Pages:
Author

Topic: URGENT: Windows Bitcoin-Qt update - page 3. (Read 28189 times)

legendary
Activity: 916
Merit: 1003
March 17, 2012, 02:48:50 PM
#38
I upgraded my client yesterday and suddenly today I noticed I'm getting hit with a SYN flood attack.

Don't know if it's related but it's damn annoying.  I've stopped my BTC client temporarily to see what happens.
legendary
Activity: 2058
Merit: 1431
March 17, 2012, 12:25:51 PM
#37
Java/Python/Ruby/Lisp buffer overflows simply don't exist... a huge class of exploit eradicated by language choice.  And there's a long list of languages immune to buffer overflows (this is mostly a glaring hole in C/C++).  Look up US military/intelligence mandates about language choice.  C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_.  Why do you think computer security is such a disaster (it was all C/C++ until the recent xss/xsrf/sql havoc - and that too is a design flaw).
I tried looking it up, but I could only find some random articles about switching to ada, but nothing stating that "C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_" . Can you point to the article claiming that?
legendary
Activity: 2576
Merit: 1186
March 17, 2012, 11:52:12 AM
#36
You have to be god-like to not create security vulnerabilities in significantly C/C++ software.  'Direct' buffer overflows can be avoided by littering your code with meticulous boiler plate (and praying you haven't made a mistake somewhere).  But integer overflows leading to buffer overflows are so hopelessly trickly that I have no faith in any C/C++ being safe.

Java buffer overflows simply don't exist... a huge class of exploit eradicated by language choice.  And there's a long list of languages immune to buffer overflows (this is mostly a glaring hole in C/C++).  Look up US military/intelligence mandates about language choice.  C/C++ is so bad that it should be immediately abandoned and _never_ used for _anything_.  Why do you think computer security is such a disaster (it was all C/C++ until the recent xss/xsrf/sql havoc - and that too is a design flaw).
Guess what language Java/Python/etc are implemented it.
legendary
Activity: 3472
Merit: 1721
March 17, 2012, 11:26:10 AM
#35
Shouldn't you adher to full disclosure policy? This would actually encourage people to update.

If you look a discussion about full disclosure you'll see that much of the discussion is completely moot when the "vendors" of the software are also the discoverers of the issue.  There also isn't much more that could be disclosed right now.



 Smiley
legendary
Activity: 2576
Merit: 1186
March 17, 2012, 10:10:39 AM
#34
If anything, more advanced languages can have their own vulnerabilities which could bitcoin vulnerable without any mistakes acutally made by the developers. This is almost impossible with a low level language like c++.
Apart from that, a program's security does not depend on the language, it depends on the coding.
Or on the (coding of the) language as you stated just earlier Wink
I'm using the anonymity patched bitcoin client (https://bitcointalksearch.org/topic/--24784), hope they get their security patches too.

I don't have any info on the vuln or code for the patch.  So I'd advise you not to use my patched binaries until the vuln and fix have been disclosed and I can compile new ones.
Dev team is doing builds of 0.5.3+coderrr with the fix applied; should be available later today.
hero member
Activity: 530
Merit: 500
March 17, 2012, 10:03:00 AM
#33
It actually isn't impossible, just complex enough it hasn't been accomplished yet.

It's impossible in the same way as brute forcing a 128 bit UUID is impossible Smiley E.g. in our relevant universe.

(And enough so for the discussion at hand)
legendary
Activity: 2576
Merit: 1186
March 17, 2012, 09:47:00 AM
#32
It's simply impossible to provable test all possible pathways as soon as you venture beyond Hello World type complexity.
It actually isn't impossible, just complex enough it hasn't been accomplished yet. It's quite possible to write a specialized emulator that follows every possible code-path with "quantum" memory states...
staff
Activity: 4172
Merit: 8419
March 17, 2012, 09:17:55 AM
#31
Shouldn't you adher to full disclosure policy? This would actually encourage people to update.

If you look a discussion about full disclosure you'll see that much of the discussion is completely moot when the "vendors" of the software are also the discoverers of the issue.  There also isn't much more that could be disclosed right now.

legendary
Activity: 1148
Merit: 1008
If you want to walk on water, get out of the boat
March 17, 2012, 08:59:28 AM
#30
Updated, i have 0.6rc4 now

I wonder what happens now with older wallets...
hero member
Activity: 504
Merit: 500
FPGA Mining LLC
March 17, 2012, 06:38:22 AM
#29
only a question of a solo-mining-noob:

does an update effect the number of done shares to find a btc-block?

example: i have done 140.000 shares with 0.5.2
what will be there for me with update to 0.5.3.1 - start at share number 0 - without the 140.000?

There is no such thing as shares when you are solo mining, so updating won't affect your solo mining income.
legendary
Activity: 3472
Merit: 1721
March 17, 2012, 06:36:46 AM
#28
I always encourage people to review the git history, but if you spot the fix for this issue— please don't point it out yet (and I will remove posts that do)

Shouldn't you adher to full disclosure policy? This would actually encourage people to update.
hero member
Activity: 812
Merit: 1022
No Maps for These Territories
March 17, 2012, 06:08:44 AM
#27
0.5.1 (-beta) is *not* safe.

only 0.5.3.1 and 0.6.0pre4 are safe right now. As for next versions, 0.5.4 and 0.6.0 (final) and so on will also be safe.

All bitcoin versions have -beta added in the "About" dialog as a statement about the current phase of the project, not about the current version.

legendary
Activity: 2324
Merit: 1125
March 17, 2012, 05:57:02 AM
#26
So if I have 0.5.3.1-beta I'm safe?

Yes. 0.5.3.1 is the fixed version of 0.5.3.


What about 0.5.1-beta? (this versioning numbering is quite confusing)
newbie
Activity: 25
Merit: 0
March 17, 2012, 05:40:05 AM
#25
If anything, more advanced languages can have their own vulnerabilities which could bitcoin vulnerable without any mistakes acutally made by the developers. This is almost impossible with a low level language like c++.
Apart from that, a program's security does not depend on the language, it depends on the coding.
Or on the (coding of the) language as you stated just earlier Wink
I'm using the anonymity patched bitcoin client (https://bitcointalksearch.org/topic/--24784), hope they get their security patches too.
sr. member
Activity: 309
Merit: 250
March 17, 2012, 05:38:13 AM
#24
only a question of a solo-mining-noob:

does an update effect the number of done shares to find a btc-block?

example: i have done 140.000 shares with 0.5.2
what will be there for me with update to 0.5.3.1 - start at share number 0 - without the 140.000?
hero member
Activity: 530
Merit: 500
March 17, 2012, 05:31:30 AM
#23

Apart from that, a program's security does not depend on the language, it depends on the coding.

All software developers of any experience and educational background will tell you that programs will always have bugs. It's simply impossible to provable test all possible pathways as soon as you venture beyond Hello World type complexity.

Thus it's better to use a programming and execution environment that protects you, as far as possible, when those bugs are found.

full member
Activity: 203
Merit: 100
March 17, 2012, 05:05:46 AM
#22
Quote
about 3 days ago i was commenting on the language choice.
from a software architecture standpoint other languages than c++ would make more sense in such a sensitive area.

This is nonsense. If anything, more advanced languages can have their own vulnerabilities which could bitcoin vulnerable without any mistakes acutally made by the developers. This is almost impossible with a low level language like c++.
Apart from that, a program's security does not depend on the language, it depends on the coding.
staff
Activity: 4172
Merit: 8419
March 17, 2012, 12:02:52 AM
#21
So if I have 0.5.3.1-beta I'm safe?

Yes. 0.5.3.1 is the fixed version of 0.5.3.
full member
Activity: 736
Merit: 100
Adoption Blockchain e-Commerce to World
March 16, 2012, 11:55:07 PM
#20
So if I have 0.5.3.1-beta I'm safe?
Pages:
Jump to: