-
djykrshjuecb
You will DO what Monero tells you to do. You will JUMP when you are told to jump. And most importantly you will DISCONNECT whoever Scientology^H^H^H^H^H I mean Mnero tells you to disconnect. Otherwise you WILL end up like lh1008 here:
-
djykrshjuecb
monerologs.net/monero-community/20210114#c181614 And you will do it all for FREE. Because Monero is open souce :D Just like Linux is there to pay for $700k watches that Torvalds wears.
-
jair
Hello all, I noticed that when trying to configure monero in one of my servers, I was getting a message about a public IP aqddress being blocked by my firewall
-
jair
I wonder if that is something I must enable for monero mining?
-
jair
This message came up during the syncing process
-
jair
blockchain syncing process
-
moneromooo
Check your firewall documentation. Opening 18080 is a good idea if you can, but not strictly necessary.
-
hennyh
Hi all! I'm trying to build a local network music discovery 'app' where musicians upload songs to a server on their local network, and then other people access that server and can listen to a radio of the songs (random order). In order to like a song and then play it back at any time you need to 'tip' the artist using monero. I took a look at
getmonero.org/get-started/accepting
-
hennyh
and
monero-python.readthedocs.io/en/latest/transactions.html but can't quite figure out how to verify that a tip was sent to the artist's Monero wallet.
-
hennyh
Is there some type of proof the tipper can provide which will demonstrate they paid some amount to the artist's address? And if so, how can I generate such a proof for any old person (i.e they don't have their own node with RPC enabled)
-
hennyh
I've talked with moneromooo in #monero about some possible solutions but haven't arrived at one that would work the way I'd like. Ideally as a user sending a tip I would just scan a QR code with cake wallet (or even have it opened up via a link) choose my amount and then click send. Trying to find a way to make that experience possible
-
virgildante[m]
Depends on which wallet, IIRC this is doable on the CLI one.
-
hennyh
I think most people would be using their phone so probably cake wallet, the possiblity of using the shorter encrypted payment ids
monerodocs.org/public-address/integrated-address was thrown around
-
moneromooo
(perfect solution I think)
-
hennyh
I don't think I understand how the integrated addresses work, are the public spend/view keys listed in the table at monerodocs.org the recievers or the senders?
-
hennyh
-
moneromooo
Integrated addresses are just your (receiver's) address, with a 64 bit number appended.
-
hennyh
awesome thank you, I think I have enough to give making it a go. Flow will be: users clicks 'tip' -> UI comes up and makes a request to /get-payment-address on the server -> server makes JSON rpc call to the node's make_integrated_address endpoint -> create payment QR code/link using the integrated address -> server scans for incoming txs -> invokes split_integrated_address via rpc call
-
hennyh
-> uses the userid/songid which made the 8 bytes of the integrated address
-
moneromooo
Yes, except "server makes JSON rpc call to the node's make_integrated_address endpoint" -> the wallet's endpoint. The node does not have your address.
-
hennyh
awesome thank you, I think I have enough to give making it a go. Flow will be: users clicks 'tip' -> UI comes up and makes a request to /get-payment-address on the server -> server makes JSON rpc call to the node's make_integrated_address endpoint -> create payment QR code/link using the integrated address -> server scans for incoming txs -> invokes split_integrated_address via rpc call
-
hennyh
-> uses the userid/songid which made the 8 bytes of the integrated address -> records song as owned -> ui updates
-
moneromooo
For such low amounts, you'll probably want to check the txpool to check for txes, not wait till mined.
-
virgildante[m]
You could use tx-notify
-
virgildante[m]
(triggers a program to run on your shell when a tx is received to the wallet)
-
hennyh
ah yes sorry I meant check the txpool
-
hennyh
oh wow tx-notify that will be very useful
-
hennyh
thank you everyone! I'll let you all know how it goes (and if I get stuck again) :)
-
moneromooo
Good luck :)
-
CCosta[m]
<hennyh "Hi all! I'm trying to build a lo"> sick! good luck on it! 💯
-
psmgsqyy
Look on the bright side. At least you don't need to obsess over signs of life from FUK now.
-
anon_82641[m]
<hennyh "thank you everyone! I'll let you"> It's such a coincidence that your writing this.
-
anon_82641[m]
* It's such a coincidence that you're writing this.
-
anon_82641[m]
-
anon_82641[m]
Written two days ago
-
anon_82641[m]
It's a poor mans version of what you want.
-
anon_82641[m]
No user accounts, just an mp3 radio stream using mpd / icecast
-
anon_82641[m]
Users can't select which music to play, and a cron pauses the music after a certain period of time. Another tx has to be sent to start it again
-
CCosta[m]
<anon_82641[m] "Users can't select which music t"> lol
-
CCosta[m]
so, I've got the portable storage serialization & deserialization working great, being now able to essentially do any req & response to the p2p network (handshake working well, able to get the whole local_peerlist_new, etc)
-
CCosta[m]
but I couldn't find in the source code anything for command 1005 (network_state) and 1004 (stat_info) - is that because Monero indeed doesn't implement it, or, am I missing something?
-
CCosta[m]
(perhaps `docs/LEVIN_PROTOCOL.md` is an antique doc from pre-monero times?)
-
mj-xmr_
When SpotXMR?
-
wfaressuissia[m]
read the code and ignore that doc
-
CCosta[m]
wfaressuissia[m]: yep, just double checking if I'm not missing anything (new to the codebase)
-
moneromooo
It's current. Those are in src/*/*defs.h
-
moneromooo
Oh, they are debug calls, might have been removed actually...
-
moneromooo
They were defined out for ages anyway.
-
CCosta[m]
<moneromooo "They were defined out for ages a"> coooll, thx for confirming! 👍️
-
moneromooo
They were removed last year, I just checked.
-
gingeropolous
aren't integrated addresses on the way out?
-
moneromooo
Unclear.
-
moneromooo
Would be nice to (1) kick them out and (2) add an always on fixed size per output encrypted field. Could be used for that and other things.
-
mj-xmr_
Starting from 6th May, I'd like to try to abstract the wallet2 class a bit, using an interface. Does anybody have something against it? vtnerd ?
-
» moneromooo encourages smaller diffs if possible and waits to see where this goes
-
mj-xmr_
Of course.
-
vtnerd
its already abstracted once
-
vtnerd
in wallet/api
-
virgildante[m]
<mj-xmr_ "Starting from 6th May, I'd like "> What were you looking to abstract?
-
mj-xmr_
vtnerd, What is the reason why wallet2 class inherits no interface? Is there a relationship between wallet2 and api/wallet?
-
mj-xmr_
virgildante[m], I'd like wallet2 to inherit from something, so that the clients don't have to include wallet2.h directly.
-
endogenic
wallet2 doesnt need to inherit from something for other code to use its contents
-
endogenic
as we discusssed
-
endogenic
its functions have been factored out while largely keeping existing interfaces
-
endogenic
those factorizations can simply be PR'd to monero
-
endogenic
inheriting wallet2 from something would be fine iff what it inherits from is an object so designed as to be truly more general
-
endogenic
but what is wallet2 a specific case of?
-
endogenic
it wouldnt help much at the moment to go in that direction immediately IMO since no one has need of a more general case - what they need are the contents
-
endogenic
nor would it help to chuck another interface on top of wallet2 as vtnerd noted
-
mj-xmr_
From the design point of view, at the first iteration it would be enough if wallet2 just inherited from an interface which contained all of the wallet2's methods. It doesn't mean that that iwallet2 would be the generic case. This means that iwallet2 could in future inherit from a truly general wallet interface, as you design it.
-
endogenic
mymonero-core-cpp shows, as we discussed, those factorizations.. so that work is already done and needs to be PR'd to monero
-
endogenic
that doesnt sound useful mj
-
endogenic
wallet2 already has an interface. it actually has two now
-
endogenic
its header's entire point is to be an interface
-
endogenic
and all instantiators of it consume that interface
-
mj-xmr_
Depends on the point of view. Generally no user should have to include the header, where there are any private members. wallet2 is not an interface. It's an implementation already.
-
mj-xmr_
And this is especially true for a large class like this.
-
endogenic
sigh
-
asymptotically
endogenic: no you don't get it, we need to change it for the sake of changing it ;D
-
endogenic
sounds like youre not asking for anyone's differing opinion
-
endogenic
lol :))
-
endogenic
i have been promised funding to do this work
-
endogenic
$120k
-
mj-xmr_
That attitude is the reason why it takes bloody 50 minutes to compile the project (and not only this one)
-
endogenic
but we'd need someone who has enough experience with growing and maintaining codebases and building objects
-
endogenic
no mj
-
endogenic
it's not the cause
-
mj-xmr_
it is exactly the cause. Here's the proof
-
mj-xmr_
-
mj-xmr_
search for"
-
mj-xmr_
wallet2.h
-
mj-xmr_
endogenic> sounds like youre not asking for anyone's differing opinion <-- the only differing opinion I could extract from this is "DONT DO IT"
-
endogenic
correct
-
endogenic
dont do what you suggested
-
mj-xmr_
But OK. As you can see from the above report, there are many other files like this, which make the project compile for so long because of the same attitude, so I'm fine avoiding it, until somebody asks me to do it or I run out of ideas.
-
endogenic
if i'm not mistaken mj-xmr_, you used my name and referenced my talk in 2019 in order to raise money for this task
-
endogenic
meanwhile you told me you never looked at the work i did on it
-
endogenic
you never saw mymonero-core-cpp
-
endogenic
that effort isnt just my own
-
endogenic
it include's ndorf and even some of vtnerd's work
-
mj-xmr_
For this task alone I arranged about 4 XMR. I'm fine to redistribute it. Gee. It's yours.
-
endogenic
there's a reason we didnt just make a iwallet
-
endogenic
well if you insist it would be the second donation i've ever received
-
mj-xmr_
Honestly with such raising prices in USD terms, I will defo ask the team to redistribute a big chunk of that funding.
-
endogenic
but you should keep the money and review existing work and try to absorb the wisdom behind it as you have skill in c++ and can benefit monero
-
mj-xmr_
<endogenic> meanwhile you told me you never looked at the work i did on it <-- and this is kind of crappy public shaming. Not a gentlemen's way of dealing with differences in opinions.
-
hyc
fwiw I agree, there's still far too much actual implementations in header files
-
hyc
which is definitely a burden on compile times
-
endogenic
you're projecting, mj-xmr_
-
endogenic
and you're upset that i didnt let you walk all over me
-
mj-xmr_
Not at all :)
-
mj-xmr_
I'm a lone wolf.
-
endogenic
oh yeah you actually like that then
-
endogenic
mudslinging
-
mj-xmr_
I'll just leave it there.
-
mj-xmr_
And do some real work.
-
virgildante[m]
So wallet2.h would inherit from the new interface?
-
endogenic
yes dont waste your time
-
mj-xmr_
virgildante[m], yes.
-
endogenic
wallet2 already has an interface that changes on a regular basis
-
dEBRUYNE
Triptych prioritization meeting in ~20 minutes
-
sarang
Hello
-
dEBRUYNE
Hi
-
dEBRUYNE
cc rehrar, binaryFate
-
rbrunner
Hi there
-
rehrar
Hu
-
krongle
hi
-
gingeropolous
hi
-
sarang
Who wishes to lead this meeting?
-
binaryFate
hello
-
dEBRUYNE
binaryFate: Would you mind leading?
-
rehrar
Unfortunately I cannot. Sorry.
-
rehrar
So we leave it to somebody.
-
binaryFate
I'll probably have to leave early. Sarang do you want to have a go?
-
sarang
OK
-
sarang
I am interested to know what Triptych research priorities should be, to determine if I should work on it as part of a CCS submitted by rehrar
-
sarang
Note that I would be working as a researcher employed by rehrar's company
-
sarang
I had previously understood that multisig was not considered a very high priority, but now it sounds like it should be, for example
-
moneromooo
I vote (1) correctness, (2) security, (3) multisig, (4) speedups.
-
sarang
So it seems best to identify priorities more directly; hence this meeting
-
ArticMine
Hi
-
binaryFate
-
dEBRUYNE
-
sarang
No, rehrar did
-
sarang
Just to be very clear
-
rehrar
To be even more clear, Cypher Stack did.
-
sarang
There was much discussion about the nature of that arrangement, but I'd specifically like to determine the priorities to know if I am the best person to do that work
-
rehrar
But I, the individual, submitted it in behalf of the company because companies don't have typing hands.
-
vtnerd
mj-xmr_ : if the goal is compile-time reduction, then no doubt much could be moved using the pimpl method
-
nioc
would it be appropriate to add ring selection to mooo's list? AIUI increasing the rind # would require a new selection algo
-
vtnerd
but I'm not sure why at a glance an vtable interface is needed
-
sarang
Here are some things that I had considered useful research?
-
sarang
s/?/:
-
sarang
- Output selection and binning algorithms
-
sarang
- Batching optimizations
-
sarang
- Verifier optimizations relating to scalar computations
-
sarang
- Updates to security model
-
sarang
As far as multisig goes, I had initial work on this but it's more complex than the current multisig solutions and would require much more coding using something like OpenSSL for RSA groups
-
krongle
Hey. I'm one of the xmr.to team. Multisig is definitely be an important enabler for at least one of our upcoming projects. And quite a major bummer if we lost it :-). So I would like to add my vote for multisig.
-
sarang
I do _not_ know how much complexity this would add to things like mobile wallets or hardware wallets
-
sarang
To be absolutely clear, this requires curve arithmetic that is not 25519-based
-
sarang
and is multi-round
-
moneromooo
I'd say it's an acceptable drawback if you have to use monero-wallet-cli to use multisig.
-
sethsimmons
I will add a vote for multisig support with the recent announcement and impetus behind Haveno. That's a high priority for me, personally, now.
-
sarang
I am not very familiar with OpenSSL or its alternatives when it comes to functionality required for this RSA group support, so the implementation side is something I'm much less confident in
-
hyc
sounds fine if it's only in wallet-cli for now. someone else can adapt it for mobile wallets at a future time
-
moneromooo
I'm thinkinf of people with large amounts of monero and mandated DD. Those would have to use multisig, most likely. Kind of a must have for those.
-
sarang
I am more confident in the underlying construction and algorithms
-
binaryFate
sarang: appart from significant additional coding, would the security model be fundamentally different for multisig than for singlesig?
-
moneromooo
I can help with openssl if needed. I'm not familiar with it, but I can become :)
-
rbrunner
A vague hope, but would it help anything if only 2/3 was supported? Because that's basically where almost all the shows take place.
-
sarang
binaryFate: the existing security model holds, since it doesn't care how you compute keys or linking tags as long as they're correct
-
ArticMine
I see backwards compatibility with existing multisig as a requirement
-
sarang
ArticMine: key image format changes
-
endogenic
why would only wallet-cli have access to the implementation?
-
krongle
for us "backwards compatibility with existing multisig as a requirement" would be a nice to have, but not a have to have
-
moneromooo
Assumes facts not in evidence. AFAIK the issue is processing power (for hw wallets) and more code to use the wallet2 impl.
-
endogenic
or was that just 'it might be too much to add to a hwdevice scheme for now'
-
vtnerd
I'll throw my support for openssl rsa groups too, man
-
endogenic
ty
-
hyc
I've worked pretty extensively with OpenSSL, am available to help on that front
-
ArticMine
So what happen to existing multisig outputs? there needs to be a pathway
-
sarang
endogenic: hardware wallets would need to be able to do arbitrary RSA group computations, and I don't know enough about their capabilities
-
endogenic
yeah
-
sarang
Old outputs would continue to use the old key image format, and need to be "transitioned" to new outputs... this would likely just be a height cutoff
-
rbrunner
Are there any HW wallets that support *current* multisig? Don't think so.
-
sarang
This means a partitioning of the output set, which has important implications
-
moneromooo
They should be able to be spent normally. When spent, they'll generate triptych outputs. Whether those are multisig or not is unknown to the sender. The recipient can then send them normally.
-
sarang
However, I do not know of a way to avoid such a partitioning
-
hyc
this doesn't sound any different from transition to ringct, or transition to BP
-
sarang
As for optimizations, there's a neat optimization that was used in Beam and Firo's implementation of Lelantus (disclaimer: I do research on Lelantus as part of my role at Cypher Stack)
-
moneromooo
Similar to the ringct change, BP did not need such a change.
-
sarang
Correct
-
sarang
^ moneromooo correct, not hyc
-
ArticMine
The transition like the ringCT model should not be an issue as far as I can see
-
hyc
reference to Lelantus doesn't give warm fuzzies, given Firo's recent problems
-
sarang
It means an initially limited anonymity set, which will cause initial chain reaction deanonymization
-
sarang
hyc: Triptych and Lelantus share the same "proving system ancestor"
-
sarang
as does Arcturus
-
sarang
and this optimization applies to part of the protocol that happens to be common among them
-
sarang
I have yet to determine the precise timing differences
-
dEBRUYNE
sarang: To be clear, in that case multisig should be able to 'hold' funds past the fork date right?
-
dEBRUYNE
A output conversion subsequently takes place when the 'old' outputs are consumed in a transaction
-
dEBRUYNE
That generates new Triptych outputs
-
sarang
Output conversion means that a transaction can include either _only_ pre-Triptych anonymity set elements or _only_ post-Triptych anonymity set elements
-
sarang
and the linking tag pool used for checking double-spends is specific to that cutoff
-
sarang
The output format itself isn't actually changed, but that's not really important here
-
rbrunner
Doesn't sound like a reason to fully kill multisig to me
-
rbrunner
More like "issues"
-
selsta
IMO if there is a known Triptych optimization it is worth exploring, even if the exact speedups are not known yet
-
rbrunner
Or "things to consider"
-
sethsimmons
<selsta "IMO if there is a known Triptych"> agreed
-
sarang
Yeah, there's a separate optimization that affects proof format (using `n`-ary Gray codes)
-
sarang
The other optimization is not consensus, but it could be important for setting network parameters for the proofs
-
selsta
we want to consider and explore all known optimizations before deploying triptych
-
selsta
to avoid multiple forks
-
gingeropolous
yeah that makes sense
-
sarang
Anyway, it does sound like multisig _at fork time_ should be considered a blocker now?
-
dEBRUYNE
sarang: Is this conversion only needed for multisig, or for all outputs?
-
sarang
All outputs
-
sarang
Very similar to the RingCT transition
-
dEBRUYNE
I don't see the issue then, at least for that aspect
-
sarang
Multisig outputs look identical (by design)
-
sarang
Well, the conversion is important because it _will_ initially lead to chain reaction analysis
-
moneromooo
The issue is lots of new code using RSA groups has to be done.
-
sarang
This should dissipate quickly
-
sarang
moneromooo: yes
-
hyc
sounds like a flag day. tell everyone to churn after the hardfork.
-
dEBRUYNE
sarang: What time frame would you estimate to get multisig properly working?
-
rbrunner
Any rough estimate possible already about how many person month we talk here?
-
rbrunner
For the implementation
-
sarang
That's the thing... I don't have a solid understanding of what full multisig implementation will take, since it's multi-round and uses a lot of new group arithmetic that we currently don't use anywhere
-
moneromooo
I can maybe add some wallet code to prefer spending pre-triptych outs. This means that there'll be fewer trpitych txes right after the fork, allowing for more new triptych outs to be created before the first ones get spent.
-
binaryFate
We also have to support old non-ringct -> triptych transactions no?
-
moneromooo
No, IIRC those go pre-rct -> rct.
-
sarang
This would make a chain pre-CT -> CT -> Triptych easy to detect, FWIW
-
gingeropolous
ah, so someone with pre-rct would have to do: pre-rct -> rct -> triptych?
-
dEBRUYNE
Similar to how 'unmixable' outputs are first transformed non-ringCT outputs I guess
-
sarang
Of course, spend patterns for CT -> Triptych may be easy to detect as well based on known distributions
-
moneromooo
They don't have to. The outputs are created in the type that matches consensus rules. They're always all spendable.
-
sarang
Anyway, I think a lot of this transition needs careful consideration since it's a big change
-
ArticMine
Yes I agree
-
sarang
The work I did previously was on the proving system and a _bit_ of the multisig stuff
-
sarang
But there's a lot to consider about the migration, and any side cases that might arise
-
rbrunner
But still enough for moneromooo to implement a POC, right?
-
sarang
as well as the practical implementation of multisig due to its RSA group requirements and round structure
-
sarang
rbrunner: my initial multisig work is almost certainly not enough for a proof of concept yet
-
sarang
But I can write it up in much more detail
-
rbrunner
No, I meant Triptych in general
-
sarang
The initial stuff was just to determine if such a thing was possible
-
sarang
Oh, I have working Triptych prover and verifier code already, with limited batch support
-
sarang
That was done earlier to get timing data
-
moneromooo
Well, the patch to add triptych to monero is done.
-
rbrunner
Yes, that's what I meant :)
-
moneromooo
I did that a couple months ago.
-
sarang
Big caveat that while the preprint has undergone review for publication, the code has undergone no such formal review
-
sarang
And, as always, the quality of peer review can vary greatly compared to a paid review
-
sarang
^ for the preprint, I mean
-
rehrar
I know people are excited for the big ring sizes, but this shouldn't be rushed in any way. I would be shocked if we wanted to get this in before year's end.
-
rbrunner
sarang, you mentioned " - Updates to security model" as possible themes. What's that, in general?
-
rehrar
We can release with BP+ in the meantime.
-
dEBRUYNE
<sarang> Big caveat that while the preprint has undergone review for publication, the code has undergone no such formal review <= We would have to get multiple audits for Triptych anyway
-
sarang
rbrunner: the current security model focuses primarily on the proving system itself as a zkp system
-
dEBRUYNE
rehrar: I'd still be in favor to postpone BP+ until Triptych is ready, even if that means we have to postpone it to, say, early 2022
-
sarang
But less so on the resulting transaction model that you get by using our commitment-offset-based approach to amount balancing
-
sarang
FWIW the CLSAG security model is similar, as was MLSAG
-
sarang
Arcturus is a little different since it handles balance inside the zkp, whereas Triptych (and its predecessors) do not
-
binaryFate
would triptych multisig require specific paper peer review?
-
sarang
It would be nice if it did
-
sarang
Working up a separate security model for that would be a _lot_ more work (think about the previous multisig preprint!)
-
sarang
The most one could hope for without that would be a thorough description and proof of concept, but this is a very different review process
-
sarang
Also, multisig security models were really suraeNoether's expertise
-
sarang
The idea behind multisig is that to compute the linking tag between players requires a type of known MPC
-
sarang
and then this is worked into the rest of the proof construction, which is much more straightforward
-
sarang
The RSA group stuff only comes into play for this linking tag MPC
-
sarang
and there only because you need to jointly compute an inversion of the output secret key
-
sarang
(multiplied by a fixed curve group element, that is)
-
arnuschky
Hello everyone! Sorry I am late to the party... Is there a live transcript/log somewhere so that I can see was has been said till now?
-
dEBRUYNE
arnuschky: I'll send the logs in PM
-
rbrunner
-
arnuschky
awesome, thanks
-
rbrunner
And solutions like allowing a mix of transaction formats for the foreseeable future fully out of question?
-
moneromooo
No.
-
sarang
How do you mean?
-
rbrunner
We freely allow people to produce the current tx format even after hardfork. People sneak in their multisig transactions that way.
-
dEBRUYNE
That would imply multisig holders performing current transactions, whereas the rest of the network performs Triptych transactions
-
rbrunner
Not necessarily. I mean crazy things would be possible, like random decision what to produce for *every* tx :)
-
moneromooo
Consensus rules cannot distinguished between outputs that were spent from a multisig wallet from outputs that were not.
-
dEBRUYNE
sarang: Given the potential volume of the multisig work, would it be prudent to start with that aspect of Triptych?
-
sarang
dEBRUYNE: certainly could do this
-
binaryFate
if there is general agreement that lack of multisig is not acceptable, doesn't that define an apparently large enough (listening to sarang) research direction already?
-
dEBRUYNE
binaryFate: Right
-
dEBRUYNE
moneromooo: I meant in case of a fork without multisig support for Triptych
-
sarang
If multisig is a blocker for deployment, that could be the initial scope; if it turns out not to work in practice for whatever reason, that minimizes any wasted effort
-
dEBRUYNE
Then multisig holders can only transact in the old format basically
-
gingeropolous
just curious: does arcturus lend itself to a better / easier multisig? or is it the same?
-
sarang
To be clear about any kind of mixing of transactions... outputs need to be separated by what transaction type can consume them
-
moneromooo
If we fork without MS, and if Alice has a MS wallet, and Bob sends Alice an output after the fork, then Alice cannot spend. That is bad.
-
sarang
Arcturus multisig requires this as well, as would Omniring, RingCT 3.0
-
rbrunner
You could not prevent that sending, right, because multisig is not visible in the address
-
ArticMine
So how would a transition from Triptych to Arcturus look like for example?
-
sarang
ArticMine: output pool stays the same
-
gingeropolous
yeah it sounds like multisig is the primary at this point
-
sarang
Proof format changes
-
sarang
No transition needed for outputs between Triptych and Arcturus
-
sarang
In that case, should the initial scope of work be multisig only?
-
ArticMine
Yes
-
rbrunner
Maybe, given how far along the "other" stuff is already ...
-
dEBRUYNE
If we cannot deploy without multisig, it is basically imperative to find out as soon as possible whether proper multisig can be implemented / achieved
-
sarang
Output binning/selection is important as well, but seems less important based on this discussion
-
hyc
binning sounds like a matter of refinement, MS sounds like a harder works/won't work
-
rbrunner
I mean we don't even have any graceful way out of multisig on the table if we really should drop support, right?
-
sarang
hyc: binning would likely need to be consensus to avoid miner shenanigans
-
arnuschky
If multisig is in such high demand, but seems conceptually not really an issue but much more a coding problem - would it be sensible to turn this into a separate CCS and fund that alongside the more theoretical Triptych work?
-
ErCiccione
I agree with dEBRUYNE. Nice to see all the support for multisig and haveno :)
-
rbrunner
Other than "People, please empty all those multisig wallets"
-
gingeropolous
true arnuschky . sarang, at this point, is multisig more a theoretical problem or an implementation problem?
-
gingeropolous
or is it in that wonderful gray area .....
-
sarang
Mostly implementation, but I think the transition should be reviewed in more specificity to ensure that existing multisig wallets are not affected
-
sarang
Loss of funds seems like the obvious blocker
-
binaryFate
We'll all agree on that
-
sarang
As would having to move to a separate multisig arrangement?
-
sarang
i.e. if multisig players need to collaborate to migrate to a new address
-
gingeropolous
well, theoretically, they can migrate whenever
-
dEBRUYNE
I suppose that is not necessarily a blocker as long as there is no time limit on it
-
arnuschky
I think migration is fine as long as it's not time-constrained
-
rbrunner
Certainly unfortunate
-
dEBRUYNE
Bit inconvenient, but still
-
arnuschky
ie if I want to recover my wallet two years from now, it should still be possible
-
sarang
Should it be considered a blocker if multisig players need to change addresses?
-
rbrunner
2/3 looses sense, opens blackmail possibilities that were not there otherwise
-
arnuschky
rather than resulting in loss of funds due to a missed window
-
sarang
Or just a super duper annoyance
-
dEBRUYNE
Same answer I'd say
-
dEBRUYNE
Just inconvenient
-
arnuschky
for us that would be acceptable
-
ErCiccione
sarang: would be defintely be problematic. I'm not sure of how that would effect active trades on Haveno.
-
dEBRUYNE
sarang: I think it should be fine as long as a proper migration guide is provided
-
rbrunner
Better than no multisig in any case :)
-
dEBRUYNE
That lays out all necessary steps
-
sarang
Anyway, this is good to know. So the general consensus seems to be that limited scope initially to multisig is the best use of effort?
-
dEBRUYNE
I'd say so
-
arnuschky
inconvenience can always be softed by good software support / processes
-
ErCiccione
but if the price to pay for multisig support, i guess could be workable :)
-
sarang
I'd be hesitant to expand scope if one outcome could be "sorry, multisig doesn't work, so it's all canceled!"
-
gingeropolous
yeah
-
binaryFate
"limited scope initially to multisig is the best use of effort" +1
-
rehrar
So what say we leave the existing proposal as is, and just not merge. It'll just chill in Ideas. Make a new proposal for multisig work with the scope and price. Get discussion on that. Merge that one first once approved.
-
sarang
Why not close it?
-
rehrar
Then the Triptych optimizations can be merged after multisig is sorted out.
-
sarang
Any further work would need a more defined scope than existed in that CCS
-
dEBRUYNE
Why not change the existing one?
-
sarang
Up to rehrar I suppose
-
rehrar
dEBRUYNE: all of the comments will be for the old version, wouldn't be obvious
-
rbrunner
We are not short in possible proposals, aren't we. Cleaner certainly to make a new one, IMHO
-
rehrar
and there's a lot of comments. I think it's important for the transparency. A new lurker will see all of the comments and think they are in support of the multisig stuff. Which those people may very well be in support. But I think it's best to be clear?
-
dEBRUYNE
I guess, but most of the discussion relates to the way sarang is contracted
-
dEBRUYNE
Not to the specifics of the proposal itself
-
rehrar
I will do what the community thinks is the best course of action for the proposal itself.
-
dEBRUYNE
I'd change the scope, cite this meeting as source
-
dEBRUYNE
And then simply merge it
-
selsta
Also think no reason to open a new proposal.
-
dEBRUYNE
Would be a bit of shame to lose another week here just for redundant administrative purposes
-
sarang
One issue is that I don't have a good sense of the time commitment required for this
-
sarang
Multisig, that is
-
sarang
As noted earlier
-
dEBRUYNE
sarang: I'd just work out the current hours and see how far you get?
-
rbrunner
Sounds reasonable.
-
dEBRUYNE
We could hold another meeting afterwards I suppose
-
rbrunner
Not much choice, given all the unknowns and uncertainties
-
rehrar
I agree. And since the time is on the smallish side (one month's worth of work hours) then we can reassess at the end of that. We're underestimating rather than over, so no risk to the community on unused funds.
-
Inge-
+1 I'm quite comfortable with letting Sarang work on it and revisiting status and progress once we know more.
-
hyc
agreed
-
sarang
Yeah I want to avoid the case where it takes much less time than expected, and funds were raised in excess
-
rbrunner
Buy a lambo then :)
-
sarang
oof
-
dEBRUYNE
Depending on the status of multisig, I presume those hours can simply be used to work on other aspects
-
Inge-
If it takes less time, and multi-sig is found to be likely to have solutions with Triptych, I would also be quite comfortable with sarang spending excess time on any of the other proposed tasks :P
-
rehrar
I'm sure core would be fine with any excess funds (if it were to ever happen) to be rolled into any next research project we do.
-
sarang
The worst-case scenario would be discovering that it won't work early on
-
sarang
making the other work moot
-
dEBRUYNE
sarang: I think the community is perfectly fine with letting you churn away on Triptych
-
dEBRUYNE
<sarang> The worst-case scenario would be discovering that it won't work early on <= Which is basically why multisig has to be prioritized
-
rehrar
dEBRUYNE: well, what he's saying is it seems multisig is a showstopper. So if we realize it's not workable, then Triptych is a no-go altogether.
-
moneromooo
Sorry, was afk for a bit, just reading this: "Should it be considered a blocker if multisig players need to change addresses?"
-
rehrar
Meaning excess hours can't be poured into Triptych.
-
moneromooo
I think it would be a massive problem, because you can't stop people from sending to the old address, where the outputs would apparently be burnt ?
-
dEBRUYNE
In what kind of scenario does a multisig wallet receive a lot of transactions though?
-
sarang
Without flagging the output type, yes
-
dEBRUYNE
Hot wallets (from services) are typically not multisig as far as I know
-
sarang
Again, need to carefully consider the transition and existing addresses
-
dEBRUYNE
<rehrar> Meaning excess hours can't be poured into Triptych. <= Right, but then we could discuss with the community what to do with the remaining funds
-
sarang
I believe we'd be ok provided keys are additive
-
h2017
why not put in the proposal: Excess hour can be used on Tryptich, provided that a proof of concept of multisig is established" (or something like that)
-
arnuschky
+1
-
sarang
What should happen in the case that multisig is shown not to be viable?
-
rehrar
I also need to adjust for new prices.
-
rehrar
A good problem to have :)
-
rehrar
sarang: dEBRUYNE suggested we discuss with the community how to spend.
-
rehrar
Given my position with core, I would say rolling into the GF isn't an option so there can be no COI. Whether it's put into other existing CCS proposals or something else can be for discussion.
-
sarang
In advance, I hope
-
rehrar
But in a sense, that's not your problem as a researcher. It's your problem to consider as a member of the Monero community though.
-
sarang
I mean, I would still (as a researcher) consider the other Triptych research areas to be of independent interest
-
sarang
But if it couldn't possibly lead to deployment, that's problematic as you say
-
Inge-
Are any of the alternatives to Triptych more likely candidates to be able to support multi-sig?
-
moneromooo
If not viable, then I guess we'd need to tag outputs, rather than use the fork height to determine their type.
-
moneromooo
I thought it was pretty much worked out in theory though ?
-
sarang
Most other options I've looked at (Omniring, RCT3, Arcturus) have the same key image format, and therefore the same challenges
-
sarang
Lelantus does not, but it has other problems relating to recipient addresses that I think are non-starters here
-
sarang
moneromooo: I want to write out a much more comprehensive analysis that accounts for these cases
-
sarang
To ensure that these are all considered properly and in a unified way
-
Inge-
So basically we forge ahead, with multi-sig and the other research areas, and assume that human ingenuity will eventually prevail over the "impossible"?
-
sarang
Other non-multisig work would be placed aside
-
sarang
Since those aren't blockers
-
rbrunner
Any idea yet whether wallet construction and transacting, as seen *by the user*, will be different (if it works)?
-
moneromooo
Not different.
-
rbrunner
Different order of commands, more key exchange rounds, stuff like that?
-
rbrunner
(For Multisig specifically)
-
moneromooo
Oh, for multisig itself ? If so, I dunno ^_^
-
sarang
This'll be a new multi-round MPC
-
sarang
I need to review my notes to see how many rounds :/
-
sarang
And there's been additional literature on similar constructions that I will need to review carefully
-
rbrunner
Alright. As I said, if 2/3 works out reasonable, we are (almost) set.
-
sarang
This particular construction (the author names escape me) has been studied pretty extensively because of its use in other signature MPCs
-
sarang
Yeah, I need to look over the threshold stuff again too
-
sarang
Most work initially starts with `n`-of-`n` and then builds threshold using additional round(s)
-
sarang
Unfortunately I don't know a way to reduce the rounds too far without sacrificing security expectations
-
rbrunner
Everything else pales in comparison with 2/3, I would say.
-
rbrunner
as far as practical importance goes
-
sarang
Sure, but if you have threshold, it's pretty much guaranteed you have arbitrary `n`-of-`n` in the math already
-
sarang
and `n-1`-of-`n` too
-
rbrunner
All the better then. I just remember we did not bother to implement that for quite some time.
-
binaryFate
I got to go sorry. Feels like it was very useful, thanks sarang and all. rehrar: I suggest we double-check with luigi1111 the phrasing for potential excess funds before you post updated proposal
-
sarang
The implementation differences exist, of course, no doubt
-
sarang
Thanks to everyone for the information on priorities; this was very helpful
-
sarang
I assume the meeting is now adjourned?
-
hyc
nobody feels like an issue was left out?
-
rbrunner
Not me. In any case relieved that multisig support is accepted as important.
-
gingeropolous
i mean, i think there are more, but the go/nogo of multisig seems like the primary
-
sarang
Yeah, I'm glad to know of its priority. From much earlier discussion I was under the impression it was not
-
moneromooo
Pailler ?
-
moneromooo
Or Paillier.
-
sarang
That's what is used for the MPC, yes
-
gingeropolous
well, i think that was before multisig was being used maybe. I mean, i still feel like its niche and beyond the scope of money, but the can of worms has been opened
-
rbrunner
In any case right now would probably the last decent point where to announce that we kill it for good.
-
sarang
It's not consensus though, and not detectable anyway
-
sarang
Anyone could be doing multisig in any number of ways
-
sarang
If you end up with a valid transaction, it's a valid transaction
-
rbrunner
Well, I am quite sure from the lack of feedback for and questions about "my" MMS that it probably *is* niche :)
-
rbrunner
At least until now.
-
dEBRUYNE
Wouldn't be surprised if some exchanges use it for cold wallets though
-
rbrunner
The story will change of course as soon as software like Haveno will start to use it under the hood, automatically
-
dEBRUYNE
Would anyone mind posting the logs on the Github meta ticket by the way?
-
ErCiccione
i think and hope that Haveno will make people use multisig more tbh
-
bevanoff[m]
rbrunner: idk if you saw but I updated my GUI PR for basic multisig too
-
rbrunner
Yes, will certainly have a look when I have time.
-
bevanoff[m]
ty
-
rbrunner
dEBRUYNE: Posted the meeting logs. Without further comment, should be clear what it is :)
-
dEBRUYNE
ty
-
vxzzqnkxq
Howard Chu is a high IQ scholar, he has more Google images with a violin than Sting with a guitar, he singlehandely saved NASA from doom. Why can't the saviour of NASA save Monero?
-
xmrhaelan[m]
Theoretical question.... would two VPS nodes sharing the same storage, but different IP addresses, work in practice?
-
xmrhaelan[m]
We’re trying to figure out the most economical way to run a basic node and an RPC node
-
moneromooo
It'll work in theory. But in theory, practice matches theory, where in practice, they don't.
-
moneromooo
whereas
-
gingeropolous
xmrhaelan[m], why do you need two separate nodes?
-
gingeropolous
the same node can serve both types - an unrestricted RPC port and a restricted RPC port
-
endogenic
endogenic's Lemma: "with the exception of this theory itself"
-
selsta
.merges
-
xmr-pr
7016 7349 7643 7651 7656 7657 7658 7669
-
endogenic
mj-xmr_: i apologize for how i responded earlier. i became emotional partially bc i was tired 😅