bo.siu (OP)
Newbie
Offline
Activity: 8
Merit: 0
|
|
March 05, 2014, 02:50:07 PM |
|
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
March 05, 2014, 02:56:33 PM |
|
You do realize this requires the attacker to have access to the CPU. If the attacker has access to do the low level hardware you system is likely rooted, and he is reading your passphrase as you type it. The one noteable exception is this makes VPS even less secure. They already were a horrible idea for Bitcoin security but I guarantee you at least one "professional" bitcoin site is running on a VPS right now. Information security begins with physical security and you can't have physical security inside another persons vault (your VPS running on their hardware). Title should be changed to "Using a VPS means you can be hacked (by this and countless other attack vectors)".
|
|
|
|
Armis
|
|
March 05, 2014, 03:01:37 PM |
|
Truth or lie, doesn't matter the fact of the matter is the btc protocol needs more security Exchanges who used it should be more transparent such that their transactions are signed (verified) One weaknesses of the protocol has already been exposed: https://bitcointalk.org/index.php?topic=492776.0;topicseennow the community is fighting hard to uncover more weaknesses, not to exploit them, but to know what parts of the infrastructure needs replacement. When you find the flaws, when you fix the flaws, you create a more secure protocol, and you create a more secure environment for the community to thrive
|
|
|
|
franky1
Legendary
Offline
Activity: 4396
Merit: 4760
|
|
March 05, 2014, 03:05:06 PM |
|
if a hacker has access to your system, why bother with that sophistication, just steal the wallet.dat
the bitcoin protocol cannot be hacked. just one persons data in this scenario.
bitcoin protocol needs 51% out of millions of users for the protocol to be "hacked" or as others call it a change to cause a fork.
this hack is about gaining private keys of individuals not forking the protocol of millions of users. yes i know bitcoin uses those encryptions, but bitcoin protocol is more then just the privkey of someones address.
|
I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER. Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
|
|
|
RodeoX
Legendary
Offline
Activity: 3066
Merit: 1147
The revolution will be monetized!
|
|
March 05, 2014, 03:08:34 PM |
|
if a hacker has access to your system, why bother with that sophistication, just steal the wallet.dat ...
That's what I was wondering.
|
|
|
|
Staring Owl
Member
Offline
Activity: 90
Merit: 10
|
|
March 05, 2014, 03:08:47 PM |
|
Your myth has been busted!
|
SLOT machine with generous payouts and affiliate program. BTC No registration needed BTC Start playing for real within seconds BTC Provably fair and transparent BTC You can win up to 5000 times your bet BTC Or make 30% by referring friends. -> BitBandit.eu
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
March 05, 2014, 03:10:13 PM |
|
When you find the flaws, when you fix the flaws, you create a more secure protocol, and you create a more secure environment for the community to thrive
This is a side channel attack. There is no flaw to find or fix in the protocol. It says that if the attacker can monitor and manipulate the CPU then they can steal the private key. The fix is to make sure the attacker can't monitor or manipulate the CPU. If almost all circumstances if the attacker can do this he can simply steal the wallet.dat (which is much easier). The one exception would be idiot service operators running bitcoin services in "the cloud" or on VPS. Of course there have been at least two dozen thefts in the past related to compromises of VPS (including linode). Virtual environment will NEVER be secure for bitcoin services. OpenSSL may eventually make this attacker harder to pull off but even then the VPS will remain a source of hundreds of attack vectors. If you use a bitcoin related service (exchange, eWallet, mining pool, etc) ask the service operator if they are stupid enough to run it on a VPS? If the answer is yes run, run, run for the exits because it is only a matter of when not if they eventually lose all your bitcoins. This technical vulnerability is the least of your worries. There are attacks which are a magnitude easier (including simply logging in with the super admin/root account and stealing the coins).
|
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
March 05, 2014, 03:12:04 PM |
|
if a hacker has access to your system, why bother with that sophistication, just steal the wallet.dat ...
That's what I was wondering. The operator is stupid enough to run a hot wallet on a VPS. The attacker may not have access to the wallet.dat or file system but can monitor the CPU and manipulate its operation from the hypervisor.
|
|
|
|
franky1
Legendary
Offline
Activity: 4396
Merit: 4760
|
|
March 05, 2014, 03:12:33 PM |
|
One weaknesses of the protocol has already been exposed
the protocol is fine. its how people use it (their PHP scripts that do not double check transactions that is at fault) i am still using a qt client from before christmas and it still works. your scenario involved webservices changing their website code, not the bitcoin daemon of all users to solve the issue. i wonder when people will learn to not blame the protocol for their own lack of firewalls to prevent hackers, encryption to make data useless to outsiders, and webcode that can adequately talk to the daemon with the security and double checking standards that we see as 'basic' in the FIAT network. its the services ontop of bitcoin at fault. its they type of CPU and operating systems with or without antivirus/firewalls/networking monitor tools that is at fault. if a hacker can sniff out data from the CPU cache, then private keys could be hacked. but also your bank account and personal correspondance to your mistress can be hacked. that is not bitcoin protocol flaw. that is a operating system/ CPU manufacturer security flaw. summary: paper wallets dont need CPU's
|
I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER. Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
|
|
|
tntdgcr
Full Member
Offline
Activity: 219
Merit: 100
Bitcoin Mining Hosting
|
|
March 05, 2014, 03:15:40 PM |
|
When you find the flaws, when you fix the flaws, you create a more secure protocol, and you create a more secure environment for the community to thrive
This is a side channel attack. There is no flaw to find or fix in the protocol. It says that if the attacker can monitor and manipulate the CPU then they can steal the private key. The fix is to make sure the attacker can't monitor or manipulate the CPU. If almost all circumstances if the attacker can do this he can simply steal the wallet.dat (which is much easier). The one exception would be idiot service operators running bitcoin services in "the cloud" or on VPS. Of course there have been at least two dozen thefts in the past related to compromises of VPS (including linode). Virtual environment will NEVER be secure for bitcoin services. OpenSSL may eventually make this attacker harder to pull off but even then the VPS will remain a source of hundreds of attack vectors. If you use a bitcoin related service ask the service operator if they are stupid enough to run it on a VPS and if the answer is yes run, run, run for the exits because it is only a matter of when not if they eventually lose all your bitcoins.QFT ++ ... the best systems cannot prevent userland errors or lack of security. encrypt encrypt encrypt encrypt, and be smart
|
OregonMines is expanding. Are you expanding with us?
|
|
|
gollum
Sr. Member
Offline
Activity: 434
Merit: 250
In Hashrate We Trust!
|
|
March 05, 2014, 03:21:25 PM |
|
Do you think it's enough to have the bitcoin wallets in a server you physically control or should also the website be located inhouse to prevent thieves from stealing bitcoins?
|
|
|
|
aztecminer
Legendary
Offline
Activity: 1092
Merit: 1000
|
|
March 05, 2014, 03:21:43 PM |
|
When you find the flaws, when you fix the flaws, you create a more secure protocol, and you create a more secure environment for the community to thrive
This is a side channel attack. There is no flaw to find or fix in the protocol. It says that if the attacker can monitor and manipulate the CPU then they can steal the private key. The fix is to make sure the attacker can't monitor or manipulate the CPU. If almost all circumstances if the attacker can do this he can simply steal the wallet.dat (which is much easier). The one exception would be idiot service operators running bitcoin services in "the cloud" or on VPS. Of course there have been at least two dozen thefts in the past related to compromises of VPS (including linode). Virtual environment will NEVER be secure for bitcoin services. OpenSSL may eventually make this attacker harder to pull off but even then the VPS will remain a source of hundreds of attack vectors. If you use a bitcoin related service (exchange, eWallet, mining pool, etc) ask the service operator if they are stupid enough to run it on a VPS? If the answer is yes run, run, run for the exits because it is only a matter of when not if they eventually lose all your bitcoins. This technical vulnerability is the least of your worries. There are attacks which are a magnitude easier (including simply logging in with the super admin/root account and stealing the coins).most vps are run on a physical server that hosts many vps and therefore most vps cannot handle that much traffic before it becomes a problem and crashes the vps constantly.
|
|
|
|
aztecminer
Legendary
Offline
Activity: 1092
Merit: 1000
|
|
March 05, 2014, 03:23:45 PM |
|
Do you think it's enough to have the bitcoin wallets in a server you physically control or should also the website be located inhouse to prevent thieves from stealing bitcoins?
my policy is "IN_HOUSE ONLY" .. the reason for this policy is because any data that resides on someone elses hardware is accessable by who knows how many other admins. i get calls everyday of people trying to get me to send data to thier "cloud" and then wonder why i am so against "cloud" technology. very simple the data is not secure on someone elses servers.
|
|
|
|
franky1
Legendary
Offline
Activity: 4396
Merit: 4760
|
|
March 05, 2014, 03:33:16 PM |
|
Do you think it's enough to have the bitcoin wallets in a server you physically control or should also the website be located inhouse to prevent thieves from stealing bitcoins?
2 years ago i posted a idea that no wallet should be on a server. instead a withdrawal request should just be a database entry on the server. and on a separate system away from the server that has a copy of users details. no communications go to the off-server system. pure the off-server system looks in the database (one way communication) which it would see the request and compare the password or pin given on that request to the copy on their off-network system. if they match the off-server system would perform the transaction. all that should be on the server is a hashed copy of the password, used purely for login requests where the login page hashes the users password and compares the hashes. that way the hacker cannot guess the unhashed password adding to that the withdrawal request database uses a different hashing method which the off-server has a copy of, so that hackers dont simply copy the login hash to the withdrawal request. as the 2 would be different combine that with the fact that there is no privkey on the server makes cpu sniffing useless also
|
I DO NOT TRADE OR ACT AS ESCROW ON THIS FORUM EVER. Please do your own research & respect what is written here as both opinion & information gleaned from experience. many people replying with insults but no on-topic content substance, automatically are 'facepalmed' and yawned at
|
|
|
DeathAndTaxes
Donator
Legendary
Offline
Activity: 1218
Merit: 1079
Gerald Davis
|
|
March 05, 2014, 03:34:12 PM |
|
Most vps are run on a physical server that hosts many vps and therefore most vps cannot handle that much traffic before it becomes a problem and crashes the vps constantly.
That is the least of your problems. Some very large bitcoin services have lost some very large amounts of bitcoins because they were running on a VPS. Google Bitcoin linode hack.
|
|
|
|
gollum
Sr. Member
Offline
Activity: 434
Merit: 250
In Hashrate We Trust!
|
|
March 05, 2014, 03:34:28 PM |
|
Do you think it's enough to have the bitcoin wallets in a server you physically control or should also the website be located inhouse to prevent thieves from stealing bitcoins?
my policy is "IN_HOUSE ONLY" .. the reason for this policy is because any data that resides on someone elses hardware is accessable by who knows how many other admins. i get calls everyday of people trying to get me to send data to thier "cloud" and then wonder why i am so against "cloud" technology. very simple the data is not secure on someone elses servers. That's true, but you can never compete with cloud services like Amazon in uptime and you also have a higher risk of DDOS. Even if you got two redundant servers, at two different locations, backup power, and two ISP:s your servers uptime wont be as good as Amazon. Even if you reach the same uptime and stability as Amazon your cost will be many times higher, unless you have economics of scales as a big corporation.
|
|
|
|
proudhon
Legendary
Offline
Activity: 2198
Merit: 1311
|
|
March 05, 2014, 03:47:15 PM |
|
Help!? What does this mean for my offline paper and encrypted USB wallets?
|
Bitcoin Fact: the price of bitcoin will not be greater than $70k for more than 25 consecutive days at any point in the rest of recorded human history.
|
|
|
Sitarow
Legendary
Offline
Activity: 1792
Merit: 1047
|
|
March 05, 2014, 03:54:39 PM |
|
You do realize this requires the attacker to have access to the CPU. If the attacker has access to do the low level hardware you system is likely rooted, and he is reading your passphrase as you type it. The one noteable exception is this makes VPS even less secure. They already were a horrible idea for Bitcoin security but I guarantee you at least one "professional" bitcoin site is running on a VPS right now. Information security begins with physical security and you can't have physical security inside another persons vault (your VPS running on their hardware). Title should be changed to "Using a VPS means you can be hacked (by this and countless other attack vectors)". I agree with you on all points. Thank you for making this clear.
|
|
|
|
Coins4life
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 05, 2014, 04:00:13 PM |
|
When you find the flaws, when you fix the flaws, you create a more secure protocol, and you create a more secure environment for the community to thrive
This is a side channel attack. There is no flaw to find or fix in the protocol. It says that if the attacker can monitor and manipulate the CPU then they can steal the private key. The fix is to make sure the attacker can't monitor or manipulate the CPU. If almost all circumstances if the attacker can do this he can simply steal the wallet.dat (which is much easier). The one exception would be idiot service operators running bitcoin services in "the cloud" or on VPS. Of course there have been at least two dozen thefts in the past related to compromises of VPS (including linode). Virtual environment will NEVER be secure for bitcoin services. OpenSSL may eventually make this attacker harder to pull off but even then the VPS will remain a source of hundreds of attack vectors. If you use a bitcoin related service (exchange, eWallet, mining pool, etc) ask the service operator if they are stupid enough to run it on a VPS? If the answer is yes run, run, run for the exits because it is only a matter of when not if they eventually lose all your bitcoins. This technical vulnerability is the least of your worries. There are attacks which are a magnitude easier (including simply logging in with the super admin/root account and stealing the coins).+1
|
|
|
|
cr1776
Legendary
Offline
Activity: 4214
Merit: 1313
|
|
March 05, 2014, 04:03:46 PM |
|
Do you think it's enough to have the bitcoin wallets in a server you physically control or should also the website be located inhouse to prevent thieves from stealing bitcoins?
2 years ago i posted a idea that no wallet should be on a server. instead a withdrawal request should just be a database entry on the server. and on a separate system away from the server that has a copy of users details. no communications go to the off-server system. pure the off-server system looks in the database (one way communication) which it would see the request and compare the password or pin given on that request to the copy on their off-network system. if they match the off-server system would perform the transaction. all that should be on the server is a hashed copy of the password, used purely for login requests where the login page hashes the users password and compares the hashes. that way the hacker cannot guess the unhashed password adding to that the withdrawal request database uses a different hashing method which the off-server has a copy of, so that hackers dont simply copy the login hash to the withdrawal request. as the 2 would be different combine that with the fact that there is no privkey on the server makes cpu sniffing useless also QFT. D&T also makes a good point about a pool having their VPS hacked, and tons of bitcoins stolen nearly 2 years ago now. (And they were not the only one, it has been a recurring problem.) If you are on a pool, exchange, etc, don't store your coins there. Set an automatic payout, or use p2pool with an instant payout.
|
|
|
|
|