-
m-relay
<rbrunner7:monero.social> Meeting in a bit more than 1 hour
-
m-relay
<jberman:monero.social> github . com errors are increasing on my end, pretty annoying
-
m-relay
-
m-relay
<jpk68:matrix.org> Getting this one too?
-
m-relay
<sneedlewoods_xmr:matrix.org> me too
-
m-relay
<jberman:monero.social> yep
-
m-relay
<rbrunner7:monero.social> Yes, and on several repositories not related to Monero as well. I think this time they have outdone themselves, congratulations.
-
m-relay
<rbrunner7:monero.social> Maybe they started to vibe-code? "Eating their own dogfood" as it was called many years ago?
-
m-relay
<jpk68:matrix.org> Pretty sure Microslop has openly bragged about vibecoding their products now
-
m-relay
-
m-relay
<rbrunner7:monero.social> Meeting time. Hello! (No link to the meeting's meta issue, because GitHub is borked right now)
-
m-relay
<jberman:monero.social> *waves*
-
m-relay
<sneedlewoods_xmr:matrix.org> hey
-
UkoeHB
Hi
-
m-relay
<jpk68:matrix.org> Hello
-
m-relay
<rbrunner7:monero.social> Alright, what are the reports about last week? Me: Could continue a bit with implementing Polyseed for the CLI wallet
-
m-relay
<koe000:matrix.org> Me: multisig slowly
-
m-relay
-
m-relay
<sneedlewoods_xmr:matrix.org> (hopefully) as you rbrunner recommended/imagined
-
m-relay
<sneedlewoods_xmr:matrix.org> also worked on some smaller reports and reviews
-
m-relay
<jpk68:matrix.org> Added support for standard I2P hostnames to the daemon (awaiting review); published an AUR package for Cuprate; attempted to improve fiat API support in the GUI
-
m-relay
<jberman:monero.social> me: mostly beta stressnet prep (binaries coming soonTM) and followup on PR's for release v0.18.5.0
-
m-relay
<rbrunner7:monero.social> jpk68: Looks like you pick up speed :)
-
m-relay
<jeffro256:monero.social> howdy
-
m-relay
<rbrunner7:monero.social> So, if you hope for binaries soon, jberman , no real blockers left I guess?
-
m-relay
<jeffro256:monero.social> me: also stressnet prep, plus some vuln handling
-
m-relay
<jberman:monero.social> a small log spam thing I've been discussing with jeffro, it's not a major blocker but I think would be nice to have done. And ofrn is still doing some testing AFAIK
-
m-relay
<jeffro256:monero.social> Will have that done in the next couple hours btw
-
m-relay
<rbrunner7:monero.social> I wonder how we will fare as an open source project in the light of a possible pick-up of AI found issues. Might get interesting, or maybe merely annoying if we have bad luck
-
m-relay
<rbrunner7:monero.social> As I see it, we can't do anything pro-actively, just wait what will happen. I think more or less the whole IT scene is now waiting for how things will turn out security-wise.
-
selsta
we received like 30 reports in the past month
-
selsta
so far the AI reports have been a couple interesting things and lots of more or less irrelevant edge cases
-
m-relay
<rbrunner7:monero.social> Was that above long-term average?
-
selsta
yes, previously it would be like 1 report per month
-
m-relay
<rbrunner7:monero.social> Ah, you mean only the AI reports were 30?
-
m-relay
<rbrunner7:monero.social> 1 per month - oh, ok
-
selsta
yes so 30x increase, though i assume we will have solved the low hanging fruits with the next release so let's see if the high amount of reports continue
-
m-relay
-
m-relay
<jpk68:matrix.org> jeffro256: Sorry for asking you this for the 10th time, but have you heard anything new from Ledger/Trezor?
-
m-relay
<jpk68:matrix.org> I also wonder if the Trezor dev who originally implemented support is aware of the possibility of opening a new CCS for it
-
selsta
to be precise he was never CCS funded, in the past Trezor paid for it
-
m-relay
<jeffro256:monero.social> Unfortunately, nope
-
m-relay
<rbrunner7:monero.social> I dimmly remember that with one of the two there is a potential problem with a new protocol that pretty complicated, the protocol to talk to the device?
-
m-relay
<jpk68:matrix.org> RIP
-
m-relay
<jpk68:matrix.org> Yeah, it's kind of ludicrous
-
m-relay
-
selsta
jeffro if you could prioritise 10431 and 10367 that would be great, last thing missing for the release
-
m-relay
<jpk68:matrix.org> They created a new protocol that can work over Bluetooth or (Web)USB, that includes a cusom NoiseXX handshake and like 4 different trasnport layers
-
m-relay
<jpk68:matrix.org> The spec document (linked above) is quite literally 10x longer than the 'legacy' one
-
m-relay
<rbrunner7:monero.social> That does not sound good.
-
MarkoPohlo
rbunner, re: the future of open source projects facing AI-found issues - that's where protocol modelling and formal verification come in!
-
m-relay
<rbrunner7:monero.social> MarkoPohlo: Hmm, yes, but I guess anything in such a direction will take time, and quite some effort in itself
-
m-relay
<rbrunner7:monero.social> Maybe stupid question, but was there a real *need* for a new protocol?
-
m-relay
<jpk68:matrix.org> No...
-
m-relay
<rbrunner7:monero.social> You could get the suspicion that they don't want other apps talking to their devices that eagerly anymore ...
-
m-relay
<jpk68:matrix.org> They also advertise their new device as 'post-quantum' despite the fact that the THP (Trezor Host Protocol) in its current state uses ECDH
-
m-relay
<jpk68:matrix.org> I think this is pretty disingenuous
-
m-relay
<jeffro256:monero.social> selsta: heard, ty will do that today
-
m-relay
<jpk68:matrix.org> Anyways, I've become sort of intrigued by how an implementation of this would work, and at first glance, it appears we would need to have some sort of abstraction layer that manages the encryption and state machine
-
m-relay
<jeffro256:monero.social> Yeah that new protocol seems like it was born in committee hell. Hopefully, once we have Rust toolchain integration, we can simply use Trezor's Rust library
-
m-relay
<jeffro256:monero.social> haven't looked into it though
-
m-relay
<jpk68:matrix.org> AFAIK Trezor doesn't have a Rust library for that. Just Python at the moment
-
m-relay
<rbrunner7:monero.social> Ah, there is a Rust library that speaks the new protocol? That's at least a shimmer of hope
-
m-relay
<jpk68:matrix.org> There is a BTC-only third-party implementation of it, but it's third party
-
m-relay
<jpk68:matrix.org> and tobtoht has also said it would not be preferable to add more Rust crates
-
m-relay
-
m-relay
<jpk68:matrix.org> How did I now know about that, lmao
-
m-relay
<jpk68:matrix.org> Apologies :)
-
m-relay
<jeffro256:monero.social> I also would prefer not to add more crates, but I would prefer less to spend a crap ton of time reinventing the wheel.
-
m-relay
<rbrunner7:monero.social> Well, I understand reluctance for adding more dependencies, but maybe it will turn out to be the lesser evil. Somehow I don't see somebody doing that protocol in C++
-
m-relay
<jeffro256:monero.social> Especially since Trezor THP is ridiculously complicated
-
m-relay
<rbrunner7:monero.social> Complicated == hight potential for bugs. Just saying :)
-
m-relay
<rbrunner7:monero.social> I would say what you want when you buy a hardware wallet is a solid step up in security. Maybe that is not that.
-
m-relay
<jpk68:matrix.org> The Rust library also doesn't have an insane amount of dependencies (11, to be exact)
-
m-relay
<rbrunner7:monero.social> Alright, looks pretty bleak then. Do we have something else to discuss today?
-
m-relay
<palinatolmach:matrix.org> It is, but FV is benefitting a lot from AI improvements in terms of proof generation and scalability. Having a protocol model also unlocks many downstream positive effects as it can serve as a reference for AI codege, audits, test generation, vulnerability detection, and so on
-
m-relay
<palinatolmach:matrix.org> It is, but FV is benefitting a lot from AI improvements in terms of proof generation and scalability. Having a protocol model also unlocks many downstream positive effects as it can serve as a reference for AI codegen, audits, test generation, vulnerability detection, and so on
-
m-relay
<rbrunner7:monero.social> Doesn't look like it. Thanks everybody for attending, read you again in 1 week!
-
m-relay
<sneedlewoods_xmr:matrix.org> thanks everyone
-
m-relay
<rbrunner7:monero.social> palinatolmach: I can't really see what you would want a "protocol model" for. Our node-to-node protocol?
-
m-relay
<rbrunner7:monero.social> And how would such a model look? Do you have some already existing examples?
-
m-relay
<ofrnxmr:monero.social> Yes sir
-
m-relay
<rbrunner7:monero.social> Looks like they are on it:
githubstatus.com
-
m-relay
<palinatolmach:matrix.org> It can be more coarse or fine-grained - we can have a more fine-grained model targeting one component, e.g. node-to-node, Carrot, consensus can all be modeled. This model can then be used to formally verify against, but it also unlocks detailed bug finding, since you have a very high-fidelity reference to check against, and so it can also be used to generate higher quality code an<clipped mes
-
m-relay
<palinatolmach:matrix.org> d tests with AI. It would also be useful as a reference for porting the code to another language, if needed. For just the verification though, with AI doing some of the proofs and existing tools like Aeneas for Rust, we can do source code-level verification in some cases, without the need for modeling. A higher-level model maps out how these different components (consensus, wallet<clipped mes
-
m-relay
<palinatolmach:matrix.org> , mempool, etc) interact, which is used to prove security properties over this model itself, but also outlines the security assumptions on the boundaries between these parts of the system explicitly, which makes issues there harder to miss.
-
m-relay
<palinatolmach:matrix.org> One example I can share is the Dafny model we've built for Optimism's Supernode:
github.com/runtimeverification/_aud…ny-models/op-supernode/dafny-models. It's still being worked on, but it has uncovered some simplifications in the design and code architecture, and just generally improving the quality of the audit we've don<clipped mes
-
m-relay
<palinatolmach:matrix.org> e by feeding as context to AI agents we've used for assisting the review; that's in addition to verifying security properties over this model.
-
m-relay
<palinatolmach:matrix.org> It can be more coarse or fine-grained - we can have a more fine-grained model targeting one component, e.g. node-to-node, Carrot, consensus can all be modeled. This model can then be used to formally verify against, but it also unlocks detailed bug finding, since you have a very high-fidelity reference to check against, and so it can also be used to generate higher quality code an<clipped mes
-
m-relay
<palinatolmach:matrix.org> d tests with AI. It would also be useful as a reference for porting the code to another language, if needed. For just the verification though, with AI doing some of the proofs and existing tools like Aeneas for Rust, we can do source code-level verification in some cases, without the need for modeling. A higher-level model maps out how these different components (consensus, wallet<clipped mes
-
m-relay
<palinatolmach:matrix.org> , mempool, etc) interact, which is used to prove security properties over this model itself, but also outlines the security assumptions on the boundaries between these parts of the system explicitly, which makes issues there harder to miss.
-
m-relay
<palinatolmach:matrix.org> One example I can share is the Dafny model we've built for Optimism's Supernode:
github.com/runtimeverification\_audits\_Ethereum-optimism\_optimism\_interopv2/tree/rv/dafny-models/op-supernode/dafny-models. It's still being worked on, but it has uncovered some simplifications in the design and code architecture, and just generally improved the quality of the audit we've <clipped mes
-
m-relay
<palinatolmach:matrix.org> done by feeding as context to AI agents we've used for assisting the review; that's in addition to verifying security properties over this model.
-
m-relay
<palinatolmach:matrix.org> It can be more coarse or fine-grained - we can have a more fine-grained model targeting one component, e.g. node-to-node, Carrot, consensus can all be modeled. This model can then be used to formally verify against, but it also unlocks detailed bug finding, since you have a very high-fidelity reference to check against, and so it can also be used to generate higher quality code an<clipped mes
-
m-relay
<palinatolmach:matrix.org> d tests with AI. It would also be useful as a reference for porting the code to another language, if needed. For just the verification though, with AI doing some of the proofs and existing tools like Aeneas for Rust, we can do source code-level verification in some cases, without the need for modeling. A higher-level model maps out how these different components (consensus, wallet<clipped mes
-
m-relay
<palinatolmach:matrix.org> , mempool, etc) interact, which is used to prove security properties over this model itself, but also outlines the security assumptions on the boundaries between these parts of the system explicitly, which makes issues there harder to miss.
-
m-relay
<palinatolmach:matrix.org> One example I can share is the Dafny model we've built for Optimism's Supernode:
github.com/runtimeverification\_audits\_Ethereum-optimism\_optimism\_interopv2/tree/rv/dafny-models/op-supernode/dafny-models. It's still being worked on, but it has uncovered some simplifications in the design and code architecture, and just generally improved the quality of the audit we've <clipped mes
-
m-relay
<palinatolmach:matrix.org> done by feeding as context to AI agents we've used for assisting the review; that's in addition to verifying security properties over this model.
-
m-relay
<palinatolmach:matrix.org> It can be more coarse or fine-grained - we can have a more fine-grained model targeting one component, e.g. node-to-node, Carrot, consensus can all be modeled. This model can then be used to formally verify against, but it also unlocks detailed bug finding, since you have a very high-fidelity reference to check against, and so it can also be used to generate higher quality code an<clipped mes
-
m-relay
<palinatolmach:matrix.org> d tests with AI. It would also be useful as a reference for porting the code to another language, if needed. For just the verification though, with AI doing some of the proofs and existing tools like Aeneas for Rust, we can do source code-level verification in some cases, without the need for modeling. A higher-level model maps out how these different components (consensus, wallet<clipped mes
-
m-relay
<palinatolmach:matrix.org> , mempool, etc) interact, which is used to prove security properties over this model itself, but also outlines the security assumptions on the boundaries between these parts of the system explicitly, which makes issues there harder to miss.
-
m-relay
<palinatolmach:matrix.org> One example I can share is the Dafny model we've built for Optimism's Supernode:
github.com/runtimeverification\_audits\_Ethereum-optimism\_optimism\_interopv2/tree/rv/dafny-models/op-supernode/dafny-models. It's still being worked on, but it has uncovered some simplifications in the design and code architecture, and just generally improved the quality of the audit we've <clipped mes
-
m-relay
<palinatolmach:matrix.org> done by feeding as context to AI agents we've used for assisting the review; that's in addition to verifying security properties over this model.
-
m-relay
<palinatolmach:matrix.org> It can be more coarse or fine-grained - we can have a more fine-grained model targeting one component, e.g. node-to-node, Carrot, consensus can all be modeled. This model can then be used to formally verify against, but it also unlocks detailed bug finding, since you have a very high-fidelity reference to check against, and so it can also be used to generate higher quality code an<clipped mes
-
m-relay
<palinatolmach:matrix.org> d tests with AI. It would also be useful as a reference for porting the code to another language, if needed. For just the verification though, with AI doing some of the proofs and existing tools like Aeneas for Rust, we can do source code-level verification in some cases, without the need for modeling. A higher-level model maps out how these different components (consensus, wallet<clipped mes
-
m-relay
<palinatolmach:matrix.org> , mempool, etc) interact, which is used to prove security properties over this model itself, but also outlines the security assumptions on the boundaries between these parts of the system explicitly, which makes issues there harder to miss.
-
m-relay
<palinatolmach:matrix.org> One example I can share is the Dafny model we've built for Optimism's Supernode:
github.com/runtimeverification\_audits\_Ethereum-optimism\_optimism\_interopv2/tree/rv/dafny-models/op-supernode/dafny-models. It's still being worked on, but it has uncovered some simplifications in the design and code architecture, and just generally improved the quality of the audit we've <clipped mes
-
m-relay
<palinatolmach:matrix.org> done by feeding as context to AI agents we've used for assisting the review; that's in addition to verifying security properties over this model.