-
m-relay
<vtnerd:monero.social> Correct, if tor or i2p is specified, it does not use clearnet.
-
m-relay
<vtnerd:monero.social> Even if no outbound connections. I'm not sure of the best behavior here, but it seems like the user wouldnt want to use clearnet in many situations
-
selsta
vtnerd: i did a tx and it seems it didn't propagate, it stayed in pool
-
selsta
it did not print the "Unable to send transaction(s), no available connections" message
-
m-relay
<vtnerd:monero.social> Hmm. Did it print that before?
-
selsta
it prints it with the current release
-
selsta
with your patch it did not print it, but it also didn't propagate the tx, i did have Tor out peers
-
m-relay
<vtnerd:monero.social> Ok, I'll have to look again tomorrow. I can't reproduce your setup easily, as I have outbound i2p peers
-
selsta
maybe you can use --tx-proxy i2p,127.0.0.1:9050,0 (not sure if you can limit it to 0)
-
m-relay
<vtnerd:monero.social> selsta: did you have noise disabled on tor?
-
selsta
yes
-
selsta
both i2p and tor
-
m-relay
<vtnerd:monero.social> Yeah, i messed up this patch, I'll post a real fix tomorrow
-
m-relay
<vtnerd:monero.social> It's a little more involved than I thought
-
selsta
ty
-
m-relay
<im_m:matrix.org> Hi,
-
m-relay
<im_m:matrix.org> i am new in Monero blockchain , i have setup gui and created a wallet on testnet environment. Now i am synchronizing the block, i want to test how sent/receive works, but for this i will need testnet XMR, if anyone can help me to how can i get testnet facuet (XMR) for testing sent/ receive.
-
m-relay
<im_m:matrix.org> Thanks & Regards
-
m-relay
<sneedlewoods_xmr:matrix.org>
tools.rino.io/faucet/testnet
-
m-relay
-
m-relay
<im_m:matrix.org> Thanks for the response , but i am getting this error. can anybody help.
-
m-relay
<sneedlewoods_xmr:matrix.org> this is the wrong channel, try #monero-support:monero.social , but looks like you trying to send to a mainnet address
-
m-relay
<im_m:matrix.org> SNeedlewoods: this is my primary address currently
-
m-relay
<im_m:matrix.org> do i need to paste my primary address? although i have setup on testnet only.
-
m-relay
<syntheticbird:monero.social> Hello, here's a kind reminder that
monero-project/monero #9211 requires another review for approval. It is very small but clearing it would be appreciated.
-
m-relay
<endor00:matrix.org> Not sure if it directly impacts Monero software, but xz/libzlma versio s >= 5.6.0 have been backdoored (primarily affecting deb and rpm binary packages):
openwall.com/lists/oss-security/2024/03/29/4
-
selsta
our release binaries are unaffected, we don't build xz or liblzma
-
selsta
if someone compiles themselves it depends on their package manager, libunwind which is an optional monero dependency has liblzma and xz as a dependency
-
rbrunner
That backdoor really reads like a horror story. Lose all hope for computer security overall going into the mid-term future. I think it will become a lot worse before it gets better again.
-
rbrunner
It's possible the bad actor patiently submitted good PRs to earn trust for *two* years and then plant the backdoor:
news.ycombinator.com/item?id=39865810
-
m-relay
<syntheticbird:monero.social> It is indeed possible. But as someone said on hn, the ignorance was also due to build configs beings more and more gibberish nowaday that no one cared about verifying his imports as long as it was in the test folder
-
m-relay
<syntheticbird:monero.social> At least everyone have learned that supply chain attack isn't only based on source code but also development and build environment. Despite having being scared, I learn a lot
-
m-relay
<syntheticbird:monero.social> At least everyone have learned that supply chain attack isn't only based on source code but also development and build environment. Despite having being scared, I learned a lot
-
m-relay
<syntheticbird:monero.social> I refuse to admit the possibility that the maintainer was the one that wrote this highly obfuscated shell script
-
m-relay
<syntheticbird:monero.social> Using powershell for injecting malware on Windows is well known and some fully-bash malware exist. But this sample really took it to a whole new higher level of fuckery
-
m-relay
<syntheticbird:monero.social> I refuse to admit the possibility that the maintainer was the one that wrote this highly obfuscated shell script/binary
-
Nausicaa
tor depends optionally on liblzma as well
-
m-relay
<vtnerd:monero.social> selsta: hopefully this attempt works better
-
selsta
will try it later today
-
m-relay
<vtnerd:monero.social> I added an another log call too, in case all anonymity networks have no outbound connections