[Status: offline] SAFE Network Testnet - Vaults from home with IGD - Iteration 2

Are we up or down?..
ubuntu@ip-nnn-nnn-nnn-nnn:~$ safe auth create-acc --test-coins
[2020-07-17T15:44:11Z DEBUG safe] Starting SAFE CLI…
[2020-07-17T15:44:11Z DEBUG safe::cli] Processing command: CmdArgs { cmd: Some(Auth { cmd: Some(Create { config_file_str: None, sk: None, test_coins: true }) }), output_fmt: None, output_json: false, dry: false, xorurl_base: None, endpoint: None }
[2020-07-17T15:44:11Z DEBUG safe_api::api::authd_client::authd_client_api] Creating new authd client for endpoint https://localhost:33000
Passphrase:
Password:
Creating a SafeKey with test-coins…
[2020-07-17T15:44:26Z INFO safe_api::api::app::safe_client] Creating test SafeKey with 1000.110000000 test coins
[2020-07-17T15:44:26Z TRACE safe_core::client] Create test balance of 1000.110000000 for FullId { keypair: Keypair::Bls(…), public_id: Client(PublicKey::Bls(a7c14f…)) }
[2020-07-17T15:44:26Z TRACE safe_core::config_handler] Not available: /home/ubuntu/.config/safe_core/safe_core.config
[2020-07-17T15:44:26Z TRACE safe_core::config_handler] Reading: /home/ubuntu/.config/safe_vault/vault_connection_info.config
[2020-07-17T15:44:26Z TRACE safe_core::connection_manager] Trying to bootstrap with group Client(PublicKey::Bls(a7c14f…))
[2020-07-17T15:44:56Z TRACE safe_core::client] Error connecting to network! Retrying… (1)
[2020-07-17T15:44:56Z TRACE safe_core::connection_manager] Dropped ConnectionManager - terminating gracefully
[2020-07-17T15:44:56Z TRACE safe_core::connection_manager::connection_group] Gracefully terminating quic-p2p event loop
[2020-07-17T15:44:56Z TRACE safe_core::connection_manager] Trying to bootstrap with group Client(PublicKey::Bls(a7c14f…))
[2020-07-17T15:45:26Z TRACE safe_core::client] Error connecting to network! Retrying… (2)
[2020-07-17T15:45:26Z TRACE safe_core::connection_manager] Dropped ConnectionManager - terminating gracefully
[2020-07-17T15:45:26Z TRACE safe_core::connection_manager::connection_group] Gracefully terminating quic-p2p event loop
[2020-07-17T15:45:26Z TRACE safe_core::connection_manager] Trying to bootstrap with group Client(PublicKey::Bls(a7c14f…))
[2020-07-17T15:45:56Z TRACE safe_core::connection_manager] Dropped ConnectionManager - terminating gracefully
[2020-07-17T15:45:56Z TRACE safe_core::connection_manager::connection_group] Gracefully terminating quic-p2p event loop
[2020-07-17T15:45:56Z TRACE safe_api::api::authd_client::authd_client_api] SafeAuthdClient instance being dropped…
[2020-07-17T15:45:56Z ERROR safe] safe-cli error: [Error] NetDataError - Failed to allocate test coins: Unexpected: Connection timed out when bootstrapping to the network - CoreError::Unexpected::{“Connection timed out when bootstrapping to the network”}

Seemingly down.

5 Likes

Thank you.

4 Likes

Do we have any figures for the no of vaults connected, total uploaded/downloaded etc?

2 Likes

isnt that the entire point of a self encrypted chunked file… Am i missing something?

I also noticed that some chunks were fully readable. Which at first did my head in. Then I remembered that public data is not encrypted. (I believe that’s the case)
So it seems the file types of chunks that are not encrypted are somehow still recognized.

That is my take on it, if I am wrong I’d gladly be corrected.

1 Like

I thought everything was encrypted but public data everyone can access the data map. I’d prefer that so even if something nasty that was public was on a hard drive no one would be the wiser. Kind of becomes a slippery slope otherwise imo.

2 Likes

Agreed, I’m totally out of my depth here so I am just guessing. I could see bits of Javascript/HTML that were legible, parts of files… chunks.
Not parts of images or anything like that.
I vaguely remember this discussion in the past so don’t quote me but may have to do with performance.

I’ll post a screenshot in a minute.

3 Likes

I think chunk obfuscation is important foundation of maidsafe. why it is not implemented yet? Its published back in 2010 by @dirvine it may overkill? https://www.google.com/url?sa=t&source=web&rct=j&url=http://docs.maidsafe.net/Whitepapers/pdf/SelfEncryptingData.pdf&ved=2ahUKEwigw4i64tXqAhUNa94KHWNaAV0QFjABegQIBBAB&usg=AOvVaw3WWO3kP0PcIA39SusH6WJx

3 Likes

I believe data obfuscation is on the roadmap at safenetwork.tech in future work AFAIK.

1 Like

Not sure if CRDT change something but the idea is that all data greater than 3 KB. will be chunks where self-encryption could be applied regardless which data type they belong to.

The earliest time of implementation would be post-Fleming

6 Likes

There is something fishy about the “router problem”. I always use the same phone for tethering. Sometimes it works - sometimes I get this:

sascha@Knut-Mint:~$ tail -f ~/.safe/vault/local-vault/safe_vault.log
INFO 2020-07-18T11:17:20.667798070+03:00 [src/bin/safe_vault.rs:114] 

Running safe-vault v0.25.1
==========================
INFO 2020-07-18T11:17:30.892900120+03:00 [src/vault.rs:135] Initializing new Vault as Infant
ERROR 2020-07-18T11:18:00.893737680+03:00 [src/bin/safe_vault.rs:169] Cannot start vault due to error: Routing(Network(IgdNotSupported))
ERROR 2020-07-18T11:18:00.893765515+03:00 [src/bin/safe_vault.rs:170] Automatic Port forwarding Failed. Check if UPnP is enabled in your router's settings and try again. Note that not all routers are supported in this testnet. Visit https://forum.autonomi.community for more information.

thanks digipl it explained a lot.

1 Like

It may be the igd crate has a short timeout. We will check that out @ravinderjangra and @lionel.faber are looking for bugs like this to kill off.

7 Likes

IIRC, it was when the content was public and small enough to fit in a single file with the data map, so it doesn’t get broken up and self encrypted. My memory may be deceiving me though.

It seems a bit of a weakness though.

4 Likes

Yes, I think if it’s under 3KB it doesn’t currently get encrypted. I remember adding a bunch of zeros to an HTML file and experimenting with that, way back when.

4 Likes

The idea being a tiny file would be in a dir, the dir is encrypted as a file and that puts it over the 3Kb so it is unwrapped recursively. i.e. you should never have small file datamaps out somewhere on their own, if part of a filesystem it’s cool. The root dir will always be over 3Kb IIRC.

If there is no choice then the data map itself should be encrypted, but I don’t know where we would need to do this as files are for now part of filesystems. It would be a simple thing to encrypt them though with the users keys if necessary.

8 Likes

That brings up an interesting situation.

I have come across a number of situations where a directory full of small files (like 1KB to 5KB, mostly 1KB to 2KB) and its painfully enough that windows keeps getting slower with each version to just display the file list or work with it. Sometimes thousands of files.

Now if these files are then in the directory file, then that makes for a one large directory file. And what about working with the directory.

Just a thought

1 Like

In these cases the DM should be recursively encrypted to produce a small initial DM.

3 Likes

For those interested in running local testnets, there’s a new browser alpha release available: Release v0.18.0-alpha.4 · maidsafe/sn_browser · GitHub

Remember, it’s still alpha and may be buggy, so if you’re not comfortable with investigating/reporting bugs this may not be for you! (But if you are, :fire:in :smiley: !)

17 Likes