-
moneromooo
hyc:
paste.debian.net/hidden/f184fe30 - I don't get bans with this, do you ?
-
moneromooo
The drops at the end of each ~10k blocks are still there, I don't mind them for now.
-
moneromooo
Actually, reading it as posted, it seems it should be
paste.debian.net/hidden/5f6fca2d - building with that one now to test.
-
hyc
will try it in a little while
-
hyc
but you were able to repro the bans without the patch?
-
moneromooo
Only at the end of the sync, but that was because the source daemon was ~80k height only, and thus inside the HOH hashes.
-
moneromooo
Better log settings for this: 0,p2p*:DEBUG,*queue*:DEBUG,net.cn:DEBUG
-
moneromooo
Also, I'm running something based off latest 0.17, not master.
-
moneromooo
Should not make a difference I think.
-
moneromooo
Also, it seems weird but appears right: if I want to encode numbers where 50% are 0, 25% are 1, 12.5% are 2, etc (but random), it looks like writing N zeroes with N being the number plus one is pretty good at compression.
-
moneromooo
But it's kinda de-encoding the number, so it would be totally shite at normal numbers... I found this interesting.
-
wfaressuissia[m]
What's about unresponsive synced node ? Is it reproducible or not ?
-
moneromooo
Unresponsive via RPC ?
-
moneromooo
That's a very longstanding problem, it's "random" but apparently fairly well reproducible if you leave a node up for hours and wait.
-
wfaressuissia[m]
according to logs from hyc there was no response from both p2p and rpc
-
wfaressuissia[m]
Any specific requirements for reproduction ?
-
wfaressuissia[m]
pruned/full, fast/slow connection, open/close p2p port ?
-
moneromooo
Heh. Looks like this is actually Huffman coding...
-
wfaressuissia[m]
:D
-
hyc
nothing special on source node - full, not pruned. both on same wifi LAN.
-
wfaressuissia[m]
Is it reproducible with remote exclusive node ?
-
wfaressuissia[m]
probably hard test without fast internet connection
-
hyc
that's a bit more difficult for me to test. my remote node has an in_peers limit. if the 10k disconnect occurs, may not be able to reconnect because other nodes may take that spot.
-
moneromooo
There is a bug report on github with logs, user name something like ajeuciu4 or the like.
-
wfaressuissia[m]
That's about ssl rpc
-
wfaressuissia[m]
We're talking about p2p problems
-
moneromooo
Hmm, OK. I thought this was predating SSL but maybe not.
-
wfaressuissia[m]
There are so many reasons why application can unresponsive. We need more info: better log or some runtime info from gdb
-
wfaressuissia[m]
* There are so many reasons why application can be unresponsive. We need more info: better log or some runtime info from gdb
-
wfaressuissia[m]
or It should be reproduced locally then I'll find all info by myself
-
hyc
you haven't been able to reproduce this?
-
wfaressuissia[m]
not yet, syncing old hdd with full node now
-
hyc
2nd chunk of that paste doesn't apply to master. I can't find anything resembling that section of code
-
hyc
neither the surrounding comment nor the error msg text
-
hyc
moneromooo: so I guess I have to test v0.17
-
hyc
eh no, it's not in my v0.17 branch either. must be one of your own patched branches
-
moneromooo
Oh really. Sorry -_- I'll build vanilla 0.17 then.
-
utxobr[m]
<mj-xmr "utxobr, I wrote my comment. Plea"> thanks mj-xmr, I really appreciate the honesty :)) just wrote a reply there 👍️
-
sgp_
Carrying over a conversation from #monero-research-lab:matrix.org on what's needed for the next update
-
gingeropolous
hyc, re: tx_extra phaseout - im more thinking of phase 1... like, make it so the CLI wallet doesn't support it anymore etc
-
sgp_
It's somewhat pressing because Thorchain plans to start supporting Monero, and that will lead to a bunch of publicly revealed transactions (by revealed view key and key images)
-
gingeropolous
i.e., don't touch consensus yet, just make it so users aren't inclined to use it
-
sgp_
Does the CLI wallet support it still?
-
gingeropolous
dunno.
-
hyc
extra_nonce is still being set in tx_extra. pool mining breaks without that
-
gingeropolous
pooled mining strikes again
-
sgp_
I definitely want to limit tx_extra further, but doing so in like 2 months is too short of a time period
-
wfaressuissia[m]
"Synced 95252/2061118 (4%, 1965866 left) (0.948245 sec, 105.457978 blocks/sec)," nothing interesting except frequent disconnects on every ~10000 blocks
-
sgp_
so for this version: BP+, messaging 32 bytes in BP+, ringsize bump, ArticMine fee changes. Am I missing anything?
-
hyc
that sounds like all that's actually ready
-
sgp_
If we have a huge public wallet coming online, I want to get a ringsize bump in there for sure, sooner rather than later
-
gingeropolous
so whats the ringsize
-
sech1
11
-
sgp_
most people supported 17. I personally voted for 15, but this pushes me to support 17 I think
-
sgp_
sech1: :p
-
sgp_
-
selsta
is there any evidence that 17 has a drastic advantage over 15? with increased daily transactions we want to keep verification time as low as possible
-
sgp_
Does anyone here have an opinion?
-
gingeropolous
i mean i honestly think anything in this range is quibbling (11 - 15 or 17), and any increase is probably statistically handwavy at best. But i like increasing it regardless
-
gingeropolous
knaccc, ?
-
selsta
also if we hardfork in 3-4 months then we have to consider that Triptych will have to wait another 9 months after BP+ hf
-
gingeropolous
is thorchain actually gonna hold off for 3-4 months so they can work within 32 byte messaging in BP+?
-
selsta
also I don't want to rush a hardfork because whatever thorchain is doing
-
gingeropolous
yeah
-
sgp_
will that take 3-4 months to add?
-
sgp_
selsta's messages aren't coming through to matrix.... hmm
-
gingeropolous
dunno... moneromooo ?
-
sgp_old
selsta: there is no "drastic" improvement over 15 imo
-
sgp_old
knaccc supports 17 because it saves a churn transaction in his model
-
sgp_old
actually I think it was 16 specifically
-
sgp_old
knaccc: "the only two clear possibilities, in my opinion, are ring size 11 or 16"
-
sgp_old
selsta: how far away is triptych though in reality?
-
selsta
we will know once sarang has spent more time on multisig
-
sgp_old
9 mo seems fine for me then personally
-
gingeropolous
selsta> also if we hardfork in 3-4 months then we have to consider that Triptych will have to wait another 9 months after BP+ hf >>>> indeed, but I'd argue that 1) triptych is still unknown and 2) these large HF gaps are assumptions
-
gingeropolous
i.e., we assume its better for the ecosystem to have large gaps, when in reality it might be better to have them closer together. just a thought
-
selsta
gingeropolous: assumption in what way? we won't hardfork 6 months after the previous hf, the ecosystem is way larger than years ago
-
sgp_old
I would be open to an exception for triptych if it really does come along faster, but I also think it's weird we keep assuming triptych is ready to go in short order
-
selsta
lol disagree, hardfork are quite exhausting for everyone involved, I don't see how rapid consecutive hardfork are supposed to improve things
-
sgp_old
there are several parts, we clearly accept some difficulty to have them at all
-
gingeropolous
sure.
-
sgp_old
triptych major update with major gains = potentially worth more effort
-
sgp_old
I am however concerned that we'll have a large influx of public transactions in 2 months, for which I'm not super comfortable with ringsize 11 to protect if I'm honest
-
gingeropolous
will they still be public with the message in the BP+ thing?
-
sech1
influx from where?
-
gingeropolous
this thorchain thing sech1
-
sech1
just remove tx_extra
-
sgp_old
thorchain's model will have them receiving monero transactions in wallets with a publicly shared view key and key images
-
sech1
from everything except miner reward tx
-
sgp_old
they agreed not to spam tx_extra
-
gingeropolous
well there's nothing that can stop anyone from publicly sharing viewkeys
-
sgp_old
they will use either short payment ID (technically part of tx_extra so you got me) or the BP+ storage
-
sgp_old
also talking about network stability, probably not best to remove tx_extra with no notice
-
dEBRUYNE
I am not sure if a bump in ring size without Triptych is quite productive
-
dEBRUYNE
Especially with the high tx volume currently, sync time has already been affected quite a lot
-
sgp_old
if a lot of people use thorchain (which I expect them to do), then I think 11 is insufficient. 15 would let me sleep at night
-
dEBRUYNE
Have you tried to sync 1-2 months worth of blocks recently?
-
sgp_old
nah my node has been running 24/7. wallet syncs are still fast but that's with a local node and a fancy phone
-
sgp_old
I'd rather address this problem by bumping fees, and taking the BP+ efficiency win sooner rather than later
-
dEBRUYNE
I'd be opposed against a fork in the foreseeable future, just fyi
-
sgp_old
yeah, something something triptych eventually, maybe :p
-
selsta
I personally also think that BP+ efficiency gains are not worth a standalone HF.
-
sgp_old
what are we going to do if thorchain starts processing ~25% of monero transactions
-
sgp_old
what is your plan then
-
dEBRUYNE
If they use an encrypted pID as identifier, are those transactions even publicly identifiable?
-
sgp_old
yes because the wallet they end up in reveals the view key and key images publicly
-
selsta
I don't know what thorchain is exactly.
-
sech1
some DeFi stuff
-
selsta
Why would they suddenly be 25% of tx volume?
-
sgp_old
broadly, it's a DEX that tried to imitate an instant swap model, where users can send native assets to a pool of semi-trusted nodes and receive another native asset back
-
sgp_old
you can "stake" XMR in these pools, you can swap with no KYC in an AMM liquidity pool
-
sech1
do they have any public stats? Number of users, activity etc.
-
sech1
viewblock.io/thorchain shows 535k transactions total
-
sgp_old
that's in 1 month
-
sgp_old
that blockchain only went public last month
-
sgp_old
-
sech1
That's across all coins, do you think Monero will be super popular on that platform?
-
sgp_old
Monero, the only real privacy coin, trading on a DEX with traditional DeFi benefits that allows "staking" for the first time, and has no KYC? Yeah, I think it will be popular
-
asymptotically
yeah get 500000000% APR until it collapses and you lose everything :D
-
sgp_old
that's the hot gamble the rest of the crypto space is playing :p
-
sgp_old
anyway, hopefully you see why I'm concerned about the possible # of public outputs with this coming online
-
selsta
with current tx volume bp+ will save us 1GB chain growth per year
-
sgp_old
at this point that's just the cherry though, it wouldn't be the main reason for the update because that alone is too small
-
selsta
as to increased ring size, is there any evidence / calculations that a ring size bump without Triptych has any meaningful impact on plausible deniability?
-
selsta
sgp_old: you used to push for evidence before ring size bump in the past :D
-
sgp_old
yeah plenty, check out the issue where knaccc and I run through the calculations for the same stuff mentioned in mrl-0001 and mrl-0004
monero-project/research-lab #79
-
selsta
> We should only move to ring size 16 if we are willing to pay the price of 46% higher individual tx verification times (and 21% higher verification times in churn scenarios due to one fewer churn tx being required at ring size 16).
-
selsta
I'm skeptical this is worth it :/ A targeted individual will also have issues with ring size 17 without churning.
-
selsta
it all depends how far away Triptych is
-
sarang
So is there serious interest in range proof data embedding?
-
gingeropolous
i think its a better approach than integrated address / encrypted payment ID for any sorta data storage
-
gingeropolous
sarang, ^
-
sarang
A few things to keep in mind with that
-
sarang
- You get 64 bytes per proof (with some restrictions based on scalar representations), and no more
-
sarang
- Recovering embedded data requires partially verifying the resulting proofs (scalar and hash operations only)
-
sarang
- You likely need a way to differentiate between a wallet that produced a proof with no embedding, and one that produced a proof with embedding
-
sarang
The last one means that a wallet that doesn't know about data embedding would produce proofs using random data, and a recipient would "recover" garbage data unless you had authentication or some other way to signal that a pID is present
-
sarang
Notably, the network _cannot_ detect the difference between a proof with embedding and a proof without embedding
-
gingeropolous
right, thats sorta the goal :)
-
gingeropolous
right?
-
sarang
Sure, but the UX of differentiating these two use cases should be considered
-
sgp_old
yeah that's a big
-
sgp_old
*big +
-
gingeropolous
indeed. I imagine ":and a recipient would "recover" garbage data unless you had authentication or some other way to signal that a pID is present" .. could be addressed by some sorta standard or prefix in the embedded data
-
sarang
Yep
-
gingeropolous
.e.g, if the wallet decodes and a tag is present, then its a payment ID. if the wallet decodes and no tag, then its random
-
sarang
Depends on the length of the tag
-
gingeropolous
indeed
-
sarang
A certain fraction of non-embedded proofs would have the tag by chance
-
gingeropolous
i wonder if we could sandwich it
-
sarang
To confirm, there would never be a need for per-recipient pIDs? Or longer pIDs than 64 bytes (accounting for scalar restrictions)?
-
sarang
Because again, you get 64 bytes per proof, and that's it
-
sarang
The `pybullet-plus` branch of my `skunkworks` repository has a demo of this embedding, should anyone find it useful
-
sarang
It would need to be updated to reflect the optimized code in the `monero` repository, which I haven't investigated at all
-
gingeropolous
<sarang> To confirm, there would never be a need for per-recipient pIDs? Or longer pIDs than 64 bytes (accounting for scalar restrictions)? >>> so, in other words, if you make a multi-output transaction (for multiple recipients), there's only 1 pID
-
sarang
As long as each transaction has a single range proof, you get 64 bytes per transaction to do with as you choose
-
sarang
No more
-
sarang
(technically a bit less, due to some scalar representation restrictions)
-
sarang
So you need to make sure that this restriction is acceptable, because you can't play around with it
-
sgp_old
are you sure it's 64? moo kept saying 32
-
sarang
For BP+ it is 64
-
sarang
Actually hold just one moment... I need to check something about the scalars involved there, to make sure I wasn't implicitly assuming common recipients
-
sarang
Rats, it _is_ 32 bytes... you only get 64 bytes if you can assume a common recipient among all outputs
-
sarang
Sorry for the confusion... I neglected to account for this while re-reading my demo code
-
sarang
You can include any value representable as a scalar element in the prime-order curve subgroup
-
sgp_old
sure, so the 64 byte case is unrealistic unless someone wants to record a message on-chain for themself or something
-
sarang
It does highlight that this approach in general implies restrictions that can't be avoided
-
sarang
Whereas a separate pID field, while irritating for several reasons, offers flexibility
-
sgp_old
well, flexibility of 8 bytes instead of 32 bytes
-
sgp_old
in practice BP+ storage seems more flexible in 99% of cases
-
sarang
I mean you could decide to do pIDs per recipient, or longer values, etc. and have this be a fairly arbitrary consensus decision
-
sarang
Whereas you can't do this with the BP+ approach
-
sgp_old
are pids per recipient supported?
-
sgp_old
I thought we only supported 1/tx currently
-
sarang
So the strategy for this would be that if a client detects a transaction for which it is a recipient, it would do the following:
-
sarang
- compute a hash variant of its shared secret
-
sarang
- partially verify the range proof
-
sarang
- use this data to attempt to recover embedded pID data
-
sarang
- use any signals/flags defined by the protocol to identify if data is present
-
sarang
- recover data if present
-
sarang
- ignore if data is not present (or if data is intended for another recipient)
-
sarang
Keeping in mind that it is possible for a sender not to properly embed data, in which case the signals/flags would need to be used to identify the presence of data
-
sarang
False positives would be possible
-
gingeropolous
yeah, but if a recipient is not expecting a pID, then false positives are sorta benign.
-
gingeropolous
but you definitely want to avoid false negatives
-
sarang
?
-
sarang
A recipient can always attempt to recover embedded data
-
selsta
18:24 <sgp_old> I thought we only supported 1/tx currently <-- correct
-
sgp_old
I want to separate two things
-
sgp_old
1. the 8 byte payment ID in the way it's currently implemented
-
sgp_old
2. any other conjuration of a form of payment ID with tx_extra playspace
-
sgp_old
so one ID/recipient would fall under 2 since that's not how anything currently uses it
-
selsta
did anyone ever see "Invalid decimal point specification 11" when opening a .keys file?
-
selsta
corrupted .keys file?
-
wfaressuissia[m]
"Sent ... (3.85 GB) ..., average 253.33 kB/s = 12.37% of the limit of 2.00 MB/s", "Synced 1216600/2061198 (59%, 844598 left) ..." nothing interesting, still syncing
-
wfaressuissia[m]
What was the lowest height during some ban event ?
-
wfaressuissia[m]
"... sent wrong NOTIFY_RESPONSE_GET_OBJECTS: block with ... wasn't requested, dropping connection" such errors are regular but they lead only to disconnect without ban
-
moneromooo
Odd. That should only happen for very slow connections. Is that a very slow connection ?
-
wfaressuissia[m]
both nodes (87% synced full hdd node and 2% synced pruned tmpfs node) are on the same machine but communicating through 192.7.7.1 assigned to loopback
-
wfaressuissia[m]
connection between them is surely not slow but hdd node has long delays due to writes
-
moneromooo
Slow here means a node asks for data, but doesn't receive a reply within 60 seconds.
-
moneromooo
I guess it might do that when commiting a large txn to HDD.
-
tczee36
im doing the monero book's tutorial in chapter 7, 7.4.2 Tutorial 2 - How to generate a pseudo-random address, utils.hash_to_scalar(secret_spend_key) does not exist in any python library?
-
tczee36
import utils, doesnt have alot of functions, such as utils.sc_reduce32, utils.hash_to_scalar, utils.publickey_to_privatekey, etc, so on
-
wfaressuissia[m]
-
wfaressuissia[m]
"Odd. That should only happen for very slow connections.", "... kicking idle peer ..." yes, idle peer kicker isn't correct and triggers that error
-
wfaressuissia[m]
but anyway it isn't important now since it doesn't lead to ban
-
wfaressuissia[m]
moneromooo: What avg upload speed from synced to fresh node did you have at the moment of ban ?
-
moneromooo
I did not have a ban. hyc did.
-
moneromooo
Well, apart from the sync ending at 140k (source daemon was there) but it's unrelated.
-
wfaressuissia[m]
then there is no successful reproduction outside of hyc environment
-
wfaressuissia[m]
* then there is no successful reproduction outside of hyc's environment
-
ratthing69[m]
-
ratthing69[m]
oh shit
-
ratthing69[m]
look who's makin ga lot of commits
-
selsta
ratthing69[m]: please not here :P
-
hyc
moneromooo: do you have an updated patch? or should I just go ahead with chunk#1 of that one?
-
moneromooo
paste.debian.net/hidden/fe688136 but that should only trigger when you get past the builtin hashes, so not relevant to your bans AFAICT.
-
wfaressuissia[m]
hyc: Can you try to reproduce in simplified environment with both nodes on the same machine or full node without out peers?
-
moneromooo
er, when you sync off a daemon that's itself synced to a height that ends before the end of the builtin hashes.
-
hyc
wfaressuissia[m]: both nodes on same machine, only got disconnects
-
hyc
that was log1/log2.txt
-
hyc
anyway the serving node was fully sync'd
-
wfaressuissia[m]
What's about no other peers (--out-peers, --in-peers 1) ?
-
hyc
so hashes would be well beyond the builtin hashes
-
hyc
yeah I can set it up again and try that
-
wfaressuissia[m]
What was the last commit/branch without these bans ?
-
wfaressuissia[m]
"v0.17.1.5, v0.17.1.6" it's expected v0.17.1.5 shouldn't have bans but v0.17.1.6 will have
-
wfaressuissia[m]
Can you try ?
-
hyc
that will take quite a long time to step thru
-
hyc
I'm now running 2 builds of master on same box
-
hyc
no other peers
-
hyc
seeing the 10k disconnects, no surprise there
-
wfaressuissia[m]
"that will take quite a long time to step thru" to try 2 tags or to do bisection between them ?
-
hyc
both, because it takes a long time starting from scratch before a ban occurs
-
wfaressuissia[m]
Can you send me your environment I'll try something :D ?
-
hyc
wdy mean? this is ubuntu20 laptop
-
wfaressuissia[m]
nothing
-
wfaressuissia[m]
"I'm now running 2 builds of master on same box" how many % are already synced without bans ?
-
hyc
it is just starting out, 4% syncd so far
-
wfaressuissia[m]
fresh run, ok
-
hyc
since this is over localhost I don't believe it will hit any ban
-
hyc
that was only across wifi LAN
-
hyc
but I'll let it run a couple hours and see
-
wfaressuissia[m]
nothing here even with non-loopback address
-
wfaressuissia[m]
assigned to `lo`
-
hyc
of course not
-
hyc
you're still using the loopback interface
-
wfaressuissia[m]
that means some network delays are required to trigger the problem
-
hyc
probably
-
hyc
also notice that bandwidth limits don't impede sync over loopback at all
-
wfaressuissia[m]
sw bandwidth limit can't be reached even with fast CPU and SSD?
-
hyc
I'm seeing ~15Mbps in and out over loopback now
-
wfaressuissia[m]
`print_net_stats` the result from monerod ?
-
hyc
sent average 1.39MB/s
-
hyc
69.45% of 2MB/s limit
-
wfaressuissia[m]
ok
-
hyc
Received 7478183 bytes (7.13 MB) in 2376 packets in 14.1 minutes, average 8.66 kB/s = 0.11% of the limit of 8.00 MB/s
-
hyc
Sent 1242666684 bytes (1.16 GB) in 38907 packets in 14.1 minutes, average 1.41 MB/s = 70.29% of the limit of 2.00 MB/s
-
hyc
10% syncd now
-
hyc
also - reading and writing to 2 separate SSDs
-
wfaressuissia[m]
`ip link add name lo1 type dummy`, "
wiki.linuxfoundation.org/networking/netem" it should be enough to simulate wifi connection
-
hyc
42% sync'd here no slowdowns. just the usual disconnects
-
wfaressuissia[m]
It's expected that other peers connected to 100% node are more important for reproduction than wifi connection since they add more interesting delays into async code
-
hyc
yeah I get the feeling this is only going to show up with other active peer connections
-
hyc
but I'll restart again soon over wifi
-
wfaressuissia[m]
over wifi without other peers ?
-
hyc
right
-
wfaressuissia[m]
good
-
hyc
it's 50% now I think that's good enough, going to exit and start again
-
hyc
sad that this macbook "pro" has no wired ethernet port
-
wfaressuissia[m]
and no possibility to catch thunder strike via ethernet from router :D
-
hyc
well. it's still plugged in to AC power
-
hyc
and WAN port is fiber, so no threat there
-
wfaressuissia[m]
I had one because it wasn't fiber internet :D
-
hyc
bummer. talk about rotten luck!
-
wfaressuissia[m]
everything else survived except laptop
-
wfaressuissia[m]
and router
-
hyc
path of least resistance
-
hyc
huh.
-
hyc
starting on mac with --add-exclusive-node but it is still talking to other peers
-
hyc
oops
-
hyc
other nodes hitting inbound port, forgot I set a port-forward
-
hyc
16% sync'd. looks like no issues
-
hyc
so the problem only occurs when the fullnode has other connections
-
hyc
42% syncd still going
-
hyc
so yeah, can't repro without other peers
-
wfaressuissia[m]
What will try after 50% of current test ?
-
wfaressuissia[m]
* What will you try after 50% of current test ?
-
hyc
I suppose, re-enable other peer connections
-
wfaressuissia[m]
-
hyc
ok
-
hyc
as which side, full node or new node?
-
wfaressuissia[m]
It's likely enough for fresh node
-
wfaressuissia[m]
but it would be simpler to use for both if all other fixed problems since 17.1.6+ will not pop up (out-of-memory, ...)
-
hyc
I would have to compile 17.1.6 for my Mac
-
hyc
which is doable of course. just takes more time
-
wfaressuissia[m]
-
hyc
I mean an ARM binary
-
hyc
that one should run, because of binary translation
-
hyc
but that seems like a bad idea
-
wfaressuissia[m]
How much time does it take to compile only monerod target ?
-
wfaressuissia[m]
20m ?
-
hyc
starting right now with master on mac
-
hyc
will try 17.1.6 later
-
hyc
mac is full node for now
-
hyc
linux is new node
-
hyc
about 19% sync'd got a ban
-
hyc
mac seems to have been frozen for a while
-
hyc
-
hyc
log2 is the mac fullnode
-
hyc
log1 is the linux new node, 17.1.6
-
hyc
it just seems to be banning because the mac timed out
-
hyc
these are both with loglevel 0,p2p*:DEBUG,*queue*:DEBUG,net.cn:DEBUG
-
hyc
also, the Mac is not cleaning up connections
paste.debian.net/1196474
-
hyc
1.155 is the linux new node, 1.214 is the mac full node
-
hyc
-
hyc
mebbe it's just a macos bug
-
selsta
never noticed any freezing
-
hyc
it definitely is not doing clean shutdowns of those incoming sockets
-
hyc
and it definitely is being to slow to respond
-
selsta
is the issue with connections not cleaning up on mac only?
-
hyc
haven't fired up a 2nd linux box yet to see
-
hyc
this is also strange. the connection to the mac has been in close_wait for several minutes but is still showing up in debu output
-
hyc
tcp 116585 0 192.168.1.155:56720 192.168.1.214:18080 CLOSE_WAIT
-
hyc
2021-05-05 23:43:51.665 D [192.168.1.214:18080 OUT] next span in the queue has blocks 2353364-2353383, we need 2353364
-
hyc
2021-05-05 23:48:08.329 D [192.168.1.214:18080 OUT] Block process time (20 blocks, 781 txs): 12118 (7042/5076) ms
-
hyc
or I suppose those are new connections
-
hyc
and that one is just still waiting to be cleaned up
-
hyc
dunno since the output doesn't include local port#
-
hyc
no sign of those conns on the Mac side
-
hyc
phantoms
-
hyc
there are no other connections. this node 1.155 thinks it has a conn to 1.214 but 1.214 doesn't show any and the one on the 1.155 side is in CLOSE_WAIT
-
hyc
ok it finally closed properly
-
hyc
so for several minutes it was ignoring that conn, not reading anything off it, while remote side had already closed it