summaryrefslogtreecommitdiff
path: root/f0/784268ba587087e56647f30e83d9948efd4e50
blob: 20a197994c8ffec27048822024303192126e3d1a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193]
	helo=mx.sourceforge.net)
	by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <jrn@jrn.me.uk>) id 1XJszC-0007Eo-GV
	for bitcoin-development@lists.sourceforge.net;
	Tue, 19 Aug 2014 23:38:42 +0000
X-ACL-Warn: 
Received: from s3.neomailbox.net ([178.209.62.157])
	by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256)
	(Exim 4.76) id 1XJszA-0006b4-IN
	for bitcoin-development@lists.sourceforge.net;
	Tue, 19 Aug 2014 23:38:42 +0000
Message-ID: <53F3DFF7.9070709@jrn.me.uk>
Date: Wed, 20 Aug 2014 00:38:31 +0100
From: J Ross Nicoll <jrn@jrn.me.uk>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Johnathan Corgan <johnathan@corganlabs.com>, 
	Gregory Maxwell <gmaxwell@gmail.com>,
	Justus Ranvier <justusranvier@riseup.net>
References: <CA+8=xuJ+YDTNjyDW7DvP8KPN_nrFWpE68HvLw6EokFa-B-QGKw@mail.gmail.com>	<CA+8=xuKRyO1=bu7cgNGHvtAeqgKBxjTH2uUkb61GdCuEQWEu5A@mail.gmail.com>	<0C0EF7F9-DBBA-4872-897D-63CFA3853726@ricmoo.com>	<CA+8=xu+KWSF6XYgH-_t87na6M6UOD0CM1su8sizxn5a4b0_Xrw@mail.gmail.com>	<33D4B2E3-DBF0-444E-B76A-765C4C17E964@ricmoo.com>	<53F37635.5070807@riseup.net>	<CAAS2fgTF6424+FfzaL=+iaio2zu_uM_74yKohi7T3dtz=J9CjA@mail.gmail.com>
	<53F38AC9.4000608@corganlabs.com>
In-Reply-To: <53F38AC9.4000608@corganlabs.com>
Content-Type: multipart/alternative;
	boundary="------------070000060604050307090605"
X-Spam-Score: 1.0 (+)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	1.0 HTML_MESSAGE           BODY: HTML included in message
X-Headers-End: 1XJszA-0006b4-IN
Cc: Bitcoin Development <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Proposal: Encrypt bitcoin messages
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Tue, 19 Aug 2014 23:38:42 -0000

This is a multi-part message in MIME format.
--------------070000060604050307090605
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

The concern is that if you can monitor traffic in and out of a single
node, you can determine which transactions originate from it vs those
which it relays. That's not great, certainly, but how many nodes
actually require that level of security, and surely they can use Tor or
VPN services if so?

Further, unless the remote nodes are in some way trusted, you're
changing the attack from read-only to requiring the ability to perform 
a man in the middle attack - that doesn't seem much harder to me.

As Gregory states, there's been at least two recent serious if not
catastrophic OpenSSL bugs, and the consequences of Heartbleed if the
Bitcoin network had been vulnerable are the stuff of nightmares.

Very difficult to see the risk/reward payoff being worthwhile.

Ross


On 19/08/2014 18:35, Johnathan Corgan wrote:
> On 08/19/2014 09:38 AM, Gregory Maxwell wrote:
>
>> We've dodged several emergency scale vulnerabilities by not having TLS.
> I'm still trying to understand the original premise that we want
> encrypted communications between nodes.
>
> I can certainly see the value of having *authenticated* traffic with
> specific nodes, using an HMAC for the protocol messages in place of the
> current checksum.
>
>
>
> ------------------------------------------------------------------------------
>
>
> _______________________________________________
> Bitcoin-development mailing list
> Bitcoin-development@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bitcoin-development


--------------070000060604050307090605
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    The concern is that if you can monitor traffic in and out of a
    single node, you can determine which transactions originate from it
    vs those which it relays. That's not great, certainly, but how many
    nodes actually require that level of security, and surely they can
    use Tor or VPN services if so?<br>
    <br>
    Further, unless the remote nodes are in some way trusted, you're
    changing the attack from read-only to requiring the ability to
    perform&nbsp; a man in the middle attack - that doesn't seem much harder
    to me.<br>
    <br>
    As Gregory states, there's been at least two recent serious if not
    catastrophic OpenSSL bugs, and the consequences of Heartbleed if the
    Bitcoin network had been vulnerable are the stuff of nightmares.<br>
    <br>
    Very difficult to see the risk/reward payoff being worthwhile.<br>
    <br>
    Ross<br>
    <br>
    <br>
    <div class="moz-cite-prefix">On 19/08/2014 18:35, Johnathan Corgan
      wrote:<br>
    </div>
    <blockquote cite="mid:53F38AC9.4000608@corganlabs.com" type="cite">
      <pre wrap="">On 08/19/2014 09:38 AM, Gregory Maxwell wrote:

</pre>
      <blockquote type="cite">
        <pre wrap="">We've dodged several emergency scale vulnerabilities by not having TLS.
</pre>
      </blockquote>
      <pre wrap="">
I'm still trying to understand the original premise that we want
encrypted communications between nodes.

I can certainly see the value of having *authenticated* traffic with
specific nodes, using an HMAC for the protocol messages in place of the
current checksum.

</pre>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">------------------------------------------------------------------------------
</pre>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Bitcoin-development mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Bitcoin-development@lists.sourceforge.net">Bitcoin-development@lists.sourceforge.net</a>
<a class="moz-txt-link-freetext" href="https://lists.sourceforge.net/lists/listinfo/bitcoin-development">https://lists.sourceforge.net/lists/listinfo/bitcoin-development</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------070000060604050307090605--