summaryrefslogtreecommitdiff
path: root/d3/63cf1df1bcdebaaec466429beb293ba57df9cc
blob: edb112b6394c632c75fe7fed16aa9f838d2de8cf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
	helo=mx.sourceforge.net)
	by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <mh.in.england@gmail.com>) id 1XK712-0005kW-DF
	for bitcoin-development@lists.sourceforge.net;
	Wed, 20 Aug 2014 14:37:32 +0000
Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com
	designates 209.85.218.53 as permitted sender)
	client-ip=209.85.218.53; envelope-from=mh.in.england@gmail.com;
	helo=mail-oi0-f53.google.com; 
Received: from mail-oi0-f53.google.com ([209.85.218.53])
	by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1XK710-0005i6-GS
	for bitcoin-development@lists.sourceforge.net;
	Wed, 20 Aug 2014 14:37:31 +0000
Received: by mail-oi0-f53.google.com with SMTP id e131so5589666oig.26
	for <bitcoin-development@lists.sourceforge.net>;
	Wed, 20 Aug 2014 07:37:25 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.60.158.8 with SMTP id wq8mr49156390oeb.40.1408545445003;
	Wed, 20 Aug 2014 07:37:25 -0700 (PDT)
Sender: mh.in.england@gmail.com
Received: by 10.76.97.132 with HTTP; Wed, 20 Aug 2014 07:37:24 -0700 (PDT)
In-Reply-To: <CAACjpwKX9cwowiCruP9xw2UiqfsVXVC1TdKvA1HbQZ6UZ6qBsA@mail.gmail.com>
References: <c45a638f1e1640fe84bef01d12cda4c3@hotmail.com>
	<BLU402-EAS2546AD6C97DCED8FCE9C04CC6D20@phx.gbl>
	<CAACjpwKX9cwowiCruP9xw2UiqfsVXVC1TdKvA1HbQZ6UZ6qBsA@mail.gmail.com>
Date: Wed, 20 Aug 2014 16:37:24 +0200
X-Google-Sender-Auth: SKmuFlZAsDpL1yvXvj70x-Um6GY
Message-ID: <CANEZrP0WC2XL3Z0==BMjhWJuA8DgxBKUMKMdhh267JXduCZ0KQ@mail.gmail.com>
From: Mike Hearn <mike@plan99.net>
To: Cameron Garnham <da2ce7@gmail.com>
Content-Type: multipart/alternative; boundary=047d7bd6ac48e67bbe0501108a11
X-Spam-Score: -0.5 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
	sender-domain
	0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
	(mh.in.england[at]gmail.com)
	-0.0 SPF_PASS               SPF: sender matches SPF record
	1.0 HTML_MESSAGE           BODY: HTML included in message
	0.1 DKIM_SIGNED            Message has a DKIM or DK signature,
	not necessarily valid
	-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
X-Headers-End: 1XK710-0005i6-GS
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Proposal: Encrypt bitcoin messages
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 14:37:32 -0000

--047d7bd6ac48e67bbe0501108a11
Content-Type: text/plain; charset=UTF-8

I would be very happy if we upgraded the P2P protocol with MAC keys and a
simple home grown encryption layer, because:

   1. It's practically guaranteed that 5-eyes intelligence agencies are
   either systematically deanonymising Bitcoin users already (linking
   transactions to real world identities) or close to succeeding. Peter is
   correct. Given the way their infrastructure works, encrypting link level
   traffic would significantly raise the bar to such attacks. Quite possibly
   to the level where it's deemed unprofitable to continue.

   2. Tor is not a complete solution. The most interesting links to monitor
   are those from SPV clients connecting to Core nodes. Whilst Java SPV
   clients have the nice option of an easy bundled Tor client (er, once we fix
   the last bugs) clients that are not based on bitcoinj would have to use the
   full-blown Tor client, which is not only a PITA to bundle as Tor is not at
   all library-fied, but is a giant pile of C which is almost certainly
   exploitable. Even if it runs in a separate address space, for many
   platforms this is insufficient as a compromised Tor client could then go
   ahead and compromise your wallet app too.

Implementing a full Tor client is not a reasonable thing to ask of a wallet
developer, but doing HMAC checks and a simple ECDH exchange + AES would be
quite realistic.

--047d7bd6ac48e67bbe0501108a11
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra">I would be very happy if we upg=
raded the P2P protocol with MAC keys and a simple home grown encryption lay=
er, because:</div><div class=3D"gmail_extra"><ol><li>It&#39;s practically g=
uaranteed that 5-eyes intelligence agencies are either systematically deano=
nymising Bitcoin users already (linking transactions to real world identiti=
es) or close to succeeding. Peter is correct. Given the way their infrastru=
cture works, encrypting link level traffic would significantly raise the ba=
r to such attacks. Quite possibly to the level where it&#39;s deemed unprof=
itable to continue.<br>
<br></li><li>Tor is not a complete solution. The most interesting links to =
monitor are those from SPV clients connecting to Core nodes. Whilst Java SP=
V clients have the nice option of an easy bundled Tor client (er, once we f=
ix the last bugs) clients that are not based on bitcoinj would have to use =
the full-blown Tor client, which is not only a PITA to bundle as Tor is not=
 at all library-fied, but is a giant pile of C which is almost certainly ex=
ploitable. Even if it runs in a separate address space, for many platforms =
this is insufficient as a compromised Tor client could then go ahead and co=
mpromise your wallet app too.<br>
</li></ol><div>Implementing a full Tor client is not a reasonable thing to =
ask of a wallet developer, but doing HMAC checks and a simple ECDH exchange=
 + AES would be quite realistic.</div></div></div>

--047d7bd6ac48e67bbe0501108a11--