1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
|
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
helo=mx.sourceforge.net)
by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
(envelope-from <mh.in.england@gmail.com>) id 1XK712-0005kW-DF
for bitcoin-development@lists.sourceforge.net;
Wed, 20 Aug 2014 14:37:32 +0000
Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com
designates 209.85.218.53 as permitted sender)
client-ip=209.85.218.53; envelope-from=mh.in.england@gmail.com;
helo=mail-oi0-f53.google.com;
Received: from mail-oi0-f53.google.com ([209.85.218.53])
by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128)
(Exim 4.76) id 1XK710-0005i6-GS
for bitcoin-development@lists.sourceforge.net;
Wed, 20 Aug 2014 14:37:31 +0000
Received: by mail-oi0-f53.google.com with SMTP id e131so5589666oig.26
for <bitcoin-development@lists.sourceforge.net>;
Wed, 20 Aug 2014 07:37:25 -0700 (PDT)
MIME-Version: 1.0
X-Received: by 10.60.158.8 with SMTP id wq8mr49156390oeb.40.1408545445003;
Wed, 20 Aug 2014 07:37:25 -0700 (PDT)
Sender: mh.in.england@gmail.com
Received: by 10.76.97.132 with HTTP; Wed, 20 Aug 2014 07:37:24 -0700 (PDT)
In-Reply-To: <CAACjpwKX9cwowiCruP9xw2UiqfsVXVC1TdKvA1HbQZ6UZ6qBsA@mail.gmail.com>
References: <c45a638f1e1640fe84bef01d12cda4c3@hotmail.com>
<BLU402-EAS2546AD6C97DCED8FCE9C04CC6D20@phx.gbl>
<CAACjpwKX9cwowiCruP9xw2UiqfsVXVC1TdKvA1HbQZ6UZ6qBsA@mail.gmail.com>
Date: Wed, 20 Aug 2014 16:37:24 +0200
X-Google-Sender-Auth: SKmuFlZAsDpL1yvXvj70x-Um6GY
Message-ID: <CANEZrP0WC2XL3Z0==BMjhWJuA8DgxBKUMKMdhh267JXduCZ0KQ@mail.gmail.com>
From: Mike Hearn <mike@plan99.net>
To: Cameron Garnham <da2ce7@gmail.com>
Content-Type: multipart/alternative; boundary=047d7bd6ac48e67bbe0501108a11
X-Spam-Score: -0.5 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
See http://spamassassin.org/tag/ for more details.
-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
sender-domain
0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider
(mh.in.england[at]gmail.com)
-0.0 SPF_PASS SPF: sender matches SPF record
1.0 HTML_MESSAGE BODY: HTML included in message
0.1 DKIM_SIGNED Message has a DKIM or DK signature,
not necessarily valid
-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature
X-Headers-End: 1XK710-0005i6-GS
Cc: Bitcoin Dev <bitcoin-development@lists.sourceforge.net>
Subject: Re: [Bitcoin-development] Proposal: Encrypt bitcoin messages
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 20 Aug 2014 14:37:32 -0000
--047d7bd6ac48e67bbe0501108a11
Content-Type: text/plain; charset=UTF-8
I would be very happy if we upgraded the P2P protocol with MAC keys and a
simple home grown encryption layer, because:
1. It's practically guaranteed that 5-eyes intelligence agencies are
either systematically deanonymising Bitcoin users already (linking
transactions to real world identities) or close to succeeding. Peter is
correct. Given the way their infrastructure works, encrypting link level
traffic would significantly raise the bar to such attacks. Quite possibly
to the level where it's deemed unprofitable to continue.
2. Tor is not a complete solution. The most interesting links to monitor
are those from SPV clients connecting to Core nodes. Whilst Java SPV
clients have the nice option of an easy bundled Tor client (er, once we fix
the last bugs) clients that are not based on bitcoinj would have to use the
full-blown Tor client, which is not only a PITA to bundle as Tor is not at
all library-fied, but is a giant pile of C which is almost certainly
exploitable. Even if it runs in a separate address space, for many
platforms this is insufficient as a compromised Tor client could then go
ahead and compromise your wallet app too.
Implementing a full Tor client is not a reasonable thing to ask of a wallet
developer, but doing HMAC checks and a simple ECDH exchange + AES would be
quite realistic.
--047d7bd6ac48e67bbe0501108a11
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr"><div class=3D"gmail_extra">I would be very happy if we upg=
raded the P2P protocol with MAC keys and a simple home grown encryption lay=
er, because:</div><div class=3D"gmail_extra"><ol><li>It's practically g=
uaranteed that 5-eyes intelligence agencies are either systematically deano=
nymising Bitcoin users already (linking transactions to real world identiti=
es) or close to succeeding. Peter is correct. Given the way their infrastru=
cture works, encrypting link level traffic would significantly raise the ba=
r to such attacks. Quite possibly to the level where it's deemed unprof=
itable to continue.<br>
<br></li><li>Tor is not a complete solution. The most interesting links to =
monitor are those from SPV clients connecting to Core nodes. Whilst Java SP=
V clients have the nice option of an easy bundled Tor client (er, once we f=
ix the last bugs) clients that are not based on bitcoinj would have to use =
the full-blown Tor client, which is not only a PITA to bundle as Tor is not=
at all library-fied, but is a giant pile of C which is almost certainly ex=
ploitable. Even if it runs in a separate address space, for many platforms =
this is insufficient as a compromised Tor client could then go ahead and co=
mpromise your wallet app too.<br>
</li></ol><div>Implementing a full Tor client is not a reasonable thing to =
ask of a wallet developer, but doing HMAC checks and a simple ECDH exchange=
+ AES would be quite realistic.</div></div></div>
--047d7bd6ac48e67bbe0501108a11--
|