Bitcoin Forum
May 03, 2024, 05:25:50 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: This message was too old and has been purged  (Read 1197 times)
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 09, 2015, 02:37:00 PM
Last edit: April 17, 2016, 08:02:14 PM by Evil-Knievel
 #1

This message was too old and has been purged
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714757150
Hero Member
*
Offline Offline

Posts: 1714757150

View Profile Personal Message (Offline)

Ignore
1714757150
Reply with quote  #2

1714757150
Report to moderator
terrytibbs
Hero Member
*****
Offline Offline

Activity: 560
Merit: 501



View Profile
January 09, 2015, 03:33:21 PM
 #2

Regarding your second point: how would a malicious entity differentiate between normal transaction rebroadcasting between nodes and an original transaction being broadcast?
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 09, 2015, 03:39:49 PM
Last edit: April 17, 2016, 08:02:01 PM by Evil-Knievel
 #3

This message was too old and has been purged
amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
January 09, 2015, 06:37:41 PM
 #4

Quote
If you sent an "inv" mesaage containing your transaction hash without receiving that same message before, you are the initiator.
... or you have another connection.
for example through tor

fabrizziop
Hero Member
*****
Offline Offline

Activity: 506
Merit: 500



View Profile
January 09, 2015, 09:39:33 PM
 #5

The problem with your idea is simple: Anyone who wants to monitor you can initiate a connection to you, and see if you broadcast the transaction first.

There are other issues, as a simple Diffie-Hellman key agreement is unauthenticated. It's trivial to MITM you and relay the communications with another client without you even knowing. You're assuming the attacker only has the ability to sniff packets and not alter them or get in the middle (or just connect to you!).
amaclin
Legendary
*
Offline Offline

Activity: 1260
Merit: 1019


View Profile
January 09, 2015, 09:48:46 PM
 #6

Quote
Anyone who wants to monitor you can initiate a connection to you
-listen=0
fabrizziop
Hero Member
*****
Offline Offline

Activity: 506
Merit: 500



View Profile
January 09, 2015, 10:01:02 PM
 #7

Quote
Anyone who wants to monitor you can initiate a connection to you
-listen=0

Still, it's trivial to MITM a DH exchange. How are you going to authenticate people?. Via ECDSA signatures with their bitcoin addresses?.
gmaxwell
Moderator
Legendary
*
expert
Offline Offline

Activity: 4158
Merit: 8382



View Profile WWW
January 09, 2015, 10:02:51 PM
 #8

We have encryption: Use Tor. It's a strongly supported solution which addresses many privacy concerns that plain encryption cannot.

Quote
diffie-hellman handshake
Weren't you trying to sell your "crack" of ECC here some months ago?
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 09, 2015, 11:08:42 PM
Last edit: April 17, 2016, 08:01:54 PM by Evil-Knievel
 #9

This message was too old and has been purged
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 09, 2015, 11:11:01 PM
Last edit: April 17, 2016, 08:01:48 PM by Evil-Knievel
 #10

This message was too old and has been purged
Evil-Knievel (OP)
Legendary
*
Offline Offline

Activity: 1260
Merit: 1168



View Profile
January 09, 2015, 11:46:39 PM
Last edit: April 17, 2016, 08:01:35 PM by Evil-Knievel
 #11

This message was too old and has been purged
gmaxwell
Moderator
Legendary
*
expert
Offline Offline

Activity: 4158
Merit: 8382



View Profile WWW
January 10, 2015, 03:25:08 PM
 #12

Gmaxwell, I studied the code, and noticed that the "version" message would include the "addrMe" field, which is populated from LocalAddrs, which again contains the own public IP (for example gotten from UPNP). Would that be a concern when using tor? If so, using Tor would be pointless.
Study harder.  It doesn't in that case.  (And, even if it did make such a colossal goof the other advantages of using tor would still persist.).

There is no feasible way to MITM diffie hellman. If you can do so, you will get all my BTC if you provide a working way.
So you've flipped to the other side of wrong these days.  MITMing a DH key exchange is trivial, you just _do_.

Quote
I should have mentioned that we need some kind of authentication.
Authentication is basically all the complexity in a system, not something you just can wave away.

Quote
Similar to the way it is implemented in TOR.
It's unclear of what you mean here; if you mean the way the tor network prevents MITM/sybil attacks between it's own participants; thats accomplished via centralized "directory authorities".
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!