2019-06-28 08:04:50
Hey @Fireduck - any idea how I can get my android wallet to sync?
fent
should snow have dev fees? it can be used to hire more people,and reward developers. is that needed? of course it may look better without it, but it can be useful .
2019-06-28 11:54:31
the pool software has a dev fee option, find a pool with a dev fee and mine there
Rotonen
2019-06-28 11:54:41
or start a new pool
Rotonen
2019-06-28 16:46:49
@fent if it isn't syncing, it is likely a firewall problem of some sort
Fireduck
2019-06-28 16:46:55
are you on any sort of restricted network?
Fireduck
2019-06-28 17:06:02
@Fireduck you should probably do the comms over a websocket to avoid most trouble
Rotonen
2019-06-28 17:06:57
I also need to copy the key management work from channels into snowblossom and do TLS
Fireduck
2019-06-28 17:11:33
secure web sockets are a thing
Rotonen
2019-06-28 17:12:26
yeah...the p2p links don't really need encryption
Fireduck
2019-06-28 17:12:35
but the client to server links should
Fireduck
2019-06-28 17:15:49
IETF recommends to do everything over TLS for the sake of uniformity
Rotonen
2019-06-28 17:16:09
easier to do that than to try to bucket things into categories
Rotonen
2019-06-28 17:16:11
yeah, I like that plan
Fireduck
2019-06-28 19:20:54
I've tried it on 4g, and two separate private wifi's , none of which connects. It was working fine a couple of weeks ago on the same networks
fent
2019-06-28 21:26:13
I guess I'll need to open new ports for the switch to TLS
Fireduck
2019-06-28 21:44:37
Anyone have any strong feelings about public keys being in DNS TXT records?
Fireduck
2019-06-28 22:31:25
that's how a lot of stuff works
Rotonen
2019-06-28 22:31:40
like DKIM
Rotonen
2019-06-28 22:32:23
what's the use case? more like HPKP?
Rotonen
2019-06-28 22:33:05
So light clients can connect to known node securrly
Fireduck
2019-06-28 22:33:15
But I guess I could hard-code the keys of the hard-coded hostnames as well
Fireduck
2019-06-28 22:33:16
do you care of current or future connections?
Rotonen
2019-06-28 22:33:39
leaf through the DANE RFC in any case https://tools.ietf.org/html/rfc6698
Rotonen
2019-06-28 22:38:47
but with all key pinning schemes, please also consider hostile pinning as a case to mitigate
Rotonen
2019-06-28 22:39:08
once there is enough popularity or money on the table, entropy ensues
Rotonen
2019-06-28 22:40:09
or just make it so that there needs to be a CAA record and assume everyone can use at least letsencrypt
Rotonen
2019-06-28 22:41:05
in any case avoid rolling your own
Rotonen