summaryrefslogtreecommitdiff
path: root/d8/2190d534f91369cf3b144c88b1ef42e1efd4ec
blob: e4427879a7f369b8ef651dac407abeaf72b679dd (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191]
	helo=mx.sourceforge.net)
	by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
	(envelope-from <pedro@worcel.com>) id 1YIOMo-0007a9-EE
	for bitcoin-development@lists.sourceforge.net;
	Mon, 02 Feb 2015 21:17:10 +0000
X-ACL-Warn: 
Received: from mail-ie0-f171.google.com ([209.85.223.171])
	by sog-mx-1.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
	(Exim 4.76) id 1YIOMm-0007Q6-Se
	for bitcoin-development@lists.sourceforge.net;
	Mon, 02 Feb 2015 21:17:10 +0000
Received: by mail-ie0-f171.google.com with SMTP id tr6so20537162ieb.2
	for <bitcoin-development@lists.sourceforge.net>;
	Mon, 02 Feb 2015 13:17:03 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20130820;
	h=x-gm-message-state:message-id:date:from:user-agent:mime-version:to
	:subject:references:in-reply-to:content-type;
	bh=9ibKguJO7B9UVBywE99rcVEytTy6IsYo313qpbhF2lI=;
	b=DX+8D8dJO94A3vJY2wQsN4Yx2X4tJ3Tsdgzn+Wmd4T1pGzjx98v5s98hQBA+vEij9l
	xKzfQLYctB3Av91OcvcKYXC1vNPOT5LgGB2X2kr9egjQLZ3+TDn6/0OM7eAewqQoCxzK
	nwBjQRotlyPmC5Ci0RXPEJ1zuF6B2e7L/+1fSoq2Q8xApfYPL+Xg47kRGeL+/Rz11kFp
	VkQN0k/UDi11f0rYKpDvdEndwCQkhRaNXqXzJiFvobWKjPMgDvL/s4qu7xzpFRVaMciq
	kue9UxQMC+T5vefNuQra2neFMupEBPjFrbr52GF+JpEuk1cL6oleeB3u8FiaQK56dZzk
	XdvQ==
X-Gm-Message-State: ALoCoQne0Xbe8REqahy+2/TWG/g8tj6TBoIJz5NYa7OOADnmcb1qe6ZNa+psC1T493IziSLmebDP
X-Received: by 10.107.150.67 with SMTP id y64mr24647172iod.22.1422911364890;
	Mon, 02 Feb 2015 13:09:24 -0800 (PST)
Received: from [192.168.20.101] (203-97-255-117.cable.telstraclear.net.
	[203.97.255.117])
	by mx.google.com with ESMTPSA id c8sm6745546igx.9.2015.02.02.13.09.22
	for <bitcoin-development@lists.sourceforge.net>
	(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Mon, 02 Feb 2015 13:09:23 -0800 (PST)
Message-ID: <54CFE780.1040400@worcel.com>
Date: Tue, 03 Feb 2015 10:09:20 +1300
From: Pedro Worcel <pedro@worcel.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64;
	rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: bitcoin-development@lists.sourceforge.net
References: <27395C55-CF59-4E65-83CA-73F903272C5F@gmail.com>	<54CE3816.6020505@bitwatch.co>	<68C03646-02E7-43C6-9B73-E4697F3AA5FD@gmail.com>	<CALkkCJbk0czFj5mdMB6_0+Umw5V-fo-4tdBHgvg92zhyRZWiYQ@mail.gmail.com>	<CANEZrP0QjPm+TTgV9Fh84vt2zLaGp0R2Wt2ZL2ZXYhxzOFPHVA@mail.gmail.com>	<CALkkCJYuM_T=_nfBOCF4S8XhVecUZA0ug==Y_n+qdFpb-F628g@mail.gmail.com>	<CANEZrP1QZqP6wSxcNJt81c4=xXLJsEsPF-CN71NZzwdOFSpB2A@mail.gmail.com>	<57186618-F010-42E6-A757-B617C4001B5B@gmail.com>	<F4C9E954-6A29-4A31-B09B-7F0B62270EF8@voskuil.org>	<4B53C1B0-A677-4460-8A69-C45506424D7F@gmail.com>	<CAGKSKfW8seFosxzdSL-t8MJ4ewXPUpNh4BJQVVhMn4qPf_BtqQ@mail.gmail.com>
	<CB45FC36-3B3E-486D-95FE-596D7380C3D2@gmail.com>
In-Reply-To: <CB45FC36-3B3E-486D-95FE-596D7380C3D2@gmail.com>
Content-Type: multipart/alternative;
	boundary="------------020205080508020906070404"
X-Spam-Score: 1.0 (+)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
	See http://spamassassin.org/tag/ for more details.
	1.0 HTML_MESSAGE           BODY: HTML included in message
X-Headers-End: 1YIOMm-0007Q6-Se
Subject: Re: [Bitcoin-development] Proposal to address Bitcoin malware
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
	<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Mon, 02 Feb 2015 21:17:10 -0000

This is a multi-part message in MIME format.
--------------020205080508020906070404
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit

Where would you verify that?

On 2/3/2015 10:03 AM, Brian Erdelyi wrote:
> Joel,
>
> The mobile device should show you the details of the transaction (i.e. 
> amount and bitcoin address).  Once you verify this is the intended 
> recipient and amount you approve it on the mobile device.  If the 
> address was replaced, you should see this on the mobile device as it 
> won’t match where you were intending to send it.  You can then not 
> provide the second signature.
>
> Brian Erdelyi
>
>> On Feb 2, 2015, at 4:57 PM, Joel Joonatan Kaartinen 
>> <joel.kaartinen@gmail.com <mailto:joel.kaartinen@gmail.com>> wrote:
>>
>> If the attacker has your desktop computer but not the mobile that's 
>> acting as an independent second factor, how are you then supposed to 
>> be able to tell you're not signing the correct transaction on the 
>> mobile? If the address was replaced with the attacker's address, 
>> it'll look like everything is ok.
>>
>> - Joel
>>
>> On Mon, Feb 2, 2015 at 9:58 PM, Brian Erdelyi 
>> <brian.erdelyi@gmail.com <mailto:brian.erdelyi@gmail.com>> wrote:
>>
>>
>>     > Confusing or not, the reliance on multiple signatures as
>>     offering greater security than single relies on the independence
>>     of multiple secrets. If the secrets cannot be shown to retain
>>     independence in the envisioned threat scenario (e.g. a user's
>>     compromised operating system) then the benefit reduces to making
>>     the exploit more difficult to write, which, once written, reduces
>>     to no benefit. Yet the user still suffers the reduced utility
>>     arising from greater complexity, while being led to believe in a
>>     false promise.
>>
>>     Just trying to make sure I understand what you’re saying.  Are
>>     you eluding to that if two of the three private keys get
>>     compromised there is no gain in security?  Although the
>>     likelihood of this occurring is lower, it is possible.
>>
>>     As more malware targets bitcoins I think the utility is evident. 
>>     Given how final Bitcoin transactions are, I think it’s worth
>>     trying to find methods to help verify those transactions (if a
>>     user deems it to be high-risk enough) before the transaction is
>>     completed.  The balance is trying to devise something that users
>>     do not find too burdensome.
>>
>>     Brian Erdelyi
>>     ------------------------------------------------------------------------------
>>     Dive into the World of Parallel Programming. The Go Parallel Website,
>>     sponsored by Intel and developed in partnership with Slashdot
>>     Media, is your
>>     hub for all things parallel software development, from weekly thought
>>     leadership blogs to news, videos, case studies, tutorials and
>>     more. Take a
>>     look and join the conversation now.
>>     http://goparallel.sourceforge.net/
>>     _______________________________________________
>>     Bitcoin-development mailing list
>>     Bitcoin-development@lists.sourceforge.net
>>     <mailto:Bitcoin-development@lists.sourceforge.net>
>>     https://lists.sourceforge.net/lists/listinfo/bitcoin-development
>>
>>
>
>
>
> ------------------------------------------------------------------------------
> Dive into the World of Parallel Programming. The Go Parallel Website,
> sponsored by Intel and developed in partnership with Slashdot Media, is your
> hub for all things parallel software development, from weekly thought
> leadership blogs to news, videos, case studies, tutorials and more. Take a
> look and join the conversation now. http://goparallel.sourceforge.net/
>
>
> _______________________________________________
> Bitcoin-development mailing list
> Bitcoin-development@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bitcoin-development


--------------020205080508020906070404
Content-Type: text/html; charset=windows-1252
Content-Transfer-Encoding: 8bit

<html>
  <head>
    <meta content="text/html; charset=windows-1252"
      http-equiv="Content-Type">
  </head>
  <body bgcolor="#FFFFFF" text="#000000">
    Where would you verify that?<br>
    <br>
    <div class="moz-cite-prefix">On 2/3/2015 10:03 AM, Brian Erdelyi
      wrote:<br>
    </div>
    <blockquote
      cite="mid:CB45FC36-3B3E-486D-95FE-596D7380C3D2@gmail.com"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=windows-1252">
      Joel,
      <div class=""><br class="">
      </div>
      <div class="">The mobile device should show you the details of the
        transaction (i.e. amount and bitcoin address).  Once you verify
        this is the intended recipient and amount you approve it on the
        mobile device.  If the address was replaced, you should see this
        on the mobile device as it won’t match where you were intending
        to send it.  You can then not provide the second signature.</div>
      <div class=""><br class="">
      </div>
      <div class="">Brian Erdelyi</div>
      <div class=""><br class="">
        <div>
          <blockquote type="cite" class="">
            <div class="">On Feb 2, 2015, at 4:57 PM, Joel Joonatan
              Kaartinen &lt;<a moz-do-not-send="true"
                href="mailto:joel.kaartinen@gmail.com" class="">joel.kaartinen@gmail.com</a>&gt;
              wrote:</div>
            <br class="Apple-interchange-newline">
            <div class="">
              <div dir="ltr" class="">If the attacker has your desktop
                computer but not the mobile that's acting as an
                independent second factor, how are you then supposed to
                be able to tell you're not signing the correct
                transaction on the mobile? If the address was replaced
                with the attacker's address, it'll look like everything
                is ok.
                <div class=""><br class="">
                </div>
                <div class="">- Joel<br class="">
                  <div class="gmail_extra"><br class="">
                    <div class="gmail_quote">On Mon, Feb 2, 2015 at 9:58
                      PM, Brian Erdelyi <span dir="ltr" class="">&lt;<a
                          moz-do-not-send="true"
                          href="mailto:brian.erdelyi@gmail.com"
                          target="_blank" class="">brian.erdelyi@gmail.com</a>&gt;</span>
                      wrote:<br class="">
                      <blockquote class="gmail_quote" style="margin:0 0
                        0 .8ex;border-left:1px #ccc
                        solid;padding-left:1ex"><span class=""><br
                            class="">
                          &gt; Confusing or not, the reliance on
                          multiple signatures as offering greater
                          security than single relies on the
                          independence of multiple secrets. If the
                          secrets cannot be shown to retain independence
                          in the envisioned threat scenario (e.g. a
                          user's compromised operating system) then the
                          benefit reduces to making the exploit more
                          difficult to write, which, once written,
                          reduces to no benefit. Yet the user still
                          suffers the reduced utility arising from
                          greater complexity, while being led to believe
                          in a false promise.<br class="">
                          <br class="">
                        </span>Just trying to make sure I understand
                        what you’re saying.  Are you eluding to that if
                        two of the three private keys get compromised
                        there is no gain in security?  Although the
                        likelihood of this occurring is lower, it is
                        possible.<br class="">
                        <br class="">
                        As more malware targets bitcoins I think the
                        utility is evident.  Given how final Bitcoin
                        transactions are, I think it’s worth trying to
                        find methods to help verify those transactions
                        (if a user deems it to be high-risk enough)
                        before the transaction is completed.  The
                        balance is trying to devise something that users
                        do not find too burdensome.<br class="">
                        <div class="HOEnZb">
                          <div class="h5"><br class="">
                            Brian Erdelyi<br class="">
------------------------------------------------------------------------------<br
                              class="">
                            Dive into the World of Parallel Programming.
                            The Go Parallel Website,<br class="">
                            sponsored by Intel and developed in
                            partnership with Slashdot Media, is your<br
                              class="">
                            hub for all things parallel software
                            development, from weekly thought<br class="">
                            leadership blogs to news, videos, case
                            studies, tutorials and more. Take a<br
                              class="">
                            look and join the conversation now. <a
                              moz-do-not-send="true"
                              href="http://goparallel.sourceforge.net/"
                              target="_blank" class="">http://goparallel.sourceforge.net/</a><br
                              class="">
_______________________________________________<br class="">
                            Bitcoin-development mailing list<br class="">
                            <a moz-do-not-send="true"
                              href="mailto:Bitcoin-development@lists.sourceforge.net"
                              class="">Bitcoin-development@lists.sourceforge.net</a><br
                              class="">
                            <a moz-do-not-send="true"
                              href="https://lists.sourceforge.net/lists/listinfo/bitcoin-development"
                              target="_blank" class="">https://lists.sourceforge.net/lists/listinfo/bitcoin-development</a><br
                              class="">
                          </div>
                        </div>
                      </blockquote>
                    </div>
                    <br class="">
                  </div>
                </div>
              </div>
            </div>
          </blockquote>
        </div>
        <br class="">
      </div>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">------------------------------------------------------------------------------
Dive into the World of Parallel Programming. The Go Parallel Website,
sponsored by Intel and developed in partnership with Slashdot Media, is your
hub for all things parallel software development, from weekly thought
leadership blogs to news, videos, case studies, tutorials and more. Take a
look and join the conversation now. <a class="moz-txt-link-freetext" href="http://goparallel.sourceforge.net/">http://goparallel.sourceforge.net/</a></pre>
      <br>
      <fieldset class="mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap="">_______________________________________________
Bitcoin-development mailing list
<a class="moz-txt-link-abbreviated" href="mailto:Bitcoin-development@lists.sourceforge.net">Bitcoin-development@lists.sourceforge.net</a>
<a class="moz-txt-link-freetext" href="https://lists.sourceforge.net/lists/listinfo/bitcoin-development">https://lists.sourceforge.net/lists/listinfo/bitcoin-development</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------020205080508020906070404--