summaryrefslogtreecommitdiff
path: root/93/81febef21da02d326e1474b8a0f137acd09c22
blob: 52152bf35fab3b28d2a912b8218eeefbfddadcb1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
	helo=mx.sourceforge.net)
	by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <luke@dashjr.org>) id 1T414Y-0005AF-Bg
	for bitcoin-development@lists.sourceforge.net;
	Wed, 22 Aug 2012 02:53:34 +0000
X-ACL-Warn: 
Received: from zinan.dashjr.org ([173.242.112.54])
	by sog-mx-4.v43.ch3.sourceforge.com with esmtp (Exim 4.76)
	id 1T414X-0001gO-IS for bitcoin-development@lists.sourceforge.net;
	Wed, 22 Aug 2012 02:53:34 +0000
Received: from ishibashi.localnet (unknown [97.96.85.141])
	(Authenticated sender: luke-jr)
	by zinan.dashjr.org (Postfix) with ESMTPSA id CE79F27A297B;
	Wed, 22 Aug 2012 02:53:27 +0000 (UTC)
From: "Luke-Jr" <luke@dashjr.org>
To: bitcoin-development@lists.sourceforge.net
Date: Wed, 22 Aug 2012 02:53:21 +0000
User-Agent: KMail/1.13.7 (Linux/3.4.5-gentoo-nestfix; KDE/4.8.3; x86_64; ; )
References: <CAOCHLotLO8eaLJV2Kkm_YEvbDb80A1VzVGuvujm6NjjGraFEsQ@mail.gmail.com>
In-Reply-To: <CAOCHLotLO8eaLJV2Kkm_YEvbDb80A1VzVGuvujm6NjjGraFEsQ@mail.gmail.com>
X-PGP-Key-Fingerprint: E463 A93F 5F31 17EE DE6C 7316 BD02 9424 21F4 889F
X-PGP-Key-ID: BD02942421F4889F
X-PGP-Keyserver: hkp://pgp.mit.edu
MIME-Version: 1.0
Content-Type: Text/Plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Message-Id: <201208220253.24822.luke@dashjr.org>
X-Spam-Score: -0.1 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-0.2 RP_MATCHES_RCVD Envelope sender domain matches handover relay
	domain 0.1 AWL AWL: From: address is in the auto white-list
X-Headers-End: 1T414X-0001gO-IS
Subject: Re: [Bitcoin-development] Full Disclosure: CVE-2012-2459 (block
	merkle calculation exploit)
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 22 Aug 2012 02:53:34 -0000

On Wednesday, August 22, 2012 2:25:20 AM Forrest Voight wrote:
> An unpatched Bitcoin installation can be permanently wedged at its
> current highest block using this and the fact that Bitcoin caches
> orphan blocks in a disk-backed database. To do so, the attacker must
> send it a valid block (that will eventually make it into the
> blockchain) made invalid by duplicating one of the transactions in a
> way that preserves the Merkle root. The attacker doesn't even need to
> mine their own block - instead, they can listen for a block, then
> mutate it in this way, and pass it on to their peers.

=46rom the mining perspective, the unpatched install might not be simply we=
dged:=20
it will also follow a competing smaller blockchain. An attacker could have=
=20
used this exploit against a number of large miners (say about 40% or so) an=
d=20
exchanges to pull off any number of double-spend attacks until the miners=20
noticed they had been forked and fixed their bitcoind. That is, the attacke=
r=20
could easily hijack as much of the miners has he wanted for his own purpose=
s=20
including phony 6+ confirmation transactions. On a more subtle level, the=20
attacker could target certain blocks they wanted orphans by performing this=
=20
attack on a majority of miners with the "tip" block he wanted orphaned.

This vulnerability is also the reason why Eloipool (the software behind=20
Eligius, EclipseMC, TripleMining, and other pools) has attempted to produce=
=20
blocks with only transaction counts that are powers of two; such blocks can=
not=20
be used for an attack even against vulnerable clients.

Luke