summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJean-Paul Kogelman <jeanpaulkogelman@me.com>2014-03-12 21:08:33 +0000
committerbitcoindev <bitcoindev@gnusha.org>2014-03-12 21:08:50 +0000
commit5ed31bd97c6e63d8403dea104c00d702b757688f (patch)
tree74904bb0a03c1fe4aad755adbdd3f7e246b0d0b8
parent62edc14805d64c262f32cf1a03909c8cb524c2f4 (diff)
downloadpi-bitcoindev-5ed31bd97c6e63d8403dea104c00d702b757688f.tar.gz
pi-bitcoindev-5ed31bd97c6e63d8403dea104c00d702b757688f.zip
Re: [Bitcoin-development] [RFC] Proposal: Base58 encoded HD Wallet root key with optional encryption
-rw-r--r--34/fc09d736b373ff6d51157731447db6172868cf125
1 files changed, 125 insertions, 0 deletions
diff --git a/34/fc09d736b373ff6d51157731447db6172868cf b/34/fc09d736b373ff6d51157731447db6172868cf
new file mode 100644
index 000000000..88a2abb64
--- /dev/null
+++ b/34/fc09d736b373ff6d51157731447db6172868cf
@@ -0,0 +1,125 @@
+Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193]
+ helo=mx.sourceforge.net)
+ by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
+ (envelope-from <jeanpaulkogelman@me.com>) id 1WNqOQ-00051Y-8d
+ for bitcoin-development@lists.sourceforge.net;
+ Wed, 12 Mar 2014 21:08:50 +0000
+Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of me.com
+ designates 17.172.220.237 as permitted sender)
+ client-ip=17.172.220.237; envelope-from=jeanpaulkogelman@me.com;
+ helo=st11p02mm-asmtp002.mac.com;
+Received: from st11p02mm-asmtp002.mac.com ([17.172.220.237])
+ by sog-mx-3.v43.ch3.sourceforge.com with esmtp (Exim 4.76)
+ id 1WNqOP-00059V-An for bitcoin-development@lists.sourceforge.net;
+ Wed, 12 Mar 2014 21:08:50 +0000
+Received: from st11p02mm-spool002.mac.com ([17.172.220.247])
+ by st11p02mm-asmtp002.mac.com
+ (Oracle Communications Messaging Server 7u4-27.08(7.0.4.27.7) 64bit
+ (built Aug
+ 22 2013)) with ESMTP id <0N2C00HY1DE9AL20@st11p02mm-asmtp002.mac.com>
+ for bitcoin-development@lists.sourceforge.net; Wed,
+ 12 Mar 2014 21:08:34 +0000 (GMT)
+X-Proofpoint-Virus-Version: vendor=fsecure
+ engine=2.50.10432:5.11.87,1.0.14,0.0.0000
+ definitions=2014-03-12_07:2014-03-12, 2014-03-12,
+ 1970-01-01 signatures=0
+X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
+ suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam
+ adjust=0
+ reason=mlx scancount=1 engine=7.0.1-1401130000
+ definitions=main-1403120125
+MIME-version: 1.0
+Content-type: multipart/alternative;
+ boundary="Boundary_(ID_PU1YwDCTYPlEml5P+SxP/w)"
+Received: from localhost ([17.172.220.223]) by st11p02mm-spool002.mac.com
+ (Oracle Communications Messaging Server 7u4-27.01(7.0.4.27.0) 64bit
+ (built Aug
+ 30 2012)) with ESMTP id <0N2C002EUDE9WV90@st11p02mm-spool002.mac.com>;
+ Wed, 12 Mar 2014 21:08:33 +0000 (GMT)
+To: Pavol Rusnak <stick@gk2.sk>
+From: Jean-Paul Kogelman <jeanpaulkogelman@me.com>
+Date: Wed, 12 Mar 2014 21:08:33 +0000 (GMT)
+X-Mailer: iCloud MailClient14A49 MailServer14A.15417
+X-Originating-IP: [159.153.138.53]
+Message-id: <994afcd1-798d-452a-850c-02b5ce393dd3@me.com>
+In-reply-to: <5320C27B.8090205@gk2.sk>
+X-Spam-Score: -0.5 (/)
+X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
+ See http://spamassassin.org/tag/ for more details.
+ -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
+ sender-domain
+ -0.0 SPF_PASS SPF: sender matches SPF record
+ 1.0 HTML_MESSAGE BODY: HTML included in message
+ 0.0 MIME_QP_LONG_LINE RAW: Quoted-printable line longer than 76 chars
+X-Headers-End: 1WNqOP-00059V-An
+Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
+Subject: Re: [Bitcoin-development] [RFC] Proposal: Base58 encoded HD Wallet
+ root key with optional encryption
+X-BeenThere: bitcoin-development@lists.sourceforge.net
+X-Mailman-Version: 2.1.9
+Precedence: list
+List-Id: <bitcoin-development.lists.sourceforge.net>
+List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
+List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
+List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
+List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
+List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
+X-List-Received-Date: Wed, 12 Mar 2014 21:08:50 -0000
+
+
+--Boundary_(ID_PU1YwDCTYPlEml5P+SxP/w)
+Content-type: text/plain; charset=ISO-8859-1; format=flowed
+Content-transfer-encoding: quoted-printable
+
+=0A=0AOn Mar 12, 2014, at 01:24 PM, Pavol Rusnak <stick@gk2.sk> wrote:=0A=0A=
+On 03/12/2014 09:10 PM, William Yager wrote:=0Aimplement this is to allow =
+semi-trusted devices (like desktop PCs) to do=0Aall the "heavy lifting". T=
+he way the spec is defined, it is easy to have a=0Amore powerful device do=
+ all the tough key stretching work without=0Asignificantly compromising th=
+e security of the wallet.=0A=0ABy disclosing "preH" to compromised compute=
+r (between steps 4 and 5) you=0Amake further steps 5-9 quite less importan=
+t.=0A=A0=0AAgreed, this is a valid concern. This could possibly allow a 3r=
+d party to crack the password, but then again, they would not gain access =
+to any key material. So yes, you could expose your password, but your key =
+would still be safe.=0A=0AIf people feel strongly about this vulnerability=
+, we can revisit step 4 and adjust it to make password recovery more expen=
+sive.=0A=0Ajp=
+
+--Boundary_(ID_PU1YwDCTYPlEml5P+SxP/w)
+Content-type: multipart/related;
+ boundary="Boundary_(ID_/ezT6xeHVXjD2nriQVNfSA)"; type="text/html"
+
+
+--Boundary_(ID_/ezT6xeHVXjD2nriQVNfSA)
+Content-type: text/html; CHARSET=US-ASCII
+Content-transfer-encoding: quoted-printable
+
+<html><body><div><br><br>On Mar 12, 2014, at 01:24 PM, Pavol Rusnak &lt;stick@gk2.sk&g=
+t; wrote:<br><br></div><div><blockquote type=3D"cite"><div class=3D"msg-qu=
+ote"><div class=3D"_stretch">On 03/12/2014 09:10 PM, William Yager wrote:<=
+br><blockquote class=3D"quoted-plain-text" type=3D"cite">implement this is=
+ to allow semi-trusted devices (like desktop PCs) to do</blockquote><block=
+quote class=3D"quoted-plain-text" type=3D"cite">all the "heavy lifting". T=
+he way the spec is defined, it is easy to have a</blockquote><blockquote c=
+lass=3D"quoted-plain-text" type=3D"cite">more powerful device do all the t=
+ough key stretching work without</blockquote><blockquote class=3D"quoted-p=
+lain-text" type=3D"cite">significantly compromising the security of the wa=
+llet.</blockquote><br> By disclosing "preH" to compromised computer (betwe=
+en steps 4 and 5) you<br> make further steps 5-9 quite less important.</di=
+v></div></blockquote><span>&nbsp;</span></div><div>Agreed, this is a valid=
+ concern. This could possibly allow a 3rd party to crack the password, but=
+ then again, they would not gain access to any key material. So yes, you c=
+ould expose your password, but your key would still be safe.</div><div><sp=
+an style=3D"line-height: 1.5;"><br></span></div><div><span style=3D"line-h=
+eight: 1.5;">If people feel strongly about this vulnerability, we can revi=
+sit step 4 and adjust it to make password recovery more expensive.</span><=
+/div><div><span style=3D"line-height: 1.5;"><br></span></div><div><span st=
+yle=3D"line-height: 1.5;">jp</span></div></body></html>=
+
+--Boundary_(ID_/ezT6xeHVXjD2nriQVNfSA)--
+
+--Boundary_(ID_PU1YwDCTYPlEml5P+SxP/w)--
+
+