diff --git a/src/checkpoints/checkpoints.cpp b/src/checkpoints/checkpoints.cpp index 17f08e9c5..37760ddad 100644 --- a/src/checkpoints/checkpoints.cpp +++ b/src/checkpoints/checkpoints.cpp @@ -283,6 +283,7 @@ namespace cryptonote // All four MoneroPulse domains have DNSSEC on and valid static const std::vector dns_urls = { + "checkpoints.muchwow.lol", }; static const std::vector testnet_dns_urls = { diff --git a/src/common/dns_utils.cpp b/src/common/dns_utils.cpp index 3eddede3b..ce4e64f0a 100644 --- a/src/common/dns_utils.cpp +++ b/src/common/dns_utils.cpp @@ -526,12 +526,12 @@ bool load_txt_records_from_dns(std::vector &good_records, const std const std::string &url = dns_urls[cur_index]; if (!avail[cur_index]) { - records[cur_index].clear(); + //records[cur_index].clear(); TODO: temp skipped DNSSEC LOG_PRINT_L2("DNSSEC not available for hostname: " << url << ", skipping."); } if (!valid[cur_index]) { - records[cur_index].clear(); + //records[cur_index].clear(); TODO: temp skipped DNSSEC LOG_PRINT_L2("DNSSEC validation failed for hostname: " << url << ", skipping."); } @@ -552,7 +552,7 @@ bool load_txt_records_from_dns(std::vector &good_records, const std } } - if (num_valid_records < 2) + if (num_valid_records < 1) { LOG_PRINT_L2("WARNING: no two valid DNS TXT records were received"); return false; diff --git a/src/p2p/net_node.inl b/src/p2p/net_node.inl index c723201e2..65749c148 100644 --- a/src/p2p/net_node.inl +++ b/src/p2p/net_node.inl @@ -2012,12 +2012,14 @@ namespace nodetool template bool node_server::update_dns_blocklist() { - if (!m_enable_dns_blocklist) - return true; + /*if (!m_enable_dns_blocklist) // TODO: temp forced DNS blocklist + return true;*/ if (m_nettype != cryptonote::MAINNET) return true; static const std::vector dns_urls = { + "blocklist.wownero.com", + "blocklist2.wownero.com", }; std::vector records;