Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 4686A69 for ; Fri, 25 Mar 2016 20:42:12 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from mx-out02.mykolab.com (mx01.mykolab.com [95.128.36.1]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id D5538175 for ; Fri, 25 Mar 2016 20:42:11 +0000 (UTC) X-Virus-Scanned: amavisd-new at kolabnow.com X-Spam-Score: -2.9 X-Spam-Level: X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW autolearn=ham version=3.3.1 Received: from mx05.mykolab.com (mx05.mykolab.com [10.20.7.161]) by mx-out02.mykolab.com (Postfix) with ESMTPS id AAFC061E02 for ; Fri, 25 Mar 2016 21:42:09 +0100 (CET) From: Tom To: bitcoin-dev@lists.linuxfoundation.org Date: Fri, 25 Mar 2016 20:42:08 +0000 Message-ID: <4517402.JLxTDjem5X@garp> In-Reply-To: <56F586B4.8020507@jonasschnelli.ch> References: <56F2B51C.8000105@jonasschnelli.ch> <2590065.B4dTBeyc1A@garp> <56F586B4.8020507@jonasschnelli.ch> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Sat, 26 Mar 2016 08:34:15 +0000 Subject: Re: [bitcoin-dev] p2p authentication and encryption BIPs X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Development Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Mar 2016 20:42:12 -0000 On Friday 25 Mar 2016 19:43:00 Jonas Schnelli via bitcoin-dev wrote: > An encrypted channel together with a trusted full node would finally > allow to have a secure and save SPV communication. I guess my question didn't get across. Why would you want to make your usecase do connections over the peer2peer (net.cpp) connection at all? Mixing messages that are being sent to everyone and encrypted messages is asking for trouble. Making your private connection out-of-band would work much better. > > Also, you didn't actually address the attack-vector. > > Which attack-vector? The statistical attack I mentioned earlier. Which comes from knowing which plain text messages are being sent over the encrypted channel, So as long as you keep saying you want to encrypt data that identical copies of are being sent to other nodes at practically the same time, you will keep being vulnerable to that.