-
waywardsonAha.
-
m-relay<syntheticbird:monero.social> I think i've seen this subnet in the blocklist
-
waywardsonThe IP is connecting to my node, sending a ping command to stay alive. Then whenever I get a new transaction come in, it sends request 1007
-
waywardsonthis log level 1
-
m-relay<googlemozilla:matrix.org> What does request 1007 do?
-
waywardsonRECEIVED_NEW_TRANSACTIONS, like 50ms laters send 1007
-
waywardsonchatgpt says NOTIFY_NEW_TRANSACTIONS
-
waywardsonhmm
-
waywardson
-
as2333chatgtp?
-
waywardsonim just asking chatgpt what the hell command-100X means in the level 1 logs
-
waywardsonthere this weird node connecting to peoples node and doing funky stuff with transactions
-
waywardsonI think its trying to break dandelion++
-
m-relay<boog900:monero.social> it's known: monero-project/research-lab #126
-
m-relay<googlemozilla:matrix.org> Smells like Chainalysis.
-
waywardsonyea
-
m-relay<googlemozilla:matrix.org> Banning IPs won't be an effective solution, as that would only address a temporary symptom rather than the underlying problem. However, if we encourage users to use TOR or I2P when sending transactions, it could render eavesdropping attempts futile. What are your thoughts on this approach?
-
waywardsonsome of my nodes are both clearnet and tor
-
waywardsonI should probably add enable-dns-blocklist
-
m-relay<boog900:monero.social> it would be a good solution, however our Tor impl is not perfect: dl.acm.org/doi/abs/10.1145/3589335.3651487 (going to fixed). Plus with the amount of nodes they run it's a network security risk as well
-
m-relay<boog900:monero.social> it would be a good solution, however our Tor impl is not perfect: dl.acm.org/doi/abs/10.1145/3589335.3651487 (going to be fixed). Plus with the amount of nodes they run it's a network security risk as well
-
m-relay<googlemozilla:matrix.org> How will this be fixed?
-
m-relay<elongated:matrix.org> tx-proxy
-
m-relay<googlemozilla:matrix.org> Isn't this already supported?
-
m-relay<elongated:matrix.org> Use it ?
-
waywardsonboog900
-
waywardsonshould i stop having my nodes priority-node connect to each other
-
m-relay<elongated:matrix.org> Oh nvm this is a different issue
-
m-relay<googlemozilla:matrix.org> I don't understand.
-
waywardsonIf a public client sends a transaction through one of my public nodes
-
waywardsonand my public nodes choose my other public nodes as that anonymity stage for dandelion
-
m-relay<boog900:monero.social> by not inserting the nodes incoming onion address to the end of the peer list message + by randomly re-routing txs over, currently they only do 1 Tor hop
-
waywardsonthese trackers can connect to all my public nodes to try and pick up the fluff stage
-
waywardsonbut this is is probably unlikely
-
waywardsonmy nodes are unlikely to choose my priority nodes as the initial anonymity stage dandelion all time.
-
waywardsonits I assume 1/the number of nodes you are currently connected to
-
m-relay<googlemozilla:matrix.org> I don't think Tor is a good solution for the long term, though. Considering that most nodes are suspiciously located in Germany, which may be run by Interpol, is it possible to migrate to I2P instead?
-
m-relay<boog900:monero.social> only outbound connections are used to stem, I would just ban the nodes: github.com/Boog900/monero-ban-list/tree/main
-
waywardsonis priority node in bound our outbound connection? what if two nodes have priority-node for each other
-
waywardsonthat means they are always connected
-
m-relay<boog900:monero.social> you can use I2p with monero now, it gets priority for routing your txs if you set Tor as well.
-
waywardsonsays you have 50 outbound connections
-
waywardsonthen every 1/50 transactions you get, you'll send it to your other node your are priority connected to
-
waywardsonwe should probably disable sending txs to priority nodes imo
-
m-relay<boog900:monero.social> > is priority node in bound our outbound connection?
-
m-relay<boog900:monero.social> outbound
-
m-relay<boog900:monero.social> > what if two nodes have priority-node for each other
-
m-relay<boog900:monero.social> No clue, probably which eve connects first has the peer as outbound
-
m-relay<boog900:monero.social> ever*
-
m-relay<boog900:monero.social> > we should probably disable sending txs to priority nodes imo
-
m-relay<boog900:monero.social> why?
-
waywardsonyea, so the stem phase may be sent to your priority nodes
-
waywardsonand an advesary knows what your public nodes are
-
waywardsonthey can connect to your public nodes and listen for transactions
-
waywardsonobviously its unlikely that all your stem transmits will go to another priority node you have
-
waywardsonbuts its possible
-
m-relay<boog900:monero.social> I don't see how that's a problem, they would still need your node to connect to a spy and for that spy to be chosen as a stem
-
m-relay<sethforprivacy:monero.social> Done:
-
m-relay<sethforprivacy:monero.social> sethforprivacy/simple-monerod-docker cea9d8c
-
m-relay<sethforprivacy:monero.social> Note that anyone running the image WITHOUT setting any custom flags/configs will get the ban list automatically applied, but anyone customizing the config at all (most people) will need to add this line to their command or config:
-
m-relay<sethforprivacy:monero.social> `--ban-list=/home/monero/ban_list.txt`
-
m-relay<sethforprivacy:monero.social> OR
-
m-relay<sethforprivacy:monero.social> `ban-list=/home/monero/ban_list.txt`
-
m-relay<sethforprivacy:monero.social> The ban list itself is the latest from boog900 but is locally pinned as I didn't want to pull in an external repo I have no control over at build time. If there are major updates to the list please let me know.
-
m-relay<sethforprivacy:monero.social> I've subscribed to changes to the repo so will do my best to keep up with it.
-
m-relay<rucknium:monero.social> Seth For Privacy: Thank you!
-
waywardsonhmm
-
waywardsonIf I use a vps with an ipv6 range
-
waywardsonI can host at my house a proxmox node. On there I can put tiny stupidly underpowered (half fractional cpu, 1gb ram, lots of swap) vms on them. I can route the traffic from the vms to each ipv6 address on my vps
-
waywardsonthis can like fight the war against these fake proxy nodes
-
waywardsonthe nodes don't have to be fast enough for public rpc access, just used for p2p
-
m-relay<googlemozilla:matrix.org> As more and more legitimate nodes emerge, I assume that this threat will have fewer impacts, since the probability of a spy node being selected as one of the D++ nodes becomes much smaller?
-
waywardsonor dandelion++ gets replaced
-
m-relay<googlemozilla:matrix.org> As more and more legitimate nodes emerge, I assume that this threat will have fewer impacts, since the probability of a spy node being selected as one of the D++ leaves becomes much smaller?
-
m-relay<googlemozilla:matrix.org> What alternatives are there? I'm not aware of any.
-
m-relay<ofrnxmr:xmr.mx> Tor / i2p
-
m-relay<googlemozilla:matrix.org> Forcing only Tor and I2P usage?
-
waywardsonhonestly I agree, tor is just much better solution overall. A fully synced node doesn't use that much bandwidth anyway.
-
waywardsonWe need more nodes on tor. It's also a lot easier to host tor entry nodes than exit nodes
-
waywardsonBasically anyone can host a tor entry node, so, hopefully it wouldn't be too much of a strain on the tor network.
27 minutes ago