12:01:43 moneromooo> In any case, I'm not sure it's worth wasting time just to make github servers happy. <--- After taking a deeper though about it, what I'm doing is actually providing more error margin, IN CASE somebody overloads the Github servers one way or another. Then the mining process is not to be blamed for this, and thus should not be canceled, just because it took too much CPU time (which had to be shared at that moment). 12:24:17 anyone have an idea about https://github.com/monero-project/monero/issues/7386 ? 12:28:28 he can try to download the same old version monero-wallet-cli and restore it there, then use the v0.17.1.9 12:36:45 ok suggested that in a comment 14:29:30 How is the monero wallet encrypted with password? ChaCha8 something? 14:40:42 chacha20 14:41:02 It used to be chacha8 until... maybe two years ago. 14:48:16 Someone got their parents into monero, and they lost both their password and image of seed ... looking at options for retrieving wallet - hashcat supports ChaCha20 but more for hashes than for decrypting a wallet 14:56:47 How much space size of password are you going to brute force ? 14:57:32 * What alphabet and how many characters are you going to brute force ? 14:57:50 If I could leverage hashcat with wordlists and masks, my chances are pretty good 14:58:23 There is default lang for masks with english lower/upper/both case alphabets 15:03:41 I wonder if a Cryptonight ASIC could be used for that. It might be much slower if you change the input all the time... 15:09:07 "If I could leverage hashcat with wordlists and masks, my chances are pretty good" You don't work size for brute force and don't know speed of your GPUs, right ? 15:09:34 also didn't extract hash of password from wallet file 15:28:53 I don't know if it is chacha8 or 20 even 15:29:11 speed of GPUs is easy enough to check - at least if it is chacha20 15:30:43 looks like a single vega64 can do 5.6GH/s chacha20 (synthetic, so only realistic for a mask attack) 15:31:36 I need the same script that accept wallet file path and return hashcat args to brute force 15:31:41 writing ... 15:31:54 chacha20 was checked in on Dec25th 2017. moneromooo: You don't do holidays, do you :P 15:39:16 Is there some good way to determine if a file is a valid monero wallet? I guess that is the only way to validate the decryption being "correct" 16:22:34 The plaintext should be valid JSON. So test whether the first few characters are... hmmm... {" maybe. Log your own wallet's decrypted contents, see the first few bytes. 16:22:46 If it passes that, parse with an actual JSON parser. 16:42:24 "https://github.com/ph4r05/py-cryptonight" this doesn't produce valid cn_slow_hash(...) hashes 16:42:30 * "https://github.com/ph4r05/py-cryptonight" this module doesn't produce valid cn_slow_hash(...) hashes 16:50:50 * moneromooo grumbles at the build suddenly spamming warnings about pointless stuff, hiding interesting stuff 17:00:18 "I wonder if a Cryptonight ASIC ..." if these devices support only fixed offset for nonces then they are useless 17:23:09 "looks like a single vega64 can do 5.6GH/s chacha20" password -> [cryptonight (original)] -> chacha key -> [chacha20(, , )] -> decrypted prefix of account data -> [memcmp(<...>, {"key_data":)] -> true / false 17:23:46 If there is no availabel ASIC then you take cn/0 implementation from xmrig and add support of this scheme into hashcat since xmrig doesn't have sophisticated pw generator 17:23:55 * If there is no available ASIC then you take cn/0 implementation from xmrig and add support of this scheme into hashcat since xmrig doesn't have sophisticated pw generator 17:24:22 cn/0 will be bottleneck of this brute force 17:24:40 you need at most 12 bytes of chacha so it isn't important 17:40:06 "looks like a single vega64 can do 5.6GH/s chacha20" 2kH/s for cryptonight (cn/0, you can check with xmrig) 17:40:22 Is it feasible to brute force forgotten characters with this speed ? 17:42:01 it should be easy to add support, e.g. https://github.com/hashcat/hashcat/pull/2559/files, only 2 major files are need adopted OpenCL code from xmrig and input/output processing 17:42:10 but the speed will be slow 18:07:53 moneromooo, I believe the warning spam will be solver with: 18:07:54 https://github.com/monero-project/monero/pull/7394 18:07:59 Which you already approved. 18:59:24 .merges 19:00:19 dsc bot got k-lined 19:06:12 how sad 19:50:01 is it known that submodules are are borked? 19:50:43 "Fetched in submodule path 'external/miniupnp', but it did not contain 544e6fcc73c5ad9af48a8985c94f0f1d742ef2e0. Direct fetching of that commit failed. 19:50:43 " 19:50:51 on master 19:51:13 No. AFAIK they're not. 19:51:14 git submodule sync 19:51:32 git submodule update 19:51:45 git submodule unbork 19:51:51 ^ 19:52:06 (but if they're not borked, would it actually bork them...) 19:52:33 danke schon 19:53:47 https://github.com/monero-project/monero/pull/7311 19:53:56 gonna see if master has any new tricks to deal with my public node eventually just dieing on wallet connections 19:54:09 It actually builds the whole thing now, not just libminiupnpc. 19:56:39 lets see if xmrchain.net breaks it too 20:03:01 * gingeropolous grumbles about not compiling debug. ponders if he should compile debug 20:21:12 Remember kids. If you call project coral reef for what it is - fluffypony embezzling half a mil usd from the monero fund for a website with smaller adoption than monero woo plugin, you will get excommunicated. Why do you think charities need Teslas? They don't and Elon won't support Monero 150k will sure buy a lot of party time for those that actually do get it. 20:37:41 what the heck just happened to #monero 20:37:50 Hilarious :D 20:38:20 uhhh 20:38:22 Did our channel get taken down? 20:39:11 13:35 -!- mode/#monero [+b *!*@*] by ChanServ 20:39:19 seems excessive. 20:40:02 moneromooo we dying here 20:40:41 How did our channels get dropped? 20:40:57 chanserv hijack of some sort? 20:41:04 looks like it 20:41:09 Anyone else from Core around to help figure it out? 20:41:17 fluffypony maybe? 20:41:35 Heard Core has some special access to #monero* channels 20:41:48 Never a dull moment in Monero... 20:43:34 yesterday there were strange PMs on freenode from random nicknames, some windows batch commands or whatever, maybe someone got compromised who had access to chanserv 20:44:50 fluffy running windows ? :D 20:45:04 Oh wait, I should not, I'm fluffy... 20:45:08 *know 20:45:26 strange selection of targeted channels 20:46:05 one of those spam messages yesterday did say "attn: freenode is moving to irc.crimeircd.net" so it does seem like it could be related 20:46:14 Freenode ops are fixing. 20:46:26 thx 20:46:30 good to hear 20:46:45 I wonder if someone saw that msg and actually tried to login with their IRC passwd to that server 20:47:44 was the channel hacked or something 20:48:38 * marmulak scrolls up 20:48:55 hyc: yikes, if true 20:51:22 wait so this is not #monero, but #monero-dev right? 20:51:29 yes 20:51:38 ahh this all makes sense now 20:52:48 Yes, seems like pony indeed. 20:53:06 Channels seem joinable now fwiw. 20:53:08 on purpose? >_> 20:55:08 20:54 It actually builds the whole thing now, not just libminiupnpc. <-- why? 20:55:34 was something wrong in my PR or change in miniupnp repo? 20:55:54 I think it refers to miniupnpc being only part of the repo IIRC. 21:07:05 monero branch in our repo was set up to only build libminiupnpc, IIRC. 22:07:13 Hello! Where can I find what the monero block template consists of (field blocktemplate_blob of getblocktemplate response)?