Bitcoin Forum
June 22, 2024, 11:19:32 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: Moving bitcoin.org to a hardened server?  (Read 2087 times)
Herodes (OP)
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 04, 2012, 02:46:09 PM
 #1

I just got aware of the fact that bitcoin.org is served through pages.github.com.

Code:
 ping www.bitcoin.org
PING bitcoin.org (207.97.227.245) 56(84) bytes of data.
64 bytes from pages.github.com (207.97.227.245)

I haven't develved deep into the issues surrounding github.com, neither have I used it much,
but there's been some writings about compromises of github during the last months, so I was
wondering if we would not be safer off disconnecting the bitcoin.org page with it's downloadable
binaries completely from github.com.

Could a github compromise lead to binaries on bitcoin.org being compromised ? With the current
setup, it seems so.

In my personal opinion, bitcoin.org along with it's binaries should be hosted on a hardened server,
separate from any other service.

Please discuss.
Deafboy
Hero Member
*****
Offline Offline

Activity: 482
Merit: 502



View Profile WWW
October 04, 2012, 02:50:15 PM
 #2

You mean... people can lose money because of hosting provider? Ridiculous...
/sarcasm Smiley
Herodes (OP)
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 04, 2012, 02:56:44 PM
 #3

You mean... people can lose money because of hosting provider? Ridiculous...
/sarcasm Smiley

Sarcasm goes well with me, however, it could also be an external attack. We seek non-centralization, no ?
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1025



View Profile
October 04, 2012, 05:07:35 PM
 #4

I just got aware of the fact that bitcoin.org is served through pages.github.com.

Code:
 ping www.bitcoin.org
PING bitcoin.org (207.97.227.245) 56(84) bytes of data.
64 bytes from pages.github.com (207.97.227.245)

I haven't develved deep into the issues surrounding github.com, neither have I used it much,
but there's been some writings about compromises of github during the last months, so I was
wondering if we would not be safer off disconnecting the bitcoin.org page with it's downloadable
binaries completely from github.com.

Could a github compromise lead to binaries on bitcoin.org being compromised ? With the current
setup, it seems so.

In my personal opinion, bitcoin.org along with it's binaries should be hosted on a hardened server,
separate from any other service.

Please discuss.

The download links on bitcoin.org go to sourceforge.  Also, the binaries are hashed and the hashes are signed with a well known key, so anyone that bothers to check would notice.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
ralree
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500


Manateeeeeeees


View Profile
October 04, 2012, 05:29:10 PM
 #5

I just got aware of the fact that bitcoin.org is served through pages.github.com.

Code:
 ping www.bitcoin.org
PING bitcoin.org (207.97.227.245) 56(84) bytes of data.
64 bytes from pages.github.com (207.97.227.245)

I haven't develved deep into the issues surrounding github.com, neither have I used it much,
but there's been some writings about compromises of github during the last months, so I was
wondering if we would not be safer off disconnecting the bitcoin.org page with it's downloadable
binaries completely from github.com.

Could a github compromise lead to binaries on bitcoin.org being compromised ? With the current
setup, it seems so.

In my personal opinion, bitcoin.org along with it's binaries should be hosted on a hardened server,
separate from any other service.

Please discuss.

The download links on bitcoin.org go to sourceforge.  Also, the binaries are hashed and the hashes are signed with a well known key, so anyone that bothers to check would notice.

Thanks for that - I was wondering if there was a way to confirm authenticity of the official downloads if I wanted to be really anal retentive.

1MANaTeEZoH4YkgMYz61E5y4s9BYhAuUjG
Herodes (OP)
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 04, 2012, 05:42:36 PM
 #6

Thanks for that - I was wondering if there was a way to confirm authenticity of the official downloads if I wanted to be really anal retentive.

I guess how anal retentive you want to be is directly proportional to the amount of bitcoins you have.
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1025



View Profile
October 04, 2012, 05:49:19 PM
 #7

Here is one of the validation files for 0.7.0.

Quote
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

4d4bba64926e86c4dfe8603ef2d7c2b942c29d47  bitcoin-0.7.0-linux.tar.gz
f5e4950451fb84806a4c86709d8f9e7aecbf0512  bitcoin-0.7.0-macosx.dmg
dce46beef11f4a82c0c24ea2d2fc4b39b680143c  bitcoin-0.7.0-win32-setup.exe
851708693d0609803eb917368c28d1142e029a31  bitcoin-0.7.0-win32.zip
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
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=CZgV
-----END PGP SIGNATURE-----

Any changes to any of those files will change their hashes, and changes to any of the hashes will break the signature.  If you've verified the key, you can check them for each release.  By the way, the key they are signed with (currently) can be found here.  (But please don't take my word for it, verify the key yourself before you sign it or use it.)

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
Richy_T
Legendary
*
Offline Offline

Activity: 2464
Merit: 2130


1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k


View Profile
October 04, 2012, 05:57:39 PM
 #8

Here is one of the validation files for 0.7.0.

Any changes to any of those files will change their hashes, and changes to any of the hashes will break the signature.  If you've verified the key, you can check them for each release.  By the way, the key they are signed with (currently) can be found here.  (But please don't take my word for it, verify the key yourself before you sign it or use it.)

But how can I trust you? Or that the owners of this site haven't modified your post? Wink

Perhaps key-signing parties need to become part of the Bitcoin deal.

Probably should have these files torrented too for the decentralization. Would that decrease or increase security? Possibly neither I suspect.


1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1025



View Profile
October 04, 2012, 06:29:20 PM
 #9

Here is one of the validation files for 0.7.0.

Any changes to any of those files will change their hashes, and changes to any of the hashes will break the signature.  If you've verified the key, you can check them for each release.  By the way, the key they are signed with (currently) can be found here.  (But please don't take my word for it, verify the key yourself before you sign it or use it.)

But how can I trust you? Or that the owners of this site haven't modified your post? Wink

Perhaps key-signing parties need to become part of the Bitcoin deal.

Probably should have these files torrented too for the decentralization. Would that decrease or increase security? Possibly neither I suspect.

Heh, you don't trust me, or my posts.  In fact, I explicitly tell you not to.

If, for some strange reason, you did want to trust me, I'd tell you that if:
1) the SHASUMS.asc file you are looking at has the SHA256 hash d2f06aca782ae7bc1f0df13e2646ea3343f09048019aa3136832c11c04a08fc7
and
2) the 1FC730C1 key you've downloaded verifies the signature in that file
then according to me (or anyone that has access to the forum database or can intercept either my post or your loading of my post), you have the right key and file.

Torrent would ensure that the file you downloaded was the file described in the torrent, but it couldn't tell you that the torrent was legit.

One thing that you can do is check the hashes and signatures on several of the releases you've used in the past, and decide that you've already trusted that key, whoever it belongs to, without knowing it, and then sign it with your own key.  That way, you'd at least know that future releases were signed by the same key as before.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
Pieter Wuille
Legendary
*
Offline Offline

Activity: 1072
Merit: 1178


View Profile WWW
October 04, 2012, 07:28:09 PM
 #10

Also, through gitian, everyone can build the binaries and verify they match byte-for-byte the distributed ones, and their hash matches the signed checksums. We do not publish binaries before a few developers have succesfully built the exact same binary.

The process is somewhat contrived, but it allows for very deep inspection of what is distributed.

I do Bitcoin stuff.
Richy_T
Legendary
*
Offline Offline

Activity: 2464
Merit: 2130


1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k


View Profile
October 09, 2012, 07:19:07 PM
 #11

Here is one of the validation files for 0.7.0.

Any changes to any of those files will change their hashes, and changes to any of the hashes will break the signature.  If you've verified the key, you can check them for each release.  By the way, the key they are signed with (currently) can be found here.  (But please don't take my word for it, verify the key yourself before you sign it or use it.)

But how can I trust you? Or that the owners of this site haven't modified your post? Wink

Perhaps key-signing parties need to become part of the Bitcoin deal.

Probably should have these files torrented too for the decentralization. Would that decrease or increase security? Possibly neither I suspect.

Heh, you don't trust me, or my posts.  In fact, I explicitly tell you not to.

If, for some strange reason, you did want to trust me, I'd tell you that if:
1) the SHASUMS.asc file you are looking at has the SHA256 hash d2f06aca782ae7bc1f0df13e2646ea3343f09048019aa3136832c11c04a08fc7
and
2) the 1FC730C1 key you've downloaded verifies the signature in that file
then according to me (or anyone that has access to the forum database or can intercept either my post or your loading of my post), you have the right key and file.

Torrent would ensure that the file you downloaded was the file described in the torrent, but it couldn't tell you that the torrent was legit.

One thing that you can do is check the hashes and signatures on several of the releases you've used in the past, and decide that you've already trusted that key, whoever it belongs to, without knowing it, and then sign it with your own key.  That way, you'd at least know that future releases were signed by the same key as before.

I was more thinking of the torrent as a way of decentralizing availability of the app. Though the fact that it is hashed is definitely a bonus.

1RichyTrEwPYjZSeAYxeiFBNnKC9UjC5k
auzaar
Full Member
***
Offline Offline

Activity: 151
Merit: 100



View Profile
October 10, 2012, 12:12:22 AM
 #12

Also, through gitian, everyone can build the binaries and verify they match byte-for-byte the distributed ones, and their hash matches the signed checksums. We do not publish binaries before a few developers have succesfully built the exact same binary.

The process is somewhat contrived, but it allows for very deep inspection of what is distributed.

How can binaries build on my machine would match binaries build on other machine byte-by-byte?
teamhugs
Member
**
Offline Offline

Activity: 69
Merit: 10



View Profile WWW
October 10, 2012, 01:16:48 AM
 #13

The download links on bitcoin.org go to sourceforge.  Also, the binaries are hashed and the hashes are signed with a well known key, so anyone that bothers to check would notice.

Sourceforge mirrors have been cracked in the past, here's a recent example, https://bitcointalk.org/index.php?topic=113018.0

teamhugs
Member
**
Offline Offline

Activity: 69
Merit: 10



View Profile WWW
October 10, 2012, 01:31:09 AM
 #14

In my personal opinion, bitcoin.org along with it's binaries should be hosted on a hardened server,
separate from any other service.

A hardened server is irrelevant. Trusting pgp verification is relevant. With pgp verification, and a trust path back to the signer, the binaries and pgp sig can be hosted anywhere.

Has there been a pgp keysigning party which involves key 29D9 EE6B 1FC7 30C1 (short key known as 0x1FC730C1)?

Bogart
Legendary
*
Offline Offline

Activity: 966
Merit: 1000


View Profile
October 10, 2012, 05:00:18 AM
 #15

The integrity questions aside, I think that publishing torrents of the releases would be useful in general.

This is especially true for the block chain download.

"All safe deposit boxes in banks or financial institutions have been sealed... and may only be opened in the presence of an agent of the I.R.S." - President F.D. Roosevelt, 1933
casascius
Mike Caldwell
VIP
Legendary
*
Offline Offline

Activity: 1386
Merit: 1136


The Casascius 1oz 10BTC Silver Round (w/ Gold B)


View Profile WWW
October 10, 2012, 01:07:13 PM
 #16

Also, through gitian, everyone can build the binaries and verify they match byte-for-byte the distributed ones, and their hash matches the signed checksums. We do not publish binaries before a few developers have succesfully built the exact same binary.

The process is somewhat contrived, but it allows for very deep inspection of what is distributed.

How can binaries build on my machine would match binaries build on other machine byte-by-byte?

What do you expect might differ per machine?  If you print the same MS Word doc from two machines it should look the same. The same idea applies to compiling the same source code.

Companies claiming they got hacked and lost your coins sounds like fraud so perfect it could be called fashionable.  I never believe them.  If I ever experience the misfortune of a real intrusion, I declare I have been honest about the way I have managed the keys in Casascius Coins.  I maintain no ability to recover or reproduce the keys, not even under limitless duress or total intrusion.  Remember that trusting strangers with your coins without any recourse is, as a matter of principle, not a best practice.  Don't keep coins online. Use paper or hardware wallets instead.
kjj
Legendary
*
Offline Offline

Activity: 1302
Merit: 1025



View Profile
October 10, 2012, 03:39:15 PM
 #17

Also, through gitian, everyone can build the binaries and verify they match byte-for-byte the distributed ones, and their hash matches the signed checksums. We do not publish binaries before a few developers have succesfully built the exact same binary.

The process is somewhat contrived, but it allows for very deep inspection of what is distributed.

How can binaries build on my machine would match binaries build on other machine byte-by-byte?

What do you expect might differ per machine?  If you print the same MS Word doc from two machines it should look the same. The same idea applies to compiling the same source code.

Compiling is a different matter, everything must be exactly the same or you'll end up with differences.  My box has slightly different libraries, and a very different compiler version, so the bitcoind that I build for my own use is wildly different from the official releases, for example.

They actually use a virtual machine to create a predictable build environment for the public releases.  If you hang out in #bitcoin-dev around release day, you'll see that even with all the work they put into the VM, they have differences fairly often and need to resolve them.

17Np17BSrpnHCZ2pgtiMNnhjnsWJ2TMqq8
I routinely ignore posters with paid advertising in their sigs.  You should too.
Herodes (OP)
Hero Member
*****
Offline Offline

Activity: 868
Merit: 1000


View Profile
October 10, 2012, 05:59:54 PM
 #18

Also, through gitian, everyone can build the binaries and verify they match byte-for-byte the distributed ones, and their hash matches the signed checksums. We do not publish binaries before a few developers have succesfully built the exact same binary.

The process is somewhat contrived, but it allows for very deep inspection of what is distributed.

How can binaries build on my machine would match binaries build on other machine byte-by-byte?

What do you expect might differ per machine?  If you print the same MS Word doc from two machines it should look the same. The same idea applies to compiling the same source code.

Compiling is a different matter, everything must be exactly the same or you'll end up with differences.  My box has slightly different libraries, and a very different compiler version, so the bitcoind that I build for my own use is wildly different from the official releases, for example.

They actually use a virtual machine to create a predictable build environment for the public releases.  If you hang out in #bitcoin-dev around release day, you'll see that even with all the work they put into the VM, they have differences fairly often and need to resolve them.

Can't they just make a vm-image that all of them can use? That should sort it out ? At least, then they would have the same environment.
jgarzik
Legendary
*
Offline Offline

Activity: 1596
Merit: 1091


View Profile
October 10, 2012, 06:28:03 PM
Last edit: October 10, 2012, 06:56:18 PM by jgarzik
 #19

The integrity questions aside, I think that publishing torrents of the releases would be useful in general.

This is especially true for the block chain download.

Yes, torrents would be useful -- and some infrastructure is coming down the pipe for this.

Upcoming version 0.7.1, released hopefully this week or early next week, will automatically import 'bootstrap.dat', if that file exists in the bitcoin data directory.

This feature is intended to enable a bootstrap torrent to be downloaded.  Simply drop the torrent's data file (bootstrap.dat) into your directory, and bitcoin will do the rest.

The next step is for some volunteers to generate the torrent, and other volunteers to "beta test" the torrent by downloading it, and making sure it imports correctly into bitcoin.

The nice thing about this process is that these volunteers may be untrusted:  bitcoin will fully verify the input data, just like it does over the network.  A malicious torrent would largely waste everybody's time, but be quickly noticed as malicious.


Jeff Garzik, Bloq CEO, former bitcoin core dev team; opinions are my own.
Visit bloq.com / metronome.io
Donations / tip jar: 1BrufViLKnSWtuWGkryPsKsxonV2NQ7Tcj
Atlas
Jr. Member
*
Offline Offline

Activity: 56
Merit: 1


View Profile
October 10, 2012, 06:30:58 PM
 #20

The integrity questions aside, I think that publishing torrents of the releases would be useful in general.

This is especially true for the block chain download.

Yes, torrents would be useful -- and some infrastructure is coming down the pipe for this.

Upcoming version 0.7.1, released hopefully this week or early next week, will automatically import any 'bootstrap.dat' files that is found in the bitcoin data directory.

This feature is intended to enable a bootstrap torrent to be downloaded.  Simply drop the torrent's data file (bootstrap.dat) into your directory, and bitcoin will do the rest.

The next step is for some volunteers to generate the torrent, and other volunteers to "beta test" the torrent by downloading it, and making sure it imports correctly into bitcoin.

The nice thing about this process is that these volunteers may be untrusted:  bitcoin will fully verify the input data, just like it does over the network.  A malicious torrent would largely waste everybody's time, but be quickly noticed as malicious.



This will not be automatic updates, correct?
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!