summaryrefslogtreecommitdiff
path: root/89/ada30de1077501ceb9ba47b707c4911f75455d
blob: 21eb41fb3e4f2464c882f4f4eb3689c8d9d78e22 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
	helo=mx.sourceforge.net)
	by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <drak@zikula.org>) id 1Vpjqd-0007rT-1o
	for bitcoin-development@lists.sourceforge.net;
	Sun, 08 Dec 2013 19:16:59 +0000
Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of zikula.org
	designates 74.125.82.169 as permitted sender)
	client-ip=74.125.82.169; envelope-from=drak@zikula.org;
	helo=mail-we0-f169.google.com; 
Received: from mail-we0-f169.google.com ([74.125.82.169])
	by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1Vpjqb-00036U-Lr
	for bitcoin-development@lists.sourceforge.net;
	Sun, 08 Dec 2013 19:16:58 +0000
Received: by mail-we0-f169.google.com with SMTP id w61so2635682wes.0
	for <bitcoin-development@lists.sourceforge.net>;
	Sun, 08 Dec 2013 11:16:51 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:mime-version:in-reply-to:references:from:date
	:message-id:subject:to:cc:content-type;
	bh=u1REQH8xnPdiv9nnP2Raoar2G+4y8hBrAPj24TJ0LTc=;
	b=j2fjlkis3VkMxtSIcxycaR0ZoimK/bjXao1Y0NH/PYMgGwnTgZbqSeoOK09LvUrbgX
	LhopDttG9yQeWdLtxSSpsQSnt3g3tzLwMJLFeXS5ZESum0IeErbx51/ERluOqb845YTn
	OUrpX5x9YUhUGmatw7FoGGZoY6bxFEtLG5POfWlDxGWMheXjuBOMOwa5vYQUp+QbQ0mi
	IPkO1VJXnZvK0vROSZDKUdolFIz1MX6CH9v5q+TaMMwVYw+cjWPek9qjehSqgSwl/DIA
	K2v11LBgdAxsms0nMtErYMm39KQ+3Y2NPL5KB3TyQ3j7CJBaXlgS5EEHJfMOYY2TYLR3
	bSiw==
X-Gm-Message-State: ALoCoQnhotx5VkBnu/siVd3JtVdyv7vG5Z5DZj/31GPdhDSihRk9EUofnO3bLWg7O2Op2jc5MFeZ
X-Received: by 10.194.236.199 with SMTP id uw7mr2739481wjc.63.1386530211418;
	Sun, 08 Dec 2013 11:16:51 -0800 (PST)
MIME-Version: 1.0
Received: by 10.194.93.105 with HTTP; Sun, 8 Dec 2013 11:16:31 -0800 (PST)
In-Reply-To: <201312081237.24473.luke@dashjr.org>
References: <52A3C8A5.7010606@gmail.com>
	<1795f3067ba3fcdd0caf978cc59ff024.squirrel@fruiteater.riseup.net>
	<52A435EA.7090405@gmail.com> <201312081237.24473.luke@dashjr.org>
From: Drak <drak@zikula.org>
Date: Sun, 8 Dec 2013 19:16:31 +0000
Message-ID: <CANAnSg2OrmQAcZ+cZdtQeADicH3U29QOgYPfP1AQhOMP6+P1wg@mail.gmail.com>
To: Luke-Jr <luke@dashjr.org>
Content-Type: multipart/alternative; boundary=089e01493e44b8f1f504ed0ab856
X-Spam-Score: -0.5 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
	sender-domain
	-0.0 SPF_PASS               SPF: sender matches SPF record
	0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked.
	See
	http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block
	for more information. [URIs: dashjr.org]
	1.0 HTML_MESSAGE           BODY: HTML included in message
X-Headers-End: 1Vpjqb-00036U-Lr
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Dedicated server for bitcoin.org,
	your thoughts?
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Sun, 08 Dec 2013 19:16:59 -0000

--089e01493e44b8f1f504ed0ab856
Content-Type: text/plain; charset=UTF-8

On 8 December 2013 12:37, Luke-Jr <luke@dashjr.org> wrote:

> Encryption is useless here. We want everyone to be able to download Bitcoin
> clients. Binaries on sourceforge are signed by multiple parties using
> gitian.
>
> > Decentralization:
> > So long as we actually use DNS, the website is centralized :( However,
> > its content isn't (can be forked on GitHub), but regarding the domain
> > name, there is not much we can do against this AFAIK.
>
> So long as someone has root (or a user that can modify it), the website is
> centralised. To really solve this, we would need a dedicated server that
> accepts commands only when signed by N-of-M parties, inside a cage locked
> by
> padlocks with keys held by independent parties, with a SSL certificate
> issued
> by an authority that has multiple parties watch it every step of the way
> into
> that server.


Malicious actors with root access to the server is another issue entirely.
Sure it's a problem, but it is not an argument not to have a properly
signed SSL certificate.

With out one, the exploit can be performed on routers to redirect traffic
through a third party alter the content of the site (like the links on
bitcoin.org to various wallet projects) and then onto the correct
destination. SSL at least mitigates that. For example it would be trivial
to impersonate Electrum's site or whatever, "change" the link on the fly
that appears on the trusted source bitcoin.org via BGP redirection. Now
users will be directed to the scammers site which could be identical except
for domain name and of course malicious binaries.

BGP redirection is a reality and can be exploited without much
expense/effort. MITM is a real world threat, not some theoretical
possibility - reports show it's happening on an unprecedented scale. SSL is
essential - that's a no-brainer. Sure other measures are important, but
without SSL there is almost no point to any of the other options.

SSL is so considered so important that the *HTTP 2.0 spec might be SSL
only*according to recent discussions at the W3C (
http://lists.w3.org/Archives/Public/ietf-http-wg/2013OctDec/0625.html).

Drak

--089e01493e44b8f1f504ed0ab856
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra"><div class=3D"gmail_quote">On 8=
 December 2013 12:37, Luke-Jr <span dir=3D"ltr">&lt;<a href=3D"mailto:luke@=
dashjr.org" target=3D"_blank">luke@dashjr.org</a>&gt;</span> wrote:<br><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left=
-width:1px;border-left-color:rgb(204,204,204);border-left-style:solid;paddi=
ng-left:1ex">


<div><span style=3D"color:rgb(34,34,34)">Encryption is useless here. We wan=
t everyone to be able to download Bitcoin</span><br></div>
clients. Binaries on sourceforge are signed by multiple parties using gitia=
n.<br>
<div><br>
&gt; Decentralization:<br>
&gt; So long as we actually use DNS, the website is centralized :( However,=
<br>
&gt; its content isn&#39;t (can be forked on GitHub), but regarding the dom=
ain<br>
&gt; name, there is not much we can do against this AFAIK.<br>
<br>
</div>So long as someone has root (or a user that can modify it), the websi=
te is<br>
centralised. To really solve this, we would need a dedicated server that<br=
>
accepts commands only when signed by N-of-M parties, inside a cage locked b=
y<br>
padlocks with keys held by independent parties, with a SSL certificate issu=
ed<br>
by an authority that has multiple parties watch it every step of the way in=
to<br>
that server.</blockquote><div><br></div><div>Malicious actors with root acc=
ess to the server is another issue entirely. Sure it&#39;s a problem, but i=
t is not an argument not to have a properly signed SSL certificate.</div>

<div><br></div><div>With out one, the exploit can be performed on routers t=
o redirect traffic through a third party alter the content of the site (lik=
e the links on <a href=3D"http://bitcoin.org" target=3D"_blank">bitcoin.org=
</a> to various wallet projects) and then onto the correct destination. SSL=
 at least mitigates that. For example it would be trivial to impersonate El=
ectrum&#39;s site or whatever, &quot;change&quot; the link on the fly that =
appears on the trusted source <a href=3D"http://bitcoin.org" target=3D"_bla=
nk">bitcoin.org</a> via BGP redirection. Now users will be directed to the =
scammers site which could be identical except for domain name and of course=
 malicious binaries.=C2=A0</div>


<div><br></div><div>BGP redirection is a reality and can be exploited witho=
ut much expense/effort. MITM is a real world threat, not some theoretical p=
ossibility - reports show it&#39;s happening on an unprecedented scale. SSL=
 is essential - that&#39;s a no-brainer. Sure other measures are important,=
 but without SSL there is almost no point to any of the other options.</div=
>

<div><br></div><div>SSL is so considered so important that the <u>HTTP 2.0 =
spec might be SSL only</u> according to recent discussions at the W3C (<a h=
ref=3D"http://lists.w3.org/Archives/Public/ietf-http-wg/2013OctDec/0625.htm=
l">http://lists.w3.org/Archives/Public/ietf-http-wg/2013OctDec/0625.html</a=
>).</div>

<div><br></div><div>
Drak<br></div><div>=C2=A0</div></div></div></div>

--089e01493e44b8f1f504ed0ab856--