14:34:21 https://github.com/monero-project/monero-site/issues/1081 14:35:00 Is there a solution for this? I cannot test myself what are the hops the requests goes through 14:35:38 damn temporary win8 brick 14:37:29 the linux64 URL 302s to this: http://dlsrc.getmonero.org/gui/monero-gui-linux-x64-v0.16.0.2.tar.bz2 14:37:40 ^ fluffypony etc. 14:38:16 which in turn 301s to this: https://dlsrc.getmonero.org/gui/monero-gui-linux-x64-v0.16.0.2.tar.bz2 14:38:40 which then 200s 14:38:51 So it looks like the first redirect is HTTP for some reason, which is not good 14:46:47 thanks sarang :) 14:47:09 ping pigeons too 14:50:03 np 15:05:28 tks sarang 15:05:41 we'll have to check the nginx file to see how it redirects 15:06:29 Would there be any legitimate reason for this setup? 15:32:06 yes 15:32:17 it's wrong, but it's because updates.getmonero.org didn't support TLS 15:32:28 moneromooo: am I correct in saying that the auto-updater can now handle HTTPS? 15:32:36 ah 15:32:52 because then we can just force TLS 15:32:57 Yeah 15:33:07 Wouldn't be dangerous if everyone checks hashes and signatures 15:33:14 but MITM is no good 15:33:43 Could you at least force HTTPS for those links, and if needed use HTTP for the updater since it always checks signatures? 15:34:34 So at least an HTTP-routed updater would fail secure 15:34:40 Yeah but that's a big "if" :) 15:34:50 * That's a big "if" :) 15:35:28 HTTPS for links and _maybe_ HTTP for updater (but ideally not) would result in everyone failing secure (unless they manually do the HTTP link) 15:35:29 sarang: yes - that's a workaround if we still need to support HTTP 15:35:46 (I was just joking about "if everyone checks hashes", my message could have been relayed with a delay) 15:36:05 ErCiccione[m]: yeah, relying on hash and signature checks to avoid MITM seems like a bad idea 15:36:21 It does. 15:36:36 :D 15:36:53 Yep 🙂 Trusting people to do what's best for them? what could go wrong? 15:36:54 moneromooo: it does as in we can dump HTTP? 15:37:00 Yes. 15:37:15 ok cool 15:37:25 Cool 15:37:30 ErCiccione[m]: checking hashes and signatures is a bit of a PITA, though important 15:37:41 Best to provide some layers of protection for people who don't 15:37:48 Even though it's not possible to remove all risk 15:37:49 Just make sure you inlcude a cipher suite epee+openssl can use. 15:38:02 MD5+DES, got it 15:38:18 Who are you and what have you done with sarang ? 15:38:26 True, but i'm pleasantly surprised by the amount of people who actually check monero hashes. Maybe the website hack scared the most tech savy in the communityh 15:38:43 Check hashes, or hashes+signatures? 15:39:23 ok I've flipped on HTTPS everywhere for the whole of getmonero.org 15:39:26 and enabled HSTS 15:39:31 Many seem to at least check hashes, for what i noticed at least 15:39:34 and requested we go into the HSTS preload list 15:39:45 fluffypony: so the redirect should be gone? (will test) 15:39:45 so if anything breaks we'll know in the coming weeks that we're relying on HTTP for something 15:39:49 sarang: no not yet 15:39:52 we're fixing that too 15:39:58 That's a relative "many" tho 15:39:58 ah ok 15:40:09 Please let us know when that can be tested 15:40:29 ErCiccione[m]: checking only hashes doesn't do much of anything 15:41:22 And I don't want people to think it does more than it actually does 15:41:41 It's still something tho. It allowed us to notice we were showing wrong hashes in the downloads page recently 15:41:44 fair enough 15:41:49 Sure, but that was lucky 15:42:11 A more clever/capable attacker would have changed those too 15:42:22 Oh, you mean the switched hashes 15:42:23 yes 15:43:21 I think the download page language on signature verification should be much stronger, FWIW 15:43:42 To say that the only way to guarantee the binaries you have are those intended by the maintainers, you need to do both steps 15:43:53 "Your hardware might be pwned anyway, don't bother" 15:44:03 and that if you also wish to check that the maintainers honestly compiled the right code, you should do repro builds 15:44:09 moneromooo: :( 15:44:27 OK. Paranoid enough, but not too much. 15:44:44 Well, I think it should be more clear about what steps mitigate what risks 15:45:18 Checking hashes could be just asking the attacker "hey attacker, are you an attacker?" "um, no..." 15:46:24 Well, I get the idea, but if you claim you might get the wrong hahes to begin with, then you might get the wrong pubkey to begin with too. So you'd need to check the GPG sig in git for pony's key, and... 15:46:43 But sure, explaining what is what is good. 15:47:06 Yeah, and the real risk is a malicious binary, which has happened 15:47:12 Those two steps eliminate that risk 15:47:15 Problem solved 15:47:24 People worried about other risks can/should take extra steps 15:47:56 Not everyone cares about the repro build, and that's fine 15:48:12 But people who do care can (and do) run it 15:48:46 ok we've solved it, we're rolling it out for all the URLs, should be done in a few mins 15:48:53 Nice, that was fast 15:49:45 Probably worth noting in that issue why it was set up the way it was 15:49:51 (once it's fixed, that is) 15:50:49 ok all fixed 15:50:53 testing 15:50:56 pigeons did all the effort 15:51:02 all I did was clear the cache a bunch 15:51:10 no change yet 15:53:38 probably still a caching issue? 15:53:48 I'm getting a 302 to the http loation 15:54:30 oh hmmm 15:54:35 something still cached 15:54:36 lemme fix 15:54:54 unless `curl` is caching locally 15:55:03 nope, tried on a different machine 15:55:14 oh I rushed it sorry 15:55:17 pigeons is still busy 15:55:18 my bad 15:55:25 got it 16:00:26 yay all works 16:00:49 Confirmed! 16:00:59 party emoji! 16:01:06 Someone want to note this on the issue? 16:01:08 https://github.com/monero-project/monero-site/issues/1081 16:01:16 The original reasoning would be good too 16:01:17 I'm doing it now 16:01:28 cool 16:01:35 I'll confirm the test after you comment 16:01:39 in case that's helpful 16:02:47 Thanks pony and pigeons. I have a comment ready, but go for it :) 16:08:52 :D 16:17:09 Has there been any movement on removing analytics? 16:17:14 It was brought up a while ago 16:17:39 aren't they already gone? 16:18:14 Issue: https://github.com/monero-project/monero-site/issues/978 16:23:04 asymptotically: analytics are not working but the JS code is still on the website 16:23:34 Personally, i'm fine with remove all JS and use only server logs for anamlytics 16:23:42 *removing 16:24:23 access_logs /dev/null; @ nginx ? :P 16:26:29 OK, anything that would need to be done before just making a PR that nukes the JS code? 16:27:30 I would prefer to have analytics working before deleting all JS. Doesn't really change anything practically, but at least keeps people's attention up :P 16:28:07 I don't really follow how that benefits users 16:28:22 Right now, it's "trust us, we have analytics code but nothing happens with it" 16:28:43 Is that correct? 16:28:53 No, right now anybody can see that js code is actually not working. 16:29:03 anybody who inspect any page at least 16:29:34 Ah ok, so it's present but the user could in theory verify that no data is sent? 16:30:49 Yes, it's not intentional tho. Matomo is down for its own reason, but there is a content policy conflict that blocks matomo's JS 16:31:13 Loading failed for the