00:15:33 Hi everyone, I've just started my daemon and wallet-rpc on a debian machine on my home network, and I'm trying now to user nodejs to ask some informations about my wallet, but the response keep returning socket hang up, anyone can point my mistake? 00:23:31 Post the JSON you send in #monero. 00:35:08 I'm using monero-javascript, not sure how to get the JSON 02:23:38 kick update, I just fire the curl targeting wallet rpc from my application machine and from inside the server 02:24:15 both came with diferent results, I'm thinking that this issue is related to the port 38083 on the server side 03:16:16 Hi, I've encountered an issue with Monero GUI Wallet after a power failure where the wallet appears to have re-initialised. I've reported it as an isssue on GitHub, could someone look into Bug #7079 - https://github.com/monero-project/monero/issues/7079 09:01:40 There are multiple psychological hooks to keep Monero community members in place. Here is one: 09:01:40 https://vimeo.com/272691039 09:01:41 Notice that Scientologists don't stand on street corners saying "Would you like to talk about our Lord and Saviour, Xenu?" 09:01:41 Put yourself instead in the shoes of someone who spent $10,000 and 2-3 years of their life on their courses 09:01:42 And you get a bunch of bad sci-fi - you have two choices: 09:01:42 - either swallow a very bitter pill that you wasted a pile of money and a portion of your life 09:01:43 - or swallow the sci-fi, and from that point on, you will swallow _anything_ they tell you. 09:01:43 In the cult trade that's called "insider doctrine". 09:01:44 Would you like to talk about our Lord and Saviour of NASA, Howard Chu? 09:01:45 https://medium.com/@crypto_ryo/senior-nasa-engineer-calls-out-howard-chu-hyc-symas-monero-developer-on-being-a-fraud-db0b46688041 09:06:27 hi hi 11:46:36 If anyone is able to assist with my issue of Monero GUI Wallet having re-initialised after a power failure. I've move the bug to monero-gui - https://github.com/monero-project/monero-gui/issues/3256 11:50:42 El-Aurian: Let's continue in #monero 11:52:37 dERUYNE ok 12:35:11 Anyone has an opinion on https://github.com/monero-project/monero/pull/7072 (process N peers rather than drop) ? 12:45:50 It depends. Do any legit nodes break this limit? 12:46:35 Not that I know of. 12:46:43 If all v0.17 nodes don't send that many peers, then it's safe to enforce the limit 12:46:56 older versions don't matter obviously 12:47:30 If you launch a node with 256 out_peers and have 256 peers in your list, will it send all of them? 12:48:11 It's probably safer to just ignore excess peers 12:48:14 I think this is based on a misunderstanding. You don't send your current connection list. 12:48:22 But no. 12:48:27 ah, so what is sent there? 12:48:33 A random selection of your white list. 12:49:26 then it's safe to enforce the limit 12:49:44 FWIW, if we don't drop, it does not incentivize assholes to stop spamming. 140 kB handshake messages from the current asshole. 12:49:59 Also keepalives. 12:53:53 they'll just continue spamming with the maximum allowed number of peers, right? 12:54:52 For the record, my opinion is to drop such connections 12:56:39 Presumably. 15 kB messages, much better, 12:58:07 Hmm. I got an idea. Make it easy to plug to fail2ban. 12:58:52 very good idea actually 12:59:15 every time a connection is dropped (for whatever reason) it should be visible in the log with unique error message 12:59:18 at some log level 12:59:25 My fail2ban can't wait, hehe 13:00:48 on the other hand, this creates an easy way to block tor exit nodes, again... 13:01:08 people really need to use .onion nodes anyway 13:01:15 not clearnet nodes through tor 13:01:57 Lyza how do you use .onion nodes? 13:02:21 there's an option in the GUI to enable a SOCKS proxy 13:02:39 then you can just put onion nodes in the node field 13:03:20 is there a guide? I've never used SOCKS 13:04:07 Let me look. The dummy easy method would be to just download and run the tor browser then hit the tick box in the GUI, since the tor browser also starts a SOCKS proxy 13:04:18 this is more of a #monero convo though I think 13:05:15 There will be PoW on connect at some point. 13:05:53 IMO if the current protocol can be exploited by custom clients we should change it. 13:06:06 +1 selsta 13:06:26 (which will prevent mass banning of exit nodes, or at least make it costly) 13:08:02 adding a P2P_MAX_PEERS_IN_HANDSHAKE would make sense 13:08:09 and drop every connection that has > MAX 13:10:20 I'll do that. 13:10:54 Also, https://repo.getmonero.org/monero-project/ccs-proposals/-/merge_requests/192 - back to working more on monero after months mostly doing other stuff 13:11:29 nice 13:12:02 is the idea for PoW on connect to do some actual RandomX hashes for the receiving node a la RPC pay? or are you thinking like a separate system 13:14:10 Randomx is too heavy to verify sadly. 13:14:22 It will likely be Equix, or if not, keccak. 13:16:10 hmm, so something with asics for it? 13:16:16 that seem son the surface problematic 13:16:39 Equix does not have ASICs and if so it can be tuned. 13:16:55 Tor is looking into the same algorithm 13:17:19 oh okay I guess I thought that was a reference to equihash 13:17:24 It is not used for PoW so there is no incentive to ASIC it 13:17:37 gotcha. keccak is though right? 13:18:18 Most likely. It was designed to be silicon friendly. 13:18:29 It also very fast in software. 13:18:48 Guess blake2 would be faster even. Also ASICs probably. 13:48:01 Lyza: https://github.com/tevador/equix 13:49:32 ty for the link 15:29:17 .merge+ 7070 7071 7072 7073 15:29:17 Added 17:45:39 sech1: 7081 17:47:18 nice 18:28:39 #7082 only 2 more years? should have gone till 2023 exitscam 18:29:50 I've done two years every time before IIRC. It's arbitrary really. 18:31:22 Reason is, I've found a key from like 2000 or so someone's used, to which I no longer have the secret key :) 18:31:55 So I don't really want those keys to be kept alive forever. 18:33:01 I kinda figured it was arbitrary yeah. and 2023 just to align with the exttscam meme 18:33:29 It has an actual date, does it... 18:34:35 I don't know of an actual date, just "2023" according to fluffy 18:40:01 7054 is the only PR left that needs an approval before we can tag 18:43:05 7054 windows CI failed, is that just windows being windows? 18:43:55 the release branch does not have updated CI 18:44:12 7055 (master equivalent) passed 18:51:21 moneromooo in 7054, why do you call evict_host_from_white_peerlist() in the very end? it's inside "if(by_addr_it_wt == m_peers_white.get().end())" so the peer shouldn't be in the list already 18:51:48 To evict all the ones with different ports. 18:52:09 ah, and possibly IPV4 embedded in IPv6? 18:52:17 Yes. 18:56:07 7054 looks good at the first glance, I'll take a deeper look tomorrow 18:56:19 if it's not approved by then 20:06:53 max peers in handshake ban? xmrchain node is set to bajillions of peers 20:07:36 out_peers? 20:07:45 or what? 20:08:08 out-peers=1024 20:08:19 yea this is unrelated 20:08:37 word 21:13:49 Hi there. I want to get some info about the pow currently used in monero. Whats actually used? I've seen references to cryptonight / cryptonightr / randomx. Is this expected to switch soon? 21:14:06 I'm planning on implementing a miner for a new platform, and want to make sure I dont waste too much effort 21:14:28 mostly PoC / for fun 21:14:29 randomx, and we don't expect to switch soon. 21:14:30 this is the current PoW: https://github.com/tevador/RandomX 21:14:51 cool, many thanks