Bitcoin Forum
April 23, 2024, 06:30:15 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2] 3 4 5 6 »  All
  Print  
Author Topic: This message was too old and has been purged  (Read 37830 times)
spin
Sr. Member
****
Offline Offline

Activity: 362
Merit: 261


View Profile
March 13, 2015, 08:58:54 AM
 #21

Surely what they are saying they are doing is not really possible.  They cannot with certainty verify who is paying who.  They might be able to make probabilistic statements, but not certainty in all cases. 


If you liked this post buy me a beer.  Beers are quite cheap where I live!
bc1q707guwp9pc73r08jw23lvecpywtazjjk399daa
Even in the event that an attacker gains more than 50% of the network's computational power, only transactions sent by the attacker could be reversed or double-spent. The network would not be destroyed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713853815
Hero Member
*
Offline Offline

Posts: 1713853815

View Profile Personal Message (Offline)

Ignore
1713853815
Reply with quote  #2

1713853815
Report to moderator
1713853815
Hero Member
*
Offline Offline

Posts: 1713853815

View Profile Personal Message (Offline)

Ignore
1713853815
Reply with quote  #2

1713853815
Report to moderator
cryptrol
Hero Member
*****
Offline Offline

Activity: 637
Merit: 500


View Profile
March 13, 2015, 08:59:26 AM
 #22

This is also a reminder to always use tor with Bitcoin 100% of the time (and to use a full node if you can), as that reduces the incentives to pull this kind of stunt.
Making this the default behavior would help both Bitcoin and Tor.
It seems that many synergies could be established between the two projects, since both are disruptive enough to attract the attention of big bad actors.
BCwinning
Hero Member
*****
Offline Offline

Activity: 770
Merit: 500


View Profile
March 13, 2015, 09:02:32 AM
 #23

This is also a reminder to always use tor with Bitcoin 100% of the time (and to use a full node if you can), as that reduces the incentives to pull this kind of stunt.
Making this the default behavior would help both Bitcoin and Tor.
It seems that many synergies could be established between the two projects, since both are disruptive enough to attract the attention of big bad actors.
actually it's a good incentive to move past bitcoin and truly support a real anonymous currency (what that is yet I have no idea) that is the cash of the digital world. Because bitcoin isn't an anonymous currency and isn't going to be.

The New World Order thanks you for your support of Bitcoin and encourages your continuing support so that they may track your expenditures easier.
onemorexmr
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250



View Profile
March 13, 2015, 09:53:59 AM
 #24

Surely what they are saying they are doing is not really possible.  They cannot with certainty verify who is paying who.  They might be able to make probabilistic statements, but not certainty in all cases. 



depends on what exactly they offer.
if they are connected to more thn 75% of the network they certainly can tell what region of the world sent this transaction out first (not who crafted it... except if running bitcoind himself)

not sure who are this anonymous financial companies interested in this.

i'd say (tinfoil hat) its a service for nsa/bnd/fsb and so on

XMR || Monero || monerodice.net || xmr.to || mymonero.com || openalias.org || you think bitcoin is fungible? watch this
LeMiner
Member
**
Offline Offline

Activity: 139
Merit: 10


View Profile
March 13, 2015, 09:58:38 AM
 #25

Blocked the bad nodes as well.

Here's the list of ip's to block:


5.9.115.0/24
46.105.210.0/24
2001:41d0:a:605c::/48

46.105.210.194, 46.105.210.11, 46.105.210.255, 46.105.210.138, 46.105.210.196, 46.105.210.246, 46.105.210.220, 46.105.210.204, 46.105.210.179, 46.105.210.189, 46.105.210.10, 46.105.210.42,

Source: Reddit

I've had a few of those and another connected to my node, so add this one to the list as well: 46.105.210.137 .

Personally I've taken it to block 46.105.210.* since obviously we don't know all IP's involved (yet). What scares me is that it's relatively easy for people to evade blocks like this.

Looks like the people at mycellium and kraken are involved...
belcher
Sr. Member
****
Offline Offline

Activity: 261
Merit: 518


View Profile
March 13, 2015, 10:56:41 AM
 #26

Surely what they are saying they are doing is not really possible.  They cannot with certainty verify who is paying who.  They might be able to make probabilistic statements, but not certainty in all cases. 


Even probabilistic data is bad. They could use it for targeted advertising for instance.

Plausible deniability is not the be-all and end-all. Even if they don't know for sure it could be reason enough to put you under further surveillance.

1HZBd22eQLgbwxjwbCtSjhoPFWxQg8rBd9
JoinMarket - CoinJoin that people will actually use.
PGP fingerprint: 0A8B 038F 5E10 CC27 89BF CFFF EF73 4EA6 77F3 1129
levino
Sr. Member
****
Offline Offline

Activity: 362
Merit: 250


View Profile WWW
March 13, 2015, 12:15:28 PM
Last edit: March 13, 2015, 12:50:57 PM by levino
 #27

For Ubuntu you can use ufw.

Remark: UFW is a firewall! If you enable it in the default mode which is "deny all", all new connections on all ports will be denied while existing connections stay open (like your current ssh connection). Make sure to "ufw allow" all ports that you need before you enable ufw. Sometimes you forget a port, but if you are sshing into your server, always allow ssh before you do anything stupid. You can than open ports at a later stage through ssh.

Here it goes:

Code:
sudo -s
apt-get update
apt-get install ufw
#deny incoming from subnets
ufw deny from 5.9.115.0/24
ufw deny from 46.105.210.0/24
ufw deny from 2001:41d0:a:605c::/48
#deny outgoing to subnets
ufw deny out from any to 5.9.115.0/24
ufw deny out from any to 46.105.210.0/24
ufw deny out from any to 2001:41d0:a:605c::/48
#these are optional
ufw allow 22 #whatever port you are using for ssh
ufw allow 80 #if you have webserver running
ufw allow 443 #if you have a secure (https) web server running
#allow bitcoin
ufw allow 8333
#start ufw
ufw enable
#go back to normal user level
exit

The order is important. If you allow 8333 and deny incoming from ip ranges later, only the first rule applies.

Hope this does the trick. If I forgot something pleae tell me.

BM-2cWwQnMzK9XFTjfn6jSRRJwTG8a2wooR9A
www.coyno.com - www.bitcoinage.de
pajak666
Hero Member
*****
Offline Offline

Activity: 746
Merit: 502


Looking for advertising deal


View Profile
March 13, 2015, 12:23:51 PM
 #28

is there a way to block certain ip in bitcoin.conf file?
Cryptowatch.com
Full Member
***
Offline Offline

Activity: 196
Merit: 103


View Profile WWW
March 13, 2015, 12:26:23 PM
 #29

Surely what they are saying they are doing is not really possible.  They cannot with certainty verify who is paying who.  They might be able to make probabilistic statements, but not certainty in all cases. 


Even probabilistic data is bad. They could use it for targeted advertising for instance.

Plausible deniability is not the be-all and end-all. Even if they don't know for sure it could be reason enough to put you under further surveillance.

Was it not that a person had all his electronic equipment confiscated and brought in for having a bitcoin-node associated with a rogue transaction displayed on blockchain.info earlier on?

If there are entities paying for analysis of the block chain, and it's acted upon (by law enforcement) data that cannot be fully trusted, it could cause lots of troubles.

Also, while blocking ip's of nefarious nodes is a temporarily solution, it's only an annoyance for the perpetrators, and given they have sufficient resources, they could further hide their activity as to not give away their intentions.

Given they have enough resources, they could even have automated ip-switching going on. Once an ip is blocked by a sufficient number of legit nodes, they just switch the ip of that node, and all of that could be automated. So in essence blocking the IP's are a bit like holding your hand over a hole in your rowing boat that is leaking in water, might give you some temporarily relief, but is not a lasting solution.

Now - it's near impossible to know who really controls a node, if they really want to go stealth. If a node acts like a normal node in all ways, why should it not be considered a normal node?

If I understand it right, the chainalysis mode of operation is for them to connect to as many nodes as possible, so if I do a transaction directly from ip A, which runs a full bitcoin core node, be it on a cable-connection or otherwise, if cainalysis is connected to the node where the tx is orginating, the ip-address of the node where the transaction was orginating is recorded within the chainalysis database. They will probably use many other sources to get more info about the owner of that ip-address. If they're only a private company they will have less data points to work with, but if they're an intel agency, there's virtually no limit as to how sophisticated the systems could be, in theory they could plugin directly to the customer database of ISP's and have names displayed in real time in association with the IP's. Information that could further be relayed and shared with relevant parties.

Bitcoin is only pseudonymous, as everyone can lock up a transaction in the block-chain, and I assume network analysis cannot be prevented, but I do think it should be made more difficult.

But a blacklist solution is dangerous. Who's to decide what goes on the blacklist, and who's to verify the decisions are correct? Perhaps some automated solution in bitcoin core where peers that's behaving unexpectedly could be automatically banned is a better solution? But again, that's much like holding hand over leaking hole, as if certain footprints reveals rogue nodes, they will only change their appearance to appear more legitimate. And I'm not sure, but I believe bitcoin traffic is unencrypted in transit, so what prevents an intel org from manipulating the traffic (making legit nodes appear rogue), in essence grinding the entire network to a halt if nodes automatically ban misbehaving nodes?

I'm no TOR expert, but I've noticed there's been much mumbling about TOR not being all that secure anymore, so would a normal user really be more secure if he used Bitcoin+TOR?

Since bitcoin is supposed to be trustless, if we started to make a whitelist of legit nodes, that would go against that ideal.

So, in reality, how do we ensure that most nodes on the network are legit, and what's the best method of blocking rogue nodes from connecting to your own node?

In my view, in essence it boils down to freedom and privacy. There's something fundamentally wrong when certain people need to exert "control" over others against their will.

Ragnarokdel
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
March 13, 2015, 12:31:36 PM
 #30

Blocked the bad nodes as well.

Here's the list of ip's to block:


5.9.115.0/24
46.105.210.0/24
2001:41d0:a:605c::/48

46.105.210.194, 46.105.210.11, 46.105.210.255, 46.105.210.138, 46.105.210.196, 46.105.210.246, 46.105.210.220, 46.105.210.204, 46.105.210.179, 46.105.210.189, 46.105.210.10, 46.105.210.42,

Source: Reddit

I've had a few of those and another connected to my node, so add this one to the list as well: 46.105.210.137 .

Personally I've taken it to block 46.105.210.* since obviously we don't know all IP's involved (yet). What scares me is that it's relatively easy for people to evade blocks like this.

Looks like the people at mycellium and kraken are involved...
how do you block an IP in bitcoin core?
primer-
Legendary
*
Offline Offline

Activity: 1092
Merit: 1000



View Profile
March 13, 2015, 12:45:13 PM
 #31

I noticed that one of those nodes were connected to my own node, then I scanned it:

Starting Nmap 6.00 ( http://nmap.org ) at 2015-03-13 01:48 CET
Nmap scan report for 46.105.210.179
Host is up (0.065s latency).
Not shown: 996 closed ports
PORT     STATE    SERVICE
22/tcp   open     ssh
445/tcp  filtered microsoft-ds
8080/tcp open     http-proxy
8333/tcp open     unknown

Do you port scan every bitcoin node that connects to you ? Why would you do that, what were your real intentions ...
autodiv
Member
**
Offline Offline

Activity: 112
Merit: 10


View Profile
March 13, 2015, 12:46:28 PM
 #32

is there a way to block certain ip in bitcoin.conf file?

You really want to use iptables (assuming you are on Linux and I cannot imagine why you would not be.) That way you never have to shut down the Daemon just to block an address.

levino
Sr. Member
****
Offline Offline

Activity: 362
Merit: 250


View Profile WWW
March 13, 2015, 12:51:35 PM
 #33

is there a way to block certain ip in bitcoin.conf file?

You really want to use iptables (assuming you are on Linux and I cannot imagine why you would not be.) That way you never have to shut down the Daemon just to block an address.
What do you think of my ufw approach above? I find ufw easier to get than iptables.

BM-2cWwQnMzK9XFTjfn6jSRRJwTG8a2wooR9A
www.coyno.com - www.bitcoinage.de
laurentmt
Sr. Member
****
Offline Offline

Activity: 384
Merit: 258


View Profile
March 13, 2015, 12:56:04 PM
 #34

Good job Cryptowatch.com !

If I understand it right, the chainalysis mode of operation is for them to connect to as many nodes as possible, so if I do a transaction directly from ip A, which runs a full bitcoin core node, be it on a cable-connection or otherwise, if cainalysis is connected to the node where the tx is orginating, the ip-address of the node where the transaction was orginating is recorded within the chainalysis database.
They may also try to reproduce the experiment done by 3 researchers from the University of Luxembourg : http://arxiv.org/abs/1405.7418
If it's their mode of operation, blocking these IPs at individual node level won't be enough since information is leaked by the 8 outgoing peers.
It would require that all full nodes block these IPs. But as you've stated, that sounds like an unenforceable policy...

darlidada
Hero Member
*****
Offline Offline

Activity: 723
Merit: 503


View Profile
March 13, 2015, 01:21:28 PM
Last edit: March 13, 2015, 01:36:44 PM by darlidada
 #35

And people says we dont need an anonymous coin ? It's time for cryptonote technology to shine. its resistant to blockchain analysis. read about it here : http://en.wikipedia.org/wiki/CryptoNote or here: https://en.bitcoin.it/wiki/CryptoNote
laurentmt
Sr. Member
****
Offline Offline

Activity: 384
Merit: 258


View Profile
March 13, 2015, 01:58:23 PM
 #36

And people says we dont need an anonymous coin ? It's time for cryptonote technology to shine. its resistant to blockchain analysis. read about it here : http://en.wikipedia.org/wiki/CryptoNote or here: https://en.bitcoin.it/wiki/CryptoNote
Please, note that the "problem" discussed in this post isn't blockchain analysis per se, but network eavesdropping.
Ring signatures and stealth addresses won't help to solve this specific issue.
AdamCox9
Full Member
***
Offline Offline

Activity: 145
Merit: 112

To the moon!


View Profile WWW
March 13, 2015, 02:28:35 PM
 #37

I got one of them attached to my node: 46.105.210.37

You can see all the connections to my full-node here: http://23.253.119.84/

Buy Bitcoin!
Cryptowatch.com
Full Member
***
Offline Offline

Activity: 196
Merit: 103


View Profile WWW
March 13, 2015, 02:38:55 PM
 #38

I noticed that one of those nodes were connected to my own node, then I scanned it:

Starting Nmap 6.00 ( http://nmap.org ) at 2015-03-13 01:48 CET
Nmap scan report for 46.105.210.179
Host is up (0.065s latency).
Not shown: 996 closed ports
PORT     STATE    SERVICE
22/tcp   open     ssh
445/tcp  filtered microsoft-ds
8080/tcp open     http-proxy
8333/tcp open     unknown

Do you port scan every bitcoin node that connects to you ? Why would you do that, what were your real intentions ...

Dear primer-,

I run a node for altruistic purposes, to support the network. Here's the stats and info page: http://node.cryptowatch.com/

You can connect with any node you want to that node, and you will see there's no portscanning on your node conducted by my node.

Nmap (nmap.org) is a program that can be used manually to scan any host for open ports. When I read this thread, naturally I wanted to see if I could do some simple investigation to learn more of the nature of the party monitoring large parts of the network. As it happened, I found some public available information and shared it with the community, see my earlier posts.

My intentions are good, as I'm a big bitcoin supporter.

I hope this cleared things up. Thanks for the question.
onemorexmr
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250



View Profile
March 13, 2015, 02:41:52 PM
 #39


Dear primer-,

I run a node for altruistic purposes, to support the network. Here's the stats and info page: http://node.cryptowatch.com/

You can connect with any node you want to that node, and you will see there's no portscanning on your node conducted by my node.

Nmap (nmap.org) is a program that can be used manually to scan any host for open ports. When I read this thread, naturally I wanted to see if I could do some simple investigation to learn more of the nature of the party monitoring large parts of the network. As it happened, I found some public available information and shared it with the community, see my earlier posts.

My intentions are good, as I'm a big bitcoin supporter.

I hope this cleared things up. Thanks for the question.

imho nmapping anyone is not a problem - its like knocking on doors.
and i think i am allowed to knock on the doors of someone who enters m house (=connected to my node)

the question is what you use the data for...i have no doubt that your intentions are honest btw.

XMR || Monero || monerodice.net || xmr.to || mymonero.com || openalias.org || you think bitcoin is fungible? watch this
belcher
Sr. Member
****
Offline Offline

Activity: 261
Merit: 518


View Profile
March 13, 2015, 02:43:03 PM
 #40

If you ran bitcoind with -listen=0 these sybils would not be able to connect to you? Obviously everyone can't do this.

1HZBd22eQLgbwxjwbCtSjhoPFWxQg8rBd9
JoinMarket - CoinJoin that people will actually use.
PGP fingerprint: 0A8B 038F 5E10 CC27 89BF CFFF EF73 4EA6 77F3 1129
Pages: « 1 [2] 3 4 5 6 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!