summaryrefslogtreecommitdiff
path: root/cd/cdb1ed6de43e0371b3566897bfbfd2cc767f90
blob: a0c6a362b274d8e7c3b32a572afe301b7ea81536 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
Return-Path: <pete@petertodd.org>
Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org
	[172.17.192.35])
	by mail.linuxfoundation.org (Postfix) with ESMTPS id B7219B30
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Mon, 22 May 2017 14:09:28 +0000 (UTC)
X-Greylist: from auto-whitelisted by SQLgrey-1.7.6
Received: from outmail148102.authsmtp.net (outmail148102.authsmtp.net
	[62.13.148.102])
	by smtp1.linuxfoundation.org (Postfix) with ESMTPS id BEA42185
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Mon, 22 May 2017 14:09:27 +0000 (UTC)
Received: from mail-c232.authsmtp.com (mail-c232.authsmtp.com [62.13.128.232])
	by punt20.authsmtp.com (8.14.2/8.14.2/) with ESMTP id v4ME9PZE092124;
	Mon, 22 May 2017 15:09:25 +0100 (BST)
Received: from petertodd.org (ec2-52-5-185-120.compute-1.amazonaws.com
	[52.5.185.120]) (authenticated bits=0)
	by mail.authsmtp.com (8.14.2/8.14.2/) with ESMTP id v4ME9Nlr046073
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO);
	Mon, 22 May 2017 15:09:24 +0100 (BST)
Received: from [127.0.0.1] (localhost [127.0.0.1])
	by petertodd.org (Postfix) with ESMTPSA id CA530400A9;
	Mon, 22 May 2017 14:09:22 +0000 (UTC)
Received: by localhost (Postfix, from userid 1000)
	id D70F920101; Mon, 22 May 2017 10:09:19 -0400 (EDT)
Date: Mon, 22 May 2017 10:09:19 -0400
From: Peter Todd <pete@petertodd.org>
To: Mark Boldyrev <markboldyrev@gmail.com>
Message-ID: <20170522140919.GA17878@fedora-23-dvm>
References: <CAK9dXBSg+wzAZw7_xPXRVvx1uZzjAEE8nuvj0vkdSGD-yTfwhQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
	protocol="application/pgp-signature"; boundary="y0ulUmNC+osPPQO6"
Content-Disposition: inline
In-Reply-To: <CAK9dXBSg+wzAZw7_xPXRVvx1uZzjAEE8nuvj0vkdSGD-yTfwhQ@mail.gmail.com>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Server-Quench: 425c6b16-3ef8-11e7-829f-00151795d556
X-AuthReport-Spam: If SPAM / abuse - report it at:
	http://www.authsmtp.com/abuse
X-AuthRoute: OCd2Yg0TA1ZNQRgX IjsJECJaVQIpKltL GxAVKBZePFsRUQkR
	aAdMdAAUFVQNAgsB AmEbWlFeUFR7W2c7 bghPaBtcak9QXgdq
	T0pMXVMcUgEVdBV/ WlweVh9ycAYIfXx2 bQhmXHUIWhZ7c1t+
	FxhcCGwHMGB9YGIW Bl1YdwJRcQRDe0tA b1YxNiYHcQ5VPz4z
	GA41ejw8IwAXAWxN WAYVKkkbRQ4XGXYm ShEEAS8oEVAOSm0v
	LxFuJl8HFUwVP0l6 KlA7WEoEUVcVEgZZ E0xWaAAA
X-Authentic-SMTP: 61633532353630.1037:706
X-AuthFastPath: 0 (Was 255)
X-AuthSMTP-Origin: 52.5.185.120/25
X-AuthVirus-Status: No virus detected - but ensure you scan with your own
	anti-virus system.
X-Spam-Status: No, score=-1.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW,
	UC_GIBBERISH_OBFU autolearn=no version=3.3.1
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
	smtp1.linux-foundation.org
Cc: bitcoin-dev@lists.linuxfoundation.org
Subject: Re: [bitcoin-dev] A proposal to reintroduce the disabled script
 opcodes
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Mon, 22 May 2017 14:09:28 -0000


--y0ulUmNC+osPPQO6
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, May 19, 2017 at 09:07:41AM +0300, Mark Boldyrev via bitcoin-dev wro=
te:
> Back in 2010, there was a bug found in Core which allowed denial-of-servi=
ce
> attacks due to the software crashing on some machines while executing a
> script - see CVE-2010-537.
> I believe the removed ("disabled") opcodes should be re-introduced along
> with a standardized behavior definition.
> For example, when execution of an opcode results in an arithmetic error,
> such as OP_DIV with a zero divisor, the script should exit and fail.
> The string splice opcodes should also check their arguments for
> correctness, etc.
>=20
> These opcodes would enhance the flexibility of scripts and allow
> sophisticated native smart contracts to be created.

It'd help your case if you gave us some examples of such scripts being used.

See the CHECKSEQUENCEVERIFY and my own CHECKLOCKTIMEVERIFY bips for example=
s of
how to write up such use-cases.

--=20
https://petertodd.org 'peter'[:-1]@petertodd.org

--y0ulUmNC+osPPQO6
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----

iQEcBAEBCAAGBQJZIvENAAoJECSBQD2l8JH7r9gH/A2WAuhufmyzysrowiNzdhze
2sSx/YXJOGxU/5Jay0NNgZ68c3R0VhS9A1QeuYEkLrXr/JGQRBm8bjHnj7ewDl98
6ygTIW66Qvu1SviaQ/gjHIxSs28yL8KHBB20JQ6ilYKflUSUAuEgAl1Nzr6l3/rG
aNf7/jt+5RpsCxXkR+K5HdPBDCB/t8FkAb4CiSVzBoFvRnlqQ1ZTYt78hIm7Vc6D
XABawakHxHshcQU85pzAkbr2fPmAQxyIqIPTaqRjluLRWHqmQCbkvUhMZSkWauqi
I5TP0iNaRfq7XuJr/crjL5F9mJ5tuEJlzfPflkTjjQwOHTqYmf/MLCTeuSjG3nc=
=doJc
-----END PGP SIGNATURE-----

--y0ulUmNC+osPPQO6--