Re: [Bitcoin-development] Positive and negative feedback on certificate validation errors
On Fri, Feb 28, 2014 at 10:26:39PM -0800, Jeremy Spilman wrote: > We currently have subtle positive feedback of a signed payment request in > the form of the green background. Unsigned requests simply show up without > the green background, as well as requests which provide a certificate but > have a missing or invalid signature. Are we talking a third-party 'root certificate'? I don't quite see why a cryptographic currency that has the most widely deployed ECDSA public/private key infrastructure ever needs to use external certificates. That seems like a significant reduction in security to pretend that a 'signed' certificate is any good when it's pretty easy to buy a compromised cert, or just hack the server its on. If it's 'signed' by the ECDSA private key that you are sending the payment to, by all means, make it bright green. I mean if you want to make it expensive for small businesses to take secure payments, why don't you add a native 'signing fee' extension and have a (more) transparent market for the price of perceived security, or at least a compile time option so i can turn this nonsense off for my customers. -- Troy Benjegerdes 'da hozer' ho...@hozed.org 7 elements earth::water::air::fire::mind::spirit::soulgrid.coop Never pick a fight with someone who buys ink by the barrel, nor try buy a hacker who makes money by the megahash -- Flow-based real-time traffic analytics software. Cisco certified tool. Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer Customize your own dashboards, set traffic alerts and generate reports. Network behavioral analysis & security monitoring. All-in-one tool. http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk ___ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development
Re: [Bitcoin-development] Positive and negative feedback on certificate validation errors
I'm hoping I can convince Saivann to do a bit of graphics work for this at some point :-) Something like a green stamp that appears (like a watermark) in the background, might be good. On Sat, Mar 1, 2014 at 8:50 AM, Jeremy Spilman wrote: > On Fri, 28 Feb 2014 23:26:57 -0800, Wladimir wrote: > > Such a thing would be interesting for a future BIP standard. I see one > problem here: for an unsigned payment request there isn't really an > "origin". Browser URI handlers don't send the referrer either. > > > Yeah, good point. If you have a cert, we have the CN from the cert, which > becomes the string displayed as 'Pay To' and alternatively 'Merchant'. > > But if there's no cert then all you have is memo. > > So the best way to differentiate signed requests is by prominently > displaying that Merchant string. Really the green part should just be the > 'Pay To' line, the rest is content. If it showed a BLANK 'Pay To' that > would make the lack of certificate highly apparent. > > > > > -- > Flow-based real-time traffic analytics software. Cisco certified tool. > Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer > Customize your own dashboards, set traffic alerts and generate reports. > Network behavioral analysis & security monitoring. All-in-one tool. > > http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk > ___ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development > > -- Flow-based real-time traffic analytics software. Cisco certified tool. Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer Customize your own dashboards, set traffic alerts and generate reports. Network behavioral analysis & security monitoring. All-in-one tool. http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk___ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development
Re: [Bitcoin-development] Positive and negative feedback on certificate validation errors
On Fri, 28 Feb 2014 23:26:57 -0800, Wladimir wrote:Such a thing would be interesting for a future BIP standard. I see one problem here: for an unsigned payment request there isn't really an "origin". Browser URI handlers don't send the referrer either.Yeah, good point. If you have a cert, we have the CN from the cert, which becomes the string displayed as 'Pay To' and alternatively 'Merchant'.But if there's no cert then all you have is memo.So the best way to differentiate signed requests is by prominently displaying that Merchant string. Really the green part should just be the 'Pay To' line, the rest is content. If it showed a BLANK 'Pay To' that would make the lack of certificate highly apparent. -- Flow-based real-time traffic analytics software. Cisco certified tool. Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer Customize your own dashboards, set traffic alerts and generate reports. Network behavioral analysis & security monitoring. All-in-one tool. http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk___ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development
Re: [Bitcoin-development] Positive and negative feedback on certificate validation errors
On Sat, Mar 1, 2014 at 7:26 AM, Jeremy Spilman wrote: > There's a open bug (#3628) and pull request (#3684) to provide negative > feedback (yellow background) for a missing or invalid signature, but it > seems like there's some debate on whether bitcoind should do that... > The consensus there is to treat invalid and unsigned payment requests the same (apart from debug error logging). After all, the cost to the attacker to remove the signature or corrupt it is exactly the same. I do recommend testing that pull request (#3684) to see if it improves payment request reporting, and provide testing reports or suggestions in the github comments. I've been very busy the last few weeks with integrating and testing other pre-0.9 changes so I have been unable to look at the visual side of payment request stuff much. We could use some help there. If an attacker can avoid the negative feedback by just stripping the > signature and setting pki_type to none, then arguably there's no security > benefit by singling out badly signed payment requests from unsigned > payment requests. > Exactly. > So perhaps the root problem is that the positive feedback (green > background) is not strong enough to make its absence highly conspicuous to > the end user. > Well, ideas to make the difference more conspicuous are welcome. The green background is just to make a basic distinction. If it involves any imagery or graphics we do need contributions (with the appropriate MIT license), no one of us is an artist. > As an aside, how could we go about implementing the equivalent of HTTP > Strict Transport Security for payment protocol to prevent this trivial > signature stripping attack? Is this a possible extension field merchants > are interested in? > Such a thing would be interesting for a future BIP standard. I see one problem here: for an unsigned payment request there isn't really an "origin". Browser URI handlers don't send the referrer either. This rules out adding a field to the Bitcoin URI 'requests from us must be signed from now on' (there's no us). The server that serves the payment requests *could* serve an HSTS-like header 'only accept signed payment requests from us from now on'. The client needs to remember this for this server. Then if someone has compromised that server (or hijacked DNS) to serve fake and unsigned payment requests, the client can block these. Neither scenario will help in the case in which the server serving the Bitcoin URIs is compromised. Wladimir -- Flow-based real-time traffic analytics software. Cisco certified tool. Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer Customize your own dashboards, set traffic alerts and generate reports. Network behavioral analysis & security monitoring. All-in-one tool. http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk___ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development
[Bitcoin-development] Positive and negative feedback on certificate validation errors
We currently have subtle positive feedback of a signed payment request in the form of the green background. Unsigned requests simply show up without the green background, as well as requests which provide a certificate but have a missing or invalid signature. There's a open bug (#3628) and pull request (#3684) to provide negative feedback (yellow background) for a missing or invalid signature, but it seems like there's some debate on whether bitcoind should do that... If an attacker can avoid the negative feedback by just stripping the signature and setting pki_type to none, then arguably there's no security benefit by singling out badly signed payment requests from unsigned payment requests. So perhaps the root problem is that the positive feedback (green background) is not strong enough to make its absence highly conspicuous to the end user. As an aside, how could we go about implementing the equivalent of HTTP Strict Transport Security for payment protocol to prevent this trivial signature stripping attack? Is this a possible extension field merchants are interested in? -- Flow-based real-time traffic analytics software. Cisco certified tool. Monitor traffic, SLAs, QoS, Medianet, WAAS etc. with NetFlow Analyzer Customize your own dashboards, set traffic alerts and generate reports. Network behavioral analysis & security monitoring. All-in-one tool. http://pubads.g.doubleclick.net/gampad/clk?id=126839071&iu=/4140/ostg.clktrk ___ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development