-
winircuser-980
a
-
normo
\quit
-
Kronovestan
selsta, new host my system auto blocked 100.19.74.83
-
selsta
auto block can have many reasons, I would prefer to only add IPs that are confirmed to do the +2 attack
-
Kronovestan
gotcha
-
selsta
Kronovestan: when was this ban?
-
selsta
also which version are you running?
-
Kronovestan
-
gingeropolous
is there a way to just restart the rpc server?
-
moneromooo
Send it signal 15, start it again.
-
gingeropolous
lulz. naw, i mean within monerod itself. I see during monerod boot up it says" rpc server initialized OK". I'd like to maintain my p2p connections etc, but just restart rpc.
-
moneromooo
It us unclear what that means. Closing the port and reopening it maybe ?
-
gingeropolous
i dunno. all i know is after a while, my high load public remote node can't get more wallet connections. restarting monerod "fixes" it. just wondering if there's an even hackier solution.
-
moneromooo
Do you have error messages ? If so, which ones ? Do you have loads of entries in /proc/`pidof monerod`/fd ?
-
binaryFate
v0.17.1.7 binaries are now available at
getmonero.org/downloads
-
Lyza
cheers
-
Inge-
1
-
sech1
Running 0.17.1.7 without block list and out-peers=64, let's see how it goes
-
Kronovestan
sech1, what's the command you do to start it with out-peers
-
sech1
Kronovestan --out-peers 64
-
hyc
or just type out_peers 64 at the monerod command prompt
-
hyc
the 0.17.1.7 release notes should have mentioned that the upgrade of OpenSSL to 1.1.1i was because of their latest security advisory
openssl.org/news/secadv/20201208.txt
-
hyc
since monerod can optionally use TLS on a various connections, it was vulnerable to DoS attack thru this vector
-
hyc
the release notes currently just mention the upgrade as if it was a routine change or just did it for no reason
-
hyc
which is rather misleading...
-
binaryFate
I can update them
-
binaryFate
-
hyc
sounds good
-
Kronovestan
once I incrase to outpeers 64 then the "bug" happens again where I'm off by 2 blocks ... (this is WITHOUT the ban list for testing purps and .7 release)
-
selsta
Kronovestan: it takes a couple seconds to get the peer kicked
-
selsta
stay at 12 out peers so that you connect to attacker nodes less often
-
selsta
if you don't want to use the ban list
-
dEBRUYNE
hyc, binaryFate: Will update the Reddit thread too
-
hyc
cool
-
binaryFate
-
Inge-
ok I'm getting differing hashes now, this is weird.
-
Inge-
-
dEBRUYNE
binaryFate: ty
-
dEBRUYNE
Inge-: Should be, yes
-
Inge-
used to be
-
Inge-
the former comes in at ~80MB, the latter at ~121MB
-
Inge-
the latter has the correct sha256sum
-
selsta
caching
-
selsta
try a private browser window
-
selsta
this should get fixed at some point
-
Inge-
this was wget and curl from the command line
-
Inge-
wait hang on... could be me being an idiot
-
Inge-
Mixed in CLI and GUI here, I think all is well. Still a bit twitchy since that time...
-
moneromooo
Kronovestan: can you post a level 2 log of when that happens ? Ideally from a couple of minutes before it happens.
-
xmr-pr
vtnerd opened pull request #7151: Fix byte_stream::put_n
-
xmr-pr
-
selsta
v0.17.1.7 definitely works for me, +2 nodes get kicked after ~10 seconds
-
selsta
luigi1111w: please upload binaries to github releases
-
selsta
and also update hashes.txt.sig
-
luigi1111w
plz check
-
Kronovestan
moneromooo, of course I'd be happy to... let me make it write the log to a file first. then restart the daemon
-
moneromooo
set_log 2
-
selsta
Kronovestan: are you sure the +2 peers stay connected?
-
selsta
luigi1111w: looks good