summaryrefslogtreecommitdiff
path: root/4a/5ab64c161a8bc9529b7886d2d9edcb3cfcc56b
blob: 40b52b3b83095f77686dba215657e98180ef576f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193]
	helo=mx.sourceforge.net)
	by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <zooko@zooko.com>) id 1S2YnS-0002Lt-Ka
	for bitcoin-development@lists.sourceforge.net;
	Wed, 29 Feb 2012 01:57:38 +0000
X-ACL-Warn: 
Received: from zim.maski.org ([173.230.137.215])
	by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256)
	(Exim 4.76) id 1S2YnR-0007ur-T4
	for bitcoin-development@lists.sourceforge.net;
	Wed, 29 Feb 2012 01:57:38 +0000
Received: from mail-ee0-f47.google.com (mail-ee0-f47.google.com [74.125.83.47])
	(using TLSv1 with cipher RC4-SHA (128/128 bits))
	(No client certificate requested) (Authenticated sender: zooko)
	by zim.maski.org (Postfix) with ESMTPSA id 2A61B23111
	for <bitcoin-development@lists.sourceforge.net>;
	Wed, 29 Feb 2012 01:41:33 +0000 (UTC)
Received: by eekc1 with SMTP id c1so1152370eek.34
	for <bitcoin-development@lists.sourceforge.net>;
	Tue, 28 Feb 2012 17:41:32 -0800 (PST)
Received-SPF: pass (google.com: domain of zooko@zooko.com designates
	10.14.200.129 as permitted sender) client-ip=10.14.200.129; 
Authentication-Results: mr.google.com;
	spf=pass (google.com: domain of zooko@zooko.com
	designates 10.14.200.129 as permitted sender)
	smtp.mail=zooko@zooko.com
Received: from mr.google.com ([10.14.200.129])
	by 10.14.200.129 with SMTP id z1mr12583089een.124.1330479692127
	(num_hops = 1); Tue, 28 Feb 2012 17:41:32 -0800 (PST)
MIME-Version: 1.0
Received: by 10.14.200.129 with SMTP id z1mr9518442een.124.1330479692014; Tue,
	28 Feb 2012 17:41:32 -0800 (PST)
Received: by 10.14.94.199 with HTTP; Tue, 28 Feb 2012 17:41:31 -0800 (PST)
In-Reply-To: <CAPg+sBhb+gYMwp1OJuCHYt5=BU63=YBWOFaLLthHBkN_U-scaA@mail.gmail.com>
References: <CAPg+sBhb+gYMwp1OJuCHYt5=BU63=YBWOFaLLthHBkN_U-scaA@mail.gmail.com>
Date: Tue, 28 Feb 2012 18:41:31 -0700
Message-ID: <CANdZDc7c5D7YmAn7GUO+--9U2Z3Lz-CR9E-QsKriVeMoudeipA@mail.gmail.com>
From: "Zooko Wilcox-O'Hearn" <zooko@zooko.com>
To: Pieter Wuille <pieter.wuille@gmail.com>
Content-Type: text/plain; charset=UTF-8
X-Spam-Score: -1.5 (-)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
	sender-domain
X-Headers-End: 1S2YnR-0007ur-T4
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Duplicate transactions vulnerability
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 29 Feb 2012 01:57:38 -0000

Could you spell out the attack explicitly? Presumably there aren't a
lot of people with the "malice energy" to perform the attack but not
to figure it out for themselves. I, however, have the "niceness
energy" to think about it for a few minutes but not to figure it out
for myself. If in your opinion it is realistically dangerous to post
it publicly, would you be so kind as to include me in the private
sharing of the explanation?

By the way, I found a couple of cases of slightly bad handling of
merkle trees when I inspected the code (v0.4) that was, I'm 99% sure,
not exploitable. I never got around to reporting it yet. I'm sorry
about that. My discoveries might interact with the one you're talking
about here. I should definitely explain mine to y'all soon. (Possibly
in private for the first pass, in case it is more exploitable than I
thought, or has become exploitable since v0.4.)

I showed it to a couple of other people at the time who helped me make
sure that it wasn't exploitable.

I'll make time to explain what I found within a week.

Regards,

Zooko