19:00:38 #startmeeting 19:00:38 Meeting started Thu Jun 9 19:00:38 2016 UTC. The chair is wumpus. Information about MeetBot at http://wiki.debian.org/MeetBot. 19:00:38 Useful Commands: #action #agreed #help #info #idea #link #topic. 19:01:01 phantomcircuit: sipa: morcos: sdaftuar: btcdrak: jonasschnelli: luke-jr: 19:01:22 first at PSA: the feature freeze for 0.13 is next week. Make sure that whatever features need to be merged are merged before that time. If there are any pulls that require special attention, or are ready, let me know. 19:01:25 petertodd: MarcoFalke: 19:01:39 #link 0.13 release schedule: https://github.com/bitcoin/bitcoin/issues/7679 19:01:52 any topic suggestions today? 19:02:23 We can talk some about ongoing compact block testings, I have a few things to report. 19:02:42 last meeting there was talk of release lifecycles documentation, btcdrak and David Harding have been working on that page here: https://github.com/bitcoin-core/bitcoincore.org/pull/179 https://github.com/btcdrak/bitcoincore.org/pull/2 this needs review 19:02:53 wumpus: I have 2 p2p refactor PRs that i'd _very_ much like to have in 0.13. I'm not sure how you're considering those in terms of freezing 19:02:54 instagibbs: nickler: NicolasDorier: CodeShark: 19:03:14 yo 19:03:23 cfields_: I think p2p refactor can go in after the feature freeze? 19:03:29 We apparently can no longer compile on hosts with only 2GB ram with defaults. 19:03:39 other TODOs from last week: review and merge #8126 (std::shared_ptr based CTransaction storage in mempool) - that was done, #7935 (Versionbits: GBT support) - also done 19:03:46 I mean it is not a new feature ;) 19:04:04 well it was more like 1.5GB ram before. 19:04:35 others have not yet finished: #7598 (Refactor CreateNewBlock to be a method of the BlockAssembler class) 19:04:37 gmaxwell: I compiled on a 2GG AARCH this week successfully. 19:04:41 *GB 19:04:46 We have docs that say 1.5GB, they're gonna be like the blocksize on bitcoin.org :) 19:04:49 #7600 Mining: Select transactions using feerate-with-ancestors 19:04:55 depends on what else is running on the machine 19:05:34 I've been going through #7598/#7600. 19:05:38 #topic compile-time memory usage 19:05:45 what can *concretely* be done here? 19:05:58 would kick out boost help? 19:05:59 -O0 19:06:01 is it something worrying? 19:06:08 has anyone measured to see if there are particular objects that are especially guilty? 19:06:11 what's eating up all the RAM? 19:06:14 yes, we have cfields_ 19:06:20 ie. main.cpp/net.cpp ? 19:06:21 CodeShark: ld/GCC doesn't free memory 19:06:22 especialy some autogenerated c++ files 19:06:33 I made some tables back in the issue about this 19:06:37 main.cpp, matt has a patch that moves all the mempool stuff out of it taht apparently gets it back to 1.5GB. 19:06:50 CFLAGS="-O0 -g0 --param ggc-min-expand=0 --param ggc-min-heapsize=32768" 19:06:54 #link https://github.com/bitcoin/bitcoin/issues/7471 19:06:54 I dunno why he hasn't PRed it, I asked him to. 19:07:00 wumpus: thanks 19:07:10 eeh that's the wrong one 19:07:22 wumpus: unthanks 19:07:30 well it is about the same subject 19:07:33 #link https://github.com/bitcoin/bitcoin/issues/6658 19:07:52 lots of people have posted about it, but there doesn't seem to be a clear solution 19:08:00 main.cpp -> 1248524bytes ... ^^ 19:08:37 reducing the number of included headers works, I think 19:08:41 present 19:08:46 I have PRs which break up net.h/netbase.h, i'd be curious to see if those make a significant difference 19:09:00 in any case, something to be aware of and nudge a bit at... some refactorings to move code around would help. 19:09:13 also building with clang helps 19:09:21 it uses a lot less memory at the same compile settings, usually 19:09:25 and be independantly good for reasons unrelated to peak memory usage. 19:10:05 i'd assume that mem usage correlates solidly with compile time 19:10:55 not so sure - lots of small files might mean the bottleneck is disk access 19:11:29 CodeShark: come on 19:11:32 in any case, it would be good to bring down the peak mem usage 19:11:32 the bottleneck in compilation is hardly ever disk access, at least *reading* disk access 19:11:37 reading in 100 files? 19:11:43 sequentially 19:12:08 would be cool, if btc full nodes could continue to be runnable on Rasberry Pi ... with 1GB RAM 19:12:37 BakSAj: runnable is not compileable on? 19:12:40 not sure there is much else to say here. I only brought it up for general awareness issues, since I think it's likely a death by 1000 cuts that can be improved in a multitude of ways. 19:12:54 seek/read access for source files is only a problem for really huge projects, and then especially when the source is hosted on some horrible network file system (like clearcase), in any case bitcoin doesn't even come close 19:13:03 heh, disk is negligible. It's easy to see where time is spent with -ftime-report. 19:13:17 but like always: measure before you start talking about bottlenecks 19:13:35 I think adding cross compile depends options for ARM and AARCH64 would also reduce the "memory problem" (at least the amount of complains): https://github.com/bitcoin/bitcoin/issues/8162 19:13:58 jeremyrubin: preferably both compileable and operatable 19:13:59 BakSAj: for small embedded systems you should use cross-compilation 19:14:03 jonasschnelli: i'm halfway through the changes needed there. 19:14:13 i have had machines take a bit of time on autogen.sh fyi 19:14:18 cfields_: nice. Focus on Qt5.6 first. :) 19:14:34 you can cross compile on ARM using depends, we just don't distribute ARM binaries 19:14:37 jonasschnelli: actually, arm/aarch64 already work fine with depends. Just have to use NO_QT=1 manually. 19:14:40 s/on/to 19:14:42 I'm skeptical that the intersection of rpi users that complain about compile issues and people who will cross compile is the emptyset. But cross compiling is good. 19:14:44 cfields_: yes, it works fine 19:14:51 for comparison, webkit-based stuff typically uses up to 12 GB RAM with debug symbols, and much much less without.. 19:14:56 er isn't the empty set, you get what I mean. 19:15:07 luke-jr: oh, good point... 19:15:13 it's *very easy* tocross compile for ARM 19:15:14 I think NO_QT=1 for ARM/AARCH64 could be a start (even for "official binaries"). 19:15:20 with the depends system 19:15:24 jonasschnelli: yes 19:15:28 the gitian-debug PR turns on debug symbols, so gitian mem requirement is bumped after that. 19:15:37 wumpus: a lot of people using rpi2 like systems do not have another linux host. 19:15:42 wumpus: that builds static binaries, which is wasteful on RAM 19:15:44 Also ARM is used more and more for GUI systems. 19:15:50 can autogen.sh be made faster? 19:16:01 jeremyrubin: no 19:16:15 not by us, at least 19:16:15 ok, thanks for explaining.. personally i had no trouble compiling 0.12.1 on rpi 3, was afraid that minimum requirements will raise with future releases 19:16:32 luke-jr: if you want to run bitcoind on a RiP (or similar) static builds are fine. Mostly you don't have tons of other tools that could share libraries installed. 19:16:32 since suprisingly many nodes run on rpi 19:16:44 wumpus: maybe the one thing that is fixed by a faster disk 19:16:50 jonasschnelli: I'm thinking more of Bitcoin-Qt 19:16:59 jonasschnelli: as qt's gui plugin situation improves, we may be able to move back to the shared-qt builds 19:17:05 I'm sure minimum requirements will raise with future releases, that's just the way things are, we'll try to raise them not too much though 19:17:11 jonasschnelli: I think we already have notes on how to corss compile to arm? 19:17:13 Agree. Static linking qt is not ideal. But lets don't roll this up again. 19:17:14 https://github.com/bitcoin/bitcoin/blob/master/doc/build-unix.md#arm-cross-compilation 19:17:23 oh meeting 19:17:35 MarcoFalke: notes, yes. But it should be included in our release builds (gitian) 19:17:42 jup, agree 19:17:46 jonasschnelli: sorry, i meant that directly in the context of shipping arm+gui binaries 19:17:56 jonasschnelli: for now, people just compile natively to avoid static, so suggesting cross-compile isn't a real option 19:18:06 jeremyrubin: I'm not sure. I have no idea what autogen.sh would be spending time on. But it seems more a GNU problem thatn a bitcoin core problem :) 19:18:09 * gmaxwell looks forward to arm (+gui) binaries in the sometime future. 19:18:23 jeremyrubin: I'm surprised it's autogen.sh taking a lot of time not configure, which has this huge list of scripts to execute for probing 19:18:48 * luke-jr fully intends to use an ARM system with Core(Knots) as his hot wallet in some months. 19:18:50 jeremyrubin: you can use a quicker shell for autogen. IIRC dash vs. bash shaves a few seconds off 19:19:15 well arm non-GUI binaries would already be a great step forward, one step at a tme 19:19:15 autogen.sh isn't even part of building; it's a developer tool 19:19:17 wumpus: ah, as a feature-freeze request: ok to plan on arm bins (without gui) for 0.13 ? 19:19:27 if you're running autogen.sh, that means you're running from git, and you shouldn't do that 19:19:30 i can try to have that done today 19:19:30 cfields_: ack, +1 19:19:33 I think arm gui would be prett much a per-distro afair 19:19:36 cfields_: sure! 19:19:37 cfields_: +1 19:19:39 luke-jr: are we making build faster for developers or for users? 19:19:45 +1 19:19:47 ok 19:20:06 jeremyrubin: I think the concern is "ability to build" rather than "speed to build" 19:20:11 jeremyrubin: users shouldn't need to run autogen-- if they get the source tarballs we have, it should already be autogenned. 19:20:26 ^^ 19:20:36 cool, rpi fans will love you :-) 19:20:44 but the people actually doing a lot of builds are developers, only they would care about a few more/less seconds in the build scripting 19:20:57 next step - run full node on cell phone :-) 19:21:01 wumpus: ++ 19:21:11 BakSAj: I believe a number of people have done this. 19:21:18 BakSAj: people are doing that actually, that's one of the motivations for the ARM binaries 19:21:28 lol ok 19:21:28 next step is therefore to support SPV mode when bandwidth is expensive ;) 19:21:30 BakSAj: abcore, it works fine. 19:21:39 luke-jr: +1 19:21:41 but that's post-0.13 IMO 19:21:45 absolutely 19:22:22 in any case it's too late to start on anything new for 0.13, for that we have to consider which of the current pulls can go in 19:22:47 can we get in [8-bit] key generation type? 19:23:32 32bit! 19:23:41 You can provide a migration patch for Knots 19:23:52 Isn't that trivial? 19:23:53 will 0.13 contain just segwit code or actual softfork also? tnx 19:24:03 SW SF can be 0.13.1 19:24:17 SW are mostly not coupled with major releases 19:24:21 I think that 0.13.1 will be worse for upgrade times 19:24:24 SW should be released in a minor release 19:24:26 does anyone have data on that 19:24:29 BakSAj: major releases do not contain network consensus changes. 19:24:31 do we think segwit is going in to 0.13? 19:24:42 (without activation scheduled) 19:24:52 wumpus: isn't it a major change? 19:24:52 sdaftuar: you mean, 0.13.0, or 0.13.x>0? 19:24:53 jonasschnelli: migration is not very practical if 32-bit uses the same version number in Core as 8-bit in Knots already is 19:24:57 0.13.0 19:24:59 sdaftuar: yes, sipa wanted to merge it soon to master 19:25:01 what happened to doing it in 0.12.x? 19:25:02 jonasschnelli: maybe this needs more off-meeting discussion then 19:25:08 (without mainnet defs) 19:25:08 luke-jr: agree 19:25:15 seems like there are still open issues, and no ACKs 19:25:16 jeremyrubin: well from what I've heard minor releases are usually more popular, especialy .1, as some people don't trust .0 :) 19:25:26 CodeShark: nothing, there are confused questions. 19:25:27 so i don't see how it's going to be merged in the next week 19:25:48 sdaftuar: why? 19:25:48 jeremyrubin: segwit is a major change to Bitcoin - not Bitcoin Core. 19:25:51 * jonasschnelli thinks sipa is allowed to merge without ACK 19:25:52 jeremyrubin: we have a long thought out published spec on this, please don't divert the meeting to debating it. I can direct you to the information after the meeting. 19:26:07 wumpus: interesting... I do tend to not upgrade any of my software major versions for 6 months. diversion over 19:26:27 well merging segwit without fork enabled is not in contradiction with "not doing a consensus change in a major release" 19:26:36 agree 19:26:41 right 19:26:47 sure 19:26:49 no objections to merging segwit code without activation 19:26:50 Also, getting ACK for SW is extremly hard. Nobody wants to take the risk. 19:26:51 sure, there are code motion logistics that favor merging it. 19:26:51 to be clear i'm not talking about any kind of release policy, just code-readiness / review 19:26:54 jeremyrubin: see out lifecycle docs https://github.com/bitcoin-core/bitcoincore.org/pull/179 19:27:07 s/out/our/ 19:27:57 so is SW ready for merge (into master/0.13)? 19:28:06 it has no ACKs, and some open issues to be resolved 19:28:31 ok 19:28:33 major open issue? Or more nitish stuff? 19:28:35 minor 19:28:49 if it is not critical it can also be fixed in a later pull 19:28:51 but bugs, not style nits 19:29:09 oh known bugs should be addressed in the pull itself 19:29:21 i think everything will be addressed in my next batch of patches 19:29:29 sipa: great! 19:29:42 should people be acking the reviwew PR or the rebase/reorg? 19:29:42 sipa: does that include expanding 2nd push to 75 bytes max? or is that still an open thing? 19:30:19 luke-jr: this is the place to ask, and i would say no, there is no point 19:30:27 but perhaps others have another opinion 19:30:32 luke-jr: I didnt understand where 75 came from. 19:30:42 btcdrak: up to 75 is easy 19:30:43 btcdrak: largest size that wouldn't require additional testing 19:31:18 has to do with the opcode types changing for different sizes of push. 19:31:47 so, opinions? 19:31:51 32->40->75 seems like a big jump 19:32:06 btcdrak: from the code perspective they're all the same. 19:32:19 my opinion is there is no point limiting it (beyond the impl/test cost of >75), and such limits could very well prevent future softforks 19:32:49 more tolerant enables softforks, so should be preferred over useless limits 19:33:08 Luke-jr's argument has merit in my opinion-- it can be reduced later, but I don't have a strongly held view. I'm not aware of a DOS attack risk created by not having the stricter limit earlier. 19:33:44 (of course, IsStandardness should be strictly limited) 19:33:44 to expand the limit later requires a hardfork 19:34:00 yes, node policy should reject any unknown witnesses period 19:34:23 ok, I think luke-jr has a strong argument 19:34:27 that makes sense 19:34:47 there should be no need for more than 256-bit hash + some versioning metadata 19:35:14 and setting it to more gives it the impression that there is 19:35:16 sipa: or, to be precise if there is that means Bitcoin is more broken than that 19:35:24 petertodd: exactly 19:35:33 luke-jr: in general I agree with keeping flexible, but do you have an example for sipa of why you'd want it? 19:35:36 The biggest harm I see is that allowing a larger size here does limit the ability to make utxo entries limited in size in the future, potentially. But it could be done later. It also enabled policy bypass to abuse the utxo set for data storage, though it's not much of an issue there. 19:35:42 sipa: it doesn't need to give that impression. I don't think we need to predict the future too much here. 19:36:23 luke-jr: for example, if you were to argue that we might someday need 512 bit hashes, I'd agree-- but then I'd point out that in that case there would need to be a hardfork to change all the other things. 19:36:26 i'd rather not rely on isstandardness when reasoning about longer term future 19:37:01 in a MR implementation I did, it turned out to be very advantageous if the things in the MMR were fixed side forperformance 19:37:13 jeremyrubin: any case where we would need indicators in the UTXO set itself; but I don't have a concrete example at this time 19:37:19 Also, not allowing it in SW doesn't preclude it in the future, you'd just need to use a different version type signaling in that case. 19:37:35 for example, we could have added the maturity stuff in the 2nd push if we didn't have nSequence 19:37:43 Yes, I really wish UTXO entries were fixed size. 19:37:53 sipa: isn't there a strong deterrent against abuse, because your funds are anyone-can-spend to older nodes? 19:37:59 gmaxwell: you'd need a new commitment entirely 19:38:13 gmaxwell: in addition to the current one 19:38:24 sdaftuar: there is no rule preventing 0-value outputs 19:38:34 <_anthony_> just use the private key of a payment address to store the 256 bits 19:38:37 ah, good point 19:38:41 (if you ignore relay polify) 19:39:09 abuse is already possible. this doesn't make it worse. if in the future we make it better, we can limit this at the same time 19:39:28 if one assumes a fixed size utxo entry, luke's suggestion basically doubles the utxo set size. 19:39:32 sipa: though, for that specific case I find it ahrd to think of a abuse use-case that'd care about that, given you could screw up the usse-case by spending those outputs 19:39:51 gmaxwell: we can't assume that today, and if we softfork an assumption tomorrow, we can limit this then also 19:40:44 We've probably spent more time discussing it now than the decision is worth. 19:41:14 ok, next topic? 19:41:24 #topic compact block testing 19:41:27 so we use 75 for now, and discuss reducing it later? 19:41:33 (and that time could be better spent reviewing/testing more corner cases... lets continue discussion elsewhere I guess) 19:42:34 so compact blocks... 19:42:41 OK. So there are some number of nodes running compactblocks on the public network.. I have 12 peers at the moment, matt has another half dozen in the new relay network that I'm not connected to. 19:42:52 Things seem to be working well there, instagibbs has posted some charts. 19:42:56 I've been running a compact blocks node for a few days, no crashes to report :) 19:43:16 yes i love charts http://imgur.com/iq2lRGl 19:43:26 I've been conducting some new tests with a network of nodes with a modified version of compact blocks that reduces the hash size to 16 bits in order to test corner cases around collisions. 19:43:27 blue stuff is in kB fwiw 19:43:30 lots of succesfully reconstructed blocks 19:43:31 (ugh, Travis is apparently "detecting abuse" on the Bitcoin code itself, so every clone will be affected?) 19:43:36 Two large mining pools have also been running them, connected to their pool nodes for block source, one is behind the GFW 19:43:40 blue dot == 0 fetched txns 19:44:20 I found a few bugs, which matt has fixed but not pushed to the PR yet. Bugs were things like if the cmptblk message was rubbish, it would wait for the peer to timeout before requesting the block normally. 19:44:48 I intended to review the PR then got ill. Still planning to review. 19:44:57 I think this particular testing technique of modifying the code to make rare cases common is pretty effective and will result in good testing of most of those corner cases. 19:45:05 luke-jr: (offtopic) that started happening with the parallel testing I think 19:45:08 gmaxwell: agree 19:45:19 luke-jr: Shoot them an email 19:45:39 The compact block code is now rebased on top of the sharedptr work, so it's now a fair bit simpler. 19:45:54 MarcoFalke: I have. My concern is more than just whitelisting individual repos though. (Let's continue discussion after the meeting) 19:45:54 gmaxwell, matt's rebase is on that now? 19:45:59 err pr is rebased* 19:46:01 instagibbs: yes. 19:46:12 matt's PR is on master as of last night. 19:46:20 yes, forget my branch 19:46:34 what PR#? 19:46:48 #8086 19:47:07 #link https://github.com/bitcoin/bitcoin/pull/8068 19:47:15 has there been discussion of a servicebit for compact blocks? Now that we have the dns seed prefixes, that would allow for very quick discovery 19:47:23 Based on the issues I found, probably the interaction with block fetching logic needs more review. 19:47:37 cfields_: if it deploys in 0.13 it wont be necessary 19:47:43 cfields_: IMO I don't see a need to preferrentially peer. I expect support to become sufficiently ubiquitious fast enough. 19:47:46 #action forget sipa's compact blocks branch and use thebluematt's PR 19:48:10 it's not something that anyone has a reason to not support, except for just not having implemented it. 19:48:13 hrm, action point is to forget :) 19:48:16 cfields_: the argument brought up before was tgat service bits should be used for critical 19:48:28 for critically required services 19:48:41 like your node won't work right if you don't have peers with the right services. 19:48:46 btcdrak: yeah for people testing the code to use the other branch 19:48:49 makes sense 19:48:55 and the only time when yoi critically need a compact block peer is as a miner, who should be curating their connections anyway 19:48:59 in #8086 where is the salt generated btw? 19:49:09 hmm, fair enough 19:49:35 and miners can look at the protocol version to see if their peer supports compact blocks? 19:49:48 jeremyrubin: 19:49:49 +CBlockHeaderAndShortTxIDs::CBlockHeaderAndShortTxIDs(const CBlock& block) : 19:49:52 + nonce(GetRand(std::numeric_limits::max())), 19:50:12 wumpus: I don't think we can assume a specific protocol version supports it 19:50:27 if we have a future version with better compact blocks, we may want to drop support for the current one 19:50:28 thanks 19:50:29 I think using service bits is a good idea, mainually curtailing connections is very time consuming and raisies the barrier to entry for mining 19:50:32 wumpus: you can do the handshake. 19:50:36 wumpus: no, miners should connect to a known peer that supports it 19:50:41 Lightsword: neither are likely to be necessary 19:51:09 gmaxwell: right 19:51:22 Please, service bits are basically forever and we only have 32 of them, I expect the window between some and nearly all use of this to only be a few months to a year long. 19:51:24 wumpus: because just supporting compact blocks is not enough, they also need to have good uptime and reliability latency, bandwodth, ... 19:51:29 gmaxwell: we have 64 19:51:41 Same difference. (really? hmph!) 19:51:46 I would suggest either writing the entropy to a file once or having it settable in a config file 19:51:48 we should have a concept of temporary service bits, like for the versionbits 19:52:05 jeremyrubin: that's a good idea but orthogonal 19:52:11 as long as nobody relies on service bits, they can be temporary 19:52:16 we dont need preferential peering for compact blocks. It wont take long for wide network support. 19:52:17 ie, use them as hints 19:52:23 don't we have a range designated for playground? 19:52:27 yes 19:52:31 sipa: (yes, sorry, just reviewing it now) 19:52:34 a service bit to indicate a secondary service bit field needs to be used? 19:52:47 one of which is currently getting full-RBF temporary usage 19:52:50 Lightsword: that would completely make it unuseful for preferential peering 19:52:50 jeremyrubin: uh. I'm not sure what you're talking about there... the nonces are per block and should not be predictable. 19:53:12 Lightsword: (as neither addr messages nor the DNS seeds would be aware of the secondary mechanism) 19:53:14 statically configuring it would be broken. 19:53:29 why would you want to fix the entropy statically? 19:53:33 gmaxwell, perhaps setting cmpctblock as a tie-breaker for keeping connection? 19:53:41 Okay, in any case, I think thats all I've got there. 19:53:50 ding ding, we have 7 mins remaining 19:53:52 well, I guess "he sent me blocks fast" is/will be one, same thing 19:53:54 static entropy is much easier to test :p 19:53:54 instagibbs: sounds like a fine additional ranker in the connection management stuff. 19:54:05 instagibbs: +1 19:54:06 indeed 19:54:13 cfields_: yep 19:54:16 instagibbs: though yea, the 'most recent blocks' probably mostly covers it. 19:54:35 which version are compact blocks planned for? 19:54:40 related to that: please review gmaxwell's patch for adding fast blkck and tx relayers for not evicted 19:54:41 gmaxwell: it doesn't harm security so long as it's kept secret from peers 19:54:50 BakSAj: 0.13.0 19:54:51 sipa, which number 19:54:59 instagibbs: sec 19:55:04 gmaxwell: nvm -- forgot you have to send it? 19:55:07 jeremyrubin: the nonce used for compact blocks must be sent to peers or they can't recover the block. 19:55:12 wumpus: we do have temporary service bits 19:55:19 btcdrak: thanks! 19:55:33 gmaxwell: thoughts on #7598/#7600? you said above that you'd started review 19:55:40 isn’t it likely we’re going to overhaul the p2p protocol by the time we run out of service bits? 19:55:45 i still think it should be a priority to get those PRs merged for 0.13.0... 19:55:47 I don't think connecting to cmpctblock peers will be hard unless we get sybil'd by AWS forks 19:55:57 sdaftuar: I like them and will ACK soon, once I come up with a useful way to test. 19:56:08 sdaftuar: me too, i started revieweing but got caught up on other things 19:56:09 sdaftuar: I agree. 19:56:24 Lightsword: maybe 19:56:41 Lightsword: it's often hard to predict how long protocols live 19:56:47 I think important big PRs I'd really like to have in 0.13 are SW, Compact blocks, CFPF related, and BIP32. 19:56:51 gmaxwell: ok, let me know if you want help with the sim environment i shared with you, i think that makes it easy 19:56:54 sipa, https://github.com/bitcoin/bitcoin/pull/8084 19:56:59 There are a bunch of small things (including all of mine) 19:57:16 instagibbs: that one, thanks 19:57:45 off-topic: quickly, before I forget. I'll be headed out of town on Friday and only reachable for emergencies for ~10 days. If anyone needs anything from me before I go, speak up now :) 19:57:58 cfields_: for how long? 19:58:03 a month? 19:58:04 maybe we should just have a service bit for flagging fast relay nodes/miners in general for preferential peering rather than making it flag compact blocks specifically 19:58:17 only features have to be in before the feature freeze, anything that can be interpreted as bug fixes or anti-DoS measures doesn't have the deadline of next week 19:58:20 also SW is special 19:58:30 Lightsword: we should also have an evil bit that abusive nodes should set 19:58:45 Lightsword: "the I am a DOS attack master node, please connect to me" flag? 19:58:48 brilliant 19:58:51 sipa: ^.^ 19:58:56 as we discussed above it's a consensus change so it can't be enabled in a major release first 19:59:04 sipa: for ~10 days. I'll be gone for a month total, but working for the last few weeks. 19:59:10 i see 19:59:23 he announced that well in advance 19:59:30 lynch him! 19:59:33 cfields_: review of https://github.com/bitcoin/bitcoin/pull/5872 ? :D 19:59:36 oh in advance, okay. 19:59:38 :P 19:59:47 :-) 19:59:54 luke-jr: added to the list, thanks 20:00:01 *ding dong* 20:00:03 wumpus, all-but-SF SW would be nice 20:00:05 #endmeeting