Bitcoin Forum
May 24, 2024, 03:56:00 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 [197] 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 ... 288 »
3921  Bitcoin / Bitcoin Discussion / Re: Bitcoin-Qt / bitcoind version 0.8.4 released, fixes critical DoS vulnerability on: September 11, 2013, 04:53:21 AM
See other threads.  re-run with "-checklevel=2"
Here is the aforementioned other threads.
3922  Bitcoin / Bitcoin Technical Support / Re: All Bitcoind / Bitcoin-qt nodes failing to come up. Workaround inside! on: September 11, 2013, 04:45:07 AM
I encountered this problem this morning before I was aware of this thread, but in my case reindexing, although it took all day, was successful.
Indeed, reindexing will now work if after the reindex you leave the node running long enough to process the trigger block and the next ~100 blocks. However if more of these transactions get mined it will break again.

It's ~mostly harmless to have the check level down, it just changes the checking at startup. ... it means _if_ you suffer disk corruption your node may eventually produce a bad block if mining or get stuck processing the chain in the future.  That said, after this we may rename the checklevel knob in the next version just to turn it back to the normal level for people who've stuck in this workaround.

Sorry for silly question, but would it not be better to release 0.8.5 version with this bug fixed, than to give instructions for workaround? Version 0.8.3 also had just one fix added, so why not do the same?
0.8.4 had three-ish changes, but they also had at least three weeks of testing (more much more for some of them). Partially this was possible because we were able to keep the bug that triggered the release a secret until publishing the fixed version.  Because of the workaround is basically as good as the fix and factors mentioned above getting a fixed version out is slightly less urgent than it was for the first day after the issue happened, and I'm not inclined to rush out a version which isn't thoroughly tested.

The fix for this is now merged in the git development branch. There will be an updated release soon.
3923  Bitcoin / Development & Technical Discussion / Re: Downloading the Blockchain.... on: September 10, 2013, 07:59:31 PM
Strange I bootstrapped a node from genesis block to current in less than 18 hours.
Slowness these days is mostly due to cruddy peers combined with bitcoin's poor handling of cruddy peers. The work in progress for 0.9 (headers first) improves this enormously. (e.g. down to a couple of hours on my DSL test)
3924  Bitcoin / Development & Technical Discussion / Re: Amount of addresses created on Testnet3 on: September 10, 2013, 07:42:22 PM
Oh, you're flooding the network with unconfirmed transactions and then noticing further sends start taking forever?

The part of coin selection which traverses unconfirmed change has complexity exponential in the amount of unconfirmed coins in your wallet.
3925  Bitcoin / Development & Technical Discussion / Re: ECDSA Weak signing on: September 10, 2013, 07:36:21 PM
K=secret-key is no more a special value than K=11 (or 12 or 13 or any other specific value)
Agreed, but the difference is that to recognize values k=11, 12 ... you need a lookup table on the r value that does not worth it! Checking r=Qx is at no cost!
To recognize K=11 you do a comparison with a constant.  To recognize K=secret key you do a comparison with a dynamic value.  In either case the operation is the same and you only recognize one possible K. Maybe you can argue that you save a word of memory, but this is a trivial cost.
3926  Bitcoin / Development & Technical Discussion / Re: CoinJoin: Bitcoin privacy for the real world on: September 10, 2013, 07:32:03 PM
I agree that it might not be ideal, but it does not compromise the anonymization. It is not intended to be pretty, but useful, and to decrease the chance of the user making mistakes.
If you obtain an explicit change address from the user there won't be any confusion or mistakes. And it does reduce privacy— otherwise a third party is still unsure about the ownership of the change, if less unsure than they are about the other outputs.

Are you planning on writing software that does this? if not, the debate is kind of moot.
3927  Bitcoin / Development & Technical Discussion / Re: Amount of addresses created on Testnet3 on: September 10, 2013, 07:29:43 PM
With using Testnet=1 our and using client we find that after about 300 addresses our RPC calls fail to work with Json.
I just generated 10,000 fine. Are you using a locked wallet and draining your keypool?
3928  Bitcoin / Bitcoin Discussion / Re: Landmark Event For Bitcoin: First Full & Independent Wallet on: September 10, 2013, 07:12:13 PM
Very cool.

Though I'll repeat what I've told alternative implementers,

_Please_ do not mine on this until it at least passes the block tester. Inconsistencies in block validation can result in devastating forks which would be harmful to all Bitcoin users and not just the users of the inconsistent software. This is more of a risk today than it ever was since a majority of mining is just in three hands and so many people use SPV wallets.
3929  Bitcoin / Development & Technical Discussion / Re: Auxiliary block: Increasing max block size with softfork on: September 10, 2013, 07:04:39 PM
Technically, that's correct. Practically, my statement is dead on. Usurping Bitcoin is as easy as getting 51% of the hashing power and some number of users (doesn't need to be a majority, just a few percent) on your side. We need to think long and hard about the implications this will have in the future.
I think you need to think through your attack a bit more.
The problem is that I'm not referring to what is generally accepted to be considered an "attack". If that were the case, I would have contacted Gavin about this issue long ago. The problem with this, which is far more subtle than an "attack", is that now the Bitcoin "contract" can be violated with a mere simple-majority support. That's why I didn't tell any developers about this method (although I would have if the block size became a major issue and no hardfork was in sight).
This wouldn't have news to us, go look at bitcoin-dev logs around june-july 2011.  I wish you wouldn't have ignored the rest of my message.

It's isomorphic to a majority hashpower DOS attack and an altcoin.  The challenge in saying that its different is that if a majority of hashpower violates the contract then the security assumptions underlying Bitcoin (and any similarly constructed altcoin) are invalid.

Bitcoin is secure if:

(0) Various cryptographic constructs do what they're supposed to.
(1) A majority of the involved computing power behaves honestly (correctly imposed the rules of the contract)
(2) If information is easy/cheap to spread and hard to stifle so that its participants cannot be isolated (including excessive delays) from the honest majority.

And we argue that (1) is probable because faithful behavior is what makes performing computing valuable.
3930  Bitcoin / Development & Technical Discussion / Re: CoinJoin: Bitcoin privacy for the real world on: September 10, 2013, 06:20:51 PM
In order to avoid confusion, this change address is the same as the input address).
This is a terrible idea. You have to specify the input you want to spend, just specify the address you want change to be assigned to too.
3931  Bitcoin / Development & Technical Discussion / Re: ECDSA Weak signing on: September 10, 2013, 06:15:15 PM
Once again this thread has nothing to do with RNG.
It is just a special case, very easy to detect, more or less as probable (or improbable) as other tests that are performed in the signing process.
So why not?
Because you're wrong.

Ignoring potential problems with RNG, K=secret-key is no more a special value than K=11 (or 12 or 13 or any other specific value). All of them result in a trivally identifiable R.

Ignoring RNGs,  you are no more likely to crack ECDSA by recognizing K==secret from R than you are to crack it by recognizing K==11 from R. You're aware that if the attacker knows K they can recover your private key, right?  K doesn't need to be reused to expose you.
3932  Bitcoin / Development & Technical Discussion / Re: Deterministic Usage of DSA and ECDSA Digital Signature Algorithms (RFC 6979) on: September 10, 2013, 05:01:51 PM
I'm probably missing something here, but it seems to me that the argument that you're giving is similar to what Colin Percival had in mind, though you're interpreting it in the opposite way than he, and I don't exactly understand your argument yet.
Colin Percival is the author of the only recent notable hash-function with significant data-dependent-timing attack problems, so perhaps thats why it's on his brain.

If you have non-memory access related power or timing side channels (e.g. like adders leaking data, which is what would be required for HMAC-SHA512 to leak) then there is going to be no way to avoid the ECDSA point math leaking like crazy. Using non-deterministic DSA does not save you from side channels. Maybe deterministic makes a really side-channel heavy implementation more vulnerable, but people have already demonstrated recovery on devices with randomized DSA, so I am a little skeptical that it matters. Some masking behavior would be fine, but it wouldn't require making the output non-deterministic.

Being hard against an attacker with physical access is very hard, as I mentioned a simple bit error in our the multiply will put you on the twist and the largest prime factor of the order of SECP256k1's twist is only around 2^50.
3933  Bitcoin / Development & Technical Discussion / Re: ECDSA Weak signing on: September 10, 2013, 04:50:19 PM
Are you seriously suggesting that we should test here whether we're dealing with RNG that always returns the same value, or is there something else that I'm missing?
No, I think this thread is foolish. But RNG's the break and return constant values do happen so I can't honestly say that its completely worthless.  I was trying to make clear that any (however small) value added here is because it detects a faulty rng, not because picking the same value as your private key is actually a threat.
3934  Bitcoin / Development & Technical Discussion / Re: Zerocoin: Anonymous Distributed E-Cash from Bitcoin on: September 10, 2013, 04:36:10 PM
uh wtf is with that novacoin page?  Did the author of that look at how script works at all?

There shouldn't be additional script pushes for this. This should use the existing push opcodes and add new CHECKSIG operators. :-/
3935  Bitcoin / Bitcoin Technical Support / Re: All Bitcoind / Bitcoin-qt nodes failing to come up. Workaround inside! on: September 10, 2013, 04:08:37 PM
Why this resulted in bitcoin failure to come up?  With security model in place should have resulted in a chain fork, yes?
There is no network rule that does anything with the transaction versions currently, there is no fork because the consensus algorithm doesn't care if its consistent. The startup database validation cares if the database is correct, however.
3936  Bitcoin / Development & Technical Discussion / Re: Auxiliary block: Increasing max block size with softfork on: September 10, 2013, 07:02:50 AM
Technically, that's correct. Practically, my statement is dead on. Usurping Bitcoin is as easy as getting 51% of the hashing power and some number of users (doesn't need to be a majority, just a few percent) on your side. We need to think long and hard about the implications this will have in the future.
I think you need to think through your attack a bit more.

If you are imagining something as simple as "deny all new transactions, mine just blocks committing to MegaBitcoin auxblocks with 21 trillion coins instead" then it would be simple enough for the honest Bitcoin users to ignore blocks with the MegaBitcoin Commitments in them.

So instead I think your attack is a weaker versions of an attack where you merge mine Bitcoin with an altcoin and DOS bitcoin and do all your stuff in your altcoin. At least then it's harder for Bitcoin users to fork off your blocks by their shape.

Of course, if you're using a majority of hashpower to DOS bitcoin you've disprove one of the fundamental security assumptions (arguably the current hashpower distribution is already disproving them, but its not clear how fast that would change if there was an attack) and so what would be the point of your MegaBitcoin?  If you want to trust a cooperating conspiracy, there are far more efficient ways to interact with them for finical purposes.

So really this just sounds like "if you can get a conspiracy of a majority of hashpower you can kill bitcoin" but we've always known that— thats what it said on the tin.

... When I stop having problems with people paying to me on a P2SH address, adopted at the beginning of 2012— you can't send to them in half the clients apps, including ones promoted on Bitcoin.org, or via many popular webwallets or commercial services, even though the change is a couple lines of code and is economically neutral... I might start worrying more about "in practice" more. Experience shows that having some network rules does far less than you might guess.
3937  Bitcoin / Bitcoin Discussion / Re: What if dev-team is compromised? on: September 10, 2013, 06:47:41 AM
In all seriousness though, I'd like to have a mechanism whereby if a core developer is approached by any gov't to compromise bitcoin, they have to resign - and announce that publicly, signing the message with the same pgp signature used to commit their changes to the Bitcoin codebase.
But whats that even mean exactly?

I had some doofbrained researchers contact me to ask about adding tracking code to Bitcoin to help with their research. I told them to buzz off in perhaps excessively rude terms. If it was some law enforcement, some officer Obie from Stockbridge, Nowhere?  I'd have to resign?

Or maybe those researchers were really government shills (how would I know?) does that mean I'm already free?  ?? ?!? FREE?! IT WAS THAT EASY OMG I'M FREE   FREEEE FREEEEEEE!

I imagine that, if malicious, the compromisors (?) would push out an update to QT with a virus or a way to screw up the network
This is why we don't have an auto-updater. We should eventually gain some kind of update tool... Without one a lot of people just keep downloading the software and not checking the PGP signatures, and every time they do it they're exposed to getting an exploited version.

The community should absolutely not accept just some tool that lets a single person or even a small number of people rapidly push out replacement software to all the users.  If you want to give the developers of your node software crazy power just in case of emergencies, give them a key that makes it shut off, but don't let them freely push updates.  If I ever come back asking for the ability to rapidly push updates that means I've be replaced by an alien symbiont. (And really: the same for any developer, you'd have to be evil or crazy to want that ability: It makes you a target)

I'd like to see is someday have a system where developers can push an update out and your computer will download it but not install it. And after a minimum delay of a couple days if it gets enough positive signatures and no (or not too many) negative signatures, it will wait a random amount of time (e.g. up to a week) and then start asking you if you'd like to make the upgrade (this way if it's busted you might hear about it or the update may be withdrawn after other people update but before you install it)... obviously you could go and manually trigger the upgrade at any point.  This would give time for a lot of people to review any updates and sound alarms if they found problems. It could also allow us to be very liberal in granting veto access, since the vetos would just make things fall back to a manually triggered install.

3938  Bitcoin / Development & Technical Discussion / Re: Auxiliary block: Increasing max block size with softfork on: September 10, 2013, 05:52:24 AM
With this, it's not attackers we should be worried about. Think about it: changing the max block size just became as painless to the community as changing the protocol to prevent duplicate transaction ids was. Take that as you will, for better or for worse.
Woah woah, you've taken a reasonable point and exaggerated it here. A softforking rule that just denies some kinds of transactions is not the same as having clients that have to accept whole different kinds of invisible bitcoins. You still have to change the client software to be able to see or spend your bloatcoins.

(But then again with 200k users or whatever being on BC.i we can probably just dispense with the blockchain in any case…)
3939  Bitcoin / Development & Technical Discussion / Re: Auxiliary block: Increasing max block size with softfork on: September 10, 2013, 04:42:36 AM
Fortunately since it would take a conspiracy or compromise of at least _three_ people to have control over 50% of Bitcoin's mining hashpower today, so we can be quite confident that such an outcome is completely infeasible.
3940  Bitcoin / Development & Technical Discussion / Re: Auxiliary block: Increasing max block size with softfork on: September 10, 2013, 04:28:59 AM
This reminds us that a 51% attacker could do a lot more than we usually think.
Dunno there: someone with a bunch of hashpower can't make anyone actually use whatever crap they add to their blocks.
Pages: « 1 ... 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 [197] 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!