08:48:56 that sounds problematic :D > it just looks at the AD flag 11:38:17 You are trusting the DNS Server you set 11:38:27 That is why you should run local recursive dns servers 11:38:36 They check the chain of trust of delegation 11:45:17 I think monerod checks 11:45:28 It prints logs about getting the chain of trust etc 11:49:25 Does it have an embedded recursive dns client? 11:51:35 🤷‍♂️ 11:52:34 no 11:52:47 but cuprate can 11:52:57 did I talked to you about our lord and savior hickory-dns 11:53:23 secure, correct, rust-written dns resolver library, now in discount for the whole family 11:59:01 https://github.com/hickory-dns/hickory-dns 11:59:07 https://github.com/hickory-dns/hickory-dns/tree/main/crates/client 12:07:54 <321bob321> Hates self sign certs 15:47:21 Hello, I've read so far: 15:47:21 https://www.eddieoz.com/monero-under-attack-how-the-community-responds-to-selfish-mining-attacks/ 15:47:21 https://github.com/monero-project/monero/issues/10064 15:47:21 [... more lines follow, see https://mrelay.p2pool.observer/e/-MfSs7cKTWRieWN1 ] 15:49:15 I just hope Monero project future won't depend on a few domains registered at Gandi and "protected" behind a single Cloudflare account... 15:49:47 that's a lot of text 15:50:08 @syntheticbird: stop watching tiktok 15:50:18 @syntheticbird: And it's not LLM! 😀 15:50:27 @basses:matrix.org: no, i love reducing my brain size 15:50:31 @alfieedwards: odd thing to say 15:51:17 @alfieedwards: CHAT DONT LOOK AT ME LOOK AT THIS MESSAGE. 15:55:41 2) dnssec is and was always required. the code for this is already in Monero 15:56:12 1) the code is already in monero and it's an opt-in temporary bandaid before proper means are developed 15:56:57 also for 2) if using dns-checkpoint or a custom server that is possible. However, exposing the hardcoded IPs of each one opens you to DDoS 15:57:33 note the system is fail-safe and stopping checkpoints = no harm. node operators can also disable the opted-in flag and restart, and nothing else happens 15:58:31 DNS deployment for last comment also allows you to have a hidden server signing the records, then deploying to DNS secondaries. There is no need to have the active IP(s) in NS records be the alive ones. 15:59:05 I have shown this in checkpoints.gammaspectra.live example https://dnsviz.net/d/checkpoints.gammaspectra.live/dnssec/ 15:59:31 (one issuing server and several secondaries across different ISPs, but these ISPs cannot sign new records, only publish pre-signed zones) 16:02:46 keep in mind this is not intended to be permanent, nor the bandaid over the entire temporary deployment 16:03:33 as better options/decentralization is possible that can be deployed then, but waiting while bleeding and specifically having end user transactions invalidated and reverted, that's harmful 16:08:13 > also for 2) if using dns-checkpoint or a custom server that is possible. However, exposing the hardcoded IPs of each one opens you to DDoS 16:08:13 How can I host my own checkpoint server? There are different approaches to DDoS protection, reverse-proxies are just one of them. You may host on infrastructure where there are hardware firewalls (Palo Alto, etc) and exposed IP won't be the issue. 16:08:37 you cannot use reverse proxies for DNS servers in the way you see them 16:09:00 a checkpoint server is a normal DNS server with DNSSEC enabled 16:09:04 that serves a TXT record 16:09:20 you can use bind https://gitlab.isc.org/isc-projects/bind9 16:09:42 or any other DNS server that can support that 16:09:56 DNS servers can stay offline and only send pre-signed zones to the actual serving nameservers 16:10:09 As a proof of concept (that has been tested) also made https://git.gammaspectra.live/P2Pool/monero-highway#cmd-dns-checkpoints 16:10:20 How this fail-safe mechanism works? Won't unavailability of checkpoint nodes allow for reorg attacks to continue? > note the system is fail-safe and stopping checkpoints = no harm. node operators can also disable the opted-in flag and restart, and nothing else happens 16:10:37 this is a bare-bones DNS server with DNSSEC that serves a single zone, for serving the TXT record 16:10:57 yes alfieedwards. fail-safe means if anything would go wrong, it stops to a "safe" point 16:11:03 meaning no more checkpoints are issued 16:11:24 same as if domains are seized, they cannot pass 2/3rd entries 16:11:56 again. this is not a PERMANENT setup, but temporary, and once improved, it would spread further. The code already exists in Monero and is in use 16:12:07 https://docs.getmonero.org/infrastructure/monero-pulse/ 16:13:26 here are the details about MoneroPulse (the set of domains that would have the TXT records. they are already in use today, by default only as a warning, node operators have to opt-in to enforce these, and it would still be opt-in) 16:13:36 Checkpoints can be manually added, without DNS, by placing a checkpoints.json file in the .bitmonero directory of each node. 16:13:41 more than the 4 listed are added https://github.com/monero-project/monero/pull/10075 16:19:37 Thank you for explanation. I just hope there will be more moneropulse domains with different registrars than Gandi, even if it is a temporary solution. 16:20:29 Transferring the domains takes time, too 16:20:40 NS from DNSpod, etc, besides Cloudflare could also be used 16:21:10 Current test ongoing on testnet at this moment deploys checkpoints to Cloudflare DNS via batch API request 16:21:31 this is the script running these for the test https://git.gammaspectra.live/P2Pool/monero-highway/src/branch/checkpointer/cmd/checkpointer/main.go 16:21:40 rucknium also has an alternative script 16:22:03 sorry, wrong branch. it's master https://git.gammaspectra.live/P2Pool/monero-highway/src/branch/master/cmd/checkpointer 16:22:46 logic is -> each -checkpoint-interval (recommended 5 minutes), issue checkpoints at depth -checkpoint-depth (default 2) 16:23:05 depth of 2 means tip = 100, checkpoint would be placed at height = 98 16:24:03 if -checkpoint-interval is 0, checkpoints are issued as soon as a block is received, but same -depth rule is followed. blocks are received via ZMQ or RPC as fallback, and inclusion in previous checkpointed chain is enforced 16:24:27 you will see a lot of //sanity check / panic() calls to bail out 16:31:07 My alternative prototype checkpointing script is here: https://gist.github.com/Rucknium/daf4d52976fc4d32e378771f2e45f8f1 > Rucknium also has an alternative script 16:39:37 But how temporary are we talking ? > 1) the code is already in monero and it's an opt-in temporary bandaid before proper means are developed 16:39:51 A year ? More ? 16:40:26 this was discussed in MRL. I think a year and a half was thrown around as a number to have bandaids, but this doesn't mean "THIS" DNS checkpoints bandaids 16:40:52 there are more distributed ways of handling this. bandaid means anything before a hard-fork effectively 16:40:59 (or soft-fork) 16:41:34 if a better distribution than DNS checkpoints is available and deployed in N weeks, it'd be N weeks for this 16:41:58 if they need to stay longer, decentralizing these more would become priority 16:42:20 note for these to make sense people need to be making progress on the long-term solution. 16:42:55 DataHoarder: Yes because of how easily some registrars can get socially engineered to hand over accounts 16:51:07 These domains have been in use for many yrs 16:51:37 They are uses for dns checkpoints, dns blocklist, and dns monerod version updates 17:13:31 DataHoarder: Are masternodes considered? 17:13:47 Not really 17:13:55 what do you mean, for bandaid? or long term 17:14:33 (afaik for neither) 17:22:33 Well, for Tor network similar concept (of consensus in terms of various parameters among selected "authority" nodes hosted by Tor Project members) works since a long time without issues: https://consensus-health.torproject.org/ 17:23:01 I hope it will be effective also for Monero 17:26:03 @alfieedwards: masternodes = pos ? 17:29:23 If one were to think about it, it would indeed have to rely on PoS. Which is an absolutely bad idea And I hope Monero never goes for it, as it would got literally bought by big funds. 17:30:39 #monero 17:30:50 For the 17:31:10 #monero:monero.social 18:04:34 The 7th domain (.co) is now updating as well 18:06:24 🥳 18:06:52 all good from the checkpointer side? 18:07:38 yep, no unexpected behavior and very stable 18:11:15 Njalla is the first to kick your domain + they legally own it. Its weird that you mention them, while you previously correctly say "register domain directly" > <@alfieedwards> Hello, I've read so far: 18:15:40 i am not sure if that attack vector was taken serious or has relevance, but a ddos attack, especially timed in a short burst (knowing for example i will cause a chain reorganisation by publishing blocks) is very very very easy to accomplish and if outsourced cheaply executed. cloudflare wont help enough especially when talking [... too long, see https://mrelay.p2pool.observer/e/z9fxt7cKeFBhMm91 ] 18:15:40 attack scenario could be qubic having 18 blocks, alt chain whatever blocks, then ddos on the checkpoints for 1 hour. thats easily done. mind, that you dont have to worry about cfb necessarily, but about kids talking and backing crypto on discord :-) 18:16:42 note the checkpoints are DNS servers themselves 18:17:13 that'd mean taking down all DNS servers across the world offline or specifically for current testing that's Cloudflare DNS itself 18:17:36 > attack scenario could be qubic having 18 blocks, alt chain whatever blocks, then ddos on the checkpoints for 1 hour. 18:17:47 once a checkpoint is issued and received it sticks on nodes 18:31:23 Even if reorg successful, nodes will have the original chain. They will later receive checkpoint that conflict with attacking chain, and drop the attacking chain 18:32:28 If the checkpoint_ing_ node(s) blocks conflict with current checkpoints, no new checkpoints will be issued