-
selsta
moneromooo: could you close 6987?
-
luigi1111w
.merges
-
xmr-pr
6983
-
luigi1111w
what's up
-
selsta
luigi1111w: guiii merges
-
luigi1111w
yes but does that help :)
-
selsta
also 6983
-
selsta
help how
-
selsta
ping vtnerd, if you can PR 6897 to release-v0.17 branch in the next hours we can include it in the next release, else we will include it in the next one
-
selsta
in this release*
-
Snipa
.msrges
-
Snipa
.merges
-
xmr-pr
Merge queue empty
-
hyc
should we put #6948 into 0.17? seems pretty useful
-
hyc
hmmm. I started with --add-priority-node zbjkbsxc5munw3qusl7j2hpcmikhqocdf4pqhnhtpzw5nt5jrmofptid.onion:18083 and I have no outbound tor peers again
-
hyc
it was definitely connected when I started up
-
hyc
but definitely gone now, and not present in print_pl output either
-
selsta
We can include it if someone reviews it
-
Snipa
.merges
-
xmr-pr
Merge queue empty
-
Lyza
hyc if you were talking about dropped i2p connections, I think resetting i2p or clearing i2p state or something along those lines may be a big help, because after rebooting my server yesterday my outbound i2p connections all of a sudden started lasting 10x longer. now though, about 24 hours after the reboot, out connections are back to only lasting 3 - 5 minutes
-
selsta
I found Tor more stable but that might be due to more Tor nodes
-
Lyza
do you mean individual connections were more stable, or you dropped all the OUT connections at once less often? The latter would make sense but I can't see how more nodes would impact the former, which is the real head scratcher for me, why connections are dropping after ~5 minutes
-
Lyza
also, I feel like the daemon should actively try to maintain at least two (maybe more?) anonymity network peers when that is enabled, so that number of connections is less likely to go to zero. As it stands, if they aren't priority nodes, the daemon just seems to, Idk, not care that much that there are no out connections. It seems lazy about maintaining them. y'know?
-
selsta
Lyza: did you try with both Tor and I2P?
-
Lyza
nah I've never set up tor for my node, it's i2p only
-
Lyza
I thought i2p was going to end up as the primary solution and kind of don't want the association of running tor from my IP
-
Lyza
I get the impression there are more tor peers rn, so perhaps it's worth considering, but using only i2p is largely functional, despite the issues
-
Lyza
I'm sure having more peers to rotate between is better for privacy though
-
hyc
anyone know how to get from an i2pd private.dat to the keypair used in i2p-zero's tunnels.json ?
-
hyc
looks like keyinfo just gives me one of the 2 keys
-
hyc
hmm. I had out and in tor connection to same node ID
-
hyc
then the out connection dropped
-
hyc
and now I have no out tor connections
-
knaccc
hyc i have no idea what format private.dat is in, but I do know that in tunnels.json, the format is seckey,pubkey where both are base64 encoded. see
github.com/i2p-zero/i2p-zero/blob/m…ro/i2p/zero/TunnelControl.java#L450
-
hyc
thanks
-
hyc
just wanted to use the vanity address I had already generated, but not getting the formatting correct. looks like tunnels.json omits trailing base64 padding chars
-
knaccc
hyc i use the i2p java base64 encoder/decoder library net.i2p.data.Base64
-
knaccc
so i use their code to do the encoding, not mine
-
xmr-pr
mj-xmr opened pull request #6989: Clang IWYU header checker script
-
xmr-pr
-
hyc
knaccc: I think you're outputting more than just seckey,pubkey though. notice that in your tunnels.json output, the beginning of your "seckey" field is always identical to the pubkey field. it just has some extra stuff appended.
-
hyc
ah I see.
-
hyc
createDestination writes out destination,privatekey,signingprivatekey
-
hyc
and d.writeBytes writes out pubkey+signingPubkey
-
hyc
you're writing the destination info twice
-
hyc
that is, what you're writing as "seckey" is actually both sec+pubkey already. and then you write pubkey again.
-
luigi1111w
.merges
-
xmr-pr
Merge queue empty
-
luigi1111w
selsta plan is what
-
knaccc
hyc ah yes, you're right. i think i2p likes to keep the seckey and pubkey together for the same reason that other encryption libraries do, which is because there are catastrophic consequences (secret key revealed) under certain signing circumstances if you ever mix the secret key from one pair with the public key from another
-
knaccc
and i stored them separately so that i don't cause a catastrophic situation by failing to extract the pubkey from the seckey/pubkey string properly
-
hyc
ok. and looks like I was wrong about the padding discrepancy
-
hyc
the private.dat file has 4 extra bytes on the pubkey, so its base64 output needed padding
-
knaccc
you must have a vanity address you're really proud of :)
-
hyc
lol it took all day yesterday to find :P
-
knaccc
haha
-
hyc
and now I'm spending all day today to figure out how to use it !!
-
knaccc
yeah waiting for i2p warmup isn't fun
-
xmr-pr
vtnerd opened pull request #6990: Add support for i2p and tor seed nodes [0.17]
-
xmr-pr
-
dEBRUYNE
luigi1111w: Think 6985 and 6990 and then tag
-
dEBRUYNE
^ selsta, moneromooo: please confirm
-
hyc
ok I have 2 outbound i2p connections now. again, had my initial outbound tor connection too but it's dropped already
-
moneromooo
I could also add my tor seed node. It's going to conflict with selsta's PR so will have to be rebased.
-
moneromooo
6897 (minus the moot one)
-
moneromooo
wait, no, wrong one
-
moneromooo
6874
-
» moneromooo removes the other one
-
moneromooo
And now 6991 for the branch.
-
xmr-pr
moneromooo-monero opened pull request #6991: p2p: add a tor seed
-
xmr-pr
-
selsta
dEBRUYNE: and 6991 yes
-
dEBRUYNE
Perhaps we can tag tonight?
-
dEBRUYNE
Would probably be easier for the maintainers if 6991 was added to selsta's PR, right?
-
selsta
should not take long to rebase
-
selsta
ok luigi1111w please merge 6985 and 6990
-
selsta
or wait, merge 6990 and 6991, then I will rebase 6985
-
selsta
.merge+ 6990 6991 6985
-
xmr-pr
Added
-
moneromooo
I can rebase too, no bother.
-
hyc
should I add #6948 to 0.17 branch?
-
selsta
I would be okay with including it but someone has to review it
-
selsta
though PR does not look too big
-
hyc
fairly trivial PR, yes
-
hyc
but I didn't see it still needed review. never mind, if there's no time for reviews
-
hyc
I wonder if tor and i2p themselves have idle timeouts, and that's why the connections keep dropping
-
hyc
all of my i2p and tor out conns are gone now
-
hyc
still have several tor inbound
-
selsta
my i2p connections drop often but tor seem more stable
-
Lyza
I regularly have inbound i2p connections that last (according to monerod) for thousands of seconds, 10x longer than my outbound connections. it leads me to believe that outbound i2p connections are stable for at least some users sometimes, since each in connection must be somebody else's out connection
-
Lyza
either that or the long-lived incoming connections have silently idled out or something
-
moneromooo
monerod sometimes lists connections that don't exist.
-
moneromooo
90% confidence maybe.
-
moneromooo
There's a longstanding but about this.
-
Lyza
well rn I have 4 inbound i2p connections that have lasted between 3500 and 70,000 seconds. my longest lived OUT connection is 163 seconds
-
Lyza
is it bad enough that you think maybe none of those 4 inc connections actually exist?
-
moneromooo
No.
-
moneromooo
It is rare AFAIK.
-
moneromooo
Though who knows, maybe tor/i2p trigger this easier.
-
Lyza
yeah could be
-
luigi1111w
.merges
-
xmr-pr
6985 6990 6991
-
luigi1111w
if this is the final list, I'll merge and tag tonight yet
-
luigi1111w
please quadruple confirm
-
moneromooo
Looks right.
-
moneromooo
3 more confirms required :)
-
selsta
yes
-
selsta
final
-
selsta
hmm
-
selsta
not final merge list
-
selsta
have to do one more PR
-
selsta
-
selsta
.merge+ 6992
-
xmr-pr
Added
-
moneromooo
done
-
selsta
ok now the list is final
-
» selsta keeps forgetting about bumping version
-
luigi1111w
double final
-
luigi1111w
.merges
-
xmr-pr
6985 6990 6991 6992
-
selsta
moneromooo: please reapprove
-
» selsta runs
-
moneromooo
Hmm. I don't know... How about 3 instead ?
-
moneromooo
(done)
-
selsta
triple final now
-
selsta
luigi1111w: but don’t tag yet
-
xmr-pr
selsta opened pull request #6992: build: prepare v0.17.1.2
-
xmr-pr
-
selsta
moneromooo: can you test
monero-project/monero #6990 with a freshly deleted p2pstate ?
-
selsta
second time this happened now
-
selsta
it does not find any peers
-
selsta
vtnerd: ping also
-
moneromooo
OK, will be a bit.
-
luigi1111w
6991 conflicts
-
selsta
-
moneromooo
fixed
-
selsta
moneromooo: this is with tor / i2p seed nodes merged, in case it makes a difference in testing
-
selsta
so basically release-v0.17 branch
-
luigi1111w
.merges
-
xmr-pr
6991 6992
-
selsta
luigi1111w: so tag has to wait until mooo looked into this issue, but yea do merge the remaining gui PRs in the meantime
-
luigi1111w
ok tag up
-
selsta
ok lol
-
luigi1111w
(haha kidding)
-
selsta
don’t troll me :D
-
selsta
can someone give vtnerd voice?
-
vtnerd
ok, I ran a quick test with a fresh data directory and it still connects to seed nodes
-
vtnerd
was the issue seen with tor/i2p ?
-
selsta
no
-
selsta
normal seed nodes
-
selsta
try the release-v0.17 branch
-
vtnerd
I did
-
vtnerd
it started downloading mainnet blocks
-
selsta
I still have the daemon open and print_cn returns nothing
-
selsta
maybe try a couple times?
-
moneromooo
2020-11-06 23:42:04.111 E Exception at server worker thread, what=map::at
-
moneromooo
That kills the thread, no more attempts to connect.
-
selsta
ok I’m not imagining things :D
-
moneromooo
Unless you just imagined what I typed...
-
vtnerd
I just moved the default ~/.bitmonero directory too in case it picked that up through some bug, and it still started connecting+downloading
-
moneromooo
It did so a few times here, and borked twice.
-
moneromooo
-
moneromooo
Maybe an invalid seed node address ?
-
selsta
two are offline currently according to
community.xmr.to/xmr-seed-nodes
-
vtnerd
hmmm, if a seed node for the wrong zone ends up in a different m_peerlist it should bjork I think
-
selsta
gingeropolous: these are your seed nodes ^^
-
vtnerd
so `.onion` in the `ipv4.m_peerlist`
-
selsta
can you take a look?
-
vtnerd
if you were using one of your patches with tor/i2p seed nodes you cannot put in the same list
-
selsta
-
selsta
how else should we add them
-
vtnerd
where the ipv4 seeds go. it was easier to have them completely separate. we might need extra checks that don't hit a hard error in there, buts likely the cause (a tor/i2p seed being loaded into the ipv4 list without enabliong tor/i2p)
-
moneromooo
Is s3l6ke4ed3df466khuebb4poienoingwof7oxtbo6j4n56sghe3a.b32.i2p:18080 a valid I2P address ?
-
moneromooo
I don't know how to tell :)
-
vtnerd
yeah the function is called get_ip_seed_nodes() now
-
moneromooo
And I don't have i2p setup here, and it's trying to connect to it.
-
vtnerd
get_seed_nodes() is what you want to poke at
-
vtnerd
it was funky, but thing was we didn't want to ranomdly select from i2p/tor peers when randomly selecting an ipv4 node
-
vtnerd
I could've done a filter from a master list, but it seemed just as easy to put them in distinct spots. Perhaps this was the worse approach?