diff options
author | Oliver Egginger <bitcoin@olivere.de> | 2014-02-10 20:47:47 +0100 |
---|---|---|
committer | bitcoindev <bitcoindev@gnusha.org> | 2014-02-10 20:15:51 +0000 |
commit | bdc075a2f5e9c4fe004a08116fa7d821a8788489 (patch) | |
tree | 44131f8d40d122f0a6fb18e7a431e54d96968250 /fc | |
parent | 9f15ac0c4011b924b500d937633f2ccad3a384ef (diff) | |
download | pi-bitcoindev-bdc075a2f5e9c4fe004a08116fa7d821a8788489.tar.gz pi-bitcoindev-bdc075a2f5e9c4fe004a08116fa7d821a8788489.zip |
Re: [Bitcoin-development] Malleability and MtGox's announcement
Diffstat (limited to 'fc')
-rw-r--r-- | fc/b0609eb964284c0ed76135f60c5af2c166475b | 92 |
1 files changed, 92 insertions, 0 deletions
diff --git a/fc/b0609eb964284c0ed76135f60c5af2c166475b b/fc/b0609eb964284c0ed76135f60c5af2c166475b new file mode 100644 index 000000000..ca3ad3f60 --- /dev/null +++ b/fc/b0609eb964284c0ed76135f60c5af2c166475b @@ -0,0 +1,92 @@ +Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] + helo=mx.sourceforge.net) + by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) + (envelope-from <bitcoin@olivere.de>) id 1WCxGh-0005MB-Jc + for bitcoin-development@lists.sourceforge.net; + Mon, 10 Feb 2014 20:15:51 +0000 +X-ACL-Warn: +Received: from olivere.de ([85.214.144.153] helo=mail.olivere.de) + by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256) + (Exim 4.76) id 1WCxGd-0001l8-TK + for bitcoin-development@lists.sourceforge.net; + Mon, 10 Feb 2014 20:15:51 +0000 +Received: from ip-178-202-253-17.unitymediagroup.de ([178.202.253.17]:34430 + helo=[192.168.88.251]) + by mail.olivere.de with esmtpsa (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) + (Exim 4.72) (envelope-from <bitcoin@olivere.de>) + id 1WCwpZ-0003Ad-AF; Mon, 10 Feb 2014 20:47:49 +0100 +Message-ID: <52F92CE3.7080105@olivere.de> +Date: Mon, 10 Feb 2014 20:47:47 +0100 +From: Oliver Egginger <bitcoin@olivere.de> +User-Agent: Mozilla/5.0 (X11; Linux x86_64; + rv:24.0) Gecko/20100101 Thunderbird/24.2.0 +MIME-Version: 1.0 +To: Bitcoin Development <bitcoin-development@lists.sourceforge.net> +References: <CAPg+sBi-phaw3hDgguk-LYrPsKX4M5snTJBv_NsQML1M=XgZEw@mail.gmail.com> +In-Reply-To: <CAPg+sBi-phaw3hDgguk-LYrPsKX4M5snTJBv_NsQML1M=XgZEw@mail.gmail.com> +Content-Type: text/plain; charset=ISO-8859-1 +Content-Transfer-Encoding: 7bit +X-Spam-Score: -0.6 (/) +X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. + See http://spamassassin.org/tag/ for more details. + -0.6 RP_MATCHES_RCVD Envelope sender domain matches handover relay + domain +X-Headers-End: 1WCxGd-0001l8-TK +Subject: Re: [Bitcoin-development] Malleability and MtGox's announcement +X-BeenThere: bitcoin-development@lists.sourceforge.net +X-Mailman-Version: 2.1.9 +Precedence: list +List-Id: <bitcoin-development.lists.sourceforge.net> +List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>, + <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe> +List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development> +List-Post: <mailto:bitcoin-development@lists.sourceforge.net> +List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help> +List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>, + <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe> +X-List-Received-Date: Mon, 10 Feb 2014 20:15:51 -0000 + +Am 10.02.2014 13:28, schrieb Pieter Wuille: +> Hi all, +> +> I was a bit surprised to see MtGox's announcement. The malleability of +> transactions was known for years already (see for example the wiki +> article on it, https://en.bitcoin.it/wiki/Transaction_Malleability it, +> or mails on this list from 2012 and 2013). I don't consider it a very +> big problem, but it does make it harder for infrastructure to interact +> with Bitcoin. If we'd design Bitcoin today, I'm sure we would try to +> avoid it altogether to make life easier for everyone. + +Sorry, I'm not a developer, but I have got a question. It's a little bit +off-topic and can't maybe answered easy. + +As I understand this attack someone renames the transaction ID before +being confirmed in the blockchain. Not easy but if he is fast enough it +should be possible. With a bit of luck for the attacker the new +transaction is added to the block chain and the original transaction is +discarded as double-spend. Right? + +Up to this point the attacker has nothing gained. But next the attacker +stressed the Gox support and refers to the original transaction ID. Gox +was then probably fooled in such cases and has refunded already paid +Bitcoins to the attackers (virtual) Gox-wallet. + +So far everything is clear. But what I do not understand: Why apparently +had so many customers of Gox payment defaults or severely delayed +payments? I would imagine that the attacker may have doubled not only +his own transaction (maybe for obfuscating the fraud). But then all +transfers would still have go through anyway. And a normal customers +would have been satisfied. Most people observe only their wallets, I +think. What am I missing here? + +Sorry, is perhaps a silly question. But maybe you can put me on the +right track. + +regards +Oliver + + + + + + |