Bitcoin Forum
July 05, 2024, 10:03:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 [3] 4 5 »
41  Bitcoin / Project Development / Re: Developer/project introduction thread on: June 23, 2011, 02:53:09 AM
I am working on a pool server/backend based on gevent with the multiminer protocol.  It uses greenlets so it *should* theoretically scale to thousands of connections with minimal cpu and memory overhead.  Right now it is humming along with 16 connections running at less then 0.5% cpu.  I just finished up the workqueue thingy and notification on new block.  I need to post it on github sometime once I stop being lazy.  Also I need someone to go over everything to make sure I didn't f*ck something up.

There is still a long ways to go before it would be "production" ready. >_<
42  Bitcoin / Project Development / Re: Security Bounty on: June 22, 2011, 01:13:22 PM
You mean aside from the incentive to walk away with thousands of dollars worth of bitcoins?

Those are blackhat incentives. You need to make the incentive large for skilled whitehats to care.

So you are saying you wouldn't take the chance at walking off with tends of thousands of dollars worth of hard to trace currency?

The only difference between "white hat" and "black hat" is that one has decided the risk isn't worth the reward.
43  Bitcoin / Project Development / Re: Security Bounty on: June 22, 2011, 01:06:10 PM
You mean aside from the incentive to walk away with thousands of dollars worth of bitcoins?
44  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 22, 2011, 02:11:11 AM
Has anyone seen this floating around today, sure hope is false;

--tradehill bitcoin exchange user/hash passes out now

pastebin

That is some guy looking for an idiot to scam.
45  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 22, 2011, 02:04:10 AM
I'm pretty sure it's Hostgator or at least something similar. Their site can obviously handle no more traffic than Susie's Geocities page about beanie babies.
Don't even say that name. They are so bad just so bad.  Cry Cry Cry Cry

There are actually worst hosts like bluehost.  Chances are if they list UNLIMITED bandwidth, disk space, etc they are retardedly overcrowded and will disable your site once it gets hit by more then a small breeze.
46  Bitcoin / Bitcoin Technical Support / Re: ubuntu miner stops respondig when i start mining? on: June 22, 2011, 12:02:01 AM
Try connecting a monitor to see if the console is responsive when it goes out as it might be a bad network port.  Maybe try starting one card or the other and see if it runs fine.
47  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 11:42:00 PM
So you're telling me that I can't intentionally write beyond my own memory pointers in C++ on a VPM?  Nonsense.

You can't even do that on most modern OSs.  Write a program and try to write outside of the programs bounds and see what happens.
48  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 11:36:48 PM
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.

It is the same physical card in the same physical machine.  C++ is quite powerful.


Except you don't have access to the device.  In a VM you have a virtualized device you interact with and the host OS forward packets from the hardware.

Saying a language is powerful is pointless.  Most are touring complete so you can accomplish the same task in any of them.

I don't need access to the device.  I need access to the memory.  Or are you going to tell me that they have separate memory sticks too?  Tongue


Go ahead and write to the memory, you wont be able to address it so it is pointless.  Just because you can compile a program on a machine doesn't mean you can access a device without root access.
49  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 11:31:29 PM
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.

It is the same physical card in the same physical machine.  C++ is quite powerful.


Except you don't have access to the device.  In a VM you have a virtualized device you interact with and the host OS forward packets from the hardware.

Saying a language is powerful is pointless.  Most are touring complete so you can accomplish the same task in any of them.
50  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 11:16:09 PM
You also place an inordinate amount of trust on the jail system of the OS -- making sure that the various virtual machines can't see each other across the harddrive(s) they share.

They don't share any partitions.  In fact each virtual machine has their own install of an OS and they can't mount other volumes from the host machine.

And lastly, you'd be sharing SQL database access with everyone else on the virtual machine.  That could open up vulnerabilities if permissions are not exactly right.

No.  Each machine runs their own services.  Each VM will have a web server, sql, etc or whatever else the operator wants.

This depends on the setup.

I derped a little.  But it is exceptionally hard to get past the hypervisor to access other customers.
51  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 11:01:08 PM
You also place an inordinate amount of trust on the jail system of the OS -- making sure that the various virtual machines can't see each other across the harddrive(s) they share.

They don't share any hard drives.  In fact each virtual machine has their own install of an OS and they can't mount other volumes from the host machine.

And lastly, you'd be sharing SQL database access with everyone else on the virtual machine.  That could open up vulnerabilities if permissions are not exactly right.

No.  Each machine runs their own services.  Each VM will have a web server, sql, etc or whatever else the operator wants.
52  Bitcoin / Mining support / Re: GUIminer accepted (0) on: June 21, 2011, 10:58:41 PM
If you are using phoenix with guiminer I don't think it supports listing the accepted/rejected in the interface.
53  Bitcoin / Bitcoin Discussion / Re: Is tradehill.com really hosted on a shared hosting account? on: June 21, 2011, 10:55:58 PM
If you successfully compiled or uploaded a packet sniffer on virtual machine #1, it will sniff packets for every other virtual machine on that box.

Each virtual machine is bound to their own IP address so you can't listen to other machines on the same box.  You however could listen to any broadcasts on the local network, or anything else a bare metal server could do.
54  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 08:03:46 PM

Yes, but I don't enter my password on my phone.  So the hacker would still need to get that. <3

I am not disputing that the security levels are different with different methods, and one has to assess what level would be acceptable in a given context.  What I am disputing is your bizarre claim that PGP/GPG signing/verification of a unique token isn't a valid second factor authentication.

Cheers,

For the same reason email tokens don't work.  If they hacker compromises your system "what you know" is no longer a valid form of authentication.  And since they have access to your system they can also nab your private key. <3
55  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 07:24:39 PM

You are entering it with a keyboard no?  Then software can log it.  Given enough time and resources your solution falls if the hacker gains access to your machine.

Again: come on, dude — there could be malicious apps on your phone, too.  This doesn't make it less a 2-factor authentication method, it just implies a different security level with different methods.

Cheers,

Yes, but I don't enter my password on my phone.  So the hacker would still need to get that. <3
56  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 07:19:41 PM

You are entering it with a keyboard no?  Then software can log it.  Given enough time and resources your solution falls if the hacker gains access to your machine.

I could use a virtual keyboard to enter the passphrase with e.g. the mouse.

I can agree that using PGP/GPG as the second factor is probably less secure than e.g. a mobile app, and if you think it doesn't meet your security level requirements, you shouldn't use it, but I strongly disgree that it cannot be used as a second factor in authentication.

Cheers,

Most "software" keyboards send the same signals to the OS as if you were using a hardware device, hence it will be logged.
57  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 07:11:08 PM

And if the hacker has your phone, he also pwns your OATH app == 2nd factor requirement not met, using your logic.

Then he has to get past a 3rd factor, my pin.

Come on, dude.  My GPG private key is protected by a long passphrase that I haven't stored anywhere except in my brain circuits.  There's no way an intruder could sign a unique challenge with my private key (except threatening me physically to disclose it, but he could do the same with your PIN).

Cheers,

You are entering it with a keyboard no?  Then software can log it.  Given enough time and resources your solution falls if the hacker gains access to your machine.
58  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 07:06:23 PM

In a compromised machine the hacker has access to both factors (password + private key)

(I don't store passwords on disk, so a hacker wouldn't have access to my password.)
http://en.wikipedia.org/wiki/Keystroke_logging

And if the hacker has your phone, he also pwns your OATH app == 2nd factor requirement not met, using your logic.
Then he has to get past a 3rd factor, my pin.
59  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 06:59:52 PM

Another possibility is GPG/PGP authentication, […]

That sounds entirely complicated and doesn't meet the 2nd factor requirement.

I never said it was simple, just that it is a possibility.

How come you think it doesn't meet “the 2nd factor requirement”?.  The steps I see are:

 1. First you log in using the usual username/password combo.
 2. Before you're let into the account, the exchange presents you with a unqiue token.
 3. You sign the token with the previously agreed on key.
 4. The exchange verifies the signature and the token.

Cheers,

In a compromised machine the hacker has access to both factors (password + private key)
60  Bitcoin / Project Development / Re: [RFC] 2-factor auth for exchanges on: June 21, 2011, 06:48:45 PM
Another possibility is GPG/PGP authentication, much the way we do it on the #bitcoin-otc IRC channel.  When you enable 2-factor auth on an exchange you could upload the pubkey you wish to use.  When you have to authenticate yourself you have to sign and upload a unique challenge string that the exchange creates for the session.

Cheers,

That sounds entirely complicated and doesn't meet the 2nd factor requirement.
Pages: « 1 2 [3] 4 5 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!