07:35:51 cassact[m]1: why couldn't the subscription payment be Dollar-valued each time it's run? 07:36:16 the wallet could lookup the current exchange rate on some mutually agreed sources, say CMC and CoinGecko, average the two, and off you go 17:03:37 Yeah that’s true it could. 17:04:44 For reasons that are opaque to me in retrospect I dismissed the idea of having that kind of integration in the wallet 17:05:05 But yeah that would totally work 17:37:11 Is it just me or does the MAC CLI hash for the 16.0 download not match the website? 17:47:14 ignore - it's my fault. i am looking at the GUI. apologies 17:49:17 sorry for the false alarm - i appreciate that it was not helpful. 18:44:49 midipoet: thanks for giving me a heart-attack 18:46:44 Not gonna lie, had an elevated heart rate for a brief amount of time :P 18:47:17 -___- 18:47:54 I remember some earlier suggestions to have a bot periodically download the binaries and check signatures and hashes 18:48:07 although it was also pointed out that a super clever attacker could account for this 18:48:22 It could at least catch errors or less-sophisticated attackers 18:48:49 I like the idea 18:51:19 The GUI auto updater checks hashes and if there is a mismatch if would get displayed. 18:53:13 gui auto updater? 18:53:25 yep, gui has an updater now 18:53:36 v16? 18:53:37 you still have to accept it (and manually install after it got downloaded) 18:53:41 yes 18:53:48 but it automatically checks hashes and signature 18:53:54 from 2 maintainers 18:54:16 so valid signature of 2 maintainers are required that an update gets displayed which should make it hack proof 18:54:31 Are the verification keys hardcoded? 18:54:46 public keys of bF, fluffy and luigi are hardcoded 18:55:16 Where does it get the signed hashes? 18:55:27 first one: https://web.getmonero.org/downloads/hashes.txt 18:55:32 got it 18:55:36 second one: https://web.getmonero.org/downloads/hashes.txt.sig (by a different maintainer) 18:55:55 Is that the tool that mooo built, or something else? 18:56:05 I don't have the link handy to the mooo tool 18:56:08 not the same tool 18:57:02 Out of curiosity, has it been tested by pointing the updater to a different binary? 18:57:11 Even with matching (but obv. unsigned) hashes? 18:57:13 To test it 18:58:29 don’t understand, different binary but matching hash? 18:58:35 just not signed? 18:58:47 Bad wording: assuming that the adversary replaced the hash list so the hashes match the bad binary 18:59:16 In the earlier actual attack, the hashes didn't match... but one should assume that matching hashes would be something an adversary would do 18:59:45 The updater would need to be modified (or some local DNS hijinks played) to point to some different (but of course benign) binary 19:00:05 My real question is: how was the tool tested? 19:01:19 `--verify-update` flag 19:02:09 it requires the binary, signed hashes.txt with correct hash of binary, detach signature of hashes.txt form a different maintainer 19:02:35 Cool; do you know if these failure modes were tested? 19:02:44 I'm not implying they weren't; simply curious to know 19:03:30 if the hashes match the bad binary it still requires a valid signature 19:03:37 this was tested, yes 19:03:51 also step back a second 19:04:03 the alert is a DNSSEC-signed DNS record 19:04:10 and it checks 4 different domains 19:04:15 and requires 3 of them to be valid 19:04:22 so an attacked would need to compromise: 19:04:28 1. DNS records on 3 domains 19:04:40 2. the downloads on the website 19:04:48 3. the hashes file on the website 19:04:51 all without anyone noticing 19:04:54 :D 19:05:06 and forge sigs, right? 19:05:10 yes 19:05:22 That would be... extremely impressive 19:05:24 extremely 19:05:39 there is obviously still the possibility of an implementation bug 19:05:47 but we tested it quite well and mooo also reviewed it 19:05:49 Yeah, hence my question about testing failure modes 19:05:50 cool 19:06:33 I also suggested (to dEBRUYNE?) to make the blog/announcement language about checking hashes _and_ signatures more direct 19:06:41 Which was done AFAIK 19:07:02 so first-time downloads are verified properly 19:07:12 the ideal scenario in the future is that people download the GUI safely once and then the GUI will always automatically do the hash and sig checking 19:07:16 but yea the first download is it 19:07:17 yah 19:08:18 It'd be wild to also include options to check against the repro build results 19:08:26 Of course, there'd be a risk of sybil from that 19:08:44 and a malicious maintainer could disable that check or something, I suppose 19:08:54 sybil how? 19:09:07 If repro results were checked against a source that anyone could add to 19:09:16 we have https://github.com/monero-project/gitian.sigs/pulls 19:09:16 Bots could post random hashes or something 19:09:29 but obviously trusted people get merged first 19:09:31 Right, it'd need to be from a source that's reasonably trusted 19:10:11 Sybil's the wrong choice of term for that 19:10:53 But anyway, given that the failure mode for that could be a malicious maintainer, it's probably a bad signal anyway 19:11:21 The maintainer could bypass the check and just print "yep, matches!" 19:11:34 Only way to check reliably is your own local build 19:11:58 yep 19:12:08 reminds me that I wanted to do a tutorial for it 19:12:33 step by step tutorial :D 19:12:35 Gitian? 19:12:41 yep 19:12:44 Nice! 19:13:05 Along with a good explanation of why repro builds are important and useful? 19:13:47 someday gui :) 19:13:57 fluffypony: yeah, sorry about that. brain freeze on my end. happens a lot. 19:14:13 np 19:14:15 is there any solution for the GUI needing 10.12+ on MAC? 19:14:26 i am guessing not... 19:14:31 we can spin up a MacStadium box again and use it for builds? 19:14:51 Apple dropped support for it 3 years ago, now also Qt dropped support for it 19:14:57 so it becomes difficult to support at this point 19:18:06 https://support.apple.com/en-us/HT201222 19:18:16 yeah looks like 10.13 is still getting updates, but not 10.12 19:18:27 midipoet is asking about 10.11 19:18:29 last security update to 10.12 was Sep 2019 19:18:37 it supports 10.12 19:18:43 last security update for 10.11 was July 2018 19:18:56 hmm 2 years ok 19:19:00 wow. i didn't realise i was sooo far behind. 19:19:02 hmm 19:19:07 so we already support a version of macOS that no longer gets security updates 19:19:36 Qt 5.9 was the last LTS version that supported 10.11 19:19:38 but it is EOL now 19:19:44 and I don't think encouraging people to run a Monero wallet on that is a good idea 19:19:57 We should not use a framework without security updates 19:20:20 +1 19:20:22 CLI still supports 10.11 19:20:26 plus 10.13 runs on old Macs - 19:20:27 iMac: Late 2009 or later 19:20:28 MacBook: Late 2009 or later 19:20:28 MacBook Pro: Mid 2010 or later 19:20:28 MacBook Air: Late 2010 or later 19:20:28 Mac Mini: Mid 2010 or later 19:20:29 Mac Pro: Mid 2010 or later 19:20:35 so no reason not to update to 10.13 19:22:00 allegedly extended support for 10.13 will end in Sept 2020, and then everyone will need to be on 10.14, which changes the supported devices somewhat 19:22:23 you mostly need a 2012 or newer device to do that 19:22:47 i understand the issue. just trying to figure the best way to deal with the situation on my side... 19:22:55 midipoet: what prevents you from updating? 19:23:17 32 bit audio software 19:23:37 hmmmm - can't you run it in a macOS VM in Parallels? 19:23:48 Oh yeah, they dropped 32-bit support entirely, right? 19:23:50 didn’t only 10.15 killed 32bit? 19:24:02 so you can upgrade to 10.12-10.14 19:24:42 oh yeah - they come with warnings in everything but then don't work at all in 10.15 19:24:43 you may be right. i have to look into it properly. or move my monero wallet off this mac - which seems far easier. 19:25:22 either way, thanks for the security check up peeps ;-) 19:25:25 can’t wait to run GUI on ARM mac :D 19:25:44 soon^tm 19:25:56 Oh yeah, is that actually happening? 19:26:05 Heard rumblings on it for a while 19:26:13 apparently, will be announced this month 19:26:19 heard the same 19:26:22 I wonder how far into the line it'll extend 19:26:25 but first hardware will only come out next year 19:26:32 ARM on the pro line seems like a risky move 19:26:42 but maybe for the consumer line? 19:26:46 e.g. the airs 19:26:53 sarang: they'll do the Air and maybe bring back the 12" Macbook next year 19:26:55 and then Pro the year after 19:27:13 (I'm guessing) 19:27:41 there's already a large body of libraries and stuff with ARM support because of iPadOS and iOS 19:28:03 But so many major players will need to overhaul, no? 19:28:44 But I suppose "everyone needs to overhaul everything" is not unheard of for Apple =p 19:28:58 A lot of open source programs already support ARM 19:29:12 I guess some less supported niche apps will be more difficult 19:29:24 Sure, but I'm wondering about the stuff that Mac Pro folks might need that don't already 19:29:24 they'll probably also have an emulator for a few years 19:29:28 (I don't know much about that) 19:29:40 and they'll get Adobe, Microsoft, etc. to buy into it 19:29:48 Apple spent years not caring about the Pro untli the recent overhaul 19:29:56 Best not to upset those users once again 19:30:14 sarang: Mac Pro I agree, but MacBook Pro they can probably take the risk in 2 years 19:30:19 I still have a 2014 Pro one, these were the best IMO 19:30:21 That makes more sense 19:30:25 until 2015 19:30:26 I wonder what it'll do for battery life 19:34:08 good things hopefully :P 19:34:17 can’t get worse I guess 20:20:34 selsta: lol. i recently bought a 2012 Pro for someone. rock of a machine. 20:24:36 +1 older macbooks 20:24:50 +1 older thinkpads 21:15:27 12 Pro works fine if you get SSD, upgrade RAM, and avoid the newer OS 22:51:18 An update/overview of the website's security features could be a cool read