Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1R3W2K-00082r-Ja for bitcoin-development@lists.sourceforge.net; Tue, 13 Sep 2011 16:40:40 +0000 X-ACL-Warn: Received: from zinan.dashjr.org ([173.242.112.54]) by sog-mx-1.v43.ch3.sourceforge.com with esmtp (Exim 4.76) id 1R3W2J-0002v7-QC for bitcoin-development@lists.sourceforge.net; Tue, 13 Sep 2011 16:40:40 +0000 Received: from ishibashi.localnet (fl-184-4-160-40.dhcp.embarqhsd.net [184.4.160.40]) (Authenticated sender: luke-jr) by zinan.dashjr.org (Postfix) with ESMTPSA id 31FF4204002; Tue, 13 Sep 2011 16:40:34 +0000 (UTC) From: "Luke-Jr" To: bitcoin-development@lists.sourceforge.net Date: Tue, 13 Sep 2011 12:40:23 -0400 User-Agent: KMail/1.13.7 (Linux/2.6.39-gentoo; KDE/4.6.5; x86_64; ; ) References: In-Reply-To: X-PGP-Key-Fingerprint: CE5A D56A 36CC 69FA E7D2 3558 665F C11D D53E 9583 X-PGP-Key-ID: 665FC11DD53E9583 X-PGP-Keyserver: x-hkp://subkeys.pgp.net MIME-Version: 1.0 Content-Type: Text/Plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Message-Id: <201109131240.26029.luke@dashjr.org> X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -0.5 RP_MATCHES_RCVD Envelope sender domain matches handover relay domain X-Headers-End: 1R3W2J-0002v7-QC Subject: Re: [Bitcoin-development] Project status X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 Sep 2011 16:40:40 -0000 On Tuesday, September 13, 2011 10:43:27 AM Gavin Andresen wrote: > 3) I'd really like to come to consensus on one or more > 'multi-signature' standard transactions to enable much better wallet > backup and security. More important in this area, IMO, is support for deterministic keychains in wallets. Type 2, according to gmaxwell's original spec, seems pretty ideal, and significantly improves security for many use cases. Since it allows a wallet to contain a public keychain without the matching private keychain, webservers, POS, and other services can be provisioned only with the keychain required to generate/access infinite public keys, and without the private keyroot needed to spend them. The ideal scenario in this regard, as I see it, is this: - Webserver wallets are provisioned with multiple public keychains (one per webserver), and configured to use a specific one for getnewaddress/etc. By provisioning them with *all* the public keychains, their listtransactions/etc can see the transactions sent to other webservers, necessary to show confirmations to the end user and such. - Business keeps a locked-down *offline* wallet with the private keychains for all the forementioned public keychains. Only this wallet has the information required to spend the income. The wallet is encrypted, and can only be accessed by staff with the proper position/authority to authorize expenses. - A third wallet is used by staff to prepare expense transactions. It keeps track of locking coins it knows are in the process of being spent, and any staff member can create new ones. Once created, they must submit the transaction to a staff member with the proper authority to bring it to the offline transaction-signing wallet (on a USB key), where it is signed, and returned to this third wallet. Another feature that needs some attention is signmessage. It can be used to send a transaction id/summary to a specified email address signed by the sending key of the same transaction (these can be added to the send-money GUI). This would allow merchants to publish a single payment address and still be able to verify which customers sent payment.