Bitcoin Forum
July 04, 2024, 05:06:53 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 [185] 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 ... 247 »
3681  Bitcoin / Bitcoin Discussion / Please test (if you dare): next-test 20120321 on: March 21, 2012, 07:23:36 AM
next-test is a branch of the mainline bitcoind & Bitcoin-Qt with as many pull requests merged as possible, to aid in testing them. This branch can be used to test many pull requests in your daily Bitcoin use. The goal is to help pull requests get the testing they need to be merged into the main tree, so once you test a change, please comment in the relevant pull request (ideally with details).

Please note these might possibly corrupt your wallet. No warranty of any kind of provided. BACKUP YOUR WALLET


Today's next-test includes the following pull requests (green are merged now; red are disputed):
3682  Bitcoin / Bitcoin Discussion / bitcoind version 0.4.4 released on: March 21, 2012, 06:06:24 AM
Bitcoin version 0.4.4 is now available for download at:
  http://luke.dashjr.org/programs/bitcoin/files/bitcoind-0.4.4/

This is a bugfix-only release based on 0.4.0.

Please note that the wxBitcoin GUI client is no longer maintained nor supported. If someone would like to step up to maintain this, they should contact Luke-Jr.

Please report bugs for the daemon only using the issue tracker at github:
  https://github.com/bitcoin/bitcoin/issues

Stable source code is hosted at Gitorious:
  http://gitorious.org/bitcoin/bitcoind-stable/archive-tarball/v0.4.4#.tar.gz

BUG FIXES

  • Limit the number of orphan transactions stored in memory, to prevent a potential denial-of-service attack by flooding orphan transactions. Also never store invalid transactions at all.
  • Fix possible buffer overflow on systems with very long application data paths. This is not exploitable.
  • Resolved multiple bugs preventing long-term unlocking of encrypted wallets (issue #922).
  • Only send local IP in "version" messages if it is globally routable (ie, not private), and try to get such an IP from UPnP if applicable.
  • Reannounce UPnP port forwards every 20 minutes, to workaround routers expiring old entries, and allow the -upnp option to override any stored setting.
  • Various memory leaks and potential null pointer deferences have been
    fixed.
  • Several shutdown issues have been fixed.
  • Check that keys stored in the wallet are valid at startup, and if not,
    report corruption.
  • Various build fixes.
  • If no password is specified to bitcoind, recommend a secure password.
  • Update hard-coded fallback seed nodes, choosing recent ones with long uptime and versions at least 0.4.0.
  • Add checkpoint at block 168,000.



Thanks to everybody who contributed code or helped test this release:

Pieter Wuille
Luke Dashjr
Gavin Andresen
Gregory Maxwell
Matt Corallo
Lars Rasmusson
Daniel Folkinshteyn
3683  Bitcoin / Pools / Re: [390 GH/s 0% fee SMPPS] ArsBitcoin mining pool! Come join us! on: March 20, 2012, 11:53:05 PM
hmmm, I hope this wont happen to soon since right now I have over 200 BTC still unpaid and without a decent chance of recouping atleast some of it would simply suck. Unless you figure out a way to start rewarding only those who still mine at the pool from new blocks generated since it seems a huge volume of users simply stopped and is now piggybacking on remaining miners who still clear blocks for the pool, these loyal miners would be affected the most since they constantly will have unpaid balances.
I suspect you mean extra credit. That was never promised to become Bitcoins or retain any value.
3684  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 19, 2012, 04:40:41 PM
FYI, Windows binaries from the 0.6.0rc4 source (in git) will not get you a fixed build.

Why's that?  The v0.6.0rc4 tag includes the -lmingwthrd fix.

When I first saw your post I figured I must have guessed wrongly what the update was all about, because the changes for safe multi-threading in mingw were included in the rc4 source.
The v0.6.0rc4 tag includes the fix, but it removes -lmingw only in the gitian build of Qt. Since it doesn't also change the filename, there is a probability anyone using gitian will not rebuild Qt; they, and non-gitian builders, will therefore not get the change. I submitted a pull request to move the change to bitcoin-qt.pro where it belongs, and incorporated this into the v0.5.3.1 tag.

While it would be possible (and in the case of the binaries, was done) to build v0.6.0rc4 with the adjusted Qt, doing so required inside knowledge of the fix, and could not be explained without disclosing the nature of the security issue; therefore, I stuck with a blanket "will not" to be on the safe side.
3685  Bitcoin / Pools / Re: [475 GH] Eligius: Decentralized, 0Fee SMPPS, no reg, BTC+NMC, P2SH on: March 18, 2012, 06:13:57 PM
So, [sarcasm]*theoretical question*[/sarcasm], when some retard mines for over 24 hours with the username set as <bitcoinaddress>.x instead of the username being properly set as <bitcoinaddress> with a password of x, is there any chance said retard can get the rewards he should have earned added returned to his queue? Undecided
Not practical, sorry. The shares are processed in realtime, and there's no way for me to change the history without significantly rewriting code and taking the pool down for probably an extended duration to try to adapt the historical block record.
3686  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 18, 2012, 06:06:54 PM
The key is having a compiler toolchain written in the language itself. After some iterations the original C-code used to bootstrap (if it was C) can be replaced totally.
Only if the language can be compiled to native code at all. In which case it's just as "at risk" of buffer overflows etc as C++ is. For Python, Java (for practical purposes; GCJ seems to have trouble with most real Java software), etc, they cannot be compiled to native code, and thus always require a C/equivalent interpretor.
3687  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 18, 2012, 05:51:08 AM
Here are Windows binaries for coderrr's coin control patchset with 0.5.3.1 fix applied
3688  Bitcoin / Pools / Re: [475 GH] Eligius: Decentralized, 0Fee SMPPS, no reg, BTC+NMC, P2SH on: March 18, 2012, 02:31:02 AM
I'm trying to register for the namecoins and my bitcoin qt doesnt have the message option.  How can I correct this.
Upgrade to 0.6.0rc4.

Where can I get that for windows.

http://sourceforge.net/projects/bitcoin/files/Bitcoin/bitcoin-0.6.0/test/
3689  Bitcoin / Pools / Re: [475 GH] Eligius: Decentralized, 0Fee SMPPS, no reg, BTC+NMC, P2SH on: March 18, 2012, 02:24:10 AM
I'm trying to register for the namecoins and my bitcoin qt doesnt have the message option.  How can I correct this.
Upgrade to 0.6.0rc4.
3690  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 18, 2012, 01:49:10 AM
FYI, Windows binaries from the 0.6.0rc4 source (in git) will not get you a fixed build.
3691  Bitcoin / Pools / Re: [475 GH] Eligius: Decentralized, 0Fee SMPPS, no reg, BTC+NMC, P2SH on: March 18, 2012, 01:03:44 AM
Bitcoind 0.3.23.eligius (obsolete) source code released without support: https://bitcointalk.org/index.php?topic=69225.0
3692  Bitcoin / Development & Technical Discussion / For reference/history: 0.3.23.eligius on: March 18, 2012, 01:02:08 AM
Now that I have moved on to 0.6 (about a month ago) for Eligius, I wanted to be sure to release my full 0.3.23 fork that it used to run on, for the community's general benefit. I don't recommend using it, but it might have interesting bits and pieces to others.

Note that 0.3.23.eligius17 and 0.3.23.eligius18 have BIP 12 (OP_EVAL) support, 0.3.23.eligius21 has BIP 17 support, and no version of this ever had BIP 30 or BIP 16 support.

http://luke.dashjr.org/programs/bitcoin/w/bitcoind/luke-jr.git/shortlog/refs/heads/0.3.23.eligius
http://luke.dashjr.org/programs/bitcoin/w/bitcoind/luke-jr.git/shortlog/refs/heads/0.3.23.eligius-OLD
3693  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 18, 2012, 12:29:56 AM
At least python and ruby are both implemented in a wide variety of other languages, not just C.
My point is that every language eventually reduces to C somewhere, even C++.
3694  Other / Beginners & Help / Re: Reporting BitCoins on Taxes on: March 17, 2012, 07:45:27 PM
Bitcoins are not recognized by the US as a currency or commodity, so there are no governmental laws regulating trade.
This is complete nonsense. The US recognizes Bitcoins as "stored value", and even if it hadn't yet, you could be sure it's something, and everything is regulated/taxable.
3695  Bitcoin / Pools / Re: [475 GH] Eligius: Decentralized, 0Fee SMPPS, no reg, BTC+NMC, P2SH on: March 17, 2012, 05:45:47 PM
Finally got around to removing the old debug info ("fee"), so now Eligius is completely fee-free (as of midnight UTC tonight).
3696  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 17, 2012, 03:52:12 PM
You have to be god-like to not create security vulnerabilities in significantly C/C++ software.  'Direct' buffer overflows can be avoided by littering your code with meticulous boiler plate (and praying you haven't made a mistake somewhere).  But integer overflows leading to buffer overflows are so hopelessly trickly that I have no faith in any C/C++ being safe.

Java buffer overflows simply don't exist... a huge class of exploit eradicated by language choice.  And there's a long list of languages immune to buffer overflows (this is mostly a glaring hole in C/C++).  Look up US military/intelligence mandates about language choice.  C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_.  Why do you think computer security is such a disaster (it was all C/C++ until the recent xss/xsrf/sql havoc - and that too is a design flaw).
Guess what language Java/Python/etc are implemented it.
3697  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 17, 2012, 02:10:39 PM
If anything, more advanced languages can have their own vulnerabilities which could bitcoin vulnerable without any mistakes acutally made by the developers. This is almost impossible with a low level language like c++.
Apart from that, a program's security does not depend on the language, it depends on the coding.
Or on the (coding of the) language as you stated just earlier Wink
I'm using the anonymity patched bitcoin client (https://bitcointalk.org/index.php?topic=24784.0), hope they get their security patches too.

I don't have any info on the vuln or code for the patch.  So I'd advise you not to use my patched binaries until the vuln and fix have been disclosed and I can compile new ones.
Dev team is doing builds of 0.5.3+coderrr with the fix applied; should be available later today.
3698  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 17, 2012, 01:47:00 PM
It's simply impossible to provable test all possible pathways as soon as you venture beyond Hello World type complexity.
It actually isn't impossible, just complex enough it hasn't been accomplished yet. It's quite possible to write a specialized emulator that follows every possible code-path with "quantum" memory states...
3699  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 17, 2012, 01:47:16 AM
so all the 0.4.* versions are still safe, right?
For this specific bug, yes. But wxBitcoin (the GUI in 0.4.x) is not maintained or supported at all, so it likely has other unfixed vulnerabilities.
3700  Bitcoin / Bitcoin Discussion / Re: URGENT: Windows Bitcoin-Qt update on: March 17, 2012, 01:32:14 AM
are the backups in 0.6.0 for windows encrypted?
No

why wouldn't it be?  if you encrypt your working wallet, then run a backup, it should be encrypted as well i would think.
Encrypted wallets aren't really encrypted entirely. Only your private keys are. There's still a lot of sensitive data in there you probably don't want public.
Pages: « 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 [185] 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 ... 247 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!