Bitcoin Forum
May 28, 2024, 08:44:05 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 [338] 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 ... 535 »
  Print  
Author Topic: | Nxt | Blockchain Platform | Proof of Stake | Official  (Read 940984 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
nexern
Hero Member
*****
Offline Offline

Activity: 597
Merit: 500



View Profile
June 09, 2015, 12:33:42 PM
 #6741

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get
PilotofBTC
Legendary
*
Offline Offline

Activity: 1736
Merit: 1001


View Profile
June 09, 2015, 02:28:09 PM
 #6742

How many confirmations does NXT need for a transaction to fully confirm? I sent some over 12 hours ago and it now has 528 confirmations, yet still doesn't show as fully confirmed.  It doesn't seem viable for a currency for this to be normal. Is the network malfunctioning?

It depends on what you mean by "fully confirmed". It will take 1440 confirms before it will forge. But, the coins are probably pretty safe after 10 confirms or so. NXT attempted to do a roll back once, but just getting all the major forgers to do something is near impossible.
PilotofBTC
Legendary
*
Offline Offline

Activity: 1736
Merit: 1001


View Profile
June 09, 2015, 02:44:51 PM
 #6743

How many confirmations does NXT need for a transaction to fully confirm? I sent some over 12 hours ago and it now has 528 confirmations, yet still doesn't show as fully confirmed.  It doesn't seem viable for a currency for this to be normal. Is the network malfunctioning?
720 confirms for fully not rollback.
Generally,10 confirms is enough.

Wow. That's going to take close to a day to process a single transaction. Thanks for the info.

Er, seems to be some confusion here......
10 confirms is more than enough to be spendable, the 720 confirmations/blocks is the rollback limit coded into NXT:
https://nxtforum.org/general/transaction-confirmations-best-practice/

The confusion seems to be in the client, explorer, and/or network because I went to bed last night with over 850 confirmations yet the explorer showed it as "unconfirmed" and it still hadn't arrived.  Just had a chance to check today and it now has over 1275 confirms yet the explorer still shows it as unconfirmed.  However, the funds do seem to have finally arrived after a day and a half!


How many confirmations does NXT need for a transaction to fully confirm? I sent some over 12 hours ago and it now has 528 confirmations, yet still doesn't show as fully confirmed.  It doesn't seem viable for a currency for this to be normal. Is the network malfunctioning?

Are you running NRS v1.5.x?

Can you post the transaction ID (or PM it me)?

I was using Mofowallet's web client, my third attempt to get a working client (the one I had installed from months ago now gives the error "An error occurred, the server has quit. Please restart the application" when I try launching it), the official client apparently requires the command line to launch now (which I'm perfectly comfortable using) but just gives multiple error messages when I try, and the first web client I tried seemed to want me to register and create a new wallet with no way to use my existing one. 

Conceptually, I like NXT, but if the goal is widespread consumer adoption, it has a long way to go.

Mofo Wallet is nice... but I don't think they have updated the NXT side to 1.5 yet.

The standard NRS is pretty easy... as long as you have Java installed. I think they recently moved to a new version required. That may be why it doesn't run for you.
bitcoinrocks
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


View Profile
June 10, 2015, 10:53:19 AM
 #6744

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?
nexern
Hero Member
*****
Offline Offline

Activity: 597
Merit: 500



View Profile
June 10, 2015, 11:25:54 AM
 #6745

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?

add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer

or

http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html
tyz
Legendary
*
Offline Offline

Activity: 3360
Merit: 1531



View Profile
June 10, 2015, 06:27:17 PM
 #6746

Fully confirmed is relative. A transaction is fully confirmed after 1440 confirmations. After 720 confirmations a rollback is impossible. Usually it is enough when you have 10+ confirmations.

How many confirmations does NXT need for a transaction to fully confirm? I sent some over 12 hours ago and it now has 528 confirmations, yet still doesn't show as fully confirmed.  It doesn't seem viable for a currency for this to be normal. Is the network malfunctioning?
bitcoinrocks
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


View Profile
June 11, 2015, 03:45:27 AM
 #6747

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?

add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer

or

http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html

The latest available there is 8u33 which has 13 security vulnerabilities currently (3 of them rated 10/10 for severity):

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities.  ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40.  NRS updates should have been delayed until a secure ARM binary is available from Oracle.  This was not handled responsibly from a security standpoint.
nexern
Hero Member
*****
Offline Offline

Activity: 597
Merit: 500



View Profile
June 11, 2015, 10:18:03 AM
 #6748

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?

add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer

or

http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html

The latest available there is 8u33 which has 13 security vulnerabilities currently (3 of them rated 10/10 for severity):

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities.  ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40.  NRS updates should have been delayed until a secure ARM binary is available from Oracle.  This was not handled responsibly from a security standpoint.

can't remember when jdk ever was bug free (like many other complex dev-stacks).
however, since i am not a java coder but running an arm node, it would be helpfull
if you could point me to a more concret security problem or better to a non theoretical
attack vector, where running the arm node isn't secure.

if this is a real world security problem it has to be adressed ofc.
Eadeqa
Hero Member
*****
Offline Offline

Activity: 644
Merit: 500


View Profile
June 11, 2015, 01:29:12 PM
 #6749


http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities.  ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40.  NRS updates should have been delayed until a secure ARM binary is available from Oracle.  This was not handled responsibly from a security standpoint.

Nonsense. The operating system you are running (whatever it is) probably have hundreds of bugs, like all software.  Doesn't mean crap.

Nomi, Shan, Adnan, Noshi, Nxt, Adn Khn
NXT-GZYP-FMRT-FQ9K-3YQGS
https://github.com/Lafihh/encryptiontest
bitcoinrocks
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


View Profile
June 11, 2015, 04:19:38 PM
 #6750

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?

add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer

or

http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html

The latest available there is 8u33 which has 13 security vulnerabilities currently (3 of them rated 10/10 for severity):

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities.  ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40.  NRS updates should have been delayed until a secure ARM binary is available from Oracle.  This was not handled responsibly from a security standpoint.

can't remember when jdk ever was bug free (like many other complex dev-stacks).
however, since i am not a java coder but running an arm node, it would be helpfull
if you could point me to a more concret security problem or better to a non theoretical
attack vector, where running the arm node isn't secure.

if this is a real world security problem it has to be adressed ofc.


As you know, bugs aren't the issue, security vulnerabilities are, and it looks like 8u41 and higher are free of known security vulnerabilities.  The latest version for x86 looks to be 8u45.  Details on the vulnerabilities are accessible via this link:

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html
EmoneyRu
Hero Member
*****
Offline Offline

Activity: 600
Merit: 500

Nxt-kit developer


View Profile
June 12, 2015, 09:41:33 AM
 #6751

NSC payouts #7.

bitcoinrocks
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


View Profile
June 12, 2015, 09:55:48 AM
 #6752

Please see:

http://downforeveryoneorjustme.com
yassin54
Legendary
*
Offline Offline

Activity: 1540
Merit: 1000


View Profile
June 12, 2015, 10:08:14 AM
 #6753

it is just me
bizarre  Huh
Eadeqa
Hero Member
*****
Offline Offline

Activity: 644
Merit: 500


View Profile
June 12, 2015, 10:13:52 AM
 #6754

for those running a nix vps and used open-jdk.
1.5.11 needs oracle-8. here is a good page how to switch over easily.

https://www.digitalocean.com/community/tutorials/how-to-install-java-on-ubuntu-with-apt-get

If I'm not mistaken, the Oracle JDK is not open source and there are no ARM binaries available.  How are people supposed to run NRS on the many (many!) available ARM devices such as the Raspberry Pi?

add-apt-repository ppa:webupd8team/java
apt-get update
apt-get install oracle-java8-installer

or

http://www.oracle.com/technetwork/java/javase/downloads/jdk8-arm-downloads-2187472.html

The latest available there is 8u33 which has 13 security vulnerabilities currently (3 of them rated 10/10 for severity):

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

So everyone running the latest NRS on an ARM device (Raspberry Pi, etc) is likely open to several severe security vulnerabilities.  ARM users should be instructed to shut down their nodes until Oracle releases something newer than 8u40.  NRS updates should have been delayed until a secure ARM binary is available from Oracle.  This was not handled responsibly from a security standpoint.

can't remember when jdk ever was bug free (like many other complex dev-stacks).
however, since i am not a java coder but running an arm node, it would be helpfull
if you could point me to a more concret security problem or better to a non theoretical
attack vector, where running the arm node isn't secure.

if this is a real world security problem it has to be adressed ofc.


As you know, bugs aren't the issue, security vulnerabilities are, and it looks like 8u41 and higher are free of known security vulnerabilities.  The latest version for x86 looks to be 8u45.  Details on the vulnerabilities are accessible via this link:

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html


Instead of giving random links with hundreds of vulnerabilities, can you post an exact vulnerability, explain how it works, and how is it relevant to Nxt? A lot of these vulnerabilities are related to applets where you are running UNTRUSTED code  found on a random webpage.  Nxt doesn't use applets. And Nxt isn't UNTRUSTED code as you download it from official source (Nxt developers who you presumably trust)  Understand that difference  and then you will see none of these 'vulnerabilities" have any relevance in your usecase.


Nomi, Shan, Adnan, Noshi, Nxt, Adn Khn
NXT-GZYP-FMRT-FQ9K-3YQGS
https://github.com/Lafihh/encryptiontest
yassin54
Legendary
*
Offline Offline

Activity: 1540
Merit: 1000


View Profile
June 12, 2015, 10:22:53 AM
 #6755

may be the storm
this is my Internet operator who has problem
thank you for yur link  Wink
superresistant
Legendary
*
Offline Offline

Activity: 2142
Merit: 1125



View Profile
June 12, 2015, 01:41:16 PM
 #6756

may be the storm
this is my Internet operator who has problem
thank you for yur link  Wink

I had the same "storm" problem this morning. I'm in the south of France.
tyz
Legendary
*
Offline Offline

Activity: 3360
Merit: 1531



View Profile
June 12, 2015, 02:30:36 PM
 #6757

Same to me. Actually I do not trade much on Cryptsy. But each time I tried to withdrew, I had some troubles. So, choose Polo or Bittrex. Two better alternatives.

Btw cryptsy has issues with NXT withdrawals very often based on my experience... it's definitely not the best option if you need to withdraw NXT fast
bitcoinrocks
Legendary
*
Offline Offline

Activity: 1372
Merit: 1000


View Profile
June 12, 2015, 05:14:00 PM
 #6758

none of these 'vulnerabilities" have any relevance in your usecase.

It sounds like you have already carefully gone over each of the 13 vulnerabilities then, right?  Especially the 3 with a 10/10 severity of course.

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html
Mhr3io
Newbie
*
Offline Offline

Activity: 30
Merit: 0


View Profile
June 12, 2015, 05:50:37 PM
 #6759

NXT maybe this is the next coin to check
Eadeqa
Hero Member
*****
Offline Offline

Activity: 644
Merit: 500


View Profile
June 13, 2015, 07:00:26 AM
Last edit: June 13, 2015, 07:11:14 AM by Eadeqa
 #6760

none of these 'vulnerabilities" have any relevance in your usecase.

It sounds like you have already carefully gone over each of the 13 vulnerabilities then, right?  Especially the 3 with a 10/10 severity of course.

http://www.cvedetails.com/vulnerability-list/vendor_id-93/product_id-19116/Oracle-JDK.html

Once again, you failed to demonstrate how these are relevant to your case? You are not running untrusted code you found on a webpage.  These security bugs are talking about running malicious untrusted code on JVM that can breach JVM's builtin security. Lesson? Don't run untrusted code on JVM.  In your usecase, you are running software (Nxt in this case) that you downloaded yourself from official site.  You trust the code you are running.  If you don't understand that difference, then well too bad for you.

Do you even understand how computers work?

Nomi, Shan, Adnan, Noshi, Nxt, Adn Khn
NXT-GZYP-FMRT-FQ9K-3YQGS
https://github.com/Lafihh/encryptiontest
Pages: « 1 ... 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 [338] 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 ... 535 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!