-
jberman[m]
-
luigi1111
.merges
-
xmr-pr
8299 8323 8333 8352 8359 8379 8381 8415 8419 8427 8428 8442 8444 8450 8460 8462 8464 8465 8486 8490 8491 8495 8496 8497
-
luigi1111w
.merge- 8464
-
xmr-pr
Removed
-
merope
Who handles the gitlab server at repo.getmonero.org? There are a ton of spam repos and groups
-
moneromooo
I do. Kinda. If you find a way to remove them easily, let me know.
-
merope
Not familiar with gitlab server, I'm afraid :/
-
rogu157[m]
-
rogu157[m]
I also passed `disable-dns-checkpoints=1` and `enable-dns-blocklist=1` to my config file. Maybe this is the reason of disconnect?
-
woodser[m]
<woodser[m]> "after calling `scan_tx` with ids..." <- opened an issue for this problem:
monero-project/monero #8531
-
dark[m]
Hello guys just curious, why can't we get Monero mathematically proven and formally verified to be correct from its specification to C implementation to binary code? If we treat software program as mathematical proofs to a theorem, then using the rules of induction along with automated theorem prover we can mathematical prove that Monero is secure and correct without relying on cat and mouse game of finding bugs through auditing and bug
-
dark[m]
bounty
-
jozsef[m]
Are you talking about "formal verification"? It sounds like it. As far as I know, that is only possible for programs that are significantly simpler than a code like monero's source.
-
jozsef[m]
I assume sometimes the secret spend key must be sent from a client to the daemon. What security precautions are taken for that? I know there is TLS between wallet rpc and daemon, but that's optional. What else is there? I see temp storage in `epee::wipeable_string` as in `wallet_rpc_server::on_query_key()`. Other precaution on the wire? Encryption maybe?
-
moneromooo
When you say daemon... which daemon do you mean ? wallet daemon or node daemon ?
-
moneromooo
Because the node doesn't need to see your keys. If one asks, you can be sure they're a scammer.
-
moneromooo
IIRC query_key was added because someone wanted to be able to get the keys, not sure why. It should not be needed.
-
moneromooo
Assume that if the keys go over the wire, they're compromised.
-
moneromooo
Unless SSL with whitelisted certs. Because all that goes through the network stack, and we have no idea where it gets copied to.
-
moneromooo
And even if SSL with whitelisted certs, the other side may be merrily copying them all over memory.
-
moneromooo
Also, TLS is encryption.
-
moneromooo
Ah, actually, thinking about it, there is one good reason to send keys over the wire: creating a new wallet.
-
moneromooo
Same thing applies.
-
jeffro256[m]
Hey congrats on passing 11K commits y'all !
-
dark[m]
<jozsef[m]> "Are you talking about "formal..." <- That's not true. It may be difficult to formally verify large programs but it's not impossible. Gernot Heiser has proven that formal verification scales decently even with software with millions of lines of code. It's just expensive but otherwise very well worth it especially for a software like Monero committed to financial privacy
-
Rucknium[m]
dark: You can submit a CCS funding proposal to perform such a verification.
-
jozsef[m]
I mean the node daemon. I assumed (maybe I'm wrong) that when you create a transaction from a wallet and broadcast that to the network, you broadcast that to a daemon and that broadcast needs a private spend key. Does it not?
-
selsta
the transactions gets created on the wallet side, the daemon does not need any key
-
jozsef[m]
dark: I'm obviously no expert in formal verification. If this is possible, by all means that would be great. I just thought that formal verification is only possible if you can actually come up with a mathematically precise specification of what the program does and then you verify that and so that is only possible for simpler programs. The problem I see with this is that a code like monero is not written based on some specification. It
-
jozsef[m]
is written based on what it needs to do. How do you described that with the language of formal mathematics? Some parts of the math, yes, but every functionality? Sounds science & and fiction to me. But I'm happy to be proven wrong.
-
jozsef[m]
selsta: Okay, so the private spend key never leaves the wallet. That's reassuring.
-
selsta
moneromooo: updated with your suggestion
monero-project/monero #8519
-
selsta
hmm have to double check if it gets initialized correctly
-
selsta
and have to check if it works correctly on testnet and stagenet
-
UkoeHB
selsta: builds fine on my machine, tests and benchmarks run fine
-
UkoeHB
the library on its own builds fine* idk what's wrong when included as a submodule
-
selsta
what command do you use to build
UkoeHB/monero f7c53b8 ?
-
UkoeHB
some cmake voodoo
-
selsta
i'll try to get it working
-
UkoeHB
just regular make
-
UkoeHB
-
selsta
some CMake stuff is missing
-
UkoeHB
yeah but it's dying before it even gets to unit tests
-
UkoeHB
clangd also doesn't like that `asm`
-
selsta
UkoeHB: [ OK ] seraphis_crypto.mx25519_sample_tests (0 ms)
-
selsta
will send you the diff
-
selsta
-
UkoeHB
selsta: thanks that worked
-
JB[m]12
hi I made a exchange on changlly xmr 1.22 from my monero gui account to changlly and there saying they didn't get it
-
selsta
JB[m]12: do you have a transaction id?
-
selsta
also can you join the monero support channel on matrix?
-
JB[m]12
a47e131c1a58f573de04bd1e58e0e0c7be28ed54239780ca15527370515db50c
-
-
selsta
please join #monero-support:monero.social
-
ofrnxmr[m]
#monero-support:monero.social
-
JB[m]12
sorry I got logged off