-
selsta
.merges
-
xmr-pr
7086 7098 7099 7161
-
selsta
.merge+ 7175 7176
-
xmr-pr
Added
-
ziyzhou[m]
v0.17.1.7 is being killed due to OOM after running several hours. Is it a known issue? Never seen this in previous version.
-
selsta
ziyzhou[m]: do you run a public rpc node?
-
selsta
also how much RAM does your system have?
-
ragn4
.network
-
ErCiccione[m]
I wrote in monero but i think it fits here too: I'm spinning another node and i used --add-priority-node to point to another node of mine which is fully synced and doesn't have problems (at least afaict).
-
ErCiccione[m]
The problem is that this node gets automatically banned by my syncing node. It's the only node that it's getting banned as far as i can see.
-
ErCiccione[m]
Ok. Right now my node blocked another node too
-
selsta
ErCiccione[m]: are both nodes on the same network?
-
selsta
hmm, can you run with --log-level 1 and check what they are getting banned for exactly?
-
ErCiccione[m]
same network -> yes. I started to sync with add-exclusive-node pointing at the same node.
-
ErCiccione[m]
sure
-
ErCiccione[m]
alright, let's see if i catch it
-
andreasromer
Will you HODL Monero or dump it for Tari when it comes out?
-
ziyzhou[m]
selsta: yes, public node, 2G RAM.
-
selsta
ziyzhou[m]: 2GB might be not enough for a public rpc node, a regular node should be fine with 2GB RAM
-
selsta
also there currently seems to be some DoS attack against public rpc nodes which can cause higher CPU usage
-
selsta
v0.17.1.8 should have mitigations against the current DoS attack
-
ziyzhou[m]
ok
-
selsta
.merge+ 7172
-
xmr-pr
Added
-
ErCiccione[m]
¯\_(ツ)_/¯ no more bans
-
coffeeroaster
I got the gui and CLI wallets compiled and running on the Raspberry PI 4 (64 bit) by disabling hardware AES. Any drawbacks (besides slow mining) that I should be aware of?
-
moneromooo
None that I can think of.
-
moneromooo
Note thatn you do a little bit of that mining when verifying txes.
-
coffeeroaster
at the impressive rate of 40 hash/sec
-
coffeeroaster
moneromooo: good to know thanks!
-
coffeeroaster
What's the best way to get involved with development?
-
moneromooo
You could look at github issues and see if you like anything there.
-
moneromooo
Then discuss here or there.
-
moneromooo
The best way to get into a project is to see something that annoys you and fix it.
-
moneromooo
Though of course it has to not go agianst the project's goals. Like, for an extreme example, say you're annoyed you can't see amounts on a block explorer, you don't get to fix it :)
-
moneromooo
Or you could list what you're good at, what you like doing, and people here might have ideas for you.
-
coffeeroaster
moneromooo: thanks! I'll take a look. C/C++, system stuff is my bg.
-
moneromooo
Expand on system ?
-
coffeeroaster
general OS unix/linux/kernel internals
-
moneromooo
Familiar with network ?
-
coffeeroaster
moneromooo: that too but more from a VOIP perspective (NAT/TURN) etc.
-
moneromooo
One longstanding thing we've been needing is someone who groks networks well to improve the DoS resistance of our net code.
-
coffeeroaster
sounds interesting. Do you have any bg info I can read on the issue?
-
coffeeroaster
I'm assuming this is beyond the blacklisting support added recently?
-
moneromooo
Hackerone entries I think.
-
coffeeroaster
do you have a link?
-
moneromooo
Yes, I'm thinking mostly of things like QoS, connection timeouts based on in/out traffic (ie, slowloris type of attacks), etc.
-
moneromooo
Hmm. The search thing on hackerone doesn't seem to work (or needs JS maybe).
-
moneromooo
Anyway, there wasn't much really IIRC.
-
coffeeroaster
so something like maintain an active table of existing connections and when something seems wonky have a real-time reaction (block, etc.) ?
-
moneromooo
We have a drop/block system. It's more about tuning detection of what looks wonky.
-
moneromooo
Like, for example, I have a connection timeout, and extend it for every byte received.
-
coffeeroaster
ok I see. better detectors
-
moneromooo
But it's crude, and I don't think it's actually effective.
-
moneromooo
So someone with network experience would already know what works, what doesn't, how to tune these things so false positives are minimized, etc.
-
coffeeroaster
Can you point me to the code that does that?
-
moneromooo
abstract_tcp_server2.inl mostly
-
moneromooo
Warning: this file has lots of random tabs in for some reason, so it looks bad.
-
coffeeroaster
sounds like a test suite of simulating a bunch of attacks could be useful. (Or maybe it already exists?)
-
moneromooo
It doesn't really.
-
coffeeroaster
ok sounds interesting. I've got the code checked out. I'll take a look later today when I have some time.
-
moneromooo
Cool, thanks :)
-
sethsimmons
<coffeeroaster "ok sounds interesting. I've got "> Great to have someone new jumping in, welcome coffeeroaster :)
-
coffeeroaster
sethsimmons: thanks!
-
donkeydonkey[m]
i was just thinking that a test suite of attacks and other such would be cool to have... to test code and also to test new nodes and such...
-
hyc
#6262 sounds like RNG running out of entropy
-
moneromooo
We'd get a stack trace stuck in handshake surely ?
-
moneromooo
Or some similar api.
-
fmohammed[m]
high CPU usage do to tries to read 1 byte from RNG ?
-
fmohammed[m]
due to tries
-
fmohammed[m]
in non blocking mode
-
hyc
hm ture, should see it in handshake code yeah
-
hyc
true
-
hyc
is there any reason we don't have something like an rpc_clients <max number> command/setting in monerod?
-
moneromooo
Just that nobody added yet AFAIK.
-
hyc
I may take a look. setting ulimit on monerod interferes with DNSSEC lookups
-
hyc
seems it may be a way to DoS itself. if you set a low limit, you may no longer be able to issue commands to it
-
Lyza
allow a whitelist that bypasses the limit, add localhost to the whitelist by default
-
hyc
looks like more work than I have time for right now, maybe someone else will be motivated to do it