log☇︎
190700+ entries in 5.771s
davout: punkman: well, you're requesting a public key, so of course it works :-)
davout: kakobrekla: is there a way to easily get an array of asswotted fingerprints?
Apocalyptic: which is clearly not a canonical identification
Apocalyptic: the second seems like a reasonable choice
davout: - not give a fuck about who signed a to-be-notarized blob
davout: - maintain a full asswot keyring on deedbot's server
Apocalyptic: I wonder what the behaviour is if you have two pubkeys in your keyring with the same eight bytes key id and you're trying to verify a message
davout: - alter spec and add a gribble dependency
scoopbot: New post on Qntra.net by cazalla: http://qntra.net/2015/01/british-bankers-association-bitcoin-a-threat-to-sterling-may-aid-terrorists/
davout: Apocalyptic: RFC 5.2.2 sez a signature packet contains "Eight-octet Key ID of signer"
Apocalyptic: davout, re "looks like this can't be verified correctly without either relying on a keyid as an actual key unique identifier OR keeping a synchronized keyring and actually verifying the signature" I suspect there actually is, playing with the source atm
davout: oh, and it's ppl who have L1/L2 trust from assbot, a subset from the wot members sez the spec
undata: to summarize what's desired, the bot accepts signed documents from wot members in good standing only, publishes them by burning a small amount of btc and uploading to a site?
kakobrekla: punkman ill set up a daily dump to files.b-a
davout: what *is* specified is that the bot must verify that the signer has L1/L2 assbot trust, looks like this can't be verified correctly without either relying on a keyid as an actual key unique identifier OR keeping a synchronized keyring and actually verifying the signature
punkman: as a reminder, code is here https://github.com/extempore/deedbundler
undata: you'd write the deed bit as a plugin
Apocalyptic: I can see a quite unpleasant spam attack otherwise
Apocalyptic: sounds to me like a dubious choice but heh, if mp sez so
davout: punkman: mebbe i'm wrong here, lemme try and find a reference
undata: I've got a friend with a decent golang bot on github
Apocalyptic: so this is a false problem
davout: if i don't have the key in my own keyring it doesn't seem possible to extract the fingerprint from a signed message
undata: a shantytown cobbled together with the leftovers of other cultures
undata: as for english as I delve into a few other languages on duolingo I find my native tongue ever more horrifying
davout: that would work when listing keys, i can't seem to get it work when piping a clearsigned msg to "gpg -v -v --fingerprint"
davout: "replace keyid with fp ?" <<< sure, but how do i get the fpr from a signed message? gpg -v -v will just return the key id
davout: thing is, i was also reading mp's deedbot spec, the part i was wondering about was the "extract keyid from signed message, and use it in w.b-a.link URL"
davout: kakobrekla: would it be hard to make links such as w.b-a.link/trust/7C1FBEC924FBD66531A02AE3F95E4E395927DC9C/291237F37A2C023CADBED52513288EAB01713428/json work with keyids as well as fingerprints?
asciilifeform: it's hard and takes a lot of dedicated study << only for folks who do not read for pleasure in the particular language.
ben_vulpes: not that anyone should expect a "developer" to understand how to write english well - it's hard and takes a lot of dedicated study.
ben_vulpes: a plural cannot by definition be a singular thing.
ben_vulpes: as a valid construct.
Apocalyptic: looks like a valid "singular they" to me, "valid" in the grammatical sense
davout: ben_vulpes: wasn't sure about that, I assumed a weakness in my own english since no one brought that up, but it did sound slightly weird, thanks for clearing it up!
davout: danielpbarron: iirc with the raw tx thing you can send zero fees without problem, there's however a safeguard against sending a massive fee
ben_vulpes: <danielpbarron> i tried to make a raw tx once, got rejected by my own node for having too small a fee << heinous
asciilifeform: ben_vulpes: iirc, i did mention 'can pull up arbitrary tx' as part of what a 'whole bitcoin node' has to do
ben_vulpes: "whole blockchain" << and more specifically, a trivial lookup of txids
danielpbarron: i tried to make a raw tx once, got rejected by my own node for having too small a fee
danielpbarron: oh well yeah you need to know the whole blockchain to verify a tx in that case
ben_vulpes: how do i get the pubkey for a given output?
ben_vulpes: a user-supplied privkey.
ben_vulpes: (one can sign anything at any time - that's not the problem. the problems crop up in a) knowing the sigs are valid and b) the multi-input, multi-privkey transaction generation use-case: how am i to know which privkeys are to be used to sign which inputs, and furthermore [and somewhat recursively] how do i know those signatures to be valid?)
ben_vulpes: otherwise you just sign hash of txn, index in txn, and have no way to double check that you produced a valid signature corresponding to the pubkey to which those funds were transmitted originally.
ben_vulpes: to verify that you've created a valid transaction, you have to have the entirety of the previous output on hand to examine the public key
danielpbarron: i thought all you need to know is the tx id of the outputs you want to use, the private keys of the coresponding addresses, a destination, and an amount
ben_vulpes: i don't know that a bitcoind would be able to verify a transaction without access to the full inputs
ben_vulpes: creating a raw transaction requires having the previous transaction in hand in full at runtime, so as to extract the pubkey from the previous transaction
ben_vulpes: far easier for the people working on it at the time to make some silly assumptions about what txns a user would want to sign, and then keep those txns on hand
undata: actually, it appears it would only have to be aware that a tx has occurred, not send any
undata: ben_vulpes: we have a buddy with an extensible IRC bot; how's that raw tx backport coming?
ben_vulpes: supreme annihilation's a pretty fun game
gabriel_laddel: Any #-assets members who will admit to being a fan of supreme commander or total annihilation?
ben_vulpes: it's a Good Morning in America™
ben_vulpes: http://w.b-a.link/trust/ben_vulpes/kakobrekla/json << lovely, kakobrekla thanks a mil
assbot: Dear All, My name is Coco, I am a 20 year old Chinese girl and I have just arrived fr ... ( http://bit.ly/1yvXNPk )
mircea_popescu: http://www.collarspace.com/personals/v/2177988/details.htm << if anyone in london wants to host a retiring escort...
assbot: 15 results for 'dnssec' : http://s.b-a.link/?q=dnssec
mats: a hello
davout: b-a is so mean, kakobrekla makes something nice, everyone tries to break it
PeterL: so it lets you input a fraction, but converts to int?
assbot: You rated user decimation on 17-Jan-2015, with a rating of 0, and supplied these additional notes: marginal.
assbot: Request successful, get your OTP: http://w.b-a.link/otp/721476ec38fdf8b8
assbot: Trust relationship from user PeterL to user decimation: Level 1: 0, Level 2: 1 via 1 connections. | http://w.b-a.link/trust/PeterL/decimation | http://w.b-a.link/user/decimation
assbot: Trust relationship from user mircea_popescu to user kakobrekla: Level 1: 2, Level 2: 54 via 32 connections. | http://w.b-a.link/trust/mircea_popescu/kakobrekla | http://w.b-a.link/user/kakobrekla
assbot: Trust relationship from user kakobrekla to user kakobrekla: ∞ | http://w.b-a.link/user/kakobrekla
assbot: Successfully added a rating of 0.1 for decimation with note: marginal
mircea_popescu: it's a future.
mircea_popescu: this is not a bug.
assbot: Request successful, get your OTP: http://w.b-a.link/otp/9d9547d664ea4ebf
assbot: Request successful, get your OTP: http://w.b-a.link/otp/9f1f7a77bb5ab2a1
kakobrekla: and http://w.b-a.link/trust/7C1FBEC924FBD66531A02AE3F95E4E395927DC9C/27C3CE9A20851312F086268C27AF75321F2489E8/json
kakobrekla: actually http://w.b-a.link/trust/7C1FBEC924FBD66531A02AE3F95E4E395927DC9C/27C3CE9A20851312F086268C27AF75321F2489E8
kakobrekla: mircea_popescu http://w.b-a.link/trust/7C1FBEC924FBD66531A02AE3F95E4E395927DC9C/27C3CE9A20851312F086268C27AF75321F2489E8
mircea_popescu: decimation: there's a deep hypocrisy here somewhere. apparently the usg entities who are involved with foreign surveillance couldn't possibly do their jobs if they were subject to 'regulation', but of course regular people trying to say, transact bitcoin, have no such reprieve << well, usg entities that deal in bitcoin do have such reprieve currently ?
kakobrekla: a yes, v you can you anywhere
mircea_popescu: camweon's a total heel. i have nfi whatabout england produces such contemptible sacks of shit. i thought blair was an exception, but apparently he was just a harbringer.
mircea_popescu: because that's why we go to school : so we can present our inquiries in such a way that OTHER PEOPLE can fucking grok wtf we want to know
decimation: well, there's an issue of policy here, which is "is a us person allowed to communicate in a manner outside the possibility of usg interception?"
mircea_popescu: kakobrekla can there be a /n after each otp before encryption pls.
mircea_popescu: no, there shouldn't be a way to compel an answer. wtf ?!
mircea_popescu: this is roughly the equivalent of a company with 10k cab fleet having famously a weak alternator, and some reporter asking the CEO "what about the spinny trick ?"
mircea_popescu: honestly, i don't see it's a president's job, that.
mircea_popescu: lotta hay made out of how "the queen snubbed obama'. but the guy's just not very aware. which looked to me like a very very tired man that's being constantly pestered with advice and requirements by about 9 spinster women.
mircea_popescu: that poor guy, he looks like a neurotic setter.
kakobrekla: mircea_popescu perhaps is even easier if i just allow for w.b-a.link/trust/key1/key2/json ?
mircea_popescu: a well, so much for ai.
mircea_popescu: are you a slut scoopbot ? -slut
assbot: Request successful, get your OTP: http://w.b-a.link/otp/6a9d8d2d055d69cf
mircea_popescu: i want !gettrust to match any 32 char string as a key rather than a name
kakobrekla: ;;later tell ben_vulpes as requested, json; http://w.b-a.link/user/ben_vulpes/json and http://w.b-a.link/trust/ben_vulpes/kakobrekla/json ☟︎
mircea_popescu: PeterL process http://w.b-a.link/otps/PeterL/last
kakobrekla: again : http://w.b-a.link/otps/kakobrekla/last
mircea_popescu: that way, it wouldn't have to do two steps, just directly gettrust to a keyid.
mircea_popescu: 2.2. Bot makes a request to assbot via pm, of the format ;;gpg info --key <key currently
mircea_popescu: kakobrekla 2.1. Bot extracts the signature keyid through a process homologuous to gpg -v -v
kakobrekla: <PeterL> new voicing model, we still have to join #b-a before verifying otp < yes, no session, recall?
mircea_popescu: works so it simplifies deedbot design a lot ?
PeterL: new voicing model, we still have to join #b-a before verifying otp