Bitcoin Forum
May 07, 2024, 07:07:10 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 [77] 78 79 80 81 82 83 84 85 86 87 »
1521  Bitcoin / Bitcoin Discussion / Re: Pools With a Significant Hashrate: A Realistic Double Spend Attack Taking 2 Hr on: July 07, 2011, 07:46:30 AM
Please answer to my posting: Your attack still assumes that you can split the internet. That you can dictate what blockchain each miner can see.

No need to "split the internet". The attacker simply withholds the forked blocks, on the pool's server, that are being solved by the miners. Remember that these miners are not connected to the Bitcoin peer-to-peer network. There is no need to isolate them.
1522  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 07:44:27 AM
Again, it doesn't protect you, it just buys you time, because the attacker has to start that far back in the chain and build a longer chain. But the attacker will succeed (given enough time).

But in my attack, the attacker doesn't have to start "far back" in the chain. He starts forking it from the last known legitimate block... (sorry for my multiple edits, this is complicated)
1523  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 07:35:10 AM

If an attacker has 50% of the hashrate (q = 0.5), then the math is completely off. No amount of confirmations is going to protect you against that.

Well, each additional confirmation buys you more time. It would take years for someone with 51% to undo a transaction with 1000 confirmations.

No. Run the math. Run the sample Poisson code provided in the whitepaper. An increasing number of confirmations only protect Bitcoin for q < 0.5.
For q >= 0.5, no amount of confirmations can protect anything.
1524  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 07:26:38 AM
I don't think that you have 2 hours before anybody notices. The blocks will be generated at half the speed after you split off. And the miners themselves will see that their blocks are not in the legit chain.

No, you won't notice a reduced hashrate that lasts for as little as 2h. I showed in the example that it happens all the time, eg. today. Did you find this suspicious? No. Did anyone else? No.

Also, as pointed out by DamienBlack, no pool miner checks that their blocks are in the legit block chain. No one verifies the 80-byte block header they are hashing.
1525  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 07:23:40 AM
Then the real network has just as much chance to take it back on the next block. My understanding is you have to maintain the forgery sequentially. Other wise I could just put my commodore 64C to work eventually it will find a solution thru sheer luck and collapse the whole shebang.

Point being no matter how many times you flip a coin the odds are always 50/50 but to see a run you have to multiply the odds so 50 percent of 50 percent. To attack bit coin you actual need a factor more hashing power to increase your odds to the point you can. Why else do you think the 6 confirmations were designed in. If cracking one block is all it took why wait for 6 confirms. The reason is the odds of maintaining your run of blocks goes in the toilet.

You don't have to maintain the forgery sequentially.

You misunderstand the math that explains why this specific number of confirmations was chosen by some exchanges/merchants.

Read the original Bitcoin whitepaper http://bitcoin.org/bitcoin.pdf (section 11). If an attacker possesses 10% of the global hashrate (q = 0.1), in order to reduce the probability of a double spend to less than 0.1%, you should wait for 6 confirmation, ie. force the attacker to fork the chains from 5 blocks behind, that's the z=5 quoted in this section. These are the design parameters that the 6 confirmations are supposed to protect against.

If an attacker has 50% of the hashrate (q = 0.5), then the math is completely off. No amount of confirmations is going to protect you against that.

As a side node, I think there is an approximation error, or rounding error when running the sample code with q = 0.5, because it shows the attacker would have a 100% success rate (it should be 50%).
1526  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 06:41:07 AM
Also if you crack the pool server it would be more profitable to rob it and send the bitcoins to yourself.

Be creative: you could double your gains by robbing the pool and performing a double spend on this money!
1527  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 06:28:31 AM
No. The probability of outpacing the legitimate chain after N blocks, no matter what N is, is always 50%.

Think about it. You don't need to outpace every single block. Only the last one matters.
1528  Bitcoin / Bitcoin Discussion / Re: Pools Owning About 50% of The Hashrate: A Realistic Attack Taking 2 Hours on: July 07, 2011, 05:26:46 AM
No. The probability of outpacing the legitimate chain with exactly 50% of the hashrate is 50%.
1529  Bitcoin / Bitcoin Discussion / Re: Pools Owning 50% of The Hashrate: A Realistic Attack on: July 07, 2011, 04:41:32 AM
Step 10: A few minutes later, the legitimate block chain becomes longer than my forked chain, which invalidates the 500 BTC I transferred to TradeHill/Bitcoin7/MtGox. The 500 BTC automatically "reappears" in my original wallet. The exchange is short on BTC and is screwed. An investigation later in the day reveal that Tycho's pool was compromised. Tycho's reputation is ruined. People switch to another pool, which gains 50% of the hashrate. The attacker repeats the same attack on this other pool Smiley

This step won't work for two reasons.

First, if the exchange sees your chain as legitimate, you need to assume that every miner also sees it that way.  They will be working on the next block to extend your chain, not the old reverted chain.  Your 500 BTC spend to the exchange will not be overturned on those grounds.

Second, if you manage to somehow time your chain transmission so that it forces a race and gives the other chain a chance to get back on top, if it does take back over, every node on the network will instantly put your 500 BTC spend in their transaction list.  Your recovery attempt will be seen as a double spend.

So, you've spent 2 hours to get an instant transfer into an exchange when you could have just waited an hour.

He has the order backwards, but it could still be done. You would spend on the "legit" original chain, and create a longer chain without that spend, then everyone works on that. It is two hours because that is how long it would take half the network to make six blocks, that is how long the attack would take, done correctly.

Correct. The 500 BTC txfer to the exchange would need to be in the "legit" chain. I fixed my original post.
1530  Bitcoin / Bitcoin Discussion / Re: Pools Owning 50% of The Hashrate: A Realistic Attack on: July 07, 2011, 04:26:05 AM
DamienBlack: I wrote this as a counter-example to your comment in another thread that a 50% attack would be statistically noticed in the global hashrate.

I doubt Tycho keeps tens of thousands of BTC on his online infrastructure. His pool profits (~3% fee) only amount to ~100 BTC per day. But my counter example was also to illustrate that Deepbit, with its size, is now a valuable target to any attacker out there. The fact a pool owns ~50% of the hashrate is bad not only for Bitcoin, but also because it concentrates risk. My advice to users is to not keep any significant amounts of BTC in their Deepbit account.
1531  Bitcoin / Bitcoin Discussion / Re: Pools Owning 50% of The Hashrate: A Realistic Attack on: July 07, 2011, 04:19:25 AM
Why would the hacker not divert the legit blocks being mined with 5000ghash/s to himself instead?

Well, many (most?) pool users automatically withdraw their BTC balance to their wallet. If the attacker diverted the blocks to keep the BTC he would not be able to honor these withdrawals and would be noticed very quickly, perhaps after mining only a few hundred BTC.

Whereas my attack works with any amount of BTC (I should have picked a few thousand BTC as an example). The only limit is your budget to purchase the initial amount. And withdrawal restrictions on the exchanges. But there are ways to bypass them (register multiple accounts, sell your USD balance on bitcoin-otc, etc).
1532  Bitcoin / Bitcoin Discussion / Re: Pools Owning 50% of The Hashrate: A Realistic Attack on: July 07, 2011, 04:04:05 AM
No problem. I also quickly resell this remaining 500 BTC right after my attack.
1533  Bitcoin / Bitcoin Discussion / Pools With a Significant Hashrate: A Realistic Double Spend Attack Taking 2 Hr on: July 07, 2011, 03:58:54 AM
A double spend attack may be detectable after the fact, but is not likely to be stopped on time to prevent BTC theft. Pool owners with a significant hashrate are not the only persons capable of using it to their advantage. Here is an example: I am Malory, the proverbial malicious attacker, and I want to attack the Deepbit pool, managed by Tycho.

(Edit: Fixed the chain on which the BTC needs to be spent - thanks kjj/DamienBlack).
(Edit: Replaced fictional "500 BTC" amount with "10k BTC").
(Edit: Removed mentions of "50% hashrate" to emphasize that it is not required to perform a double spend.)

Step 1: I buy 10k BTC and transfer them to my wallet.

Step 2: I attack Deepbit's infrastructure to surreptitiously gain administrative control of the servers (eg. via a compromise of Tycho's workstation). Optionally, I also rob the pool of its BTC to further maximize my gains (using the pool's computational power to double spend its own money - hah!)

Step 3: I select a period of time of 2 hours during which Tycho is offline/sleeping. 2 hours is all I need because his pool, Deepbit, controls about half of the global Bitcoin network hashrate. Note that controlling exactly 50% or more is not necessary; if less than 50%, the probability of the attack being successful is simply lower.

Step 4: During these 2 hours, I send pool users work items to start forking the block chain, from the current legitimate block, but without broadcasting the forked blocks to the global Bitcoin network. The only visible effect is that the global network appears to solve ~6 blocks (instead of ~12) during these 2 hours; but no one notices because it happens all the time due to expected statistical variation. As a matter of fact, it is happening right now: in the last ~110 minutes only 6 blocks have been solved (135104-135109), and there is no reason to find this suspicious whatsoever.

Step 5: In the legitimate block chain (built by miners not in the pool), I include a transaction to transfer 10k BTC from my wallet to my TradeHill/Bitcoin7/MtGox account.

Step 6: TradeHill/Bitcoin7/MtGox detects my txfer after the legitimate block chain grows by 6 blocks (6 confirmations). I sell the 10k BTC.

Step 7: Profit! I have plenty of USD in my account. I quickly sell it on bitcoin-otc (eg. using MtGox's merchant API), or transfer it to my Dwolla account, or multiple accounts to bypass typical withdrawal limits.

Step 8: During this time, my forked chain should have grown 1 more block than the legitimate chain (if the attack was successful). I broadcast it to the network, which instantly invalidates the 10k BTC I transferred to TradeHill/Bitcoin7/MtGox. The 10k BTC automatically "reappears" in my original wallet (which I can now double-spend). The exchange is short on BTC and is screwed. An investigation later in the day reveals that Tycho's pool was compromised. Tycho's reputation is ruined. People switch to another pool, which gains 50% of the hashrate. I repeat the same attack on the other pool, and double spend again the BTC stolen from previous pools. Rinse and repeat.
1534  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 07:31:04 PM
cypherdoc: Correct. But cracking the hashes is still valuable due their re-use on other sites (Paypal, MyBitcoin, etc).
1535  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 05:39:23 PM
A few passwords of length 22 or more have been discovered (none of them are yours):

Code:
$1$vl6fKApv$FM4X4hc4oJMB7D6UsEzxN1:digitalcurrencypassword
$1$zu4V3y9t$1/iE1miMzvTuj.Js17Buo0:weloveyouinglacialways72
$1$u13cgODk$1aaFBvCFoQSl5YuwvnCbk.:Thereisnogodsofuckoff!
$1$yNsa0VJP$IftjIMbVfGWz9uIFngvKu/:60x8760b6k328vc3v24kw8y1
$1$m7j/0t7K$cxWkLa48wI2LNhqRwA45A/:8ajdegejjep10umIg30purIt
$1$hp7CVOt/$ZpKbXzOnSZezpJGgBNcie/:szyzgy1w1d1w1vfescgrdv
$1$UsVn0FLE$QnEkv9NOZnFTjUsZ.RC1B/:31knuj_m43rdbr41nd34th
$1$nUFHEtPC$q/9Vpxg7gP/I161NPW6Xq0:saab9000aeroskodafabiavrs

The first 3 passwords are concatenations of simple words with simple mangling rules (digits/symbols appended, and a capitalization) which could have been bruteforced somewhat easily. If your password was similar, then it was weak.

However, if your password was similar to the others more complex ones, then one of these 3 possible explanations is true: http://forum.bitcoin.org/index.php?topic=24727.msg317542#msg317542
1536  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 05:17:14 PM
As one of the few users with ~1k posts on this forum, therefore a likely valuable Bicoin-rich target, I think you should envisage the possibility that you have been the victim of a targeted attack (not necessarily via an MtGox flaw). You wouldn't be the first one --you remember allinvain and his 25k BTC stolen... Even Snort + fw + browsing in a VM would not have protected you against, say, a tabnabbing phishing attempt. (I mention this example again because of how deceptively efficient it is...)

On the other hand, I have no idea how security-proficient you really are. You know Snort and firewalls, but the fact you exaggerate (few sites/apps accept "random >60characters password") makes it difficult for me to evaluate you. You say your MtGox pw was shorter than usual; would you mind sharing its exact length?
1537  Other / CPU/GPU Bitcoin mining hardware / Re: Why does everyone use AMD when using 2+ cards? on: July 03, 2011, 04:30:12 PM
The question of AMD or Intel platforms basically doesn't matter. But AMD almost always comes out a few bucks cheaper, and Bitcoin miners are tightwads, so that's one reason they favor it :-)

Also, the cheapest AMD processors ($38 Sempron 140, or half the price of your Intel G620) can be used in both entry-level motherboards with x1 slots (for someone who wants to connect his GPUs with PCIe extenders) as well as high-end motherboards with 4 or more x16 slots (for someone who doesn't want to mess with extenders). On the other hand, Intel artificially segment the market: the cheap motherboards typically take LGA775 processors, whereas high-end ones require more expensive processors. AMD's more flexible upgrade path is definitely one more aspect favored by miners who frequently rebuild/upgrade their GPU farms, as they can re-use the same processors and RAM.
1538  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 03:34:44 PM
That statement does not indicate shit.
I don't have any account with your mentioned sites or sites that have been hacked. I am extremely paranoid and use one time identities and one time passwords for different sites/forums/communities. Even if some site was hacked that we don't know about, attackers would never be able to tie them to this one. Go ahead and try to find info about mewantsbitcoins or any other identifies tied to it.

Attackers don't need to tie identities. Previously broken passwords are added to dictionary lists and are blindly tried against all newly leaked accounts.

Anyway, I'm not here to argue about security practices. I don't think my password was secure - I know it was.

This contradicts your first post which says "my password was not the most secure". So which is it?

Don't be so negative with me. I am just trying to help you understand how your account was hacked. Multiple possibilities:
1) The majority of MtGox users who were hacked were knowingly using insecure passwords. Not your case.
2) A smaller but still considerable fraction of users had a misconception of what a secure password is. May be your case.
3) Finally, a minority were using perfectly secure passwords (see examples in my last post). These users either shared passwords with other sites that have been hacked, or were phished (eg. even experienced IT security professionals may fall for tabnabbing!), or were the victim of targeted attacks on their personal computers (eg. malware installing a keylogger). May be your case.
1539  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 04:00:50 AM
Many of the passwords that *have* been cracked look pretty damn strong.  Like, 14 characters long with alpha/numeric/symbol and no obvious patterns or weaknesses.  Scads of them are 12-characters long.  It's pretty scary, actually.

Indeed...

Code:
# Pairs of hash, password from http://www.nanaimogold.com/microlionsec.txt
$1$etIDyZ49$n26Qa/PPbQ5f3I8GIJhQM.         \(]|A>9{&jp013
$1$77SRs6hW$XCXcyCNwraMZ3QY8L2eRT.         hkjkGR^&$EOI(*&T
$1$WCha0X9J$71nHggA.X8/RhAB.gjY//1         vfp7U0fdl"v"LgK
$1$e/mzYsP.$H5DNwD4Njp6JNt1Kv2N.Y0         Y!m4g6s3j*

There is no way the passwords above have been bruteforced by conventional mechanisms. MD5-based crypt() can be theoretically attacked at 10 Mpw/s on an HD 6990 (the best public bruteforcer, oclHashcat, only achieves 5 Mpw/s on this card). Given a search space of length 10 and random printable ASCII chars (and the passwords above are even stronger), and a private tool doing 10 Mpw/s, it would take on average 948 years on a cluster of 100 HD 6990 to bruteforce only one of them! Therefore, there are only a few possible theories:

  • Theory 1: The attacker compromised MtGox.com and logged the passwords on the server side, for every authentication attempt. This would be very serious. MagicalTux has not hinted this was a possibility. (But who knows? He doesn't seem very good at investigating breaches, eg. he first denied evidence of SQL injection, then confirmed there was one, etc).
  • Theory 2: The attacker phished passwords or keylogged them in targeted attacks against specific individuals. This seems possible given previous reports of individuals having had their Bitcoins stolen from their personal computers.
  • Theory 3: Inside Job. MtGox had to scale up very rapidly these past few months. They may have hired one individual, without proper background checks, who is stealing passwords and money from the MtGox infrastructure.
  • Theory 4: The MtGox password hashes were compromised before April 2011, when raw MD5 hashing was in use (MagicalTux said he started migrating to salted MD5-crypt only 2 months ago). This would have made bruteforcing 1000x faster for a single password, and doable in parallel on all hashes instead of one at a time (thanks to the absence of a salt). It would have taken the same cluster of 100 HD 6990 described above about a year to cover a 10-char random printable ASCII search space. However, given the large number of hashes (65k), a fraction of them would have been broken after 2 months of bruteforcing. However theory 3 is not very likely, after all the passwords shown above are even longer than 10 chars.
1540  Bitcoin / Bitcoin Discussion / Re: [ATTN] Clarification of Mt Gox Compromised Accounts and Major Bitcoin Sell-Off on: July 03, 2011, 02:20:07 AM
You must be retarded. Why would I disclose my password and my thinking pattern? So it can be added to dictionaries and future attacks? No thank you.

This statement indicates that your password was insecure.

If all it takes to risk guessing your password is to know your password generation logic, then the breach of any of the dozens of websites on which you have a password-protected account, may have helped the attacker in guessing your password. What happens when a password hash leak occur is that attackers generate candidate passwords based on bruteforcing results from previous leaks (Gawker, phpbb, MySpace, etc). They read them, try to understand how users picked them, and they adjust the mangling rules in their bruteforcers.

Also you would not be the first one to think your password was relatively secure when in fact it turned out to be complete crap (this guy claimed his password was secure, and even lied about its length, when it was in fact "rascal101").
Pages: « 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 [77] 78 79 80 81 82 83 84 85 86 87 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!