2019-06-28 08:04:50
Hey @Fireduck - any idea how I can get my android wallet to sync?

fent
should snow have dev fees? it can be used to hire more people,and reward developers. is that needed? of course it may look better without it, but it can be useful .
2019-06-28 11:54:31
the pool software has a dev fee option, find a pool with a dev fee and mine there

Rotonen
2019-06-28 11:54:41
or start a new pool

Rotonen
2019-06-28 16:46:49
@fent if it isn't syncing, it is likely a firewall problem of some sort

Fireduck
2019-06-28 16:46:55
are you on any sort of restricted network?

Fireduck
2019-06-28 17:06:02
@Fireduck you should probably do the comms over a websocket to avoid most trouble

Rotonen
2019-06-28 17:06:57
I also need to copy the key management work from channels into snowblossom and do TLS

Fireduck
2019-06-28 17:11:33
secure web sockets are a thing

Rotonen
2019-06-28 17:12:26
yeah...the p2p links don't really need encryption

Fireduck
2019-06-28 17:12:35
but the client to server links should

Fireduck
2019-06-28 17:15:49
IETF recommends to do everything over TLS for the sake of uniformity

Rotonen
2019-06-28 17:16:09
easier to do that than to try to bucket things into categories

Rotonen
2019-06-28 17:16:11
yeah, I like that plan

Fireduck
2019-06-28 19:20:54
I've tried it on 4g, and two separate private wifi's , none of which connects. It was working fine a couple of weeks ago on the same networks

fent
2019-06-28 21:26:13
I guess I'll need to open new ports for the switch to TLS

Fireduck
2019-06-28 21:44:37
Anyone have any strong feelings about public keys being in DNS TXT records?

Fireduck
2019-06-28 22:31:25
that's how a lot of stuff works

Rotonen
2019-06-28 22:31:40
like DKIM

Rotonen
2019-06-28 22:32:23
what's the use case? more like HPKP?

Rotonen
2019-06-28 22:33:05
So light clients can connect to known node securrly

Fireduck
2019-06-28 22:33:15
But I guess I could hard-code the keys of the hard-coded hostnames as well

Fireduck
2019-06-28 22:33:16
do you care of current or future connections?

Rotonen
2019-06-28 22:33:39
leaf through the DANE RFC in any case https://tools.ietf.org/html/rfc6698

Rotonen
2019-06-28 22:38:47
but with all key pinning schemes, please also consider hostile pinning as a case to mitigate

Rotonen
2019-06-28 22:39:08
once there is enough popularity or money on the table, entropy ensues

Rotonen
2019-06-28 22:40:09
or just make it so that there needs to be a CAA record and assume everyone can use at least letsencrypt

Rotonen
2019-06-28 22:41:05
in any case avoid rolling your own

Rotonen