-
- Upgrade https://github.com/haveno-dex/tor-binary according README
- 1.2 build and check log in https://jitpack.io/#boldsuck/tor-binary
- 1.3 make PR, wait for commit & verify in https://jitpack.io/#haveno-dex/tor-binary
-
- Add tor-binary commit hash in https://github.com/haveno-dex/netlayer/blob/master/pom.xml
- 2.2 build and check log in https://jitpack.io/#boldsuck/netlayer
- 2.3 make PR, wait for commit & verify in https://jitpack.io/#haveno-dex/netlayer
-
- Add netlayer commit hash in https://github.com/haveno-dex/haveno/blob/master/build.gradle#L74
-
3.2
git add.&&./gradlew --write-verification-metadata sha256
| Haveno Desktop version 1.0.18 | |
| Usage: haveno-desktop [options] | |
| Options: | |
| --help | |
| Print this help text | |
| --configFile=<String> (default: haveno.properties) |
Make sure to check out NitroKeys, OnlyKeys or SoloKeys. They are based on open-source hardware and firmware while YubiKey's are closed source. ssh-keygen is able to generate FIDO authenticator-backed keys which can be either an ecdsa-sk or an ed25519-sk key-pair. The sk extension stands for security key. Note that an ed25519-sk key-pair is only supported by new YubiKeys with firmware 5.2.3 or higher which supports FIDO2. This means YubiKeys with firmware below 5.2.3 are only compatible with ecdsa-sk key-pairs. If possible, generate an ed25519-sk SSH key-pair for this reason.
We can check the firmware version of a YubiKey with the following command.
$ lsusb -v 2>/dev/null | grep -A2 Yubico | grep "bcdDevice" | awk '{print $2}'
4.37For https, root certificate from CAcert is required. (DANE & DNSSEC is configured)
Clearnet mainnet RPC Port: 18081 P2P Port: 18080 - stagenet RPC Port: 38081 P2P Port: 38080
xmr-de.boldsuck.org | xmr-in-berlin.boldsuck.org
185.220.101.63:18081
The Haveno .deb are build with Ubuntu. Debian 11 dpkg can't handle tar.zst files.
DEB install: unknown compression for member 'control.tar.zst'
[Edit:] Debian has fixed this in dpkg (1.21.18) = bookworm (stable) and newer.
"the ZStandard format is widely used on many projects, has been specified within the IETF as RFC8878, so backwards compatibility and format stability are no longer a concern,"
| git clone https://github.com/retoaccess1/haveno-reto.git | |
| cd haveno-reto | |
| git apply /home/user/externalTorDirectBind3.patch | |
| ./gradlew build -x test |
| diff --git a/common/src/main/java/haveno/common/config/Config.java b/common/src/main/java/haveno/common/config/Config.java | |
| index 9147d535..71f5436e 100644 | |
| --- a/common/src/main/java/haveno/common/config/Config.java | |
| +++ b/common/src/main/java/haveno/common/config/Config.java | |
| @@ -77,6 +77,7 @@ public class Config { | |
| public static final String SEED_NODES = "seedNodes"; | |
| public static final String BAN_LIST = "banList"; | |
| public static final String NODE_PORT = "nodePort"; | |
| + public static final String HIDDEN_SERVICE_ADDRESS = "hiddenServiceAddress"; | |
| public static final String USE_LOCALHOST_FOR_P2P = "useLocalhostForP2P"; |
| ## Configuration file for Haveno | |
| ## For more information, see: 'man torrc' NODE SELECTION OPTIONS | |
| ## A list of identity fingerprints, country codes, and address patterns of nodes to use for the first hop in your normal circuits. | |
| #EntryNodes $ABCD1234CDEF5678ABCD1234CDEF5678ABCD1234,[2001:db8:dead:beef::],203.0.113.0/24 | |
| ## A list of identity fingerprints, nicknames, country codes, and address patterns of nodes that are allowed to be used as the second hop in all client or service-side Onion Service circuits. | |
| #HSLayer2Nodes $fingerprint,$fingerprint,[2001:db8:dead:beef::],203.0.113.0/24,.. | |
| ## A list of identity fingerprints, nicknames, country codes, and address patterns of nodes that are allowed to be used as the third hop in all client and service-side Onion Service circuits. |
| Haveno Desktop version 1.0.18 | |
| Usage: haveno-desktop [options] | |
| Options: | |
| --help | |
| Print this help text | |
| --configFile=<String> (default: haveno.properties) |
| execve("./cake_wallet", ["./cake_wallet"], 0x7ffe229362d0 /* 57 vars */) = 0 | |
| brk(NULL) = 0x1c53000 | |
| mmap(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f10110e2000 | |
| readlink("/proc/self/exe", "/home/marco/Cake-Wallet/cake_wal"..., 4096) = 35 | |
| access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) | |
| openat(AT_FDCWD, "/home/marco/Cake-Wallet/lib/glibc-hwcaps/x86-64-v2/libblkid.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
| newfstatat(AT_FDCWD, "/home/marco/Cake-Wallet/lib/glibc-hwcaps/x86-64-v2", 0x7ffccf800200, 0) = -1 ENOENT (No such file or directory) | |
| openat(AT_FDCWD, "/home/marco/Cake-Wallet/lib/tls/x86_64/x86_64/libblkid.so.1", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file or directory) | |
| newfstatat(AT_FDCWD, "/home/marco/Cake-Wallet/lib/tls/x86_64/x86_64", 0x7ffccf800200, 0) = -1 ENOENT (No such file or directory) | |
| openat(AT_FDCWD, "/home/marco/Cake-Wallet/lib/tls/x86_64/libblkid.so.1", O_RDONLY|O_CLOEXEC) = -1 EN |