-
br-m
<helene:unredacted.org> that sounds problematic :D > <DataHoarder> it just looks at the AD flag
-
DataHoarder
You are trusting the DNS Server you set
-
DataHoarder
That is why you should run local recursive dns servers
-
DataHoarder
They check the chain of trust of delegation
-
br-m
<ofrnxmr> I think monerod checks
-
br-m
<ofrnxmr> It prints logs about getting the chain of trust etc
-
DataHoarder
Does it have an embedded recursive dns client?
-
br-m
<ofrnxmr> 🤷♂️
-
br-m
<syntheticbird> no
-
br-m
<syntheticbird> but cuprate can
-
br-m
<syntheticbird> did I talked to you about our lord and savior hickory-dns
-
br-m
<syntheticbird> secure, correct, rust-written dns resolver library, now in discount for the whole family
-
br-m
-
br-m
-
br-m
<321bob321> Hates self sign certs
-
br-m
<alfieedwards> Hello, I've read so far:
-
br-m
-
br-m
-
br-m
<alfieedwards> [... more lines follow, see
mrelay.p2pool.observer/e/-MfSs7cKTWRieWN1 ]
-
br-m
<alfieedwards> I just hope Monero project future won't depend on a few domains registered at Gandi and "protected" behind a single Cloudflare account...
-
br-m
<syntheticbird> that's a lot of text
-
br-m
<basses:matrix.org> @syntheticbird: stop watching tiktok
-
br-m
<alfieedwards> @syntheticbird: And it's not LLM! 😀
-
br-m
<syntheticbird> @basses:matrix.org: no, i love reducing my brain size
-
br-m
<syntheticbird> @alfieedwards: odd thing to say
-
br-m
<syntheticbird> @alfieedwards: CHAT DONT LOOK AT ME LOOK AT THIS MESSAGE.
-
DataHoarder
2) dnssec is and was always required. the code for this is already in Monero
-
DataHoarder
1) the code is already in monero and it's an opt-in temporary bandaid before proper means are developed
-
DataHoarder
also for 2) if using dns-checkpoint or a custom server that is possible. However, exposing the hardcoded IPs of each one opens you to DDoS
-
DataHoarder
note the system is fail-safe and stopping checkpoints = no harm. node operators can also disable the opted-in flag and restart, and nothing else happens
-
DataHoarder
DNS deployment for last comment also allows you to have a hidden server signing the records, then deploying to DNS secondaries. There is no need to have the active IP(s) in NS records be the alive ones.
-
DataHoarder
I have shown this in checkpoints.gammaspectra.live example
dnsviz.net/d/checkpoints.gammaspectra.live/dnssec
-
DataHoarder
(one issuing server and several secondaries across different ISPs, but these ISPs cannot sign new records, only publish pre-signed zones)
-
DataHoarder
keep in mind this is not intended to be permanent, nor the bandaid over the entire temporary deployment
-
DataHoarder
as better options/decentralization is possible that can be deployed then, but waiting while bleeding and specifically having end user transactions invalidated and reverted, that's harmful
-
br-m
<alfieedwards> > <DataHoarder> also for 2) if using dns-checkpoint or a custom server that is possible. However, exposing the hardcoded IPs of each one opens you to DDoS
-
br-m
<alfieedwards> How can I host my own checkpoint server? There are different approaches to DDoS protection, reverse-proxies are just one of them. You may host on infrastructure where there are hardware firewalls (Palo Alto, etc) and exposed IP won't be the issue.
-
DataHoarder
you cannot use reverse proxies for DNS servers in the way you see them
-
DataHoarder
a checkpoint server is a normal DNS server with DNSSEC enabled
-
DataHoarder
that serves a TXT record
-
DataHoarder
-
DataHoarder
or any other DNS server that can support that
-
DataHoarder
DNS servers can stay offline and only send pre-signed zones to the actual serving nameservers
-
DataHoarder
-
br-m
<alfieedwards> How this fail-safe mechanism works? Won't unavailability of checkpoint nodes allow for reorg attacks to continue? > <DataHoarder> note the system is fail-safe and stopping checkpoints = no harm. node operators can also disable the opted-in flag and restart, and nothing else happens
-
DataHoarder
this is a bare-bones DNS server with DNSSEC that serves a single zone, for serving the TXT record
-
DataHoarder
yes alfieedwards. fail-safe means if anything would go wrong, it stops to a "safe" point
-
DataHoarder
meaning no more checkpoints are issued
-
DataHoarder
same as if domains are seized, they cannot pass 2/3rd entries
-
DataHoarder
again. this is not a PERMANENT setup, but temporary, and once improved, it would spread further. The code already exists in Monero and is in use
-
DataHoarder
-
DataHoarder
here are the details about MoneroPulse (the set of domains that would have the TXT records. they are already in use today, by default only as a warning, node operators have to opt-in to enforce these, and it would still be opt-in)
-
br-m
<rucknium> Checkpoints can be manually added, without DNS, by placing a checkpoints.json file in the .bitmonero directory of each node.
-
DataHoarder
more than the 4 listed are added
monero-project/monero #10075
-
br-m
<alfieedwards> Thank you for explanation. I just hope there will be more moneropulse domains with different registrars than Gandi, even if it is a temporary solution.
-
DataHoarder
Transferring the domains takes time, too
-
br-m
<alfieedwards> NS from DNSpod, etc, besides Cloudflare could also be used
-
DataHoarder
Current test ongoing on testnet at this moment deploys checkpoints to Cloudflare DNS via batch API request
-
DataHoarder
-
DataHoarder
rucknium also has an alternative script
-
DataHoarder
-
DataHoarder
logic is -> each -checkpoint-interval (recommended 5 minutes), issue checkpoints at depth -checkpoint-depth (default 2)
-
DataHoarder
depth of 2 means tip = 100, checkpoint would be placed at height = 98
-
DataHoarder
if -checkpoint-interval is 0, checkpoints are issued as soon as a block is received, but same -depth rule is followed. blocks are received via ZMQ or RPC as fallback, and inclusion in previous checkpointed chain is enforced
-
DataHoarder
you will see a lot of //sanity check / panic() calls to bail out
-
br-m
<rucknium> My alternative prototype checkpointing script is here:
gist.github.com/Rucknium/daf4d52976fc4d32e378771f2e45f8f1 > <DataHoarder> Rucknium also has an alternative script
-
br-m
<jfuffjcjkdrngisozkfng:matrix.org> But how temporary are we talking ? > <DataHoarder> 1) the code is already in monero and it's an opt-in temporary bandaid before proper means are developed
-
br-m
<jfuffjcjkdrngisozkfng:matrix.org> A year ? More ?
-
DataHoarder
this was discussed in MRL. I think a year and a half was thrown around as a number to have bandaids, but this doesn't mean "THIS" DNS checkpoints bandaids
-
DataHoarder
there are more distributed ways of handling this. bandaid means anything before a hard-fork effectively
-
DataHoarder
(or soft-fork)
-
DataHoarder
if a better distribution than DNS checkpoints is available and deployed in N weeks, it'd be N weeks for this
-
DataHoarder
if they need to stay longer, decentralizing these more would become priority
-
DataHoarder
note for these to make sense people need to be making progress on the long-term solution.
-
br-m
<jfuffjcjkdrngisozkfng:matrix.org> DataHoarder: Yes because of how easily some registrars can get socially engineered to hand over accounts
-
br-m
<ofrnxmr:xmr.mx> These domains have been in use for many yrs
-
br-m
<ofrnxmr:xmr.mx> They are uses for dns checkpoints, dns blocklist, and dns monerod version updates
-
br-m
<alfieedwards> DataHoarder: Are masternodes considered?
-
br-m
<ofrnxmr:xmr.mx> Not really
-
DataHoarder
what do you mean, for bandaid? or long term
-
DataHoarder
(afaik for neither)
-
br-m
<alfieedwards> Well, for Tor network similar concept (of consensus in terms of various parameters among selected "authority" nodes hosted by Tor Project members) works since a long time without issues:
consensus-health.torproject.org
-
br-m
<alfieedwards> I hope it will be effective also for Monero
-
br-m
<jack_ma_blabla:matrix.org> @alfieedwards: masternodes = pos ?
-
br-m
<alfieedwards> If one were to think about it, it would indeed have to rely on PoS. Which is an absolutely bad idea And I hope Monero never goes for it, as it would got literally bought by big funds.
-
br-m
<ofrnxmr:xmr.mx> #monero
-
br-m
<one-horse-wagon> For the
-
br-m
<ofrnxmr:xmr.mx> #monero:monero.social
-
binaryFate
The 7th domain (.co) is now updating as well
-
DataHoarder
🥳
-
DataHoarder
all good from the checkpointer side?
-
binaryFate
yep, no unexpected behavior and very stable
-
br-m
<longtermwhale:matrix.org> Njalla is the first to kick your domain + they legally own it. Its weird that you mention them, while you previously correctly say "register domain directly" > <@alfieedwards> Hello, I've read so far:
-
br-m
<longtermwhale:matrix.org> i am not sure if that attack vector was taken serious or has relevance, but a ddos attack, especially timed in a short burst (knowing for example i will cause a chain reorganisation by publishing blocks) is very very very easy to accomplish and if outsourced cheaply executed. cloudflare wont help enough especially when talking [... too long, see
mrelay.p2pool.observer/e/z9fxt7cKeFBhMm91 ]
-
br-m
<longtermwhale:matrix.org> attack scenario could be qubic having 18 blocks, alt chain whatever blocks, then ddos on the checkpoints for 1 hour. thats easily done. mind, that you dont have to worry about cfb necessarily, but about kids talking and backing crypto on discord :-)
-
DataHoarder
note the checkpoints are DNS servers themselves
-
DataHoarder
that'd mean taking down all DNS servers across the world offline or specifically for current testing that's Cloudflare DNS itself
-
DataHoarder
> attack scenario could be qubic having 18 blocks, alt chain whatever blocks, then ddos on the checkpoints for 1 hour.
-
DataHoarder
once a checkpoint is issued and received it sticks on nodes
-
br-m
<ofrnxmr:xmr.mx> Even if reorg successful, nodes will have the original chain. They will later receive checkpoint that conflict with attacking chain, and drop the attacking chain
-
br-m
<ofrnxmr:xmr.mx> If the checkpoint_ing_ node(s) blocks conflict with current checkpoints, no new checkpoints will be issued