summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorBrian Erdelyi <brian.erdelyi@gmail.com>2015-02-01 08:49:05 -0400
committerbitcoindev <bitcoindev@gnusha.org>2015-02-01 12:49:15 +0000
commit05345807cface54e17b48b92b78ab9c8093f6ac5 (patch)
tree9e81617ed2be874d7e5ef7f9436fe47d1e1c41ae
parent14b9283309c218ccc3691753483c8c9028b21eeb (diff)
downloadpi-bitcoindev-05345807cface54e17b48b92b78ab9c8093f6ac5.tar.gz
pi-bitcoindev-05345807cface54e17b48b92b78ab9c8093f6ac5.zip
Re: [Bitcoin-development] Proposal to address Bitcoin malware
-rw-r--r--11/861962c5b6d43a8d7ff8cf53614a824b53a7fd144
1 files changed, 144 insertions, 0 deletions
diff --git a/11/861962c5b6d43a8d7ff8cf53614a824b53a7fd b/11/861962c5b6d43a8d7ff8cf53614a824b53a7fd
new file mode 100644
index 000000000..328d14287
--- /dev/null
+++ b/11/861962c5b6d43a8d7ff8cf53614a824b53a7fd
@@ -0,0 +1,144 @@
+Received: from sog-mx-2.v43.ch3.sourceforge.com ([172.29.43.192]
+ helo=mx.sourceforge.net)
+ by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
+ (envelope-from <brian.erdelyi@gmail.com>) id 1YHtxj-0003nb-9s
+ for bitcoin-development@lists.sourceforge.net;
+ Sun, 01 Feb 2015 12:49:15 +0000
+Received-SPF: pass (sog-mx-2.v43.ch3.sourceforge.com: domain of gmail.com
+ designates 209.85.192.45 as permitted sender)
+ client-ip=209.85.192.45; envelope-from=brian.erdelyi@gmail.com;
+ helo=mail-qg0-f45.google.com;
+Received: from mail-qg0-f45.google.com ([209.85.192.45])
+ by sog-mx-2.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
+ (Exim 4.76) id 1YHtxh-000149-J4
+ for bitcoin-development@lists.sourceforge.net;
+ Sun, 01 Feb 2015 12:49:15 +0000
+Received: by mail-qg0-f45.google.com with SMTP id q107so44152053qgd.4
+ for <bitcoin-development@lists.sourceforge.net>;
+ Sun, 01 Feb 2015 04:49:08 -0800 (PST)
+X-Received: by 10.229.174.70 with SMTP id s6mr31330482qcz.7.1422794948175;
+ Sun, 01 Feb 2015 04:49:08 -0800 (PST)
+Received: from [192.168.1.58] ([64.147.83.112])
+ by mx.google.com with ESMTPSA id 78sm15383899qgi.38.2015.02.01.04.49.06
+ (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128);
+ Sun, 01 Feb 2015 04:49:07 -0800 (PST)
+Content-Type: multipart/alternative;
+ boundary="Apple-Mail=_9DC5231B-226F-4B81-9007-F1D7B91A1D6C"
+Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2070.6\))
+From: Brian Erdelyi <brian.erdelyi@gmail.com>
+In-Reply-To: <CAAt2M1-b7ByF0yVSmwD_nj3uUSo5GFOmH860n1k6oKX_sqvEkw@mail.gmail.com>
+Date: Sun, 1 Feb 2015 08:49:05 -0400
+Message-Id: <88211D58-DE9D-4B4A-B3A5-2EEFDFC5E02B@gmail.com>
+References: <27395C55-CF59-4E65-83CA-73F903272C5F@gmail.com>
+ <CAAt2M18kRgJeNGu9GeKabRpTKPX9rVeoYiKoanz99bmV2jaf4w@mail.gmail.com>
+ <1348028F-26F8-42CB-9859-C9CB751BF0C9@gmail.com>
+ <CAAt2M1_3BdKQTVxsN7Hc-W=q0_NWyhBg1UAuSwxRQ8BePDa-8g@mail.gmail.com>
+ <CAAt2M1-b7ByF0yVSmwD_nj3uUSo5GFOmH860n1k6oKX_sqvEkw@mail.gmail.com>
+To: Natanael <natanael.l@gmail.com>
+X-Mailer: Apple Mail (2.2070.6)
+X-Spam-Score: -0.6 (/)
+X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
+ See http://spamassassin.org/tag/ for more details.
+ -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
+ sender-domain
+ 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
+ (brian.erdelyi[at]gmail.com)
+ -0.0 SPF_PASS SPF: sender matches SPF record
+ 1.0 HTML_MESSAGE BODY: HTML included in message
+ -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from
+ author's domain
+ 0.1 DKIM_SIGNED Message has a DKIM or DK signature,
+ not necessarily valid
+ -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
+X-Headers-End: 1YHtxh-000149-J4
+Cc: bitcoin-development@lists.sourceforge.net
+Subject: Re: [Bitcoin-development] Proposal to address Bitcoin malware
+X-BeenThere: bitcoin-development@lists.sourceforge.net
+X-Mailman-Version: 2.1.9
+Precedence: list
+List-Id: <bitcoin-development.lists.sourceforge.net>
+List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
+List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
+List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
+List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
+List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
+X-List-Received-Date: Sun, 01 Feb 2015 12:49:15 -0000
+
+
+--Apple-Mail=_9DC5231B-226F-4B81-9007-F1D7B91A1D6C
+Content-Transfer-Encoding: quoted-printable
+Content-Type: text/plain;
+ charset=utf-8
+
+
+In online banking, the banks generate account numbers. An attacker =
+cannot generate their own account number and the likelihood of an =
+attacker having the same account number that I am trying to transfer =
+funds to is low and this is why OCRA is effective with online banking.
+
+With Bitcoin, the Bitcoin address is comparable to the recipient=E2=80=99s=
+ bank account number. I now see how an an attacker can brute force the =
+bitcoin address with vanitygen. Is there any way to generate an 8 digit =
+number from the bitcoin address that can be used to verify transactions =
+in such a way (possibly with hashing?) that brute forcing a bitcoin =
+address would take longer than a reasonable period of time (say 60 =
+seconds) so a system could time out if a transaction was not completed =
+in that time?
+
+I=E2=80=99ve also looked into BIP70 (Payment Protocol) that claims =
+protection against man-in-the-middle/man-in-the-browser (MitB) based =
+attacks. A common way to protect against this is with out-of-band =
+transaction verification =
+(http://en.wikipedia.org/wiki/Man-in-the-browser#Out-of-band_transaction_v=
+erification =
+<http://en.wikipedia.org/wiki/Man-in-the-browser#Out-of-band_transaction_v=
+erification>). I see how BIP 70 verifies the payment request, however, =
+is there any way to verify that the transaction signed by the wallet =
+matches the request before it is sent to the blockchain (and how can =
+this support out of band verification)? Perhaps this is something that =
+can only be supported when sending money with web based wallets.
+
+Brian Erdelyi=
+
+--Apple-Mail=_9DC5231B-226F-4B81-9007-F1D7B91A1D6C
+Content-Transfer-Encoding: quoted-printable
+Content-Type: text/html;
+ charset=utf-8
+
+<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
+charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
+-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
+class=3D""><div class=3D""><br class=3D""></div><div class=3D"">In =
+online banking, the banks generate account numbers. &nbsp;An attacker =
+cannot generate their own account number and the likelihood of an =
+attacker having the same account number that I am trying to transfer =
+funds to is low and this is why OCRA is effective with online =
+banking.</div><div class=3D""><br class=3D""></div><div class=3D"">With =
+Bitcoin, the Bitcoin address is comparable to the recipient=E2=80=99s =
+bank account number. &nbsp; I now see how an an attacker can brute force =
+the bitcoin address with vanitygen. &nbsp;Is there any way to generate =
+an 8 digit number from the bitcoin address that can be used to verify =
+transactions in such a way (possibly with hashing?) that brute forcing a =
+bitcoin address would take longer than a reasonable period of time (say =
+60 seconds) so a system could time out if a transaction was not =
+completed in that time?</div><div class=3D""><br class=3D""></div><div =
+class=3D"">I=E2=80=99ve also looked into BIP70 (Payment Protocol) that =
+claims protection against man-in-the-middle/man-in-the-browser (MitB) =
+based attacks. &nbsp;A common way to protect against this is with =
+out-of-band transaction verification (<a =
+href=3D"http://en.wikipedia.org/wiki/Man-in-the-browser#Out-of-band_transa=
+ction_verification" =
+class=3D"">http://en.wikipedia.org/wiki/Man-in-the-browser#Out-of-band_tra=
+nsaction_verification</a>). &nbsp;I see how BIP 70 verifies the payment =
+request, however, is there any way to verify that the transaction signed =
+by the wallet matches the request before it is sent to the blockchain =
+(and how can this support out of band verification)? &nbsp;Perhaps this =
+is something that can only be supported when sending money with web =
+based wallets.</div><div class=3D""><br class=3D""></div><div =
+class=3D"">Brian Erdelyi</div></body></html>=
+
+--Apple-Mail=_9DC5231B-226F-4B81-9007-F1D7B91A1D6C--
+
+