summaryrefslogtreecommitdiff
path: root/ef/69ad15f329e2da21fd618af4000c9e74bf7c4a
blob: d4f348838238f7275555eacc21e9fefae7d1a04c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
Return-Path: <steven.charles.davis@gmail.com>
Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org
	[172.17.192.35])
	by mail.linuxfoundation.org (Postfix) with ESMTPS id 592F92C
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Mon,  2 Jan 2017 21:39:27 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.7.6
Received: from mail-it0-f42.google.com (mail-it0-f42.google.com
	[209.85.214.42])
	by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 09581159
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Mon,  2 Jan 2017 21:39:26 +0000 (UTC)
Received: by mail-it0-f42.google.com with SMTP id 75so253276529ite.1
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Mon, 02 Jan 2017 13:39:26 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
	h=from:mime-version:subject:date:references:to:in-reply-to:message-id; 
	bh=U/zJmE9N8F0PHpKxsprvtGvNO92rXY9h5w8V9kpFxG8=;
	b=tbmjwimP6R6LdBLnSJ5ZaA7B5ZbQADrL384/bg+nsWTCQN/sx0NV5yOkXcis0D6KXw
	sFnWtLIJvB24OwqhXtF71Zn0czctsD0g83fAIDwSnE/oCsnf6AB9Cz5dDKQN5uRHL4Hb
	20nVpKiQWYpmCNXuAVUG8s3Rn6OKClgwAm8WA7MfX9n66xxK5+SCT1eDQQy+6uGJAQtJ
	BgXd9+klbBl3HAsV5aS7+TogvModKIZHzrTeYyl2lKMCr2HWqsPVjdD2TLtzGKYNO8XT
	cSAJNSk2xwgdgjo3KXAYAX+zbn+OZFP0q40H3lU5oVK3M0zX8xAb2rEp0wyk/ovEbULa
	GFsg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20161025;
	h=x-gm-message-state:from:mime-version:subject:date:references:to
	:in-reply-to:message-id;
	bh=U/zJmE9N8F0PHpKxsprvtGvNO92rXY9h5w8V9kpFxG8=;
	b=S11GqiRl6mGa+OQq6h5ld5hWwY7a8hQOoaKW48zob2VvfB5q4VfDznU56BMG3TVYRM
	YNtBXW9jbEDsSAx0nEYU2PlWTle2qN4X+bC720SNxYdMEGKmr6tK9JtqVTJM2NXM9c2A
	k1ftrilOUJi/8VhZbWpOcaMLEqT/KrdphclqR/eKAlB46h+jhuWN+WYVLcBf+AE5QWQF
	XnVIOPoOp10ypZ1kLHF3AdZ2Ty9PKPU8OHDuPvyeASW+EPZevdedvk4G8zsL5qTHEX2N
	4Hn2Mz4oOGNR7T0WJSwK5CzWwe9JQE4ZxGEwl4zshC6iFinPnXkl2Jx3OnRZ3XXOhoJn
	j3JQ==
X-Gm-Message-State: AIkVDXIMG4sCbGscBf3rqi3utf2iuuadQkBbfCArP4DEq1f6iR415+Mw9YDjD/vyXzUk+Q==
X-Received: by 10.36.222.133 with SMTP id d127mr42173613itg.2.1483393166274;
	Mon, 02 Jan 2017 13:39:26 -0800 (PST)
Received: from [10.0.1.42] (71-81-80-204.dhcp.stls.mo.charter.com.
	[71.81.80.204])
	by smtp.gmail.com with ESMTPSA id 9sm34000138itv.0.2017.01.02.13.39.25
	for <bitcoin-dev@lists.linuxfoundation.org>
	(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);
	Mon, 02 Jan 2017 13:39:25 -0800 (PST)
From: Steve Davis <steven.charles.davis@gmail.com>
Content-Type: multipart/alternative;
	boundary="Apple-Mail=_66CB83FC-3D91-4AF0-B0E3-C60E80E16CD7"
Mime-Version: 1.0 (Mac OS X Mail 10.2 \(3259\))
Date: Mon, 2 Jan 2017 15:39:24 -0600
References: <mailman.11263.1483391161.31141.bitcoin-dev@lists.linuxfoundation.org>
To: bitcoin-dev@lists.linuxfoundation.org
In-Reply-To: <mailman.11263.1483391161.31141.bitcoin-dev@lists.linuxfoundation.org>
Message-Id: <400152B9-1838-432A-829E-13E4FC54320C@gmail.com>
X-Mailer: Apple Mail (2.3259)
X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM, HTML_MESSAGE,
	RCVD_IN_DNSWL_NONE, 
	RCVD_IN_SORBS_SPAM autolearn=no version=3.3.1
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
	smtp1.linux-foundation.org
X-Mailman-Approved-At: Mon, 02 Jan 2017 21:55:27 +0000
Subject: [bitcoin-dev] Script Abuse Potential?
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Jan 2017 21:39:27 -0000


--Apple-Mail=_66CB83FC-3D91-4AF0-B0E3-C60E80E16CD7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Hi all,

Suppose someone were to use the following pk_script:

[op_2dup, op_2dup, op_2dup, op_2dup, op_2dup, ...(to limit)..., op_2dup, =
op_hash160, <addr_hash>, op_equalverify, op_checksig]

This still seems to be valid AFAICS, and may be a potential attack =
vector?

Thanks.


--Apple-Mail=_66CB83FC-3D91-4AF0-B0E3-C60E80E16CD7
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D""><div class=3D""><div style=3D"color: rgb(34, 34, 34); =
font-family: arial, sans-serif; font-size: 12.800000190734863px;" =
class=3D"">Hi all,</div><div style=3D"color: rgb(34, 34, 34); =
font-family: arial, sans-serif; font-size: 12.800000190734863px;" =
class=3D""><br class=3D""></div><div style=3D"color: rgb(34, 34, 34); =
font-family: arial, sans-serif; font-size: 12.800000190734863px;" =
class=3D"">Suppose someone were to use the following =
pk_script:</div><div style=3D"color: rgb(34, 34, 34); font-family: =
arial, sans-serif; font-size: 12.800000190734863px;" class=3D""><br =
class=3D""></div><div class=3D"m_8591747901013163489gmail_signature" =
style=3D"color: rgb(34, 34, 34); font-family: arial, sans-serif; =
font-size: 12.800000190734863px;"><div dir=3D"ltr" class=3D"">[op_2dup, =
op_2dup, op_2dup, op_2dup, op_2dup, ...(to limit)..., =
op_2dup,&nbsp;op_hash160, &lt;addr_hash&gt;, op_equalverify, =
op_checksig]</div><div dir=3D"ltr" class=3D""><br class=3D""></div><div =
class=3D"">This still seems to be valid AFAICS, and may be a potential =
attack vector?</div><div class=3D""><br class=3D""></div><div =
class=3D"">Thanks.</div></div></div><div class=3D""><br =
class=3D""></div></body></html>=

--Apple-Mail=_66CB83FC-3D91-4AF0-B0E3-C60E80E16CD7--