Author

Topic: Electrum sybil attack? (Read 1084 times)

sr. member
Activity: 318
Merit: 260
September 16, 2016, 05:15:55 AM
#11
bump, this question is still unanwswered.

The chances someone who's actually looked at the code are here is very slim. I've never looked at their network code I just know they transfer headers and white-list scripts because that's all you need to know for what I was doing.

If there is a way to do such an attack it's just a potential ddos. There aren't many networking or coding experts outside of the full reference client dev community so you'd see long waits for patches too..

Thats pretty sad, perhaps electrum should hire more developers, I see that the new version has already been updated in the changelog file, but not yet released.

And the commits are comming slowly as well on github, it would be nice if more devs would work on it.

Yeah 2.7.0 or whatever it is has been in the works for months. The patches look like mostly string constant and UX changes. I use it with my cold storage on Tails so it doesn't really matter. I'm still waiting for them to use Android hardware keystore to multisig. I do portable on Windows for view only.

Regarding ddos: Most criminals with capabilities are too busy dumping databases from all the bad development practices on "credible" bitcoin sites. I wouldn't worry about them shutting down the market or crashing values yet. Maybe when it takes more than a public SQLi fuzzer to jackpot exchanges they'll get mad and ddos..
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
September 01, 2016, 11:21:17 AM
#10
bump, this question is still unanwswered.

The chances someone who's actually looked at the code are here is very slim. I've never looked at their network code I just know they transfer headers and white-list scripts because that's all you need to know for what I was doing.

If there is a way to do such an attack it's just a potential ddos. There aren't many networking or coding experts outside of the full reference client dev community so you'd see long waits for patches too..

Thats pretty sad, perhaps electrum should hire more developers, I see that the new version has already been updated in the changelog file, but not yet released.

And the commits are comming slowly as well on github, it would be nice if more devs would work on it.
sr. member
Activity: 318
Merit: 260
August 31, 2016, 04:15:25 AM
#9
bump, this question is still unanwswered.

The chances someone who's actually looked at the code are here is very slim. I've never looked at their network code I just know they transfer headers and white-list scripts because that's all you need to know for what I was doing.

If there is a way to do such an attack it's just a potential ddos. There aren't many networking or coding experts outside of the full reference client dev community so you'd see long waits for patches too..
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
August 26, 2016, 06:29:13 PM
#8
bump, this question is still unanwswered.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
July 21, 2016, 02:22:53 PM
#7

By white listing scripts as is becoming the trend. Scripts are a huge attack surface as you pointed out. I found this out my first week writing a network fuzzer.

No you misunderstand, I`m curious how electrum client talks to electrum servers.

I have read somewhere in the past, not sure, that the client fetches the blocks or block headers and cross verifies them across multiple servers to prevent sybil attacks.

I would like a confirmation if that is true or not.
sr. member
Activity: 318
Merit: 260
July 18, 2016, 11:13:54 PM
#6
Go look at the GIT repo and see for yourself, or get one of the experts telling you all this to do it.

You sign the transactions you send.. Nobody is going to forge transactions unless they do something like get code execution on your client and load malware that grabs your wallet data after logging your pass phrase. If they can find vulnerabilities in memory they probably don't need a server they could just make malicious broadcasts and save all the hassle and costs.

No, i`m not talking about the software being compromized, i`m talking about the block headers being. Because you download them from a server, and if 1 server is malicious, they can send you fake blocks with fake TX.

That is why i`m asking how electrum prevents that?

By white listing scripts as is becoming the trend. Scripts are a huge attack surface as you pointed out. I found this out my first week writing a network fuzzer.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
July 13, 2016, 03:22:37 PM
#5
Go look at the GIT repo and see for yourself, or get one of the experts telling you all this to do it.

You sign the transactions you send.. Nobody is going to forge transactions unless they do something like get code execution on your client and load malware that grabs your wallet data after logging your pass phrase. If they can find vulnerabilities in memory they probably don't need a server they could just make malicious broadcasts and save all the hassle and costs.

No, i`m not talking about the software being compromized, i`m talking about the block headers being. Because you download them from a server, and if 1 server is malicious, they can send you fake blocks with fake TX.

That is why i`m asking how electrum prevents that?
sr. member
Activity: 318
Merit: 260
July 13, 2016, 11:23:01 AM
#4
Go look at the GIT repo and see for yourself, or get one of the experts telling you all this to do it.

You sign the transactions you send.. Nobody is going to forge transactions unless they do something like get code execution on your client and load malware that grabs your wallet data after logging your pass phrase. If they can find vulnerabilities in memory they probably don't need a server they could just make malicious broadcasts and save all the hassle and costs.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
July 11, 2016, 05:22:26 PM
#3
Sorry but that doesnt answer the question. I`m curios how electrum verifies the blocks from each server.

I remember I read somewhere that it cross verifies it from multiple servers to make sure the blockchain is genuine.
member
Activity: 80
Merit: 14
July 10, 2016, 10:18:08 PM
#2
Worse case scenario, they could lie to your client and make it believe it has a bigger or a smaller amount of coins.
They could also deny transaction propagation.
But never spend funds.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
July 06, 2016, 06:24:36 PM
#1
What prevents sybil attack from electrum servers? In the sense that a malicious attacker might show you a fake balance, how does Electrum defend against a conspiracy between malicious electrum servers to show you a wrong balance?

I read somewhere that electrum client connects to more servers, or atleast fetches the data from multple ones, or cross verifies it, i`m not sure. Is that true??

How are the SPV blocks verified, some basic explanation please (i read the docs, its not very informative)
Jump to: