-
selsta
17:01 <Lyza> selsta can we throw in #7260 <-- will include it in next release
-
rbrunner
bevanoff: I saw you mentioning here yesterday that you might start an attempt to implement multisig in the GUI wallet. I was the one implementing the thing named "MMS" in the CLI wallet, so I know a thing or two about multisig :)
-
rbrunner
If interested I am available for chat about your project.
-
PotCoiner
Hello
-
selsta
.merge+ 7260 7295
-
xmr-pr
Added
-
selsta
.merge+ 7245
-
xmr-pr
...
-
PotCoiner
Hello
-
krabik2014
FUK has bееn intеnsеly hostilе to Monеro for ovеr 4 yеars. Making minеrs for Monеro, making a pool for Monеro, making codе that Monеro copiеd, not using bugs to stеal millions from еxchangеs. Wow. Such grеat hostility.
-
Lyza
selsta great tyvm
-
selsta
anyone else having issues with Tor tx-proxy?
-
selsta
lost all Tor peers on all nodes
-
Lyza
not using tor but I have out peers over i2p. no in peers atm though, had 4 yesterday
-
selsta
I2P looks normal here, only Tor seems to have issues
-
selsta
ok, now I’m getting a couple Tor peers again
-
rbrunner
CLI wallet command 'sweep_all' does not sweep the whole wallet? Only the current account? So there is no command that simply empties the wallet, period?
-
selsta
you can’t make a transaction over accounts
-
rbrunner
You mean that's a protocol / transaction structure limitation, not only a missing command that I could program?
-
selsta
It is intentional.
-
selsta
(as far as I know)
-
rbrunner
Yes, I dimmly remember that, fear not I won't program something, but still the question whether the protocol would allow it or not is interesting ...
-
rbrunner
Somehow it's hard for me to believe that couldn't just grab everything and pack it in a single transaction.
-
selsta
monero-project/monero #2056 is usually good to read up on subaddresses
-
selsta
-
selsta
as far as I can see, you could program that
-
selsta
but I don’t understand the math enough to 100% answer that :D
-
rbrunner
Interesting, thanks :)
-
moneromooo
It would allow it, it can't tell whether inputs are from the same account or not (thankfully).
-
rbrunner
"thankfully" meaning you would run into all kind of problems if it did?
-
moneromooo
Yes, like your privacy being invaded.
-
rbrunner
Ah, ok. I was expecting something on a technical level.
-
Lyza
feather should be able to do it if you import a wallet to it
-
Lyza
since it doesn't have accounts
-
rbrunner
Really? "No accounts" as in "no accounts yet", I guess? (It does take a mountain of work to implement that stuff, a whole hierarchy level.)
-
Lyza
they have coin control for individual outputs, and no plans to ever implement accounts afaik
-
Lyza
accounts are implemented inasmuch as the outputs will be recognized when importing a wallet, though
-
rbrunner
Interesting.
-
Lyza
can also label outputs, is pretty nice
-
binaryFate
-
hyc
I still have a number of in and out tor connections
-
selsta
binaryFate: ok that makes sense, thanks
-
selsta
hyc: I regained them on some nodes, but not on all
-
i2per
use only i2p, lost all INC previously had many
-
sech1
selsta I have 141 peers connected now, none of them are from tor (no blocklist)
-
agentpatience
Hi Guys, Since I have been operating full node I m seeing a lot of bad behaviouron the network, i'm getting probed, scanned, tcp/udp malicious data packets, etc... I setup a sensor so I could figure out where all this shit is coming from and get an idea how consistant it is. Has anyone else noticed the nodes are exposed to all sorts of attack traffic? IS any of the data I log useful to
-
agentpatience
the devs?
-
agentpatience
IS there anyway the node can become hostile to bad traffic and just shitlist it? Is this better done at IPS appliance?
-
moneromooo
It's normal to get random cunts probe. You can ignore, it's background noise.
-
monerofanboy
"Hi Guys, Since I have been operating full node I m seeing a lot of bad behaviouron the network, i'm getting probed, scanned, tcp/udp malicious data packets, etc."
-
monerofanboy
People are always probing on the internet. If you can, close unused ports and restrict traffic to only tcp on the needed ports using your firewall, at least for your Monero node. When running a webserver like Apache2, if you add ModSecurity, the
-
monerofanboy
OWASP Core Rules and use fail2ban, fail2ban will constantly be banning bots which are probing the webserver.
-
monerofanboy
Port/protocal restrictions do help to secure nodes. If you wanted to put Snort or Suricata in front of your node, I doubt it would hurt, but I also do not know that it would significantly increase your node's security, if you regularly install patches for the node's OS.