-
ErCiccione[m]
-
ErCiccione[m]
Is there a solution for this? I cannot test myself what are the hops the requests goes through
-
ErCiccione[m]
damn temporary win8 brick
-
sarang
-
sarang
^ fluffypony etc.
-
sarang
-
sarang
which then 200s
-
sarang
So it looks like the first redirect is HTTP for some reason, which is not good
-
ErCiccione[m]
thanks sarang :)
-
ErCiccione[m]
ping pigeons too
-
sarang
np
-
fluffypony
tks sarang
-
fluffypony
we'll have to check the nginx file to see how it redirects
-
sarang
Would there be any legitimate reason for this setup?
-
fluffypony
yes
-
fluffypony
it's wrong, but it's because updates.getmonero.org didn't support TLS
-
fluffypony
moneromooo: am I correct in saying that the auto-updater can now handle HTTPS?
-
sarang
ah
-
fluffypony
because then we can just force TLS
-
sarang
Yeah
-
sarang
Wouldn't be dangerous if everyone checks hashes and signatures
-
sarang
but MITM is no good
-
sarang
Could you at least force HTTPS for those links, and if needed use HTTP for the updater since it always checks signatures?
-
sarang
So at least an HTTP-routed updater would fail secure
-
ErCiccione[m]
Yeah but that's a big "if" :)
-
ErCiccione[m]
* That's a big "if" :)
-
sarang
HTTPS for links and _maybe_ HTTP for updater (but ideally not) would result in everyone failing secure (unless they manually do the HTTP link)
-
fluffypony
sarang: yes - that's a workaround if we still need to support HTTP
-
ErCiccione[m]
(I was just joking about "if everyone checks hashes", my message could have been relayed with a delay)
-
sarang
ErCiccione[m]: yeah, relying on hash and signature checks to avoid MITM seems like a bad idea
-
moneromooo
It does.
-
sarang
:D
-
ErCiccione[m]
Yep π Trusting people to do what's best for them? what could go wrong?
-
fluffypony
moneromooo: it does as in we can dump HTTP?
-
moneromooo
Yes.
-
fluffypony
ok cool
-
ErCiccione[m]
Cool
-
sarang
ErCiccione[m]: checking hashes and signatures is a bit of a PITA, though important
-
sarang
Best to provide some layers of protection for people who don't
-
sarang
Even though it's not possible to remove all risk
-
moneromooo
Just make sure you inlcude a cipher suite epee+openssl can use.
-
sarang
MD5+DES, got it
-
moneromooo
Who are you and what have you done with sarang ?
-
ErCiccione[m]
True, but i'm pleasantly surprised by the amount of people who actually check monero hashes. Maybe the website hack scared the most tech savy in the communityh
-
sarang
Check hashes, or hashes+signatures?
-
fluffypony
ok I've flipped on HTTPS everywhere for the whole of getmonero.org
-
fluffypony
and enabled HSTS
-
ErCiccione[m]
Many seem to at least check hashes, for what i noticed at least
-
fluffypony
and requested we go into the HSTS preload list
-
sarang
fluffypony: so the redirect should be gone? (will test)
-
fluffypony
so if anything breaks we'll know in the coming weeks that we're relying on HTTP for something
-
fluffypony
sarang: no not yet
-
fluffypony
we're fixing that too
-
ErCiccione[m]
That's a relative "many" tho
-
sarang
ah ok
-
sarang
Please let us know when that can be tested
-
sarang
ErCiccione[m]: checking only hashes doesn't do much of anything
-
sarang
And I don't want people to think it does more than it actually does
-
ErCiccione[m]
It's still something tho. It allowed us to notice we were showing wrong hashes in the downloads page recently
-
ErCiccione[m]
fair enough
-
sarang
Sure, but that was lucky
-
sarang
A more clever/capable attacker would have changed those too
-
sarang
Oh, you mean the switched hashes
-
sarang
yes
-
sarang
I think the download page language on signature verification should be much stronger, FWIW
-
sarang
To say that the only way to guarantee the binaries you have are those intended by the maintainers, you need to do both steps
-
moneromooo
"Your hardware might be pwned anyway, don't bother"
-
sarang
and that if you also wish to check that the maintainers honestly compiled the right code, you should do repro builds
-
sarang
moneromooo: :(
-
moneromooo
OK. Paranoid enough, but not too much.
-
sarang
Well, I think it should be more clear about what steps mitigate what risks
-
sarang
Checking hashes could be just asking the attacker "hey attacker, are you an attacker?" "um, no..."
-
moneromooo
Well, I get the idea, but if you claim you might get the wrong hahes to begin with, then you might get the wrong pubkey to begin with too. So you'd need to check the GPG sig in git for pony's key, and...
-
moneromooo
But sure, explaining what is what is good.
-
sarang
Yeah, and the real risk is a malicious binary, which has happened
-
sarang
Those two steps eliminate that risk
-
sarang
Problem solved
-
sarang
People worried about other risks can/should take extra steps
-
sarang
Not everyone cares about the repro build, and that's fine
-
sarang
But people who do care can (and do) run it
-
fluffypony
ok we've solved it, we're rolling it out for all the URLs, should be done in a few mins
-
sarang
Nice, that was fast
-
sarang
Probably worth noting in that issue why it was set up the way it was
-
sarang
(once it's fixed, that is)
-
fluffypony
ok all fixed
-
sarang
testing
-
fluffypony
pigeons did all the effort
-
fluffypony
all I did was clear the cache a bunch
-
sarang
no change yet
-
sarang
probably still a caching issue?
-
sarang
I'm getting a 302 to the http loation
-
fluffypony
oh hmmm
-
fluffypony
something still cached
-
fluffypony
lemme fix
-
sarang
unless `curl` is caching locally
-
sarang
nope, tried on a different machine
-
fluffypony
oh I rushed it sorry
-
fluffypony
pigeons is still busy
-
fluffypony
my bad
-
sarang
got it
-
fluffypony
yay all works
-
sarang
Confirmed!
-
fluffypony
party emoji!
-
sarang
Someone want to note this on the issue?
-
sarang
-
sarang
The original reasoning would be good too
-
fluffypony
I'm doing it now
-
sarang
cool
-
sarang
I'll confirm the test after you comment
-
sarang
in case that's helpful
-
ErCiccione[m]
Thanks pony and pigeons. I have a comment ready, but go for it :)
-
sarang
:D
-
sarang
Has there been any movement on removing analytics?
-
sarang
It was brought up a while ago
-
asymptotically
aren't they already gone?
-
sarang
-
ErCiccione[m]
asymptotically: analytics are not working but the JS code is still on the website
-
ErCiccione[m]
Personally, i'm fine with remove all JS and use only server logs for anamlytics
-
ErCiccione[m]
*removing
-
dsc_
access_logs /dev/null; @ nginx ? :P
-
sarang
OK, anything that would need to be done before just making a PR that nukes the JS code?
-
ErCiccione[m]
I would prefer to have analytics working before deleting all JS. Doesn't really change anything practically, but at least keeps people's attention up :P
-
sarang
I don't really follow how that benefits users
-
sarang
Right now, it's "trust us, we have analytics code but nothing happens with it"
-
sarang
Is that correct?
-
ErCiccione[m]
No, right now anybody can see that js code is actually not working.
-
ErCiccione[m]
anybody who inspect any page at least
-
sarang
Ah ok, so it's present but the user could in theory verify that no data is sent?
-
ErCiccione[m]
Yes, it's not intentional tho. Matomo is down for its own reason, but there is a content policy conflict that blocks matomo's JS
-
ErCiccione[m]
Loading failed for the <script> with source β
analytics.getmonero.org/piwik.jsβ.
-
ErCiccione[m]
Content Security Policy: The page's settings blocked the loading of a resource at
analytics.getmonero.org/piwik.js ("default-src").
-
sarang
I do like the idea that the project could lead by example
-
sarang
which leads me to support removing the code
-
sarang
Otherwise you're waiting for someone to enable server-side stuff
-
ErCiccione[m]
If there is the feeling that we should just remove it ASAP, i can do that. No problem. I will just ping people harder if necessary (about server logs used for analytics)
-
ErCiccione[m]
I can make a PR right now
-
sarang
I don't think an ASAP thing if users can verify
-
sarang
but I don't think waiting for server stuff is a good reason not to do it anyway
-
sarang
That signals a failure of process, which shouldn't block this
-
ErCiccione[m]
I would have liked to have confirmation by pigeons that server logs can be used for analytics (and they should), but since we want to remove all JS reguardless, i'm gonna do it right now. Worst case scenario we will keep working without any analytics data.
-
sarang
:D
-
asymptotically
could we get the analytics made public so people can see exactly that kind of data is kept?
-
sarang
-
ErCiccione[m]
sarang: yes, that should be it
-
asymptotically
js-begone? did you use a text editor for this or an ancient spell
-
sarang
Will PR after the CI build
-
sarang
Hehe, I figured the branch name could be whimsical :)
-
sarang
Unless you want me to just PR now
-
ErCiccione[m]
asymptotically: I honestly don't know, but if possible i agree we should consider it
-
ErCiccione[m]
sarang i think you can safely PR now
-
sarang
will do, one sec
-
sarang
-
ErCiccione[m]
Could you write "Closes issue" instead of "Addresses issue"? so the issue will be closed automatically once your PR is merged
-
ErCiccione[m]
sarang ^
-
sarang
Oh sure
-
sarang
done
-
ErCiccione[m]
sorry, my fault. To trigger the automatic close should be "Closes #ISSUENUMBER" without "issue" before
-
sarang
done
-
ErCiccione[m]
thanks
-
sarang
Oh don't merge yet
-
sarang
I forgot to remove a paragraph about Matomo
-
sarang
will fix now
-
sarang
Please check the updated privacy language
-
sarang
to ensure it is accurate
-
sarang
-
sarang
That preview CI is pretty slick
-
sarang
I could just open the link to check the pages and (lack of) scripts
-
sarang
OK, PR is updated
-
ErCiccione[m]
We don't really use that data to provide "statistics on the website" yet (at least AFAIK), but looks good to me. Will review it in a sec
-
sarang
Right, but the intent is to start doing that
-
sarang
Seemed prudent to leave it in
-
ErCiccione[m]
I could just open the link to check the pages and (lack of) scripts -> yeah that's what i was waiting for :D
-
ErCiccione[m]
yes sure, i didn't mean to suggest to remove it
-
xmr-pr
erciccione opened issue #1085: Set up Matomo to parse server logs for analytics
-
xmr-pr
-
xmr-pr
SarangNoether opened pull request #1084: Remove analytics
-
xmr-pr
-
sarang
good bot
-
ErCiccione[m]
.merge+ #1084
-
xmr-pr
Added
-
ErCiccione[m]
That javascript will need to be removed from ccs.getmonero as well and maybe somewhere else
-
sarang
aye
-
ErCiccione[m]
in the meantime i opened an issue about using server logs for analytics, so we don't forget about it :)
monero-project/monero-site #1085
-
» ErCiccione[m] going afk for at least one hour
-
sarang
Making changes for CCS now
-
sarang
-
dsc_
nice one guys
-
dsc_
& girls
-
dsc_
also nice bot
-
sarang
Anywhere else it should be removed?
-
sarang
this takes care of getmonero.org and ccs.getmonero.org
-
selsta
xmr-pr best xmr employee
-
dsc_
employee of the month