Bitcoin Forum
May 03, 2024, 04:10:41 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 [81] 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 158 »
1601  Bitcoin / Development & Technical Discussion / Re: So... any other long known but rarely looked at obscurities lingering out there? on: February 12, 2014, 03:19:51 AM
TXIDs of unconfirmed transactions can not be trusted to stay the same. <-- We saw what that one did very recently.
If ECDSA requires a RANDOM number, you better make sure you actually use a random one. <-- We had that one too (aka. Android bug).

Any other "long known" wiki articles with things that are likely being overlooked by client implementers or people using the RPC API?
Examples could be some more exotic script types, chain reorg detection, relaying (or not relaying) as well as reporting double-spend attempts, dust spam/collection, some more intricate crypto stuff...

Yes, I have a similar idea that we should list out all these "known problems" and put them on the top of our agenda.

If something is exploitable, someone must exploit it (e.g. malleability)
If something may go wrong, someone will certainly do it wrong (e.g. random number bug)

For the issues you listed, chain reorg could be a big headache with this ongoing malleability attack. In case we have a chain fork like the Mar 2013 one again, many transactions will get orphaned due to their parents are mutated.
1602  Bitcoin / Development & Technical Discussion / A proposal to permemenantly fixing the malleability problem on: February 11, 2014, 06:13:10 PM
I don't really expect this will be implemented, but I hope people will find this interesting.

Transaction structure is the same but an extra field, txSize, is added. Transaction hash is the hash of everything with scriptSig removed, and this is the hash going to the Merkle Root. As the scriptSig will not go to the Merkle Root, it won't be really recorded in the blockchain. People can freely mutate the scriptSig (even after confirmation). Miners will accept a transaction if they see a valid scriptSig and the transaction size is equal to txSize. This will make sure the block size is not mutable.

Payer could opt to sign the txSize or not.

This could be a hardfork, or a softfork with the auxiliary block: https://bitcointalk.org/index.php?topic=283746.0

Any comment?
1603  Bitcoin / Development & Technical Discussion / The malleability attack is creating a lot of trouble, we need a quick fix on: February 11, 2014, 05:31:42 PM
The malleability attack becomes a DOS attack. We need a quick fix. Before there is a better solution, the bitcoind should not report unconfirmed transactions. Account balance should be solely based on confirmed transactions. Before malleability is fixed (if ever), unconfirmed outputs should not be spent.
1604  Bitcoin / Development & Technical Discussion / Re: Salvaging refund protocols from malleability attacks with P2SH on: February 11, 2014, 03:33:41 PM
But isn't that precisely what this proposal is intended to deal with?

so he would have to mutate every possible transaction in order to get a mutant mined instead. This would be much harder/more costly (at least if P2SH were widely used).



This proposal assume that Bob would not take a spray-and-pray strategy. As someone is now randomly mutating transactions on the network, the proposal won't work
1605  Bitcoin / Development & Technical Discussion / Re: Salvaging refund protocols from malleability attacks with P2SH on: February 11, 2014, 03:07:07 PM
With the ongoing malleability attack, this proposal no longer works. Any hope to safe it (except by fixing malleability)?

Why does it no longer work?

Someone is randomly mutating unconfirmed transactions. So the txid of all unconfirmed transactions are not reliable
1606  Bitcoin / Development & Technical Discussion / Re: Salvaging refund protocols from malleability attacks with P2SH on: February 11, 2014, 02:55:39 PM
With the ongoing malleability attack, this proposal no longer works. Any hope to save it (except by fixing malleability)?
1607  Bitcoin / Development & Technical Discussion / Re: Is gox's "non-modifiable transaction id" a good idea? on: February 11, 2014, 01:26:43 PM
Gox is doing it wrong. They and everyone need to use inputs to identify a tx.

Obviously the signatures won't authenticate any other signatures. So someone with the private key of inputs can always create another tx (using a new signature) with exactly same inputs/outputs.. there is no way to prevent this.. especially in distributed protocols like coinjoin. So the tx will always be malleable until confirmed.



This is called double-spend attack, not malleability. To distinguish these 2:

  • Double-spend attack could only be launched by private key holder
  • Malleability (attack) could be done by anyone (there is a malleability attack bot running now)
1608  Economy / Service Discussion / Re: Mt.Gox websocket API not working? on: February 11, 2014, 09:06:20 AM
Hi, I have problem with connect to ws://websocket.mtgox.com. No data on TCP. I tried to connet from different IP, but without success.

Does anybody have the same problem? And what is solution for receiving lag, trades and also sending my trade commands?

MtSux has nothing to do in this board. Please go to service discussion
1609  Economy / Speculation / Re: Something is wrong. We cannot just gloss over the $100 sell on: February 11, 2014, 07:34:41 AM
I didn't want to have my account liquidated in the event that bitcoin was actually dying due to irrepairable protocol exploitation or failure.

The so-called bug is known for years. This suggests that you have no idea in what you are investing, and even worse, investing with margin

The most recent incident that might really have killed bitcoin was the hardfork in March 2013: https://github.com/bitcoin/bips/blob/master/bip-0050.mediawiki

1610  Local / 中文 (Chinese) / Re: MtGox事件簡單解釋 on: February 11, 2014, 04:58:07 AM
以上说法是否正确,坐等技术大牛验证。

Bitcoin核心開發人員 Peter Todd為此給我0.01BTC小費, 就是證明: http://www.reddit.com/r/Bitcoin/comments/1xiowj/explain_the_gox_transaction_malleability_issue/
1611  Bitcoin / Development & Technical Discussion / Re: Blockhain.info TX Problem? on: February 11, 2014, 04:42:28 AM
For merchants, if they want to record a transaction immediately without waiting for confirmation, what they could do now is to record the inputs (txid:index), outputs (address), and values. These information, altogether, is not malleable and could be an unique identifier for a transaction, even for zero confirmation
1612  Bitcoin / Development & Technical Discussion / Re: Is gox's "non-modifiable transaction id" a good idea? on: February 11, 2014, 04:37:49 AM


everytime i send btc to my customer, i also send email notification of the txid. so now this practice should be avoided because huge chance that txid can be altered? and should we store the txid into our database? if not, how we determine each transaction from our end?

what should we do as merchant/developer to anticipate this malleability issue?

Merchants need a way to record transactions immediately. They can't just wait for several confirmations and search the blockchain for a txid. I think gox's proposal should be adopted.
1613  Bitcoin / Development & Technical Discussion / Re: Blockhain.info TX Problem? on: February 11, 2014, 04:30:10 AM

everytime i send btc to my customer, i also send notification of the txid. so now this practice should be avoided because huge chance that txid can be altered? and we should not store the txid into our database?

what should we do as merchant/developer to anticipate this malleability issue?

You can still rely on txid, but ONLY AFTER SEVERAL CONFIRMATIONS

Confirmation is the king: not just for the safety of the fund, but also for the reliability of txid
1614  Bitcoin / Development & Technical Discussion / Re: Blockhain.info TX Problem? on: February 11, 2014, 04:22:14 AM
Quick answer: don't need to worry. You fund is perfectly safe

what's going on with blockchain? is the whole network effected by malleable attack?

Blockchain.info mistakenly thinks those transactions are double-spending but actually they are not. However, these are all cosmetic issue and no real harm could be done.

I have pm-ed piuk asking him to stop reporting double-spending on his service for now
1615  Bitcoin / Development & Technical Discussion / Re: Blockhain.info TX Problem? on: February 11, 2014, 04:17:18 AM
Someone is using the malleability to spread FUD. It looks bad but won't lead to any real harm.
1616  Bitcoin / Development & Technical Discussion / Re: Blockhain.info TX Problem? on: February 11, 2014, 04:14:11 AM
Quick answer: don't need to worry. You fund is perfectly safe
1617  Bitcoin / Bitcoin Discussion / Re: Explain the gox transaction malleability issue like you are five on: February 11, 2014, 04:09:28 AM
So Gox has to manually compare all previous cheques issued with photos to sort out the mess of their cashbook?

It is always not a good practice to compare the photos (transaction hash). They should check the balance of all their bitcoin accounts
1618  Local / 中文 (Chinese) / Re: MtGox事件簡單解釋 on: February 11, 2014, 04:07:51 AM
牛B啊,老兄, 你这篇文是目前最简单易明的说明.感谢!
我在MTGOX有30个币,您觉得我应该怎样做? 沽->提现,还是坐等,给个建议吧.

如果你相信Gox仍然持有足夠的幣, 那應該持幣

如果你相信Gox己出現嚴重財政問題, 沽出可能會較好, 因為在法律上比較容易追究

但說到提現 (美元), 你真的能提現嗎...........?

1619  Bitcoin / Development & Technical Discussion / Re: MtGox blames Bitcoin protocol problem for BTC withdrawal issue on: February 11, 2014, 03:47:05 AM
I proposed a new txid type this morning that would contain only prevout,vout and address,amount pairs. It would only need to be used internally by companies vulnerable to this type of attack and doesn't require 99% of bitcoin users to change a thing. When creating a withdrawal, log the new id and do your lookups based on it when users complain.
The txid you propose could collide, should a spend be made from the same address to the same address in the same amount (a certainly foreseeable circumstance). Non-reuse of addresses after spending from them is simpler, requires no protocol change, and seems to be as Shatoshi himself suggested using the bitcoin protocol.

It cannot collide because inputs (prevout,vout) can only be spent once. Only malleable transactions collide with each other, which is the goal.

So this is essentially what gox is proposing
1620  Local / 中文 (Chinese) / Re: 火币网受不受Transaction Malleability影响? on: February 11, 2014, 03:45:01 AM
有没有人确认下?谢谢!
2010年的漏洞,也就只有MT没技术修复!

估计Mt Gox太有雄心,自己写钱包,结果出事。不知道火币是不是自己写的钱包,还是用的Bitcoin QT。

火币站出来正面回答下这个问题吧!

我相信除Gox以外沒有一個主要交易所受影響, 包括Bitstamp, BTC-E, BTCChina, OKCoin, Huobi. 因為如果受影響的話, 以他們的交易量已經出大問題了
Pages: « 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 [81] 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 158 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!