-
maxwilliamson
hey devs, any plans to digital sign the packages?
-
hyc
PGP sign?
-
hyc
how is that more effective than signing the hashes?
-
Flenst
does rpc_access_tracking only track rpc access through the new payment system? called it, and got 404/empty as response
-
maxwilliamson
hyc: not PGP, but with a code signing certificate
-
maxwilliamson
it's like 60 bucks a year, dead cheap
-
maxwilliamson
and it will provide security, because 70% don't verify hashes when downloading and running stuff
-
selsta
maxwilliamson: what OS?
-
selsta
Is this code signing certificate for Windows? Because there is a separate one for macOS and probably no such thing for Linux.
-
rbrunner
maxwilliamson: Where did you see a proper code-signing certificate for USD 60? I just randomly looked them up at digicert and saw a price of around USD 500
-
rbrunner
Anyway, how many people will know that the code *must* be signed and really do not install if it's missing?
-
rbrunner
And what stops attackers to buy a code signing certificate themselves, or use a leaked one, and then count on people to not notice the different owner?
-
rbrunner
And yes, as selsta said, probably Windows-only solution anyway, so less than ideal
-
maxwilliamson
Yeah, and people use windows *a lot*
-
maxwilliamson
-
maxwilliamson
pretty cheap for security it will offer
-
maxwilliamson
A lot of people actually check for code signatures because windows warns when the program is not signed.
-
rbrunner
Right, people use Windows a lot, and maybe indeed it's the Windows people most in need of some sort of safety net, being not fluent with CLI tools, hashes etc.
-
rbrunner
The warnings of Windows about binaries that are not signed are a double-edged sword: So many programs are *not* signed that people may simply click the warning away, as they usually do
-
rbrunner
By the way, I also see the non-trivial question of who would be the owner of the certificate
-
selsta
Also how does a certificate work together with reproducible builds?
-
rbrunner
Well, I think the thing most in need of a certificate is the GUI wallet Windows installer, which indeed would become un-reproducible with a signing certificate, that's true
-
rbrunner
But I can't deny that quite in general a valid signature there would at least *look* good, make a good impression
-
rbrunner
"Signed by MEA"
-
rbrunner
For people who remember that :)
-
sech1
It has to be a real organisation/person to get code signing certificate.
-
rbrunner
Yes, I think so, and that would probably be "non-trivial" to agree on somebody / something
-
rbrunner
And to found something just for that is probably overkill
-
maxwilliamson
rbrunner: many programs are indeed signed and people notice that.
-
maxwilliamson
selsta: just code sign the installer. don't sign things that needs to be reproduced.
-
rbrunner
Agreed. But we are talking about the opposite: What do they do if it's not signed? Do they do the right thing and say "Ok, no Monero for me then with this thing here, have to investigate", or do they say, what the heck, I install
-
rbrunner
Why do you see no need to reproduce the installer? I am lazy, but I really should check the current installer, Fluffypony could have put anything in there :(
-
rbrunner
Installer builds are reproducible
-
selsta
rbrunner: GUI is not reproducible
-
rbrunner
Right, the GUI itself not, but the installer. And maybe the GUI itself will get reproducible in the future ... or is that a completely lost case?
-
maxwilliamson
at least tor code signs and still has reproducible builds
-
maxwilliamson
nvm, doesn't affect me. don't want to waste energy on this
-
rbrunner
-
selsta
rbrunner: No, first we migrate to cmake and then we try to make it reproducible :P
-
rbrunner
Ok. At least there is hope
-
selsta
I’ve been looking into notarizing the macOS builds, which is a step before signing I think.
-
rbrunner
maxwilliamson: Do you know of a good explanation how Tor does that, sign code *and* having reproducible builds?
-
rbrunner
As certainly only the key owner can sign, how other people can reproduce? Maybe I overlook something.
-
sech1
It depends on how hash of the binary is calculated. They probably have a hash _before_ signing and compare it and check that signed part of the binary is the same.
-
rbrunner
Yeah, that crossed my mind. But does not erase the fact that here you execute untrustworthy code before you get at the thing you can check the hash of, right?
-
rbrunner
Untrustworthy in principle only of course, because non-reproducible
-
rbrunner
It's signed after all
-
jonathancross
In bitcoin, you'll see separate sigs for signed / unsigned builds:
-
jonathancross
-
jonathancross
> Ok. At least there is hope
-
jonathancross
Yes, TheCharlatan has already made some progress on reproducible builds for the GUI. Still *very* far from done though. Maybe by the end of 2020 :-)
-
gingeropolous
make release-static just barfed all over me
-
gingeropolous
-
rbrunner
What do people think about the following idea of mine: While syncing make the daemon periodically display time estimates until fully synced
-
rbrunner
Estimated in a sane way, with suitably sliding averages, also taking into account verification speed differences pre/post RingCT, pre/post Bulletproofs, block size averages etc.
-
rbrunner
Thus (hopefully) also being able to give useful total estimates for syncing from scratch
-
rbrunner
Maybe make the estimates also available through daemon RPC so wallets could display them to users if they so wish
-
rbrunner
I could see me implementing that over the next few weeks
-
gingeropolous
yeah, sounds nice. would be great for gui
-
moneromooo
That was a pretty low priority thing I wanted to do. I'd totally ACK it if decent.
-
rbrunner
Puh. Lucky me that you didn't do that already then :)
-
rbrunner
Yeah, it has to be decent to be useful. I don't want to produce another "Now it's 1 hour, now it's 10 years" estimator like Windows still has
-
moneromooo
What might also be nice, and possibly a byproduct of this, would be to determine what is the bottleneck.
-
moneromooo
"You know, it'd go faster if you had a faster $THINGIE"
-
moneromooo
Noting that currently, sync is often still waiting for blocks to arrive.
-
moneromooo
Maybe less so now that you can set the span download cache size though.
-
rbrunner
I see.
-
rbrunner
Might be fun to try it on Testnet and Stagenet also, if it still gives good estimates in those "edge cases" maybe a good test
-
moneromooo
Testnet will likely give you PoW performance.
-
moneromooo
Hmm. Actually, I take that back. I'm not sure it will...
-
binaryFate
would be nice to be able to bundle 'set' commands in one line, or in a copy/paste friendly manner.
-
binaryFate
I'm creating a bunch of wallets, would like to get them to behave as I like easily. I think it would involve pasting a single line and then it would ask for password only once to set up everything.
-
binaryFate
What would be the intuitive syntax for this? Semi-colon? "set <command_1>; <command_2>; ..."
-
moneromooo
"monero-wallet-cli --wallet-file foo set foo bar ?
-
moneromooo
Oh, you want a single line, rather than two set commands ?
-
moneromooo
You can paste stuff with a newline in it, right ?
-
moneromooo
Or does that not work ?
-
binaryFate
Can paste stuff with newline but it asks for password for each of them
-
nonie
does the config file support set?
-
binaryFate
"monero-wallet-cli --wallet-file foo set foo bar" is nice, but I can't put two different set commands in there I think?
-
binaryFate
like "monero-wallet-cli --wallet-file foo set foo bar set foo2 bar2" does not seem to do anything about the second set command
-
TheCharlatan
missed the conversation this morning: Code signing plays well with reproducibility. This is the usual workflow: have someone sign the code with a key corresponding to the code signing cert. Have that somebody detach his signature from the binary with ossl signcode or a similar tool. Add the detached signature to the source tree. Run a normal reproducible build. Let builders attach the signature again when
-
TheCharlatan
the build is done, thus preserving reproducibility.
-
gingeropolous
is there something going on with rpc-payments? I had a node running fine then tried to add the rpc payment stuff and got this:
paste.fedoraproject.org/paste/lAxqeiFavDlHWnHpnsL2sQ
-
gingeropolous
hrm, found it
-
gingeropolous
so im running with --rpc-restricted-bind-port 18089, but the payment flags are causing a warning that I don't have a restricted rpc
-
gingeropolous
so it seems to want the --restricted-rpc flag, not the one that specifies the port
-
gingeropolous
hrmmm.. we lost the whole up arrow to repeat command thing?
-
iDunk
Is that with your static build ?
-
iDunk
Btw, did you solve the libusb-1.0.a thing ?
-
gingeropolous
no, i just compiled regular.
-
gingeropolous
instead of static
-
iDunk
Command history works here.
-
iDunk
dpkg -S libusb-1.0.a | sed s/\:.*// | xargs dpkg --get-selections
-
binaryFate
Sent a tx from wallet A to wallet B, wallet B said upong getting tranfser "NOTE: this transaction uses an encrypted payment ID: consider using subaddresses instead"
-
gingeropolous
did it have an encrypted payment id?
-
binaryFate
I am 100% sure there was no encrypted payment ID. Is the detection of encrypted payment ID or not based on a heuristic or?...
-
gingeropolous
huh, static just built fine iDunk . mystery
-
iDunk
It did here as well.
-
gingeropolous
rpc payment is working fine for me, at least on cli
-
gingeropolous
welp, no rpc payment functionality in the GUI
-
dEBRUYNE
binaryFate: Each transaction now has an encrypted payment ID attached
-
dEBRUYNE
Regardless of whether you specified it
-
luigi1111
maybe consider removing that warning? seems meh
-
rbrunner
Each transaction now has an encrypted payment ID attached <- Also the ones to subaddresses, which then would also trigger the warning?
-
rbrunner
Really seems like some false alarm to me
-
dEBRUYNE
That I am not sure of
-
rbrunner
Well, without that txs to subaddresses would stand out, which would surprise me immensely
-
binaryFate
Oh ok, I hadn't noticed before. This does not make sense to warn user about doing X if he did not do X.
-
rbrunner
Let's continue to speculate until moneromooo spoils all the fun with facts :)
-
rbrunner
And maybe recommending Y which then would result in the very same warning ...
-
binaryFate
<rbrunner> Well, without that txs to subaddresses would stand out, which would surprise me immensely <-- they did stand out in the past, or do you mean it going forward?
-
rbrunner
From the point when the feature with random payment IDs started. I assume every tx gets one, whether to address or subaddress
-
dEBRUYNE
Think this was implemented last HF
-
rbrunner
I think I saw that warning about 2 weeks ago for the first time.
-
rbrunner
Not reporting it, assuming it will get corrected quickly
-
rbrunner
Maybe that non-reporting was not so clever ...
-
binaryFate
it was reported, even on reddit
-
binaryFate
there was nothing new, just a misunderstanding of many people who did not follow previous discussions about subaddresses closely enough (including me)
-
rbrunner
You mean the preference? To nudge people now towards subaddresses?
-
dEBRUYNE
rbrunner: As far as I can see, the warning is new, an encrypted pID being added for each transaction is not
-
rbrunner
Sounds right
-
binaryFate
I mean that you can distinguish transfers to subaddresses or non-subaddresses
-
moneromooo
Speculate about... ?
-
moneromooo
Payments to a standard address that don't have payment id get a dummy short one.
-
moneromooo
Sending to subaddresses don't.
-
moneromooo
About the warning, maybe I did not PR something, IIRC it's supposed to warn for a non zero one only.
-
moneromooo
Well, it... compares without decrypting. That's why it triggers when it should not. Easy to fix.
-
rbrunner
Pardon my ignorance - why not just slap a dummy short one on transfers to subaddresses also, so they blend in as well?
-
rbrunner
Or are subaddress transfers already recognizable for other reasons, so that would be pointless?
-
moneromooo
There are no integrated subaddresses.
-
rbrunner
Right. I was thinking on a more technical, data-structure level. Do I remember correctly - encrypted payment ids go into txextra?
-
rbrunner
Or were the unencrypted ones?
-
moneromooo
Both.
-
rbrunner
So you could put one into txextra also for a transfer to a subaddress?
-
rbrunner
Just to make it not stand out - on that low level.
-
rbrunner
But I am sure the problem is my lack of detail knowledge, that must not be possible somehow, otherwise we would do it already
-
moneromooo
Eve can tell which outputs are to a subaddress. Currently anyway. So since there are no integrated subaddresses, it would achieve nothing but bloat.
-
rbrunner
Ok, thanks, thought so
-
moneromooo
6197 should fix this.
-
gingeropolous
-
gingeropolous
good question. will a tx file created by a new wallet release be able to be signed by an older release?
-
moneromooo
Depends whether the format has changed. To preempt the next question: about the recent release, I don't know whether it did.
-
hyc
gingeropolous: seems like a stupid question though. why wouldn't you just run the same new version on both the tx creator and the tx signer?
-
moneromooo
If exchnaging multisig txes, the keys might be controlled by several parties who do not update at the same time. Corner case I guess, yes.
-
moneromooo
Oh, I read the link. That is indeed annoying if you intend to never connect the cold wallet. That is basically impossible.
-
moneromooo
For now anyway. The current release can't grok ommiring/lelantus/whatever we'll use later, so cannot sign them.
-
moneromooo
For as long as we improve the tx protocol, this cannot be done.