1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
|
Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191]
helo=mx.sourceforge.net)
by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
(envelope-from <info@AndySchroder.com>) id 1XgEd8-0004ji-Ia
for bitcoin-development@lists.sourceforge.net;
Mon, 20 Oct 2014 15:12:18 +0000
X-ACL-Warn:
Received: from uschroder.com ([74.142.93.202])
by sog-mx-1.v43.ch3.sourceforge.com with esmtp (Exim 4.76)
id 1XgEd5-0002vG-Dg for bitcoin-development@lists.sourceforge.net;
Mon, 20 Oct 2014 15:12:18 +0000
Received: from [192.168.253.4] (cpe-74-139-170-82.swo.res.rr.com
[74.139.170.82])
by uschroder.com (Postfix) with ESMTPSA id 4FDF62295C9A6;
Mon, 20 Oct 2014 11:12:09 -0400 (EDT)
Message-ID: <54452648.8040409@AndySchroder.com>
Date: Mon, 20 Oct 2014 11:12:08 -0400
From: Andy Schroder <info@AndySchroder.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64;
rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: Mike Hearn <mike@plan99.net>
References: <544174F8.1050208@AndySchroder.com>
<CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmail.com>
In-Reply-To: <CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmail.com>
X-Enigmail-Version: 1.6
OpenPGP: id=2D44186B;
url=http://andyschroder.com/static/AndySchroder.asc
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="NGn5USirRDK5SrTc10hCsBXFcLxEDmV1u"
X-Spam-Score: 1.0 (+)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
See http://spamassassin.org/tag/ for more details.
1.0 HTML_MESSAGE BODY: HTML included in message
X-Headers-End: 1XgEd5-0002vG-Dg
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>,
Andreas Schildbach <andreas@schildbach.de>
Subject: Re: [Bitcoin-development] Two Proposed BIPs - Bluetooth
Communication and bitcoin: URI Scheme Improvements
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Mon, 20 Oct 2014 15:12:18 -0000
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--NGn5USirRDK5SrTc10hCsBXFcLxEDmV1u
Content-Type: multipart/alternative;
boundary="------------010608070102050309080509"
This is a multi-part message in MIME format.
--------------010608070102050309080509
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable
Hello Mike,
Thanks for the feedback. I have indicated some replies below...
Andy Schroder
On 10/20/2014 08:50 AM, Mike Hearn wrote:
> Hey Andy,
>
> Thanks for starting this discussion!
>
> One thing this brings up is the never-resolved issue of whether BIPs=20
> should document how we'd /like/ things to work, or how things=20
> /actually do/ work. BIP32 is an example of the former - it was new=20
> technology and the spec was finalised before any wallets actually=20
> implemented it. BIP 44 is an example of the latter, it basically=20
> documents how myTREZOR works and as such there was minimal or no scope =
> for changes to it. Of course both kinds of document are valuable.
>
> Currently these specs document how Andreas' app already works. Whilst=20
> preserving compatibility with existing Android apps is surely useful,=20
> having a well designed protocol is also good. The current protocol has =
> several problems. I don't know which is more important right now and=20
> don't have a strong opinion on that. My gut feeling is that these=20
> documents should possibly be just wiki pages on Andreas' github. Then=20
> if the protocol is brought to a point where it seems pretty good,=20
> maybe it can be BIPped at that point. Alternatively, if developers of=20
> other wallet apps feel they'd like a BIP right now even in the current =
> state, that would be a very important data point.
Whatever you all want to do here is fine with me. I am new to this=20
process, so I have no preference. The payment_url portion is not=20
actually part of "Bitcoin Wallet" yet though.
>
> Re: the actual specs:
>
> * There may seem to be some inconsistency in the connection
> header messages
>
> IMHO we could live with that. Although Android apps are updatable,=20
> perfect header format is probably not worth the inevitable hassle and=20
> transition period that would result.
That's kind of what Schildbach and I were thinking so it is why we left=20
the proposed spec defined as his app currently functions.
> * The current method uses an unauthenticated bluetooth
> connection for bluetooth 2.1
>
> This on the other hand is not excellent. This is actually my fault -=20
> the first Bluetooth support in Bitcoin Wallet for Android was written=20
> by me in a frantic Berlin hackathon over a weekend. We barely got it=20
> working at all by the end, so doing encryption/auth was out of the=20
> question. Then I went back to more important tasks and what got=20
> shipped was a cleaned up/robustified version of that.
>
> Re: hash. I'm not a fan of this approach. For one, in future there=20
> might not even BE a uri involved, e.g. consider the Square style UX=20
> where the merchant is broadcasting an endpoint via BLE and the phone=20
> just automagically connects, sees a trusted merchant and pays. Super=20
> slick, we definitely want it - but no URI. Then of course there's the=20
> usual QR code size limitations.
"Bitcoin Wallet" currently does a similar thing by submitting a payment=20
request via NFC and skipping the bitcoin URI. This works just fine in=20
conjunction with bitcoin: URI support. I'm not doing it this way on my=20
fuel pump (still submitting a bitcoin: URI), because I don't think any=20
other wallets (other than "Bitcoin Wallet" derivatives) support such a=20
feature and because I'm not sure if signed payment requests can be=20
transmitted over NFC well because the message may be too large when the=20
certificate chain is included.
My point is, you can have both and if you are going to it doesn't hurt=20
to include the h=3D parameter for cases when a bitcoin: URI will still be=
=20
used.
>
> Encrypting/authing the connection at the app layer does not have to be =
> difficult. What we really need/want, is a simple lightweight library=20
> that does an ECDH key agreement using secp256k1, and then does=20
> AES+HMAC on framed messages. Such a protocol would be useful not only=20
> for this use case, but perhaps for encrypting/authing the p2p protocol =
> in future as well.
I'm not a cryptography expert, but why not just wrap the bluetooth=20
connection with SSL and not reimplement ECDH? Is this hard to do with=20
android/java?
>
> Once the encrypted connection is set up above the Bluetooth layer, the =
> payment protocol request can then be signed either with a regular=20
> Bitcoin key that was in the Bitcoin URI as the payment address (when a =
> URI is available), thus linking the request to the URI without adding=20
> any additional data by doubling up the backwards compatibility=20
> support. Or if there's no URI, then of course, the payment request=20
> must be PKI signed and the signed PaymentDetails structure can contain =
> a copy of the public key that was used to set up the connection, thus=20
> binding the connection to a PKI identity and ensuring you're not=20
> talking to a MITM.
This sounds great, but I thought it is not desired to divulge a bitcoin=20
public key until the time of signing a transaction. Isn't that the whole =
point of having a public key hash and never reusing addresses? This=20
could be resolved by the payee immediately sending the payment to=20
another address after receiving it, but that is kind of a waste of a=20
transaction. Also, I would love a less PKI dependent way to authenticate =
a transaction between the two parties, but I was trying to minimize the=20
discussion of general payment protocol modifications in this announcement=
=2E
>
> I suspect that this is not anywhere near as hard to implement as one=20
> might think. ECDH is not a complex protocol. You certainly don't need=20
> full blown HTTPS involved.
>
> * There is no acknowledgement failure message possible in the
> payment protocol, only an acknowledgement message or lack of
> acknowledgement message. This issue seems to be a concern and
> as a result, the memo field is used to send an "ack" or "nack"
> in Schildbach's wallet. Can we add a boolean status field to
> the payment acknowledgement message?
>
> Ugh. I did want a way to indicate failure when we designed BIP70, but=20
> I can't remember why one wasn't included in the final spec. I think we =
> decided the containing protocol could do this instead (normally HTTP).
>
> Abusing the memo field is definitely the wrong thing to do! Rather the =
> Bluetooth specific encapsulation protocol should have a notion of failu=
re.
We can do something like this, I guess. The issue I mentioned about the=20
message headers being inconsistent will have to be fixed though to to do =
this. However, is anyone even using the HTTP base failure signal (I=20
don't even know what it is)? What about when new protocols other than=20
bluetooth are created? I'm just wondering if it's better to have more=20
functionality defined at the payment protocol level so that developers=20
have to learn less nuances about each particular protocol they are=20
implementing the payment protocol over. The other thing is what if you=20
want to indicate a failure, and a reason for that failure?
> * I'd personally like a new optional boolean field added to the
> "PaymentDetails" portion of the "PaymentRequest" to allow for
> the payer's wallet to match the "Output" optional "amount"
> fields as a total amount of all Outputs, rather than requiring
> the amount for each output to be matched exactly.
>
> Extending BIP70 with more negotiable privacy features is a different=20
> effort, let's not discuss that as part of Bluetooth support.
Understood, I was just throwing this thought out there, but do realize=20
it is a separate discussion.
>
> Besides, no wallet uses even the existing support for merge avoidance=20
> in BIP70. In fact Andreas' wallet is one of the blocking factors here=20
> because it violates the specs by requiring the BIP70 request to have=20
> only a single output that matches the address specified in the URI.=20
> All because he doesn't trust HTTPS :(
To be clear, the way I am currently implementing my fuel pump, I am=20
specifying 4 payment addresses with no amount requirement and a h=3D=20
parameter, and Schildbach's wallet does accept the payment request, but=20
only chooses to use the first payment address (this may have something=20
to do with the unspent outputs on my phone though). I believe=20
Schildbach's wallet still works if multiple addresses are defined and=20
multiple amounts, however, I'm not currently submitting payment requests =
this way because of the merge avoidance constraints mentioned below.
I don't trust HTTPS for a number of reasons. First off, it is way to=20
easy to get a signed certificate with no real validation by the=20
certificate signer. Second, the current PKI is a target for manipulation =
by surveillance organizations because there are too few parties=20
involved. Third, even if you have a signed certificate that is really=20
owned by the person they say it is, it's not easy for a payer to quickly =
verify the signer is really the correct one because retailers can=20
contract out their payment process to another party, have a central=20
office, subsidiary, or be doing business under a name that is not=20
necessarily their legal company name. Even if we replace the PKI with=20
something more distributed like namecoin, the third option is still=20
going to be an issue, which warrants the need for the h=3D parameter.
>
> I don't think adding even more privacy stuff to BIP70 makes any sense=20
> until we have implementations that actually exploit the existing=20
> support. And to get there, we must fix Andreas' wallet so it doesn't=20
> violate the specs anymore. Sorry Andreas. I know we argue about this=20
> all the time, but it's really a big problem that your app doesn't obey =
> the specs. It makes everyone reluctant to use new BIP70 features,=20
> because they feel a need to test with every possible wallet app in=20
> case one of them has simply decided to do their own thing and become=20
> deliberately incompatible. And then why bother, there are more=20
> important things to do.
I don't totally understand the background of what you are talking about=20
here, but I think the h=3D parameter may designed to address the issues=20
Schildbach has complying with the spec as you mention.
> * Amount of data stored in QR codes may be getting large when a
> backwards compatible URL is used (for wallets that don't
> support the payment protocol) and can be difficult to scan
> with outdoor screens that have an extra weather resistant pane
> when in direct sunlight.
>
> MAC addresses could be encoded more efficiently, of course, but it=20
> seems unlikely that address-less URIs can be relied upon any time soon =
> - and besides if the URI needs to bind to an authenticated channel=20
> because PKI signing is not in use, then it makes sense to use that=20
> part of the URI to do so.
PKI is not in use for "Bitcoin Wallet" for providing payment request,=20
but it is in use in my fuel dispenser that was demonstrated in the=20
video. Actually, I should have clarified in my announcement that=20
"Bitcoin Wallet" only allows for bluetooth incoming connections for=20
submitting payment, not providing payment requests. Since the payment=20
request is unsigned and small, it can just be submitted via NFC (as I=20
have mentioned above), and bluetooth isn't really needed. Andreas does=20
have a branch that supports this but it is not included in the master=20
distribution branch. The primary reason he does not have this in the=20
master branch is because the payment protocol only supports signing of=20
payment requests via PKI, and it is difficult for a user to install a=20
PKI signed certificate on android, just for a single peer to peer use=20
case. I think for now he just uses that branch to test his functionality =
for fetching bluetooth payment requests from devices like mine (although =
I'm not aware of any other devices that actually exist right now).
> * The number of offline transactions of a wallet is limited to
> the known unspent outputs when they go offline. Long term, I'd
> like to see wallet devices that can use systems such as
> Kryptoradio's DVB-T based broadcast (but this will need yet
> another radio!).
>
> Given that all interesting mobile devices have sophisticated internet=20
> access radios of various forms, I doubt it's worth putting much effort =
> in here. Bluetooth for submitting payments makes sense some of the=20
> time, partly for performance and partly because it's more=20
> decentralised than looping in an intermediary HTTPS server to=20
> temporarily host a BIP70 request file. I don't think we should try and =
> invent an entirely new "block chain internet" though. At any rate,=20
> it's a separate effort.
It is a separate effort, but I was mentioning it because it is related.=20
Your comment "Given that all interesting mobile devices have=20
sophisticated internet access radios of various forms, I doubt it's=20
worth putting much effort in here" makes me believe that you don't=20
understand the need for this. If you are to provide a full fledged wifi=20
connection to the customer, there would then have to be a very=20
sophisticated proxy server that can allow only access to bitcoin nodes,=20
and how to do that would be difficult since every node doesn't know all=20
of the nodes in the network. You'd also have to be able to make the=20
customer's phone automatically connect and disconnect from this service=20
without leaving a saved access point name in their wifi access point=20
list (otherwise you will have a bunch of them accumulate that you don't=20
care about). Having dedicated blockchain access is going to be a=20
necessity: everyone doesn't want a cellular internet plan, they can't=20
always afford it, and it isn't always available, and as I just=20
explained, wifi is currently a cumbersome solution to this problem.
> * The additional payment_url approach is a bit sloppy of a
> solution in the PaymentDetails portion of the PaymentRequest.
>
> This is only an issue because of the way you define the hashing=20
> mechanism. If you reuse the backwards compatibility address, then the=20
> payment_url can of course be customised based on whatever transport=20
> mechanism the request was fetched over. There is no longer any need to =
> have the payment request be created (and presumably stored) the moment =
> the QR code is generated. Besides, that approach has all kinds of=20
> messy implementation problems. You don't know the QR code will=20
> /ever/ be scanned, but you must have the exact payment request at the=20
> time the QR code is generated. Payment requests expire, so you have to =
> define some kind of timeout at which point the QR code itself becomes=20
> invalid. Urgh.
>
> Much better to have the PaymentRequest formatted and signed on demand, =
> once the URI is being resolved. But that means you have to abandon the =
> h=3D mechanism.
All this was already known but was not proposed because it does not=20
allow you to use the h=3D parameter. What do you propose to do instead of=
=20
the h=3D parameter, but still allow for a trust anchor with the payee=20
still be maintained? Another option is to do the hashing to the payment=20
request before the payment_url is added to the payment request, however, =
this then can allow a hacker to change the payment_url.
--------------010608070102050309080509
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
<html>
<head>
<meta content=3D"text/html; charset=3DISO-8859-1"
http-equiv=3D"Content-Type">
</head>
<body bgcolor=3D"#FFFFFF" text=3D"#000000">
<div class=3D"moz-cite-prefix">Hello Mike,<br>
<br>
Thanks for the feedback. I have indicated some replies below...<br>=
<br>
<pre class=3D"moz-signature" cols=3D"72">Andy Schroder</pre>
On 10/20/2014 08:50 AM, Mike Hearn wrote:<br>
</div>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">Hey Andy,
<div><br>
</div>
<div>Thanks for starting this discussion!</div>
<div><br>
</div>
<div>One thing this brings up is the never-resolved issue of
whether BIPs should document how we'd <i>like</i> things t=
o
work, or how things <i>actually do</i> work. BIP32 is an
example of the former - it was new technology and the spec was
finalised before any wallets actually implemented it. BIP 44
is an example of the latter, it basically documents how
myTREZOR works and as such there was minimal or no scope for
changes to it. Of course both kinds of document are valuable.</=
div>
<div><br>
</div>
<div>Currently these specs document how Andreas' app already
works. Whilst preserving compatibility with existing Android
apps is surely useful, having a well designed protocol is also
good. The current protocol has several problems. I don't know
which is more important right now and don't have a strong
opinion on that. My gut feeling is that these documents should
possibly be just wiki pages on Andreas' github. Then if the
protocol is brought to a point where it seems pretty good,
maybe it can be BIPped at that point. Alternatively, if
developers of other wallet apps feel they'd like a BIP right
now even in the current state, that would be a very important
data point.</div>
</div>
</blockquote>
<br>
<br>
Whatever you all want to do here is fine with me. I am new to this
process, so I have no preference. The payment_url portion is not
actually part of "Bitcoin Wallet" yet though.<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div><br>
</div>
<div>Re: the actual specs:</div>
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>There may seem to be some inconsistency in the
connection header messages </li>
</ul>
</div>
</blockquote>
<div>IMHO we could live with that. Although Android apps are
updatable, perfect header format is probably not worth the
inevitable hassle and transition period that would result.<=
/div>
</div>
</div>
</div>
</blockquote>
<br>
That's kind of what Schildbach and I were thinking so it is why we
left the proposed spec defined as his app currently functions. <br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>The current method uses an unauthenticated
bluetooth connection for bluetooth 2.1</li>
</ul>
</div>
</blockquote>
<div>This on the other hand is not excellent. This is
actually my fault - the first Bluetooth support in Bitcoin
Wallet for Android was written by me in a frantic Berlin
hackathon over a weekend. We barely got it working at all
by the end, so doing encryption/auth was out of the
question. Then I went back to more important tasks and
what got shipped was a cleaned up/robustified version of
that.</div>
<div><br>
</div>
<div>Re: hash. I'm not a fan of this approach. For one, in
future there might not even BE a uri involved, e.g.
consider the Square style UX where the merchant is
broadcasting an endpoint via BLE and the phone just
automagically connects, sees a trusted merchant and pays.
Super slick, we definitely want it - but no URI. Then of
course there's the usual QR code size limitations.</div>
</div>
</div>
</div>
</blockquote>
<br>
<br>
"Bitcoin Wallet" currently does a similar thing by submitting a
payment request via NFC and skipping the bitcoin URI. This works
just fine in conjunction with bitcoin: URI support. I'm not doing it
this way on my fuel pump (still submitting a bitcoin: URI), because
I don't think any other wallets (other than "Bitcoin Wallet"
derivatives) support such a feature and because I'm not sure if
signed payment requests can be transmitted over NFC well because the
message may be too large when the certificate chain is included.<br>
<br>
My point is, you can have both and if you are going to it doesn't
hurt to include the h=3D parameter for cases when a bitcoin: URI will=
still be used.<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<div><br>
</div>
<div>Encrypting/authing the connection at the app layer does
not have to be difficult. What we really need/want, is a
simple lightweight library that does an ECDH key agreement
using secp256k1, and then does AES+HMAC on framed
messages. Such a protocol would be useful not only for
this use case, but perhaps for encrypting/authing the p2p
protocol in future as well.</div>
</div>
</div>
</div>
</blockquote>
<br>
I'm not a cryptography expert, but why not just wrap the bluetooth
connection with SSL and not reimplement ECDH? Is this hard to do
with android/java?<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<div><br>
</div>
<div>Once the encrypted connection is set up above the
Bluetooth layer, the payment protocol request can then be
signed either with a regular Bitcoin key that was in the
Bitcoin URI as the payment address (when a URI is
available), thus linking the request to the URI without
adding any additional data by doubling up the backwards
compatibility support. Or if there's no URI, then of
course, the payment request must be PKI signed and the
signed PaymentDetails structure can contain a copy of the
public key that was used to set up the connection, thus
binding the connection to a PKI identity and ensuring
you're not talking to a MITM.</div>
</div>
</div>
</div>
</blockquote>
<br>
This sounds great, but I thought it is not desired to divulge a
bitcoin public key until the time of signing a transaction. Isn't
that the whole point of having a public key hash and never reusing
addresses? This could be resolved by the payee immediately sending
the payment to another address after receiving it, but that is kind
of a waste of a transaction. Also, I would love a less PKI dependent
way to authenticate a transaction between the two parties, but I was
trying to minimize the discussion of general payment protocol
modifications in this announcement.<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<div><br>
</div>
<div>I suspect that this is not anywhere near as hard to
implement as one might think. ECDH is not a complex
protocol. You certainly don't need full blown HTTPS
involved.</div>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>There is no acknowledgement failure message
possible in the payment protocol, only an
acknowledgement message or lack of acknowledgement
message. This issue seems to be a concern and as a
result, the memo field is used to send an "ack" or
"nack" in Schildbach's wallet. Can we add a boolean
status field to the payment acknowledgement message?<=
br>
</li>
</ul>
</div>
</blockquote>
<div>Ugh. I did want a way to indicate failure when we
designed BIP70, but I can't remember why one wasn't
included in the final spec. I think we decided the
containing protocol could do this instead (normally HTTP).<=
/div>
<div><br>
</div>
<div>Abusing the memo field is definitely the wrong thing to
do! Rather the Bluetooth specific encapsulation protocol
should have a notion of failure.</div>
</div>
</div>
</div>
</blockquote>
<br>
We can do something like this, I guess. The issue I mentioned about
the message headers being inconsistent will have to be fixed though
to to do this. However, is anyone even using the HTTP base failure
signal (I don't even know what it is)? What about when new protocols
other than bluetooth are created? I'm just wondering if it's better
to have more functionality defined at the payment protocol level so
that developers have to learn less nuances about each particular
protocol they are implementing the payment protocol over. The other
thing is what if you want to indicate a failure, and a reason for
that failure?<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>I'd personally like a new optional boolean field
added to the "PaymentDetails" portion of the
"PaymentRequest" to allow for the payer's wallet to
match the "Output" optional "amount" fields as a
total amount of all Outputs, rather than requiring
the amount for each output to be matched exactly.</li=
>
</ul>
</div>
</blockquote>
<div>Extending BIP70 with more negotiable privacy features
is a different effort, let's not discuss that as part of
Bluetooth support.</div>
</div>
</div>
</div>
</blockquote>
<br>
Understood, I was just throwing this thought out there, but do
realize it is a separate discussion.<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<div><br>
</div>
<div>Besides, no wallet uses even the existing support for
merge avoidance in BIP70. In fact Andreas' wallet is one
of the blocking factors here because it violates the specs
by requiring the BIP70 request to have only a single
output that matches the address specified in the URI. All
because he doesn't trust HTTPS :( <br>
</div>
</div>
</div>
</div>
</blockquote>
<br>
To be clear, the way I am currently implementing my fuel pump, I am
specifying 4 payment addresses with no amount requirement and a h=3D
parameter, and Schildbach's wallet does accept the payment request,
but only chooses to use the first payment address (this may have
something to do with the unspent outputs on my phone though). I
believe Schildbach's wallet still works if multiple addresses are
defined and multiple amounts, however, I'm not currently submitting
payment requests this way because of the merge avoidance constraints
mentioned below.<br>
<br>
I don't trust HTTPS for a number of reasons. First off, it is way to
easy to get a signed certificate with no real validation by the
certificate signer. Second, the current PKI is a target for
manipulation by surveillance organizations because there are too few
parties involved. Third, even if you have a signed certificate that
is really owned by the person they say it is, it's not easy for a
payer to quickly verify the signer is really the correct one because
retailers can contract out their payment process to another party,
have a central office, subsidiary, or be doing business under a name
that is not necessarily their legal company name. Even if we replace
the PKI with something more distributed like namecoin, the third
option is still going to be an issue, which warrants the need for
the h=3D parameter.<br>
<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<div><br>
</div>
<div>I don't think adding even more privacy stuff to BIP70
makes any sense until we have implementations that
actually exploit the existing support. And to get there,
we must fix Andreas' wallet so it doesn't violate the
specs anymore. Sorry Andreas. I know we argue about this
all the time, but it's really a big problem that your app
doesn't obey the specs. It makes everyone reluctant to use
new BIP70 features, because they feel a need to test with
every possible wallet app in case one of them has simply
decided to do their own thing and become deliberately
incompatible. And then why bother, there are more
important things to do. <br>
</div>
</div>
</div>
</div>
</blockquote>
<br>
<br>
I don't totally understand the background of what you are talking
about here, but I think the h=3D parameter may designed to address th=
e
issues Schildbach has complying with the spec as you mention.<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>Amount of data stored in QR codes may be getting
large when a backwards compatible URL is used (for
wallets that don't support the payment protocol) and
can be difficult to scan with outdoor screens that
have an extra weather resistant pane when in direct
sunlight.<br>
</li>
</ul>
</div>
</blockquote>
<div>MAC addresses could be encoded more efficiently, of
course, but it seems unlikely that address-less URIs can
be relied upon any time soon - and besides if the URI
needs to bind to an authenticated channel because PKI
signing is not in use, then it makes sense to use that
part of the URI to do so.</div>
</div>
</div>
</div>
</blockquote>
<br>
<br>
PKI is not in use for "Bitcoin Wallet" for providing payment
request, but it is in use in my fuel dispenser that was demonstrated
in the video. Actually, I should have clarified in my announcement
that "Bitcoin Wallet" only allows for bluetooth incoming connections
for submitting payment, not providing payment requests. Since the
payment request is unsigned and small, it can just be submitted via
NFC (as I have mentioned above), and bluetooth isn't really needed.
Andreas does have a branch that supports this but it is not included
in the master distribution branch. The primary reason he does not
have this in the master branch is because the payment protocol only
supports signing of payment requests via PKI, and it is difficult
for a user to install a PKI signed certificate on android, just for
a single peer to peer use case. I think for now he just uses that
branch to test his functionality for fetching bluetooth payment
requests from devices like mine (although I'm not aware of any other
devices that actually exist right now).<br>
<br>
<br>
<br>
<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li><span>The number of offline transactions of a
wallet is limited to the known unspent outputs
when they go offline. </span>Long term, I'd like
to see wallet devices that can use systems such as
Kryptoradio's DVB-T based broadcast (but this will
need yet another radio!).</li>
</ul>
</div>
</blockquote>
<div>Given that all interesting mobile devices have
sophisticated internet access radios of various forms, I
doubt it's worth putting much effort in here. Bluetooth
for submitting payments makes sense some of the time,
partly for performance and partly because it's more
decentralised than looping in an intermediary HTTPS server
to temporarily host a BIP70 request file. I don't think we
should try and invent an entirely new "block chain
internet" though. At any rate, it's a separate effort.</div=
>
</div>
</div>
</div>
</blockquote>
<br>
It is a separate effort, but I was mentioning it because it is
related. Your comment "Given that all interesting mobile devices
have sophisticated internet access radios of various forms, I doubt
it's worth putting much effort in here" makes me believe that you
don't understand the need for this. If you are to provide a full
fledged wifi connection to the customer, there would then have to be
a very sophisticated proxy server that can allow only access to
bitcoin nodes, and how to do that would be difficult since every
node doesn't know all of the nodes in the network. You'd also have
to be able to make the customer's phone automatically connect and
disconnect from this service without leaving a saved access point
name in their wifi access point list (otherwise you will have a
bunch of them accumulate that you don't care about). Having
dedicated blockchain access is going to be a necessity: everyone
doesn't want a cellular internet plan, they can't always afford it,
and it isn't always available, and as I just explained, wifi is
currently a cumbersome solution to this problem.<br>
<br>
<blockquote
cite=3D"mid:CANEZrP33KH1F8GrTDnTP95G1MyxZ+DXWrC6QKBrj61HXv-eg2w@mail.gmai=
l.com"
type=3D"cite">
<div dir=3D"ltr">
<div class=3D"gmail_extra">
<div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0
.8ex;border-left:1px #ccc solid;padding-left:1ex">
<div bgcolor=3D"#FFFFFF" text=3D"#000000">
<ul>
<li>The additional payment_url approach is a bit
sloppy of a solution in the PaymentDetails portion
of the PaymentRequest. </li>
</ul>
</div>
</blockquote>
<div>This is only an issue because of the way you define the
hashing mechanism. If you reuse the backwards
compatibility address, then the payment_url can of course
be customised based on whatever transport mechanism the
request was fetched over. There is no longer any need to
have the payment request be created (and presumably
stored) the moment the QR code is generated. Besides, that
approach has all kinds of messy implementation problems.
You don't know the QR code will <i>ever</i> be scanned=
,
but you must have the exact payment request at the time
the QR code is generated. Payment requests expire, so you
have to define some kind of timeout at which point the QR
code itself becomes invalid. Urgh.</div>
<div><br>
</div>
<div>Much better to have the PaymentRequest formatted and
signed on demand, once the URI is being resolved. But that
means you have to abandon the h=3D mechanism.</div>
</div>
</div>
</div>
</blockquote>
<br>
<br>
All this was already known but was not proposed because it does not
allow you to use the h=3D parameter. What do you propose to do instea=
d
of the h=3D parameter, but still allow for a trust anchor with the
payee still be maintained? Another option is to do the hashing to
the payment request before the payment_url is added to the payment
request, however, this then can allow a hacker to change the
payment_url.<br>
<br>
<br>
<br>
<br>
</body>
</html>
--------------010608070102050309080509--
--NGn5USirRDK5SrTc10hCsBXFcLxEDmV1u
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQEcBAEBAgAGBQJURSZIAAoJEDT679stRBhrNwsIAMvuNh1jSbsr1OzV1IY862QB
laAYz1cubtT/rKjJz7Z4QhP36agePrGgt60xvviqX78Flhgyz8mqTaDdd+s4Ar0y
0u2V7O0WXF1yv8vG4kNZ8WXSGlUH6PweYe5xyr5bi9EPCO1TJR6WF9v0ENOM5S9n
Jma1eCFRzWdT+dtFA1iNEslGTa9KiLlP3lHRSQzRz7EEgVbvNtJSpQmNmxH9OrJb
UQftm0DLire9fboVROFtnzpNDz/mXK6UlKv9HVrqr4RBoIYbzRcd3BuxeNNHCwOK
P/D8KN8UwJtObYFOjCRtCattFi0+mjH2ro9WDDuBzD/x1rCTuvHWbCpZOWtXbTQ=
=VIsY
-----END PGP SIGNATURE-----
--NGn5USirRDK5SrTc10hCsBXFcLxEDmV1u--
|