Bitcoin Forum
November 18, 2024, 01:52:16 PM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Security Risks in downloading the whole Bitcoin Blockchain from external srces??  (Read 721 times)
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 07:32:05 AM
Merited by ABCbits (1)
 #1

Hello everyone,

Recently I uploaded the whole Bitcoin Core blockchain database to my Google Drive, see details here:
https://bitcointalk.org/index.php?topic=2321650

But later a wise forum's hero member miguelmorales85 expressed deep concern about security risks in downloading and using such a blockchain database in one's Bitcoin Core application.

I am absolutely sure SECURITY RISKS are NEVER ACCEPTABLE in Bitcoin network!!!

I am still a newbie in blockchain technologies, so I'd ask smart technical guys to explain a little bit: are there actually any real security risks here??? What are they?

If yes, I will immediately delete the upload from the Google Drive


Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
aplistir
Full Member
***
Offline Offline

Activity: 378
Merit: 197



View Profile
October 27, 2017, 09:34:51 AM
Merited by ABCbits (1)
 #2


It would be great if there was a pruned blockchain available for download.

But the only way it could work with maximum security would be if it was somehow verified by the network. For example so that enough miners have validated it  and signed that it is correct.
This would solve the problem of needing to download 140GB of data ... because pruned blockchain could fit in 1 GB

I do not really see a big security risk in downloading the blockchain from you. Even if you had altered the blockchain somehow and it could theoretically fork the chain, it would only work if the MAJORITY of nodes and miners would start using your version of blockchain, and that is never going to happen.



My Address: 121f7zb2U4g9iM4MiJTDhEzqeZGHzq5wLh
ranochigo
Legendary
*
Offline Offline

Activity: 3038
Merit: 4420


Crypto Swap Exchange


View Profile
October 27, 2017, 10:49:22 AM
Merited by ABCbits (2)
 #3

I am still a newbie in blockchain technologies, so I'd ask smart technical guys to explain a little bit: are there actually any real security risks here??? What are they?

If yes, I will immediately delete the upload from the Google Drive
I wouldn't say that the security risk is huge. There is still a security risk such that you could potentially change all the blocks out and it would potentially be valid. The client does not verify the entire Blockchain again at start up and only verifies the last few hundred blocks IIRC. However, you would also have to isolate the client from the mainnet unless your modified blockchain has the longest chain difficultywise. Its not very effective.

It would be great if there was a pruned blockchain available for download.

But the only way it could work with maximum security would be if it was somehow verified by the network. For example so that enough miners have validated it  and signed that it is correct.
This would solve the problem of needing to download 140GB of data ... because pruned blockchain could fit in 1 GB
I think Core would still force a reindex even if the wallet.dat is newly generated. Without all the blocks, the client will not be able to retrieve all the transactions associated with a specific address.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 11:42:46 AM
 #4


Guys, thank you very much for your replies.

You've calmed me down a little. I was much worried that instead of helping with fast starting new full nodes I might do some harm on the contrary.

So, I will not delete the uploaded blockchain yet, it might help some people with a pretty fast internet conception to launch their full nodes faster than if they did it in the usual way.

But I'd like to remind those with a pretty slow download internet connection that they could gain almost no advantages downloading my upload, they are better to let their Bitcoin Core full node sync itself in its usual way.

Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
Spendulus
Legendary
*
Offline Offline

Activity: 2926
Merit: 1386



View Profile
October 27, 2017, 11:50:25 AM
Last edit: October 27, 2017, 12:05:46 PM by Spendulus
 #5

Hello everyone,

Recently I uploaded the whole Bitcoin Core blockchain database to my Google Drive, see details here:
https://bitcointalk.org/index.php?topic=2321650

But later a wise forum's hero member miguelmorales85 expressed deep concern about security risks in downloading and using such a blockchain database in one's Bitcoin Core application.

I am absolutely sure SECURITY RISKS are NEVER ACCEPTABLE in Bitcoin network!!!

I am still a newbie in blockchain technologies, so I'd ask smart technical guys to explain a little bit: are there actually any real security risks here??? What are they?

If yes, I will immediately delete the upload from the Google Drive


Well, couldn't a malicious payload be embedded in the database? Something that could be lay dormant until a signal is received to activate? Think of it this way. The database resides in directories. Right now I can add files to those directories, and Core does not care. It's only operating on the files it is directed to. The additional files are undetected.

What you need here is a verifiable signature on the files which proves they match byte for byte with the actual master database.

Everyone should know the fallacy of downloading and using files without verifying the signature.

A classic way of injecting a payload into user computers is to start with a "thing they want," add the malicious payload, then prompt in various ways for them to download the "thing they want." In the case of bitcoin users, the most glaring example would be a compromised wallet.

Here we have a blockchain database. Suppose Bad Guy (BG) sees a lot of people dl'ing your database, then he grabs a user id one character off, creates a download link almost identical, and offers some appeal to greed to induce downloads. Before anyone catches it there are thousands of downloads.

Verification of the file signature prevents this. If Core is downloaded and it's signature verified, then that verified code is used to download the blockchain, one can say that the entire system is good.
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 12:12:35 PM
 #6


Spendulus, if I understand you right, you mean there is a danger that one could hide some malicious soft inside the blockchain files. Well, of course every internet download should be scanned with an antivirus.

That would be a danger for the user, his computer and so on.

What I was concerned most of all was   in no case, by no means to cause any harm to the Bitcoin Blockchain network, if there suddenly appeared some full nodes with a malicious wrong database (suppose some malifactors use the hint and uploaded some corrupted databases


Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 12:18:57 PM
 #7


My upload does not include the Bitcoin core application itself. There is exclusively my 0.15.0.1 Core's data directories (except wallet.dat and debug.log

Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
X7
Legendary
*
Offline Offline

Activity: 1175
Merit: 1016


Let he who is without sin cast the first stone


View Profile
October 27, 2017, 12:19:49 PM
 #8

Hello everyone,

Recently I uploaded the whole Bitcoin Core blockchain database to my Google Drive, see details here:
https://bitcointalk.org/index.php?topic=2321650

But later a wise forum's hero member miguelmorales85 expressed deep concern about security risks in downloading and using such a blockchain database in one's Bitcoin Core application.

I am absolutely sure SECURITY RISKS are NEVER ACCEPTABLE in Bitcoin network!!!

I am still a newbie in blockchain technologies, so I'd ask smart technical guys to explain a little bit: are there actually any real security risks here??? What are they?

If yes, I will immediately delete the upload from the Google Drive



The risks are there, why take the chance?

For what shall it profit a man, if he shall gain the world, and lose his own soul?
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 01:09:25 PM
 #9

I've explained that the full syncingof of the blockchain would be much faster than in the usual way.
When I was starting my Bitcoin Core full node it took weeks to download the blockchain.
And the bottleneck was not in my internet bandwidth or my cpu or ram. The bottleneck was the number of active, accepting incoming connections full nodes, from where my node could download the blockchain (that's how I see it

Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
cr1776
Legendary
*
Offline Offline

Activity: 4228
Merit: 1313


View Profile
October 27, 2017, 01:22:18 PM
Last edit: October 27, 2017, 05:29:26 PM by cr1776
 #10


Spendulus, if I understand you right, you mean there is a danger that one could hide some malicious soft inside the blockchain files. Well, of course every internet download should be scanned with an antivirus.

That would be a danger for the user, his computer and so on.

What I was concerned most of all was   in no case, by no means to cause any harm to the Bitcoin Blockchain network, if there suddenly appeared some full nodes with a malicious wrong database (suppose some malifactors use the hint and uploaded some corrupted databases



I think he was also saying one could hide malicious software inside the directory that stores the block chain files which wouldn't be detected by Bitcoin Core since it only looks at the blocks themselves.  Not to mention virus scanners should NOT be relied upon.  Often people are told to exclude the block directory due to false positives which would mean anything else in there would be missed even if the scan was reliable.

Another problem is that downloading this should be slower than just starting Bitcoin Core and letting it sync since it will sync from multiple nodes in parallel.  A monolithic block chain download hasn't been advisable for at least 3 major versions.

Spendulus
Legendary
*
Offline Offline

Activity: 2926
Merit: 1386



View Profile
October 27, 2017, 01:23:09 PM
Merited by ABCbits (1)
 #11


Spendulus, if I understand you right, you mean there is a danger that one could hide some malicious soft inside the blockchain files. Well, of course every internet download should be scanned with an antivirus.

That would be a danger for the user, his computer and so on.

What I was concerned most of all was   in no case, by no means to cause any harm to the Bitcoin Blockchain network, if there suddenly appeared some full nodes with a malicious wrong database (suppose some malifactors use the hint and uploaded some corrupted databases


NO.

Virus scanners routinely find (falsely) sections of the blockchain that they consider viruses. These are false positives, but rest assured that code can be disguised, such that it can be assembled later, without having a virus signature. That would be a false negative from the scanner.

In addition, it would be ridiculously easy to include extra files in the directories built, said files being outside of the blockchain.

You asked a question regarding an independent blockchain download method, and I answered your question. The proof of the integrity and safety of the download is the signature. Here it appears one would need several signatures, one for each subdirectory and one for the overall folder.

If this is not understood I'll be happy to elaborate.
Bestcoin-fan (OP)
Member
**
Offline Offline

Activity: 154
Merit: 11


View Profile
October 27, 2017, 01:35:46 PM
 #12


Spendulus, I understand that signatures are the only reliable proof that the database files are really valid and correct. Is there a way I could add such a signature for my upload if all I remember it was created from the actual blockchain as for the morning of October 24th?

Donate BTC: 1EeAXetny8pdoAZ4gyhDwnoMUxoTNGyKSz
Spendulus
Legendary
*
Offline Offline

Activity: 2926
Merit: 1386



View Profile
October 27, 2017, 02:52:32 PM
 #13


Spendulus, I understand that signatures are the only reliable proof that the database files are really valid and correct. Is there a way I could add such a signature for my upload if all I remember it was created from the actual blockchain as for the morning of October 24th?

I think you've answered your own question there.
ranochigo
Legendary
*
Offline Offline

Activity: 3038
Merit: 4420


Crypto Swap Exchange


View Profile
October 27, 2017, 03:05:36 PM
 #14

Well, couldn't a malicious payload be embedded in the database? Something that could be lay dormant until a signal is received to activate? Think of it this way. The database resides in directories. Right now I can add files to those directories, and Core does not care. It's only operating on the files it is directed to. The additional files are undetected.
I don't get it. The user never runs anything and the blocks are merely copied to the data directory. Nothing is run in the process, not even when Core is opened, it only reads from the blocks. I've never heard of any malware that could be executed by itself, without the user's intervention.

Either that, or its in zip/rar format and theres pretty much no way for a malware to be executed either.

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
cr1776
Legendary
*
Offline Offline

Activity: 4228
Merit: 1313


View Profile
October 27, 2017, 05:47:18 PM
 #15

Well, couldn't a malicious payload be embedded in the database? Something that could be lay dormant until a signal is received to activate? Think of it this way. The database resides in directories. Right now I can add files to those directories, and Core does not care. It's only operating on the files it is directed to. The additional files are undetected.
I don't get it. The user never runs anything and the blocks are merely copied to the data directory. Nothing is run in the process, not even when Core is opened, it only reads from the blocks. I've never heard of any malware that could be executed by itself, without the user's intervention.

Either that, or its in zip/rar format and theres pretty much no way for a malware to be executed either.

I think one concern here would be when Bitcoin Core is reading and parsing the block chain.  What if there is an undetected buffer overflow (stack or heap etc) or other issue in Bitcoin Core (or any other program that reads the block chain)?  This could provide an opening for attack.  It could then run an executable that was left in the block directory or code in the 'block' itself.  Buffer overflows have been a problem for decades and while Bitcoin Core is well tested, it is not perfect.  (Libraries used by Core have had buffer overflow issues in the past - e.g. the UPnP one several years ago.)

Or it could be a simple as a "ReadMe.txt.exe" file in the directory.  If only a small percentage of people on whatever OS click it without paying attention, you could have a lot of problems. 

Or (as was touched on above) suppose the archive itself is replaced with some type of malware? 

It is best to practice defensive usage so as to avoid finding out the hard way that there was an issue.

LoyceV
Legendary
*
Offline Offline

Activity: 3500
Merit: 17698


Thick-Skinned Gang Leader and Golden Feather 2021


View Profile WWW
October 29, 2017, 12:29:18 PM
 #16

It would be great if there was a pruned blockchain available for download.

But the only way it could work with maximum security would be if it was somehow verified by the network. For example so that enough miners have validated it  and signed that it is correct.
This would solve the problem of needing to download 140GB of data ... because pruned blockchain could fit in 1 GB
I've been thinking about creating a pruned_Bitcoin.zip for a while now. It will be around 3 GB (uncompressed), as I think the chainstate directory has to be included. All I need to do this, is a simple VPS.
But, I see two main problems:
1. Anybody who downloads it has to trust me. Unlike a full blockchain, a pruned blockchain can't be rescanned.
2. I could set up a VPS, but I don't have the skill to be absolutely sure it won't get compromised. Or the hoster could give someone access after social engineering.

The reason I would like to offer it though, is that Bitcoin Core is the most basic wallet, and I consider it a good thing if more people are able to verify their own transactions.
Recently, someone gave me a zip of all 20 million Bitcoin addresses with balance. Read that again: just 20 million addresses! Uncompressed, that's just 800 MB. If you'd add details on all individual outputs, it may rise to a few GB.
If - in the future - a pruned Bitcoin Core can read TXID-data from just a database, you don't have to prune all blocks, you just have to keep a record of all balances. Once you have that, 10 GB may be enough to be able to verify all transactions in existing wallet.dat files.

The minimum for a pruned blockchain is 550 blocks (4 days) of data. If you'd download a pruned blockchain as a .zip, you could just wait four days to have all downloaded data replaced by new data already. I'm not sure how secure that would be though.

This would solve the problem of needing to download 140GB of data ... because pruned blockchain could fit in 1 GB
I think Core would still force a reindex even if the wallet.dat is newly generated. Without all the blocks, the client will not be able to retrieve all the transactions associated with a specific address.[/quote]
I can tell you from personal experience that a pruned blockchain doesn't require a rescan to create a new wallet. There's no point to check if new addresses hold any balance.

▄▄███████████████████▄▄
▄█████████▀█████████████▄
███████████▄▐▀▄██████████
███████▀▀███████▀▀███████
██████▀███▄▄████████████
█████████▐█████████▐█████
█████████▐█████████▐█████
██████████▀███▀███▄██████
████████████████▄▄███████
███████████▄▄▄███████████
█████████████████████████
▀█████▄▄████████████████▀
▀▀███████████████████▀▀
Peach
BTC bitcoin
Buy and Sell
Bitcoin P2P
.
.
▄▄███████▄▄
▄████████
██████▄
▄██
█████████████████▄
▄███████
██████████████▄
███████████████████████
█████████████████████████
████████████████████████
█████████████████████████
▀███████████████████████▀
▀█████████████████████▀
▀██████████████████▀
▀███████████████▀
▀▀███████▀▀

▀▀▀▀███▀▀▀▀
EUROPE | AFRICA
LATIN AMERICA
▄▀▀▀











▀▄▄▄


███████▄█
███████▀
██▄▄▄▄▄░▄▄▄▄▄
████████████▀
▐███████████▌
▐███████████▌
████████████▄
██████████████
███▀███▀▀███▀
.
Download on the
App Store
▀▀▀▄











▄▄▄▀
▄▀▀▀











▀▄▄▄


▄██▄
██████▄
█████████▄
████████████▄
███████████████
████████████▀
█████████▀
██████▀
▀██▀
.
GET IT ON
Google Play
▀▀▀▄











▄▄▄▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!