-
Alex|LocalMonero
Is it a bug that when setting up a 2/2 multisig wallet after doing `make_multisig 2 <the other guy's prepare_multisig output>` monero-wallet-cli says "Another step is needed" and tells you to also do a round of exchange_multisig_keys, despite the documentation says that this step is only necessary for M/N (not N/N) wallets?
-
UkoeHB
Alex|LocalMonero: it is the post-kex verification round
-
UkoeHB
docs might be out of date
-
Alex|LocalMonero
UkoeHB: so it's essential?
-
UkoeHB
yes
-
UkoeHB
essential to the baseline security model, there are cases where it's fine to skip the post-kex round by using the force update option
-
UkoeHB
but you need to really understand your security model to use that, be careful
-
Alex|LocalMonero
UkoeHB: Basically, if you don't do that round then a malicious actor might steal your coins?
-
UkoeHB
no, the most that can happen is there isn't a full set of N honest participants with completed multisig accounts, so funds sent to your local completed account are effectively inaccessible
-
UkoeHB
with N-of-N it's less of a concern since there is no 'subset of honest users'
-
Alex|LocalMonero
So what's the concern?
-
Alex|LocalMonero
In the 2/2 case
-
UkoeHB
hmm can't think of anything off the top, will think more and get back to you
-
Alex|LocalMonero
<UkoeHB> "hmm can't think of anything..." <- Appreciated
-
UkoeHB
Alex|LocalMonero: all I could think of was the post-kex round could act as a heartbeat test on the other party in a 2-of-2 if you obtained a potentially very old pubkey from them
-
Alex|LocalMonero
UkoeHB: I see, so the step really isn't needed.
-
Alex|LocalMonero
The cli wallet should remove that message if it detects a n/n wallet.
-
UkoeHB
if you need a heartbeat test (a test that A) the other party is alive, B) they still have the privkey of their published multisig starter key), then you need it
-
UkoeHB
I disagree
-
UkoeHB
Including the post-kex round ensures the setup ceremony is an interactive protocol even in a 2-of-2. It's a property that may be important for some users.
-
binaryFate
would be nice if more people could contribute to gitian builds
github.com/monero-project/gitian.sigs/pulls
-
kgsphinx[m]
Sign me up. 🙂 Sounds like a weekend thing.
-
sech1
-
sech1
2 of them with failing checks though, but it's probably something on their side
-
binaryFate
doh, thanks sech1, I missed the merged ones
-
sech1
is my node acting up, or is it some kind of attack?
paste.debian.net/hidden/af9d8b36
-
sech1
all addresses belong to lionlink.net
-
sech1
the same IPs get blocked/unblocked on my second node too
-
moneromooo
Seems like an asshole trying to do things and probably failing. Is your CPU or I/O going through the roof while banning them (if you still are) ?
-
moneromooo
If yes, it might be the intent. You can manually man a subnet for longer than 24 hours (might take honest nodes with it though).
-
sech1
no, load average: 0.02, 0.09, 0.09
-
sech1
162.218.65.0/24, 91.198.115.0/24, 209.222.252.0/24
-
sech1
I'll just block them in iptables
-
selsta
Fork Networking again
-
selsta
I have seen tons of nodes with their IP in the past, running sketchy nodes
-
selsta
e.g. sending too large peer list
-
selsta
-
selsta
same IP as here, they are doing some kind of network surveillance, if you block one IP they connect from the next one
-
selsta
seems they had something misconfigured which causes all their IPs to get exposed
-
selsta
(and blocked)
-
sech1
Something like badcaca attack? Time to update DNS blocklist?
-
selsta
I blocked them on my nodes but yes would make sense to also update the DNS blocklist
-
selsta
moneromooo has to decide if banning the whole /24 is too much, though it seems they own almost every IP in the subnet
-
» moneromooo feels pinged
-
sech1
if you check my paste, it's literally every IP in those three /24 ranges
-
moneromooo
I'm fine with the 24s. If anyone complains, we can see. And probably laugh at them since they'll likely be the assholes.
-
moneromooo
Ah. I found the script that updates the list.
-
selsta
hope there is enough space to add 162.218.65.0/24, 91.198.115.0/24, 209.222.252.0/24
-
moneromooo
Added.
-
merope
Those ips are part of the weird ip ranges that I reported about a month ago