
-
stretch1
--tx-proxy?
-
stretch1
andyninbound ?
-
lo[m]
where are faucet, anyone know?
-
xmr-ack[m]
Community.rino.io
-
ofrnxmr[m]
1. No --proxy clear
-
ofrnxmr[m]
2. --proxy dns over tor
-
ofrnxmr[m]
-
ofrnxmr[m]
3. Txproxy + anoninbound😃 but without --proxy = dns over clear (I believe)
-
lo[m]
<xmr-ack[m]> "Community.rino.io" <- got
-
stretch1
ofrnxmr: why does `--proxy` not rebind 0000:18080 to localhost? it is basically clearnet & relays at once no? unless pulled in via `p2p-bind-ip 127.0.0.1`
-
stretch1
* ofrnxmr: why does `--proxy` not rebind 0000:18080 to localhost? it is basically clearnet & relays at once then which adds no visible benefit, unless pulled in via `p2p-bind-ip 127.0.0.1`
-
ofrnxmr[m]
<stretch1> "ofrnxmr: why does `--proxy..." <- You can run clear and tor at the same time
-
ofrnxmr[m]
The binds are unrelated
-
ofrnxmr[m]
You can change bind rpc to 0000 and run over clear as well.
-
ofrnxmr[m]
Its not an either / or situation. --proxy only manages outgoing connections.
-
ofrnxmr[m]
(Should also Set p2p to 127.0.0.1, in peers to 0 and disable dns checkpointing )
-
ofrnxmr[m]
You* should also
-
stretch1
people expect --proxy to proxy everything, this is huge misunderstand.
-
stretch1
"take traffic and put it through x", not have clear and x
-
ofrnxmr[m]
> <@stretch1:matrix.org> people expect --proxy to proxy everything, this is huge misunderstand.
-
ofrnxmr[m]
> "take traffic and put it through x", not have clear and x
-
ofrnxmr[m]
People dont expect, the feature is documented
-
stretch1
* x", not:, * " have clear
-
ofrnxmr[m]
Isnt*
-
stretch1
disable_noise does ? ?
-
stretch1
> Adding ,disable_noise disables white noise and Dandelion++ (will speed up tx broadcast but is otherwise not recommended).
-
ofrnxmr[m]
Disabled dandelion++ and immediately sends the tx
-
stretch1
is inpeer=0 equivalent to p2pbind=localhost ?
-
ofrnxmr[m]
For --proxy, I tend to agree that it would make sense to change the p2p bind to localhost if not specified to do otherwise
-
ofrnxmr[m]
Feel free to comment on the initial pr or to open an issue
-
stretch1
ofrnxmr[m]: comment 😅;
-
ofrnxmr[m]
? That way the author gets a ping
-
ofrnxmr[m]
tobtoht @tobtoht:libera.chat:
-
stretch1
stop it & relax :)
-
-
ofrnxmr[m]
If your questions arent development related you're asking in the wrong place
-
ofrnxmr[m]
If --proxy not affecting default p2p bind is an issue, open an issue.
-
dartian[m]
what are we going to do on July 4?
-
dartian[m]
-
dartian[m]
I will also post in this room, exclusively, prior to streaming
-
dartian[m]
-
dartian[m]
I hope it's fair enough
-
stretch1
ofrnxmr: a tx received by peer will be broadcast ONLY on the same network?
-
selsta
stretch1: --tx-proxy tor / i2p will be broadcasted to clearnet at some point
-
selsta
unless i misunderstood your question
-
stretch1
clear stays clear;
-
stretch1
analog for clear, tor, onion;
-
stretch1
(later on there will be code dive, but not yet)
-
stretch1
local rpc tx is clear; but peer tx not
-
stretch1
s/;/?/, s///
-
stretch1
> If any anonymity network is enabled, transactions being broadcast that lack a valid "context" (i.e. the transaction did not come from a p2p connection), will only be sent to peers on anonymity networks.
-
stretch1
what about tx that have 'context' ?
-
stretch1
ofrnxmr: i nee you
-
ofrnxmr[m]
I believe that was written pre --proxy and describes anonymity networks as anoninbound and txproxy
-
ofrnxmr[m]
Tx with context, ie coming from ipv4 connection, should vs relayed over ipv4 connections as well.
-
ofrnxmr[m]
Adding --proxy would imply ipv4 over tor
-
stretch1
correct?: adding proxy will relay clearnet peer tx over tor; & relay peer proxy tx over clearnet?
-
ofrnxmr[m]
-
stretch1
true? monerod sends local tx over inbound onions as well?
-
stretch1
* true? monerod sends local tx over inbound onions as well
-
stretch1
s/inbound/incoming/
-
stretch1
> TCP itself determines inbound/outbound by which side sets up the connection.
-
stretch1
i ask pkg direction not initiation
-
stretch1
* > TCP itself determines inbound/outbound by which side sets up the connection.
-
stretch1
i ask pkg direction not initiation
-
selsta
ofrnxmr[m]: --proxy does not have any special tor functionality and only works over exit nodes
-
stretch1
yes we had that already;
-
selsta
-
ofrnxmr[m]
Local tx as in Incoming rpc? Regardless of whether from clearnet (0.0.0.0:18089 etc) or the onion bound to it, it should relay to onion peers (if txproxy is enabled).
-
ofrnxmr[m]
No onion peers = tx gets stuck until you have some
-
stretch1
> <@ofrnxmr:monero.social> Adding proxy + tx proxy + anon inbound will... (full message at
libera.ems.host/_matrix/media/r0/do…8ca2f631a694d4d0e22b4b91cce8af02fb3)
-
ofrnxmr[m]
I believe it is a mandatory downgrade / one way
-
ofrnxmr[m]
Onion > ipv4 = yes
-
ofrnxmr[m]
Ipv4 > onion = no
-
ofrnxmr[m]
Would need better clarification or code reading to confirm
-
stretch1
does the incoming peer `--anonymous-inbound` receive local (rpc) tx or only push to `tx-proxy` peer B ?
-
ofrnxmr[m]
tx proxy = only outbound (push)
-
ofrnxmr[m]
Anon inbound = only inbound (receive)
-
ofrnxmr[m]
Double checking
-
ofrnxmr[m]
<stretch1> "disable_noise does ? ?" <- "Another semi-major change. If the user disables "noise" (i.e. --tx-proxy,127.0.0.1:9050,disable_noise), then the tx is "fluffed" over outbound Tor connections, and the receiving hidden service will immediately fluff the transaction over ipv4/6 upon receive. The i2p/tor network is replacing Dandelion++ stem - (hopefully) breaking the p2p sybil attacks that Dandelion++ was designed to mitigate. This
-
ofrnxmr[m]
also allows users to use i2p/tor, but still get reasonable delays when sending a tx (the noise feature is more aggressive in its privacy and latency)."
-
ofrnxmr[m]
-
woodser[m]
my stagenet node is returning target_height < height (from sync_info and get_info)
-
woodser[m]
by 26 blocks at the moment. any idea what could cause that?
-
plowsof
-
woodser[m]
ah that explains it. thank you :)
-
plowsof
TIL target_height is a meme
-
ofrnxmr[m]
Is it normal for mainnet to show 0 as target height once synced? 🫠
-
woodser[m]
yes
-
ofrnxmr[m]
Tyty