00:00:10 Tor and i2p bring in all sorts of legal concerns, especially tor entrance and 1000% for tor exit nodes. 00:02:49 whats up with Erik Vorhees - https://twitter.com/ErikVoorhees/status/1345100565735378947?s=19 00:03:07 never had an issue on hetzner with noisy neighbor. also told me you can host all the network nodes, basically. 00:03:32 node.supportxmr.com was running fine for 2 years on a hetz vps 00:03:44 but nodes only need bandwith 00:03:48 legal concerns for TOR exit nodes? i think there is a bunch of libraries that host exit nodes here in the US 00:04:19 M5M400: ya thats why i went with hetz because bandwidth. 00:04:48 just looking to get something closer to me because of the latency. 00:04:56 yes, huge legal concerns for running a tor exist node in the US. 00:05:34 there are exit nodes in the us. like i said, i think there are libraries that run some here. 00:06:43 also all the i2p traffic is encrypted and there is no practical exiting of the i2p network 00:07:01 If I remember correctly, I believe in a youtube videos in which they specifically state to form an llc if hosting a tor exist node, to avoid the police searching your personal computers if pedo stuff is detected from the out-going node. 00:07:08 Very odd 00:07:19 His whole approach to the ShapeShift delisting was weird 00:07:31 https://twitter.com/sethisimmons/status/1345124584186634245?s=21 00:09:56 Tor lists hetzner, DO, OVH, and Online s.a.s. as providers to avoid, so idk why you would knock ovh for not wanting a tor exist node when hetzner apparently does not want them either. 00:13:24 * zed19[m] uploaded an image: download (2).jpeg (68KiB) < https://matrix.org/_matrix/media/r0/download/matrix.org/zZvlSaJuAxanyPDdGkYfCawJ/download (2).jpeg > 00:19:22 im just saying OVH doesnt want any type of nodes, not just TOR. no I2P or crypto. hetzner says go right ahead with I2P and crypto. 00:19:30 ive never ran a TOR node. 00:55:14 hello 00:55:17 happy new year 00:56:41 is possible to choose a specific tx on pool for mining 01:00:00 If you're the one running the daemon which the pool is mining on, definitely. 01:00:25 yes im 01:00:37 the command? 01:01:03 i checked help all on cli but didnt find smth 01:01:12 I'm not sure it's as easy as a single command 01:01:35 sethsimmons: https://old.reddit.com/r/xmrtrader/comments/ko9s3k/daily_discussion_friday_january_1st/ghrygd3/ 01:11:28 https://www.reddit.com/r/Monero/comments/kom0hv/torserversnet_but_for_monero_nodes/ 01:11:39 Any thoughts and concerns would be appreciated 01:12:58 Thanks will read 01:19:02 "im just saying OVH doesnt want any type of nodes, not just TOR. no I2P or crypto." Than you should report to OVH the 50 OVH IPs that the attacker is using on OVH's network...... If OVH does not do anything about those attacking nodes, OVH is not going to complain about a person running a legit crypto node on their network. 01:19:58 is monero going down because of this attacks? 01:20:06 monero price i mean 01:21:53 maraga: Nope. https://www.reddit.com/r/Monero/comments/koexu5/montero_delisted_from_bittrex_on_jan_15th_thats/ 01:22:59 that is not a serius thing.there is allways bisq as solution 01:23:45 and i believe that negative news are positive news for monero 01:26:27 anyone to help on how to choose tx for mining? 01:53:03 "tx" for mining? You choose a mining pool, and if you want a dedicated rig for it, a rig. Nothing else to choose AFAIK 02:43:46 bittrex is trash anyway 02:44:15 bimbos 02:50:01 XMR in freefall -- is there any specific news triggering that? 02:51:08 bittrex delisting caused panic 02:51:42 moronic since bittrex xmr volume was near zero already 02:52:15 dunno how anyone can believe free markets are so great when investors are so irrational 02:52:38 mebbe that's why :) 02:54:32 just some random traders dumping. I just hope not many exchanges follow. 03:02:01 there is no reason for them to follow 03:02:22 bittrex has had issues for a long time that lead to this 03:03:20 now i can buy some moneroooo 03:09:50 righto, good time to bottom-pick and quadruple my position then :) 03:10:21 did bittrex cop a squeeze from regulators? 03:10:43 there was no explanation 03:11:18 just have to infer based of the past history 03:11:40 based on past*********** 03:12:26 reposting link https://old.reddit.com/r/xmrtrader/comments/ko9s3k/daily_discussion_friday_january_1st/ 03:12:45 https://twitter.com/jespow/status/1345117102009536512 03:18:32 @nioc : "Tweet 03:18:32 See new Tweets 03:18:32 This is not available to you" 03:19:06 did you try reloading 03:19:31 sometimes tweets don't load the first time 03:19:58 I haz no tweeter account 03:20:47 WTF, bittrex 03:22:53 ndorf: I was kicked off of bittrex, mebbe a year or more ago, because the NY regulators didn't like that they were still allowing people like Mickey Mouse to sign up after they were warned to get their house in order 03:24:32 Reload worked. 03:24:36 \o/ 03:24:58 ndorf: Happy New Year!!! 03:26:16 nioc: oof, haha. 03:26:25 i think i will close my bittrex account citing monero delisting as the reason 03:26:33 and happy New Year to you as well! 03:28:56 as long as kraken keeps XMR open 03:31:30 kraken is great. it sucks to have only one exchange to rely on though 03:32:31 ndorf it'll be better soon because litecoin will have mimblewimble and then it's going to be harder for exchanges to get rid of privacy coins 03:32:50 i guess this discussion really belongs on xmrtrader right? 03:32:58 i mean #Monero-markets 03:33:09 i mean, they might be okay with the weak ass privacy of mimblewimble but not the stronger privacy of monero 03:33:48 maybe, i dunno. i assume if someone is bothered by this conversation they'll let us know :) 03:33:59 true. it's not my place to tell people what to do 03:34:04 not my chan 03:34:27 but i'll be respectful and only talk about market stuff on #monero-markets 03:36:19 ndorf: grin was also delisted 04:03:52 way I see it, monero being delisted = more competition on localmonero 04:05:34 would be nice to minimize the nokyc premium 04:13:42 Right, but I'll start to get a bit worried about localmonero later on. I don't think Monero is going to be delisted from all exchanges, but if so, then it'll be matter of time until the feds start to have a big problem with localmonero 04:17:43 As for kyc or nokyc, matter of time until it starts to get abused hard and becomes practically useless https://wilderko.medium.com/how-does-kyc-aml-pose-a-serious-threat-to-your-privacy-and-should-not-be-used-at-all-88f7acd3f3b 04:38:44 what country is local monero hosted in? 09:24:30 Beags[m]: Hong Kong I think. Might be wrong. 09:43:40 jess: I can tell you why you can't stop the 'spam'. You are thinking in cult doctrine. If it was real spam, and I was selling Viagra for example - you could easily ban keywords and urls. Instead, stop being a sheep, think like a cult leader. Recoginse that this 'spam' is just some bullshit that you tell to the sheep. 09:43:40 When you do that, solution will present itself. Observe. 'spam' -> 'FUK talks bad things about Monero on our IRC' (Don't say that out loud obviously, that will get you excommunicated) Solution? Get off-the-shelf sentiment analyser, detect anyone who 'talks bad things about Monero' and ban them. 12:02:28 Is there a discord server that is generally used? 12:22:47 kiwi_48 https://discord.gg/3GDDeqjypN 13:06:16 Hello there. I'm a SysAdmin and I have a server infected with monero minner malware. I was looking for on GitHub a kind of tool for checking the execution of Xring protocol. Can someone help me? 13:07:23 No clue what Xring, but for the monero malware part, http://mrw.getmonero.org/ might help. 13:11:17 I just learned about monero 13:11:48 And I got excited when I heard the asic resistant feature 13:12:30 It has great sides, and also not great ones. A hard path to follow for sure. 13:12:53 I don't understand what that means in details. But it just means that small fish still got a chance at mining this. Even with cpu. 13:12:53 But it's easy! https://www.youtube.com/watch?v=RXJKdh1KZ0w 13:13:37 Thanks for the link. I will watch it than come back. I have more questions. 13:14:56 What is this video about? 13:17:22 Ammar__, technology 13:17:24 What video ? 13:17:39 * moneromooo assumes someone on the kill list replied 13:17:42 moneromooo, Quotes 13:17:56 Oooh :D 13:18:25 moneromooo, the "i don't understand" trigger 13:19:08 Well, what the best guide out there on mining xmr? 13:20:25 Also, what's makes you mine faster, more cpus, or more powerful ones? 13:20:39 both 13:23:01 So what asic resistant really means if cpu power is still a contributing factor? 13:23:28 CPU != ASIC 13:23:45 Oh. 13:24:31 Means rigs like gridseed and the likes can't mine it 13:25:00 The PoW algorithm monero uses tries to use modern CPU strengths. Making an ASIC for it basically means developing a lof of an actual CPU. 13:25:48 The idea's that Intel/AMD/ARM are already pretty good at this, so topping them is gonna be a high bar, even with the ability to drop some parts of hte CPU you don't need. 13:26:48 I see. Now this make sense to me. Thanks. 13:28:10 Is it possible to develop a better algorithm to mine it if someone's try too? 13:29:03 Probably. 13:29:47 It's like everything else. Doing better is almost always possible, it just takes more and more effort for less and less improvement. 13:30:05 In general, etc, etc. 13:30:47 yup 13:30:52 very smart 13:31:00 so how about that delisting, eh? 13:35:03 This delisting will be forgotten in a couple of weeks 13:37:32 I will never forget 13:41:28 1/1/21 Never forget! 14:51:50 Probably not 14:51:59 Hi there. I made an XMR withdrawal from binance which seems to have gone through but hasnt come through to my wallet. I've tried Mymonero and monero gui. it has been about 4 hours now. does anyone have any suggestions? 14:53:24 Should coMe through immediately but not settle for 10? Blocks 14:53:56 Did you copy paste the address from your gui wallet to binance withdrawal box? 14:55:45 i scanned it. Ive checked the addresses from binance destination address and my wallet and they match 14:58:16 obviously a transaction sent is logged what about when it arrives in wallet? is that logged other than locally? 15:06:24 Sorry it took a while "$ file monero-wallet-climonero-wallet-cli: ELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /system/bin/linker64, with debug_info, not stripped" 15:07:29 Is this just unheard of? RE XMR not arriving in wallet? is there anyway to debug this? 15:07:49 It's heard of a lot. The two main reasons are: 15:08:06 - your daemon and/or wallet isn't done syncing/scanning 15:08:37 - your wallet is set to ignore everything before a certain block that's after your tx 15:09:01 For the second problem, type "set" in monero-wallet-cli, then check the value of refresh-from-block-height. 15:09:33 If it's a value larger than 2.26 million, try setting it to 2.5 million and issue: rescan_bc 15:10:13 For the first problem, type "status" in monero-wallet-cli, check it claims it's at about 2.2657 million. 15:13:54 i'll work with that for now, I haven't used monero-wallet-client yet so ill give those a go. thanks 15:14:39 you can also do this with the GUI 15:15:28 go to settings -> info, click on "(change)" next to wallet restore height and then on ok twice 15:15:37 then wait until a full refresh is done 15:21:28 dav: I've had a miner today reporting that a payment from my pool didn't hit his mymonero wallet too. I verified it's on the chain. he can see subsequent TX though. maybe their service has a problem atm 15:26:30 that worked. thanks, i can rest now! cheers guys 15:26:51 The refresh-from-block-height one ? 15:27:01 yes 15:27:11 How did you originally create this wallet ? 15:27:37 in MyMonero 15:28:00 Well, glad it's all good now :) 15:28:25 me to lol ☺️ 16:03:41 monero got delisted on bittrex 16:03:58 any opinion? 16:04:35 alexhugo: https://www.reddit.com/r/Monero/comments/kouacy/havent_heard_of_anything_on_the_regulatory_side/ 16:07:50 hello 16:10:33 on how many places xmr can be sold 16:11:04 bisq one of the best 16:11:41 just is running in java and need lot of resource 16:11:58 sometimes dont play at all! 16:20:16 why i have always "pending" for transfer on new chain 16:20:26 even if i do relay tx nothing changes 16:20:36 when i do flush_Tx money are back in wallet 16:21:36 maraga: Which version of the wallet are you using? 16:21:48 the latest 16:21:52 Maybe your tx is invalid. Might hapen if your local daemon is not synced, or the db is shot in some specific way. Or you might be connected only to asshole nodes that don't relay txes. 16:22:21 tx is valid 16:22:45 im connected to one node and no issue on connection 16:23:10 Try downloading https://gui.xmr.pm/files/block.txt, run ban @block.txt, then try again after you have a few connections. 16:27:50 is possible to choose from cli or daemon specific tx to mine? 16:29:29 No. 16:32:41 maraga: which node are you using? 16:33:53 im talking about new chain 16:59:01 Hi all, is it normal for sync_info to show several peers being 2 blocks behind? (e.g. 2265773 with current being 2265775) 16:59:16 Yes. 17:09:34 Regarding "generic" network attacks (not those specifically aimed at the p2p / rpc protocols) please check https://security.radware.com/ddos-threats-attacks/ddos-attack-types/ddos-attacks-on-network-resources/ and https://blog.radware.com/security/2017/11/http-attacks/ I wonder if monerd would be susceptible to resource exhaustion attacks ... 17:11:37 It is. 17:17:03 Many attacks can be mitigated by a host with ddos scrubbing. UDP floods, iCMP floods, syn floods, Can all be mostly mitigated by a host with good ddos scrubbing. 17:17:05 People still spamming monero nodes? 17:18:20 I think so. I didn't look today. 17:18:28 But yesterday yes. 17:18:43 I haven’t updated for a few point releases 17:19:08 Did you guys implement auto ignore of known bad nodes? 17:19:11 My logs are back to normal atm so I don't see what's happened recently, but I assume they're still at it. 17:19:24 Or just delete p2plists? 17:19:46 Depends on your definition of auto, ignore, known and bad :) 17:20:27 yep, they are still doing this attack 17:20:27 Heh 17:20:41 There's a DNS based list of known bad nodes you can use to ban them, it's not default though. 17:20:46 Do we still have to manually block bad ip? 17:21:01 And various detection of various assholery, but this will never catch everything. 17:21:07 Why not default the bad nodes? 17:21:25 The chances of a good operator getting that IP is quite slim 17:21:36 monerofanboy I am asking because I was wondering if would be possible/effective to use HAproxy in front of monerod http://cbonte.github.io/haproxy-dconv/2.4/intro.html#3.1 17:21:41 Unless bad actor using vpn 17:21:44 It gives an attack vector of getting to write to that list and ban good nodes. 17:21:59 Yea 17:23:15 19 more days.... 19:16:43 To follow up from earlier, an HAproxy would help to mitigate some attacks,but definitely not all. I.e., I tested a syn flood against my own POS consumer router and I was easily able to overwhelm my router. An HAProxy would help against to protect an attack like that, coming from one single remote attacker; however, an attacker who is sending an syn 19:16:43 flood from 25 hosts at once would saturate and overwhelm my bandwidth from my ISP. 19:18:02 So a HAProxy would help, but against a determined attacker, at some point, an HAProxy is no help at all. 19:20:24 This is where host ddos scrubbing from companies like OVH, Amazon, etc help a ton, because both Amazon and OVH and the bandwidth to withstand huge DDOS attacks and can scrub the traffic going into a VPS server, hopefully keeping the server from being ovewhelmed. 19:20:39 have the bandwidth* 19:59:01 Lyza: we might have found the freezing issue 19:59:15 or one more, don’t know if there are multiple 20:14:41 great news! it does seem like there might be a couple diff ones but idk. my nodes been behaving today 20:14:54 since earlier anyway 20:26:04 Lyza: hope your node freezes again so that we can get gdb output 20:26:17 seems like my freeze is due to a recent patch 20:40:07 where daemon block list? 20:40:52 0.17.1.8-release 20:41:15 https://gui.xmr.pm/files/block_tor.txt 20:42:49 omg 20:43:00 any way to ban all of them or do we have to run each one? 20:43:12 --ban-list /path/to_block_tor.txt 20:43:24 oh nice 20:43:40 or `ban @/path/to/block_tor.txt 99999999` when you want to reload it while monerod is running 20:45:29 hmm did not work 20:46:05 unknown command: --ban-list C:\Users\pathto\monero\block_tor.txt 20:46:23 oh duh have to start cli with that add on 20:46:35 try it on linux :] 20:46:51 like I said, or use the ban @path command 20:46:57 then you can use it after it is started 20:47:14 ban @C:\Users\pathto\monero\block_tor.txt 9999999 20:47:28 ahh good to go 20:47:59 selsta: i found another block list somewhere, but I'm wondering is there a place where the xmr community keeps this info in sync? or how does that work? 20:48:18 ban @C:\Users\PoopyDiaper\Desktop\Rando,\monero\block_tor.txt worked 20:48:22 haha 20:48:34 edi_: which one did you find? 20:48:46 one on reddit, but can't exactly remember the post 20:48:57 its much shorter than yours 20:49:05 (or the one you referred to) 20:49:18 https://gui.xmr.pm/files/block.txt ? 20:49:26 ah, could be 20:49:35 this one is the same as the other, just without tor exit nodes 20:49:43 still getting the error 2021-01-02 19:11:59.123 E failed to find transaction input in key images. error on cli 20:49:44 yeah I think it is 20:49:55 ah oke, I figured it had smth to do with tor :) 20:49:58 with img number 20:50:33 but my next question , why/when are tor exit nodes problematic, 20:50:36 ? 20:50:43 then 2021-01-02 19:11:59.124 E transaction id = 20:50:47 because someone uses them to send crafted packets 20:50:54 so we temporarily ban them 20:51:07 bigslim[m]: don’t think this is related to the ban list 20:51:09 oke, so how you deal with the problem that ip's can change quickly? 20:51:11 what are you trying to do? 20:51:20 running a node, safely :) 20:51:27 meant bigslim[m] :D 20:51:31 lol 20:51:41 yes, they can get new IPs, it is not a long term solution 20:51:56 selsta: no this has been here since IIRC 17.1 20:53:53 it happens only after I update to latest version and run the first time. Then after I do not get the errors. 20:54:13 so just updated to 17.8 and got the errors, now restarted daemon and no errors 20:54:36 maybe its picking up the wrong chain tx's from back then or something. 20:55:42 selsta: so if you run a node without the blocklist, what's the worst that can happen? 20:58:26 Currently, your node crashes if it doesn't have renough memory, which is something like a couple dozen GB I think ? Not sure about the number. 20:58:40 32 GB ok :) 20:58:42 Well, more like killed by the OOM killed, but same differnce. 20:59:35 64 GB definitely enough. 4 GB definitely not enough. 20:59:57 I've seen 39 GB used on a 64 GB server with .8 release 21:00:05 jeesh 21:00:48 I do not think I have ever used more than maybe 20gb at a time and thats running 4 VM and 2 daemons at the same time 21:03:04 i limit my node at 4GB 21:03:19 +/- 21:04:01 but it runs on a machine with more overhead 21:05:26 so it's some weird sort of DDOS attack they're employing? or what do they hope to accomplish 21:05:30 bring the network down? 21:05:32 :] 21:07:33 no clear goal, probably just disruption and annoying node operators 21:07:48 but it’s good if it causes us to find and fix issues 21:11:17 i've got my own node, so i've never used someone else's node. when you use simple wallet mode, for instance, and your node just connects to another one, what happens if it connects to a rogue node. couldn't the rogue node just have a completely wrong blockchain? 21:11:22 exactly, free bug bounty :) 21:12:39 so you could be bamboozled into making transactions that never happen at the very least, by relying on someone else's node. is this not true? 21:12:41 h2017: i'm not sure how this exactly works, but I *assume* your node doesn't rely on a single another node 21:13:16 h2017: if you use the strangers node they can feed you wrong information, yes 21:13:19 remote node* 21:14:08 h2017, i notice that it relies on bootstrap mode, where your monerod instance connects to a node. is it a single other node that it connects to, or a bunch (as edi was saying). 21:16:10 Single. 21:16:43 so there is no way to be sure that you are not connecting to one of the attacker's node's when you run your wallet in simple mode 21:17:00 i was wrong, I understood you talked about node <-> node comms 21:17:18 edi i think i used wrong terminology 21:18:01 but there I'm pretty sure you got it right, if you connect your wallet to a rogue node 21:18:08 there isn't really a way of knowing 21:18:14 right 21:18:23 so the recommendation is to run your own node for maximum security 21:18:28 yes 21:18:44 not just security but transactions that will actually go onto the blockchain 21:19:30 you might be right, not sure on that one 21:19:55 edi, the rogue node could just trick you into accepting everything you do and then throwing it away 21:20:23 okay 21:20:24 or making stuff up with it's own fake blockchain 21:20:46 so in theory its possible for an attacker to fake the xmr blockchain 21:21:00 and have your authentic xmr sent to his "fake network" 21:21:11 so you lose all that money? 21:21:22 no you wouldn't lose it i don't think 21:21:34 but you would be fooled into thinking you had transacted on the real monero blockchain 21:22:16 you might lose your sanity 21:22:20 oke, haha 21:22:32 afaik he can fool you into thinking that you received monero that you didn’t receive 21:23:02 maybe its more intel gathering than attacking? 21:23:14 but he needs to mine some blocks to do it, right? As many blocks as the number of confirmations you need 21:24:03 So if you're a merchant and accept 0-conf transactions, attacker can eclipse your node, send a tx to you and send the same output to himself on the real network 21:24:26 this is about using an attacker remote node 21:24:54 hmm 21:32:46 this is why we use our own nodes 21:32:57 This is the way 21:35:25 this is the way. 22:29:46 https://www.jw.org/finder?wtlocale=E&docid=502019178&srcid=share 22:30:48 kinda random 23:49:27 i guess its for people who hodl'd altcoins other than monero