Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1VdtxV-0006XW-AW for bitcoin-development@lists.sourceforge.net; Wed, 06 Nov 2013 03:39:09 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.217.179 as permitted sender) client-ip=209.85.217.179; envelope-from=melvincarvalho@gmail.com; helo=mail-lb0-f179.google.com; Received: from mail-lb0-f179.google.com ([209.85.217.179]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1VdtxS-0003H8-HD for bitcoin-development@lists.sourceforge.net; Wed, 06 Nov 2013 03:39:09 +0000 Received: by mail-lb0-f179.google.com with SMTP id w6so7169910lbh.24 for ; Tue, 05 Nov 2013 19:38:59 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.112.202.194 with SMTP id kk2mr1124740lbc.2.1383709139732; Tue, 05 Nov 2013 19:38:59 -0800 (PST) Received: by 10.112.159.233 with HTTP; Tue, 5 Nov 2013 19:38:59 -0800 (PST) In-Reply-To: <52756B2E.7030505@corganlabs.com> References: <20131102050144.5850@gmx.com> <52756B2E.7030505@corganlabs.com> Date: Wed, 6 Nov 2013 04:38:59 +0100 Message-ID: From: Melvin Carvalho To: Johnathan Corgan Content-Type: multipart/alternative; boundary=001a11c37232bf11f504ea79e33d X-Spam-Score: -0.6 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 0.0 URIBL_BLOCKED ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [URIs: doubleclick.net] -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (melvincarvalho[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1VdtxS-0003H8-HD Cc: bitcoingrant@gmx.com, Bitcoin Dev Subject: Re: [Bitcoin-development] Message Signing based authentication X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Nov 2013 03:39:09 -0000 --001a11c37232bf11f504ea79e33d Content-Type: text/plain; charset=ISO-8859-1 On 2 November 2013 22:14, Johnathan Corgan wrote: > On 11/01/2013 10:01 PM, bitcoingrant@gmx.com wrote: > > > Server provides a token for the client to sign. > > Anyone else concerned about signing an arbitrary string? Could be a > hash of $EVIL_DOCUMENT, no? I'd want to XOR the string with my own > randomly generated nonce, sign that, then pass the nonce and the > signature back to the server for verification. > Good point. There are actually times you may want to sign a transaction. There's a little know HTTP code, 402, "Payment Required". We should really start using this at some point ... http://en.wikipedia.org/wiki/List_of_HTTP_status_codes Reserved for future use.[2] The original intention was that this code might be used as part of some form of digital cash or micropayment scheme, but that has not happened, and this code is not usually used. As an example of its use, however, Apple's defunct MobileMe service generated a 402 error if the MobileMe account was delinquent.[citation needed] In addition, YouTube uses this status if a particular IP address has made excessive requests, and requires the person to enter a CAPTCHA. > > -- > Johnathan Corgan, Corgan Labs > SDR Training and Development Services > http://corganlabs.com > > > ------------------------------------------------------------------------------ > Android is increasing in popularity, but the open development platform that > developers love is also attractive to malware creators. Download this white > paper to learn more about secure code signing practices that can help keep > Android apps secure. > http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development > > --001a11c37232bf11f504ea79e33d Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable



On 2 November 2013 22:14, Johnathan Corgan <johnathan@corga= nlabs.com> wrote:
On 11/0= 1/2013 10:01 PM, bitcoingrant@gmx.c= om wrote:

> Server provides a token for the client to sign.

Anyone else concerned about signing an arbitrary string? =A0Could be = a
hash of $EVIL_DOCUMENT, no? =A0I'd want to XOR the string with my own randomly generated nonce, sign that, then pass the nonce and the
signature back to the server for verification.

Good point.

There are actually times you may want= to sign a transaction.

There's a little know HTTP co= de, 402, "Payment Required".=A0 We should really start using this= at some point ...

http= ://en.wikipedia.org/wiki/List_of_HTTP_status_codes

Reserved for = future use.[2] The original intention was that this code might be used as p= art of some form of digital cash or micropayment scheme, but that has not h= appened, and this code is not usually used. As an example of its use, howev= er, Apple's defunct MobileMe service generated a 402 error if the Mobil= eMe account was delinquent.[citation needed] In addition, YouTube uses this= status if a particular IP address has made excessive requests, and require= s the person to enter a CAPTCHA.
=A0

--
Johnathan Corgan, Corgan Labs
SDR Training and Development Services
http://corganlabs.com

---------------------------------------------------------= ---------------------
Android is increasing in popularity, but the open development platform that=
developers love is also attractive to malware creators. Download this white=
paper to learn more about secure code signing practices that can help keep<= br> Android apps secure.
http://pubads.g.doubleclick.net/gam= pad/clk?id=3D65839951&iu=3D/4140/ostg.clktrk
___________________= ____________________________
Bitcoin-development mailing list
Bitcoin-develo= pment@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bitcoin-de= velopment


--001a11c37232bf11f504ea79e33d--