-
binaryFate
Fluorine Fermi v0.18.0.0 binaries are online!!
-
binaryFate
Massive thank you to all contributors
-
binaryFate
And thanks to everyone who contributed hashes for the deterministic builds
-
gingeropolous
huzzah! congrats all!
-
dangerousfreedom
Awesome :)
-
luigi1112
w00t
-
garth
Woooo
-
PSEP1
Congrats all! This time I'll be around for the hard fork exciting!
-
r4v3r23[m]
<binaryFate> "Fluorine Fermi v0.18.0.0..." <- thanks. just missing the github release :)
-
fluffypony
moneromooo: I can check them
-
fluffypony
ok so the issue is DNSSEC right?
-
fluffypony
-
fluffypony
-
fluffypony
-
fluffypony
-
fluffypony
-
fluffypony
-
fluffypony
-
fluffypony
all seems correctly configured per Verisign
-
fluffypony
might be the DNSSEC verifier code that is bust
-
fluffypony
the only thing I can think of that would affect it (besides ISP oddness) is the . root zone hard-coded key, but that changed a few years and I'm certain we rolled it over
-
fluffypony
*few years ago
-
sech1
-
fluffypony
"no DNSKEY rrset for trust anchor . while building chain of trust"
-
fluffypony
ok so that's the root domain
-
fluffypony
the way DNSSEC works is it only has one key hardcoded, the one for .
-
fluffypony
then it checks the trust anchor for .net based on the trust anchor for .
-
fluffypony
then the trust anchor for moneropulse.net, and then for updates.moneropulse.net
-
fluffypony
so if it's failing on . that means that either your ISP isn't serving DNSSEC records when requested, OR the utility is busted
-
sech1
This is on Hetzner server
-
fluffypony
hmmm where is monero-utils-dns-check - it's not part of the binary package, right?
-
fluffypony
WOW monerod shuts down way way way faster in 0.18
-
fluffypony
awesome work
-
sech1
monero-utils-dns-checks
-
sech1
it's built in debug builds
-
johnfoss68[m]
Hey sorry to bother, I'm putting together twitter thread about Monero's upcoming hardfork, and want to add a bit of historical context. Was there ever a code change to include the tail emission? Just been searching thru bitcointalk and couldn't find anything definitive. A rough month/year would be good if someone knows off the top of their head. Cheers.
-
sech1
yes
-
johnfoss68[m]
It'll be in reference to the calcification of emission schedule.
-
sech1
-
sech1
-
fluffypony
johnfoss68[m]: yes
-
fluffypony
there was no tail emission, but REALLY early on (first few weeks) I read the Courtois paper (and then years later he hosted the first Monero meetup in London with binaryFate and myself and others) and raised the idea of a tail emission. We announced that we'd be doing this, and then tacotime and I (primarily) debated the exact structure of it, before settling on disinflationary + starting at sub-1%.
-
fluffypony
the way we announced it / referred to it prior to the code change was "A minimum subsidy may be implemented in the future with <1% inflation to preserve mining incentives."
-
johnfoss68[m]
Thanks guy! 👍
-
johnfoss68[m]
guys*
-
maybefbi
Hypothetically speaking, If only BlackRock had the permission to add digitally-signed blocks (with BlackRock key) to the monero blockchain, how will they go about discarding transactions from bad actors? AFAIK, this can't be done because monero transactions are already indistinguishable from each other thanks to CLSAG, one-time-addresses, range proofs of pedersen commitments. So BlackRock won't know which transaction they are including or
-
maybefbi
not-including in the blocks under this hypothetical scenario. BlackRock could be handling transations from Sisters-of-Charity or a drug-cartel, so BlackRock won't know which transaction they are dealing with. So why do we require Monero to be permission-less?
-
merope
maybefbi not the right room for that discussion, and also you are making a few faulty assumptions. We can continue in #monero if you'd like
-
maybefbi
i will paste it there
-
HenryHollingwort
the latest binaries when using a ledger hardware wallet say "... app doesn't support the current monero version. Try to update the Monero Ledger App, at least 1.6.0 is required", i think that message will need to be updated (i am on 1.7.8 atm) when they update the monero integration
-
ofrnxmr[m]
I just posted the answer to that question in #monero:monero.social
-
ofrnxmr[m]
-
ofrnxmr[m]
The error should probably be updated to reflect the new minimum version
-
HenryHollingwort
(can't visit the link because i wasn't in the room before that)
-
ofrnxmr[m]
-
HenryHollingwort
that's trezor though as opposed to ledger but i assume it's in the same situtation (awaiting update released at which point update min version string same as ^)
-
TheCharlatan
hyc I saw this comment on an old bitcoin issue (#18916):
-
TheCharlatan
> One key factor to consider here is that BDB supports page-level encryption, and there's an unreleased patch for LMDB that does also. The LMDB-based Monero wallet will be using this feature.
-
TheCharlatan
what's the status on that?
-
hyc
The LMDB code has been ready for literally years. nobody has worked on migrating the wallet to use LMDB
-
hyc
TheCharlatan: probably it won't happen unless some exchanges put up a bounty, since they'll benefit the most from the perf gain
-
gingeropolous
seed node ops, update ure seed nodes :)
-
selsta
HenryHollingwort: Ledger users have to wait with the update, they didn't put out an update yet.
-
moneromooo
0.18 outputs some irrelevant (unless debugging) error: duplicate key: node_data. I suggest
paste.debian.net/hidden/42dc99e8 (untested).
-
moneromooo
Just one so far, right at the start, so it might be less spammy than I thought it'd be.
-
selsta
didn't see this yet
-
selsta
could it be a peer that uses custom code?
-
moneromooo
Yes.
-
scoobybejesus
i got that basically the moment i started up 0.18
paste.debian.net/hidden/2428e7c5
-
hyc
oh yeah, I got that here too, on my arm64 box
-
hyc
also got it ~12 hours after starting on my linode. July 17.
-
hyc
july 17 5am, july 18 2:47 on my arm64 box
-
selsta
can someone get the IP from this peer when using log level 2?
-
sethforprivacy
Could someone with monero-announce access please announce the new release? That's the only missing announcement item from
monero-project/meta #690.
-
sethforprivacy
And has anyone performed testnet Ledger/Trezor testing? I think jberman has done Ledger but want to confirm before I check those off.
-
sethforprivacy
And if anyone knows if these unchecked items have been done yet, please let me know.
-
-
selsta
ledger / trezor code is not included yet in this release
-
sech1
moneromooo I don't think it's safe to redefine MONERO_DEFAULT_LOG_CATEGORY inside a header file
-
sethforprivacy
selsta: But both have dev builds up, so was just wondering if they've been tested. If not I'll just leave them unchecked and add a note.
-
moneromooo
It is safe, since it just redirects the category. cpp files #define this after all header includes.
-
moneromooo
There are already headers that do this, due to epee's header heavy design.
-
sech1
if cpp files redefine it then ok
-
moneromooo
The worst you get is an unexpected default category, which should be trivial to fix.
-
moneromooo
Most do.
-
selsta
binaryFate has to send a monero-announce mail
-
moneromooo
(and should)
-
sethforprivacy
selsta: Figured but wasn't sure, thanks, selsta!
-
jberman[m]
Seth For Privacy: I created testnet txs with a ledger with this code (
j-berman/app-monero c1a6eb8) + this code (
j-berman/monero cfbd590). Working on the handoff with ledger
-
selsta
.merge+ 8428
-
xmr-pr
Added
-
selsta
does this still seem relevant?
monero-project/monero #119
-
hyc
probably hasn't been relevant in years
-
moneromooo
I do not remember ever seeing this.
-
hyc
nor I
-
selsta
I'll close this
-
selsta
hyc: is this still relevant with randomx?
monero-project/monero #4860 is this something that would have to be implemented in the monero repo?
-
selsta
I'm not familiar with buildroot extension
-
hyc
selsta the main point of that ticket was providing a monerod that can run on pi and other small single board computers
-
hyc
since we have official arm linux binaries now, I think we can close this
-
selsta
ok, sounds good
-
hyc
might add a commene avout pinode
-
hyc
comment
-
selsta
will do
-
real_me[m]
I’m waiting for multisig fix to be merged on 0.18
-
real_me[m]
Very excited
-
hyc
it's merged already, no?
-
selsta
multisig is still experimental and should only be used when all multisig participants are trusted
-
dangerousfreedom
I think it would be interesting to post it here too:
-
dangerousfreedom
-
selsta
dangerousfreedom: would make sense to document all of these special tx in case someone works on an alternative implementation, though not sure where to write it down
-
dangerousfreedom
I'm still working on my understanding, making stats and correlating the occurrences to be sure that it is a bug and not an exploit. I will provide my full result as soon as I have them! So far I would like to share my results as I believe that a community work would be faster and more productive to solve this issue.
-
dangerousfreedom
(If there is an issue at all)
-
selsta
.merge+ 8359
-
xmr-pr
Added
-
selsta
.merge+ 8352
-
xmr-pr
Added