public inbox for bitcoindev@googlegroups.com
 help / color / mirror / Atom feed
From: Gavin <gavinandresen@gmail•com>
To: Alex Mizrahi <alex.mizrahi@gmail•com>
Cc: Bitcoin Dev <bitcoin-development@lists•sourceforge.net>
Subject: Re: [Bitcoin-development] Long-term mining incentives
Date: Wed, 13 May 2015 09:24:04 -0400	[thread overview]
Message-ID: <E6CE3531-5AFC-49ED-9041-A924B01966BC@gmail.com> (raw)
In-Reply-To: <CAE28kUR-0ozFg6D4Es7RCm1pA5xaW-E1R_YSTRRTj3z4XXiWxw@mail.gmail.com>

[-- Attachment #1: Type: text/plain, Size: 3366 bytes --]

Checkpoints will be replaced by compiled-in 'at THIS timestamp the main chain had THIS much proof of work.'

That is enough information to prevent attacks and still allow optimizations like skipping signature checking for ancient transactions.

I don't think anybody is proposing replacing checkpoints with nothing.

--
Gavin Andresen


> On May 13, 2015, at 8:26 AM, Alex Mizrahi <alex.mizrahi@gmail•com> wrote:
> 
> Let's consider a concrete example:
> 
> 1. User wants to accept Bitcoin payments, as his customers want this.
> 2. He downloads a recent version of Bitcoin Core, checks hashes and so on. (Maybe even builds from source.)
> 3. Let's it to sync for several hours or days.
> 4. After wallet is synced, he gives his address to customer.
> 5. Customer pays. 
> 6. User waits 10 confirmations and ships the goods. (Suppose it's something very expensive.)
> 7. Some time later, user wants to convert some of his bitcoins to dollars. He sends his bitcoins to an exchange but they never arrive.
> 
> He tries to investigate, and after some time discovers that his router (or his ISP's router) was hijacked. His Bitcoin node couldn't connect to any of the legitimate nodes, and thus got a complete fake chain from the attacker.
> Bitcoins he received were totally fake.
> 
> Bitcoin Core did a shitty job and confirmed some fake transactions.
> User doesn't care that if his network was not impaired, Bitcoin Core would have worked properly.
> The main duty of Bitcoin Core is to check whether transactions are confirmed, and if it can be fooled by a simple router hack, then it does its job poorly.
> 
> If you don't see it being a problem, you should't be allowed to develop anything security-related.
> 
>> If a node is connected to 99 dishonest nodes and 1 honest node, it can still sync with the main network.
> 
> Yes, it is good against Sybil attack, but not good against a network-level attack.
> Attack on user's routers is a very realistic, plausible attack.
> Imagine if SSL could be hacked by hacking a router, would people still use it?
> 
> Fucking no.
>   
>> A 3 month reversal would be devastating, so the checkpoint isn't adding much extra security.
> 
> WIthout checkpoints an attacker could prepare a fork for $10.
> With checkpoints, it would cost him at least $1000, but more likely upwards of $100000.
> That's quite a difference, no?
> 
> I do not care what do you think about the reasons why checkpoints were added, but it is a fact that they make the attack scenario I describe above hard to impossible.
> 
> Without checkpoints, you could perform this attack using a laptop.
> With checkpoints, you need access to significant amounts of mining ASICs.
> 
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud 
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> _______________________________________________
> Bitcoin-development mailing list
> Bitcoin-development@lists•sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bitcoin-development

[-- Attachment #2: Type: text/html, Size: 4944 bytes --]

  reply	other threads:[~2015-05-13 13:24 UTC|newest]

Thread overview: 37+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-05-11 16:28 Thomas Voegtlin
2015-05-11 16:52 ` insecurity
2015-05-11 17:29   ` Gavin Andresen
2015-05-12 12:35     ` Thomas Voegtlin
     [not found]       ` <CABsx9T1h7p3hDr7ty43uxsYs-oNRpndzg=dowST2tXtogxRm2g@mail.gmail.com>
     [not found]         ` <555210AF.3090705@electrum.org>
2015-05-12 16:10           ` Gavin Andresen
2015-05-12 16:21             ` Dave Hudson
2015-05-12 21:24             ` Pedro Worcel
2015-05-12 23:48               ` Adam Back
2015-05-13 15:41                 ` Gavin Andresen
2015-05-13 20:05                   ` Pedro Worcel
2015-05-13  9:49             ` Thomas Voegtlin
2015-05-13 10:14               ` Tier Nolan
2015-05-13 10:31                 ` Alex Mizrahi
2015-05-13 11:29                   ` Tier Nolan
2015-05-13 12:26                     ` Alex Mizrahi
2015-05-13 13:24                       ` Gavin [this message]
2015-05-13 13:28                       ` Tier Nolan
2015-05-13 14:26                         ` Alex Mizrahi
2015-05-13 23:46                   ` Jorge Timón
2015-05-14  0:11     ` Jorge Timón
2015-05-14  0:48       ` Aaron Voisine
2015-05-14  0:58         ` Pieter Wuille
2015-05-14  1:13           ` Aaron Voisine
2015-05-14  1:19             ` Pieter Wuille
2015-05-14  1:31               ` Aaron Voisine
2015-05-14  2:34                 ` Aaron Voisine
2015-05-16 20:35                 ` Owen Gunden
2015-05-16 22:18                   ` Tom Harding
2015-05-17  1:08                   ` Aaron Voisine
2015-05-14  0:44 ` Melvin Carvalho
2015-05-25 18:31 ` Mike Hearn
2015-05-26 18:47   ` Thomas Voegtlin
2015-05-27 21:59   ` Mike Hearn
2015-05-27 22:22     ` Gregory Maxwell
2015-05-28 10:30       ` Mike Hearn
2015-05-13 17:49 Damian Gomez
2015-05-18  2:29 Michael Jensen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=E6CE3531-5AFC-49ED-9041-A924B01966BC@gmail.com \
    --to=gavinandresen@gmail$(echo .)com \
    --cc=alex.mizrahi@gmail$(echo .)com \
    --cc=bitcoin-development@lists$(echo .)sourceforge.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox