- 
vtnerd because one thing that was funky was how things "fell back to" dns seeds 
- 
vtnerd we didnt want to do with that i2p/tor 
- 
vtnerd or no sorry dns seeds are the primary I think 
- 
vtnerd thats why I did it like that 
- 
vtnerd I have to run for a bit, but it should be a matter of moving those seeds from `get_ip_seed_nodes()` to `get_seed_nodes()` (or to a function that `get_seed_nodes()` calls, etc) 
- 
selsta moneromooo: it should be correct, it did find i2p peers with this format 
- 
moneromooo I'm running with  paste.debian.net/hidden/34f90182 atm, seems good. 
- 
moneromooo Safer too. 
- 
» selsta testing 
- 
selsta .merge+ 6993 
- 
xmr-pr Added 
- 
xmr-pr moneromooo-monero opened pull request #6993: p2p: fix accessing non existent element of map 
- 
xmr-pr 
- 
selsta it takes a couple minutes until first tor peers show up but seems to work 
- 
selsta also no more issues with clearnet peers 
- 
selsta moneromooo: if you want to setup i2p with inbound at some point:  github.com/i2p-zero/i2p-zero/blob/master/mipseed.md
 
- 
moneromooo Thanks. 
- 
moneromooo I keep meaning to do it later :) 
- 
selsta it only takes 5 mins :P 
- 
moneromooo Cool, I'll do it later hten :P 
- 
selsta but it seems less stable than tor overall 
- 
selsta luigi1111w: ok 6993 and then tag 
- 
selsta for real this time™ 
- 
luigi1111w how many confirms 
- 
selsta lol 
- 
selsta I'm sure something is missing but we will only find out once you tag 
- 
selsta luigi1111w: ping me once you tagged, I also have to update the gui submodule 
- 
luigi1111w catch-22 
- 
luigi1111w it's up 
- 
nioc selsta: ping ^^ 
- 
selsta ty i saw it 
- 
iDunk 
- 
scoobybejesus mine agree 
- 
hyc just started a build 
- 
hyc and still no outbound tor connections. but I still see the node ID of the last outbound tor peer I had, on an inbound 
- 
hyc so for whatever reason, that direction seems to be preferred 
- 
hyc if this is going to be a normal thing now, where two peers always settle into a single direction, that's going to be problematic 
- 
selsta hyc: did you ever try without anonymous-inbound ? 
- 
selsta e.g. how stable out connections are then 
- 
selsta .merge+ 6747 6826 6829 6830 6849 6856 6858 6873 6892 6895 6898 6903 6913 6915 6920 6921 6922 6924 
- 
xmr-pr Added 
- 
selsta not sure if the tor / i2p seed node code works, at least it does not break anything clearnet related 
- 
selsta but I only managed to connect to a tor peer once out of various tries 
- 
selsta ok got it working twice now, seems random 
- 
selsta nice starting the daemon with --tx-proxy tor,127.0.0.1:9050,disable_noise means transactions show up almost instantly in the mempool like pre dandelion, 
- 
selsta nioc: ^^ 
- 
hyc ah, haven't tried without inbound yet 
- 
hyc ok. with that, my tor priority node is connected (outbound) 
- 
hyc I see several i2p handshake attempts but so far none of stayed open 
- 
hyc ... and just lost my tor out again 
- 
selsta they don’t last longer than 5 minutes or so 
- 
hyc Nov  6 22:50:55 highlandsun Tor[12437]: Tried for 120 seconds to get a connection to [scrubbed]:28083. Giving up. (waiting for rendezvous desc) 
- 
selsta yea I have that too often 
- 
selsta also Closed 1 streams for service [scrubbed].onion for reason resolve failed. Fetch status: No more HSDir available to query 
- 
hyc so it sounds like it's not a problem on the initiator's end 
- 
hyc something not working on the destination 
- 
hyc or within the tor network itself 
- 
hyc also getting these every 3-5 seconds 
- 
hyc Nov  6 23:01:29 highlandsun Tor[12437]: Invalid onion hostname [scrubbed]; rejecting 
- 
hyc continuous stream of those 
- 
selsta I don't see these 
- 
hyc I assume someone is trying to resolve an onion address it doesn't like 
- 
hyc mebbe I should turn off safelogging, to see what this offending address is 
- 
hyc hmph. it's the address I put as a priority node 
- 
hyc which I copied from mooo's tor script PR 
- 
selsta 
- 
selsta these two are mine ^ 
- 
selsta might want to try if you get the same message there 
- 
hyc cool 
- 
hyc same error for xwvz3ekocr3dkyxfkmgm2hvbpzx2ysqmaxgter7znnqrhoicygkfswid.onion:18083 
- 
hyc now I got a msg that my tor client is out of date 
- 
hyc Nov  6 23:10:06 highlandsun Tor[17514]: At least one protocol listed as recommended in the consensus is not supported by this version of Tor. You should upgrade. This version of Tor will eventually stop working as a client on the Tor network. The missing protocols are: Link=5 
- 
selsta 
- 
selsta hmm this also looks like a bug, I have 5 out connections but it writes "Unable to send transaction(s), no available connections" 
- 
selsta hmm I might know why, I had both tor and i2p enabled 
- 
selsta and no i2p connections 
- 
selsta yep removing i2p solved it 
- 
vtnerd outbound was preferred for i2p/tor because in the reverse direction a fixed identity is possibly known via the hidden service address 
- 
vtnerd I made a comment on that patch from earlier, all you did was suppress the error, when the more question was the origin 
- 
selsta vtnerd: "Tor/I2P seeds are still in the incorrect location" 
- 
selsta can you comment how it is supposed to look? 
- 
vtnerd in fact one of the purposes of the `.at` was to identify stuff like that 
- 
vtnerd I stated this earlier, theres a a function `get_seed_nodes()` with a switch for i2p and tor now 
- 
vtnerd I did this because the existing code tried dns seed first before trying hard-coded ip addresses. this isn't desireable for i2p/tor connections so it jumps to another list 
- 
selsta yes but they are inside `std::set<std::string> node_server<t_payload_net_handler>::get_seed_nodes(cryptonote::network_type nettype) const` function so I did not understand your comment 
- 
vtnerd I suppose I could've added calls to that list then "filtered" out nodes for the wrong network 
- 
vtnerd you put the seeds in that function 
- 
vtnerd like, the `.at` throw was intended to catch the existing error that just happened and now its ghosted, I'll just submit a pr in a second I guess to show you what I mean 
- 
selsta ok 
- 
gingeropolous selsta, thanks. turns out 66.85.74.134:18080 is not responsive to ssh 
- 
selsta would you prefer a new tag? or is the code we have now not dangerous and we can fix it in the next release? 
- 
gingeropolous and the other is Height: 2225120/2225120 (100.0%) on mainnet, not mining, net hash 1.64 GH/s, v14, 246(out)+27(in) connections, uptime 1d 6h 18m 46s 
- 
gingeropolous so i dunno why its not showing up as working 
- 
selsta the other one showed up again afaik 
- 
selsta hmm not sure, it is red 
- 
gingeropolous this one ( 104.238.221.81:18080 )  is running the latest patches 
- 
gingeropolous 66.85 is not 
- 
gingeropolous i am getting ERRORS in the log 
- 
selsta what kind of errors? 
- 
gingeropolous dunno why that would effect the p2p port though 
- 
gingeropolous net 
- 
gingeropolous lemme pastdump 
- 
gingeropolous 
- 
gingeropolous im not gonna figure out the 66.85 problem tonight :( 
- 
selsta do you run the block list on 104.238.221.81 ? 
- 
selsta or do you have them blocked using firewall? 
- 
gingeropolous not blocked. i assumed the new patches did the things that need doing 
- 
selsta no 
- 
selsta hmm 
- 
selsta which log level are you running? 
- 
gingeropolous 1 
- 
selsta so default or did you add --log-level 1 ? not sure what default is 
- 
gingeropolous i added log-level=1 
- 
gingeropolous i think default is 0 
- 
selsta can you do "set_log 2" 
- 
selsta save some logs 
- 
selsta and then do set_log 1 again 
- 
gingeropolous 
- 
gingeropolous thats 500 lines 
- 
selsta ok then save  gui.xmr.pm/files/block.txt somewhere on your disk and restart the daemon with --ban-list /path/to/list 
- 
gingeropolous aight, that nodes i son the list again 
- 
hyc ok, looks like I just needed a newer tor binary. no more Invalid onion hostname messages 
- 
selsta any changes to dropped peers for you? 
- 
selsta without --anonymous-inbound it seems like I constantly have out peers 
- 
selsta but with anonymous-inbound I have a lot of inbound peers but most of the time 0-2 out peers 
- 
vtnerd Im wondering if latency is causing the connection issues - timeouts are almostly certainly set too low 
- 
vtnerd 5 seconds for handshake and 2 seconds for ping 
- 
hyc I have tor out peers now, so yes that's improved 
- 
hyc and I've turned on anonymous inbound again, both in and out seem to be present 
- 
selsta vtnerd: are these timeouts for i2p / tor only? 
- 
selsta if yes we can try increasing them a bit 
- 
xmr-pr vtnerd opened pull request #6994: Fix i2p/tor seed nodes [0.17] 
- 
xmr-pr 
- 
vtnerd wait I was probably wrong about that, I'd have to look at the code again to see relevant timeouts 
- 
selsta ah now I see why I didn’t understand your seed node comment, I looked into master branch 
- 
vtnerd yes, master doesn't have any of that merge 
- 
vtnerd d 
- 
selsta yep, makes sense now 
- 
vtnerd I saw it pull some nodes through the seed nodes, so it should work (hopefully) 
- 
vtnerd *pull some non-seed nodes through a seed node 
- 
selsta it did not work for me hmm 
- 
selsta had the previous issue again 
- 
selsta it worked after a restart 
- 
vtnerd unfortunately your p2pstate may have tor and/or i2p addresses in the ip peerlist section from previous runs 
- 
selsta this was with fresh p2pstate 
- 
selsta will try again 
- 
selsta ok it worked the other tries now 
- 
selsta vtnerd: okay seems good, maybe I was too impatient 
- 
selsta yea ideally we would tag v0.17.1.3, though a bit annoying for those who did reproducible builds 
- 
selsta vtnerd: how much privacy do you lose when running tx-proxy with disable_noise? 
- 
selsta instead of without disable_noise 
- 
vtnerd one annoying thing about the implementation is that it tries to make a full-set of ip connections before moving onto tor or i2p 
- 
vtnerd its difficult to quantify how much privacy you lose. an attack with it disabled would be pretty advanced but plausible 
- 
vtnerd I did a wireshark with a snapt of bandwidth usage over time - which I showed in my monerokon presentation (I need to put that on the web btw) - and the usage was not uniform 
- 
vtnerd you might be able to spot when a tx is outgoing, but again, its not dead-simple since its indirect through statistics of data over the privacy network 
- 
vtnerd if we allowed block syncing and broadcasting over tor/i2p it might help mask/noise the traffic, but it would be more "by chance" unfortunately 
- 
vtnerd the thing thats difficult is that an isp can still see incoming/outgoing bytes at all times 
- 
vtnerd this is the "long-tail" though - we probably need to encrypt ip traffic too. I partially regret rejecting moo's tls patch based on openssl sketchiness. our best options are probably tls 1.3 or noise_xk (or another noise option). the latter has some optimization benefits and has some formal verifications iirc 
- 
vtnerd ive been writing a proposal for that to go into a github issue for discussion since there are a couple of things to consider 
- 
dEBRUYNE Do we need to retag/bump for 6994? 
- 
gingeropolous im still gettin those errors: 2020-11-07 12:15:27.714	[P2P8]	ERROR	net	contrib/epee/include/net/abstract_tcp_server2.inl:765	Setting timer on a shut down object 
- 
gingeropolous im building the tag now 
- 
hyc TLS makes a channel private, but it doesn't make the existence of that channel secret. 
- 
hyc noise is probably the only safe route. 
- 
xmr-pr xiphon opened pull request #6995: epee: readline_buffer - fix thread safety, fix sync() after stop() 
- 
xmr-pr 
- 
selsta dEBRUYNE: I would prefer so, we can also include 6995 and have an additional crash fix 
- 
selsta xiphon: can you also open 6995 against branch? 
- 
dEBRUYNE Let's include those two PRs and tag .3 then 
- 
xmr-pr xiphon opened pull request #6996: [release-v0.17] epee: readline_buffer - fix thread safety, fix sync() ... 
- 
xmr-pr 
- 
selsta .merge+ 6994 6996 
- 
xmr-pr Added 
- 
selsta monero-project/monero #6996 needs a second review, then we can tag v0.17.1.3 
 
- 
xmr-pr selsta opened pull request #6997: build: prepare v0.17.1.3 
- 
xmr-pr 
- 
selsta .merge+ 6997 
- 
xmr-pr Added 
- 
selsta .merges 
- 
xmr-pr 6747 6826 6829 6830 6849 6856 6858 6873 6892 6895 6898 6903 6913 6915 6920 6921 6922 6924 6994 6996 6997 
- 
selsta hmm 
- 
selsta luigi1111: 6994 6996 6997 and then tag v0.17.1.3 please 
- 
luigi1111w selsta done 
- 
selsta luigi1111w: ty now also gui, the remaining 2 PRs and tag 
- 
luigi1111w done 
- 
selsta binaryFate: will have binaries ready tomorrow, do you have time to upload them to the website? 
- 
iDunk 
- 
hyc ok, starting a v0.17.1.3 ... 
- 
scoobybejesus same hashes 
- 
selsta running v0.17.1.3 for the last 12 hours and did not have a single "no outbound peers" message (this is with tor / i2p tx-proxy and without anonymous-inbound) 
- 
selsta so it seems the issue seems to show up with anonymous-inbound due to the daemon preferring inbound over outbound 
- 
hyc same hashes here too 
- 
binaryFate <selsta> binaryFate: will have binaries ready tomorrow, do you have time to upload them to the website? <-- sure, might be afk 1h or 2 at some point but otherwise can do when ready