Bitcoin Forum
May 06, 2024, 01:29:59 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 [258] 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
5141  Bitcoin / Development & Technical Discussion / Re: P2PTradeX: P2P Trading between cryptocurrencies on: July 06, 2012, 02:17:02 AM

You can do this with far less complexity, and the same extortion risk like this:

Alice and Bob want to trade Acoins and Bcoins. They each pick secrets. Asecret and Bsecret.
They each tell each other H(Asecret)=Ah, and H(Bsecret)=Bh.

After agreeing on the amounts they each form transactions
AAlice 1 Acoin ->  ABob_pub + H(x)==Ah + H(y)==Bh
BBob  1 Bcoin ->  BAlice_pub + H(x)==Ah + H(y)==Bh

once both transactions are in one or the other reveals their secret out of band. The redemption works for all or none.

As mentioned, there is holdup risk here, which could be solved by adding semi-trusted observer keys to optionally release the funds in the case of defection.

But I think the fragment protocol  described here has the same risk.  (and the obvious ways to do avoid it make it possible to rip off one party by delaying the mining of the solution).
5142  Bitcoin / Development & Technical Discussion / Re: Script variation for improved account security on: July 04, 2012, 03:52:47 AM
The purpose of this being to avoid the possibility of two public keys having the same hash, which would allow either party to spend the bitcoins.
I am not familiar with how small this possibility actually is.

As Gavin says, spend-to-pubkey is valid— and it's used by the reference software for mined blocks. (and, IIRC, it used to be use for send-to-IP transactions, you'd connect to an IP and the peer would give you a pubkey to send to)

That it would increase the security is doubtful, however.  The hash function has comparable size to the ECDSA security margin, and while hash functions can be attacked being able to generate a _valid_ ecdsa key which you have the private component to which matches an arbitrary (or even any of billions) of specific hashes is basically inconceivable to me and itself would likely require both an ECDSA break and a hash break of a kind never seen on any modern hash.

If I were a betting man, I'd say it's more likely (but still unlikely) that someone would find a way of compromising some ECDSA public keys with large but feasible amounts of computation.  Under this threat model the use of hashed keys is protective, because your public key isn't revealed until just before compromising it is pointless so long as you do not reuse addresses.

There is, in fact, a oddbal altcoin proposal call MAVEPAY which uses ordered disclosures of hash preimages as its _only_ signing primitive.  (it's crazy for a bunch of reasons, but fact that you can build a plausible signing system out of just ordered disclosures of single hash inputs (e.g. not high overhead like lamport) suggests that you shouldn't discount the security benefit of that)
5143  Economy / Service Discussion / Re: Satoshi Dice -- Statistical Analysis on: July 02, 2012, 10:19:16 PM
It occurred to me that it was their way of taking a profit.  But if that's the case, why have they lowered the max bet and kept it low?  It doesn't make any sense to be decreasing the bet sizes as the profits grow.

It makes sense after you've seen people argue that their 'losses' and betcaps are "proof" that a favored gambling strategy is a "sure win".

Same reason casinos promote grand stories of card counting blackjack sharks bilking casinos and pretend to be concerned about card counters,  while simultaneously employing multi deck continuous shuffling machines that moot card counting. Smiley

5144  Bitcoin / Bitcoin Technical Support / Re: ECDSA dropped out of openssl 1.0.0b? on: July 02, 2012, 02:54:15 AM

The preferred "fixes" for Red Hat, CentOS, Fedora systems are, if you want to do it yourself,

I maintain modified openssl Fedora rpm's for my own use:

https://people.xiph.org/~greg/openssl/

Perhaps some other people might find them useful, either outright or just the spec file changes.
5145  Bitcoin / Bitcoin Technical Support / Re: [SOLVED] Bitcoin taking up 100% CPU constantly! on: July 02, 2012, 02:47:20 AM
That article claims it's only versions prior to 2.6.39.

I observed it on 3.3.7-1.fc16.x86_64 and 3.4.2-4.fc17.x86_64.  Not all vulnerable systems hit it, it depended on the system load at the time of the leapsecond.
5146  Bitcoin / Bitcoin Technical Support / Re: Bitcoin-qt after displaying low disk space warning, it quits on: July 02, 2012, 02:45:59 AM
I have multiple symlink links one for the wallet.dat, which is encrypted and inside of a true crypt container. I have a symlink for the rest of the files which are on a separate partition that is unencrypted so it isn't too bad on I/O.

Sadly, this doesn't do what you think it does. Wallet data ends up in your database directory.... so you can easily leak private keys that way if you're not using the integrated encryption,  and if you lose your disk while your wallet hasn't been flushed the copy on the flash may be unreadable without a manual recovery effort.
5147  Bitcoin / Bitcoin Discussion / Re: Initial Bitcoin client development cost on: July 01, 2012, 05:05:31 AM
I'm thinking not only about the cost of developing the idea and writing the initial code but also Dan Kaminsky's statement that there are entire classes of bugs missing from it.

Well, you can do things like run sloccount on it— which actually gives reasonable figures for 'typical' software... though bitcoin isn't especially typical, there is a whole novel distributed algorithm at its center, its own network protocol, and as you mention more than typical care was put in to making it secure.

Feeding the earliest commit in git (easier than finding the first release zip file) to SLOCCount gives me
Total Estimated Cost to Develop                           = $ 464,573

5148  Bitcoin / Development & Technical Discussion / Re: Patching The Bitcoin Client To Make It More Anonymous on: June 26, 2012, 11:55:32 AM
I never understood why the fee calculation has to bee so complicated...  age of coins - wtf why?

The question:

How can we have free transactions, but not make it possible for someone to cheaply DOS the system into oblivion by simply typing "while true; do bitcoind sendtoaddress `bitcoind getnewaddress` 0.00000001 ; done" ?

To solve this we ask:  What characterizes that kind of activity which is distinct from normal usage?    We can't tell that the DOS transactions are all coming from a single party because they can just use many addresses.  We can't really single out smallish transactions because regular users make small transactions and the attack would work just as well even it was moving 50 BTC in each transaction. What characterizes them is that they're rapidly moving the same coins over and over again.

Bitcoin days destroyed is a simple metric that measures coin velocity, and it's basically what the prioritiy system uses.  Sum(input_values * input_ages) / tx_data_size = priority.

Our priority system in effect uses the transaction's Bitcoin days destroyed to pay for them— evidence that the user isn't engaging in a maximum speed coin recycling— in lieu of fees.  The metric is directly connected to real DOS attack behavior, it doesn't depend on the impossible task of distinguishing users, it doesn't disproportionally penalize low value transactions, it expends a real scarce resource (though not one that users consider otherwise valuable), it doesn't actively encourage bad behavior, and it's demonstratively effective. If you don't have enough priority or pay a fee peer nodes will not relay your transaction, miners will not mine it— not until it does have enough priority via aging.

With this metric an attacker is required to have an enormous and near unending supply of unmoved coin in order to sustain an attack or they must spend on fees (or con some suckers into paying fees for them).

The downsides are that it can be a bit inexplicable for the users— "you can't make a free txn now, but you can after the next block??", which is made worse by the fact that the reference software doesn't really try to construct transactions in a way that avoids fees— and more complicated to find _optimal_ coin selections with this metric (it makes the objective non-linear). But otherwise it's a pretty excellent metric.
5149  Bitcoin / Development & Technical Discussion / Re: Stratised chain-services are secure on: June 24, 2012, 11:41:09 PM
"Relative to the number of users" huh?... and why would that be a relevant metric for anybody?

Because if namecoin was widely used the cost of running a full node would increase. It has _far_ less usage than bitcoin and already it's about 18% of the blockchain size.  Namecoin's design, unfortunately, doesn't enable lite resolvers (there can be no equivalent of a SPV node, like bitcoinj, for namecoin with its current design) of any kind which I think will probably doom its adoption.  I posted a sketch of a design to solve this last year, but other than the addition of merged mining namecoin development appears to be more or less completely dead.

I consider this to be fatal flaw which will ultimately prevent the adoption of namecoin unless it is resolved.

Quote
To the end user, using namecoin to ensure a secure connection to a full bitcoin node is way cheaper than running a full bitcoin node ... or are you disputing that point?

That makes no sense at all and doesn't follow from the technology.  Namecoin is fundamentally more computationally costly to maintain because you _must_ have multiple unspent outputs pending in order to have multiple registered names (whereas any amount of bitcoin can be represented by a single txout), and you must carry additional indexes on them in order to perform lookups. (bitcoin txn only require lookups by txid).

These aren't any terrible flaws, but they're reasons why a full namecoin node— if as widely adopted as bitcoin— shouldn't be expected to be less expensive to run.

A fully validating bitcoin node can actually be operated with less than 100 mbytes storage, though the code for this is not mainline yet.

Quote
Obviously namecoin doesn't have as many users as the proportion of the hash power it commands, this is precisely the piggy-backing onto the bitcoin hashpower merged-mining allows ...  this is the second time you have thrown up an irrelevant arguments without pointing out exactly where the problem is you are complaining about. Third strike and I'll assume you are just trolling.

Can someone please decode this for me— because I don't have an idea what you're talking about.  I can assure you that I'm not trolling.
 
To the contrary, you've still made no suggestion about how namecoin could do anything to address the fundamentally hard problem of this thread: Demonstrating the independence of weakly trusted central servers, as required for the exponential security model given in the OP to hold.
5150  Bitcoin / Development & Technical Discussion / Re: Help! I keep getting "Error: Transaction creation failed" on: June 24, 2012, 11:30:43 PM
Another possibility is that there is a larger fee required due to the current block size

Code misunderstanding detected:  The fees used in the generation of a txn have absolutely nothing to do with the current block size.

The most common cause of this kind of failure I've seen in the past is when a wallet is contaminated by zillions of very small inputs and ends up selecting so many the the resulting txn is >100KB, which it refuses to issue.

Litecoin carries a patch the sets a minimum value for inputs to be considered in coin selection.

5151  Bitcoin / Development & Technical Discussion / Re: Stratised chain-services are secure on: June 24, 2012, 07:02:36 PM
Not odd at all ... have you compared the overhead lately on the bitcoin network vs. namecoin network? E.g. there is no satoshi dice running on namecoin .. yet anyway.

Relative to the number of users namecoin is currently much more expensive to maintain. Or do you really think that namecoin has as many as 18% of the users as Bitcoin.

Quote
Don't understand this part of your comment, before we go any further it maybe instructive to know how much you studied the namecoin system?

I understand the namecoin system very well.

5152  Bitcoin / Development & Technical Discussion / Re: Stratised chain-services are secure on: June 22, 2012, 02:21:41 PM
Quote
How do you resolve namecoin without having a namecoin full node

Well obviously you would have to run a full node .... I thought you would know that?
The rest of the questions are based on the straw man of not running your own node ....

It seems kind of odd to me that you'd invoke running a full namecoin node as a means to avoid running a full bitcoin node— and only a partial means, since it doesn't do anything to tell you if the parties you're communicating with are actually distinct.
5153  Bitcoin / Development & Technical Discussion / Re: Stratised chain-services are secure on: June 22, 2012, 03:42:30 AM
Assume that you connect via the namecoin dot-bit dns to n chain-services controlled by different organisations/individuals .
(fixed)

How does namecoin help you know that they're distinct?   How does namecoin— as it's used today— help you defend against an attacker who has control of your router?  How do you resolve namecoin without having a namecoin full node without trusting someone (resulting in the same problem you're trying to solve here)?
5154  Bitcoin / Development & Technical Discussion / Re: Stratised chain-services are secure on: June 22, 2012, 01:33:54 AM
Assume that you connect to n chain-services controlled by different organisations/individuals.

A very tall assumption on the internet when identities are fairly cheap.  The question of interest is for a given definition of "organizations" how much does it cost me to make your P as low as I like?  If your definition would let you include individuals the answer is very low.

These sorts of assumptions can also fall down if the attacker has the ability to influence your routing unless you have a good way to validate the identities— and most ways of having good authentication and good ability to distinguish control work against having a lot of peers.

Bitcoin could have been created as 'one peer one vote' system under the logic given here but it would have been trivially exploited if it did.

[Edit: Oh, maaku said this all pretty succinctly, so succinctly that I missed it]
5155  Bitcoin / Development & Technical Discussion / Re: Roadmap to 1.0? on: June 21, 2012, 04:02:10 PM
By the way, is there any plan to implement a "header-only" mode on the main client, as Satoshi described it in his white paper?

People are working on something better than that which won't compromise a node's ability to function as an autonomous fully validating node but will still make things much faster and use less storage.

More important than supporting header only (SPV) mode, but rather the ability to start as a SPV node and sync-up and transition in the background.  But this isn't yet in the immediate pipeline.
5156  Bitcoin / Development & Technical Discussion / Re: "Critical" versus "Serious" vulnerabilities on: June 21, 2012, 02:33:52 PM


I think that critical/serious definition given here sounds fine, though I wonder if I'll remember it— especially if people come up with a number of similar sounding names.

The problems with names is that always get confused, people spend time arguing over them, and people get hurt when they misunderstand them, this is one of the reasons that CVSS was created— though I've run some example Bitcoin cases through the standard scoring criteria and I think it gives broken results. (E.g. giving more sever ratings for technically easy attacker-effort-proportional DOS attacks than for harder coin theft attacks).

My preference is to actually state what the risks is  "An attacker can crash your Bitcoin if he connects to it"  vs an opaque "Code yellow" kind of label,  at least where being descriptive won't imperil people.   This avoids getting stuck in word games over "serious" vs "severe" and other such matters of angels dancing on pins, and allows people to assess their own risks in ways that no boilerplate classification can do.

I suspect that any issue where you can't even say as much as what an attacker could do without unacceptable risk is by definition the most severe kind, Critical, or whatever you'd like to call it.
5157  Bitcoin / Development & Technical Discussion / Re: Help test: version 0.6.3 release candidate 1 on: June 21, 2012, 01:13:52 PM
"highly offensive" and "entitled" ?

Yes, entitled,— where you expected to be contacted privately in advance of the "announcement". (Never mind that the stuff in question has been public for a while)

Quote
Some people talk about getting standards in place - some don't seem to care so much, for over a year I have been idling in -dev and seen the "standards" topic come up over and again

I have no clue what you're talking about there.  My grepfu fails me because I can't find anywhere where people have asked about that.  Also, I still don't understand how you think my personal preferences proves a lack of uniformity— preferences differ.  I also still don't understand your argument about about the classification being unclear since it was described specifically in the announcement instead of just being given a class.  ::shrugs::
5158  Bitcoin / Development & Technical Discussion / Re: Help test: version 0.6.3 release candidate 1 on: June 21, 2012, 03:15:34 AM
I did an:
Code:
$ sudo rm -r      DO NOT DO THIS

Everything is now downloading fine. In hindsight, I probably could've just zipped everything up and set it aside or pass it along to someone that couldv'e poked at it to see why.

Doing this will delete your wallet.  Please edit your post to include some kind of warning so that if anyone else hits this they don't just blindly follow your instructions and lose coin.

My best guess on your issue is that you didn't shutdown cleanly before upgrading. Deleting your databases is one way to recover from that, but users with coin should take care to not delete their wallets in the process.
5159  Bitcoin / Development & Technical Discussion / Re: Help test: version 0.6.3 release candidate 1 on: June 21, 2012, 03:07:19 AM
Quote from: Gavin
Fixed a serious denial-of-service attack that could cause the
bitcoin process to become unresponsive. Thanks to Sergio Lerner
for finding and responsibly reporting the problem. (CVE-2012-3789)

Um releasing a testing version and announcing a potential vulnerability in the same thread??
I think you did better here
https://bitcointalk.org/index.php?topic=81749.0

as a pool operator I now feel in a bind, I must update to a RC (that you have asked ppl to test) because you announced a vulnerability Sad
So I risk updating 6 or 7 nodes to find the test crashes or I wait for stable and hope no-one uses the vuln against my pool in meantime.

what can I say....

Say "thank you for improving bitcoin"?   On IRC you seriously offended me with what I considered to be an entitled attitude and unjustified hostility.  I was particularly torqued after I said that I didn't agree that it was "critical" and wouldn't have personally described it that way and based on that you continued to repeat allegations that there were no standards and that the developers don't agree about vulnerabilities. I think I would know if I didn't agree with what Gavin posted.

I apologize if my willingness to argue back managed to keep us from effectively communicating. For all the trouble you'll have with your nodes keep in mind that we all work hard with Bitcoin too. I maintain more nodes than you do— though I do have the comfort of not handling a large flow of other people's money, I am  constantly dealing with juggling changes on them.

The issue at question is a (set of) DOS attacks, as described in the announcement.  They've been 'disclosed' for a month in git, and have been discussed in the abstract by class as long as a year ago.  We have not historically done embargoed releases and early warnings to major infrastructure on issues which didn't allow the theft of Bitcoin or ~O(1) knockout of the network, and I would stridently oppose beginning such a practice: We do not have the resources to manage that, and it would delay getting fixes into the hands of users.  This release announcement is not the first public mention of these issues, and standard best practices for node operation will generally protect you from DOS attacks.

You should handle this like you'd handle other testing releases: Upgrade one or two of your nodes and report issues. If you do not run testing version the release versions will likely not be of any higher quality. If by some crazy chance someone DOS attacks your other nodes, you at least have some that are working.
5160  Bitcoin / Development & Technical Discussion / Re: excessive CPU usage in 0.6.2 ? on: June 20, 2012, 01:20:41 PM
But we NOT have block each 10-15 sec, right? And usage is spiking about every 10-15 sec, not 10mins like blocks...

You receive transactions at that rate.
Pages: « 1 ... 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 [258] 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!