Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

Already on GitHub? Sign in to your account

Serve bitcoin.org over TLS (https) #253

Closed
hickford opened this Issue Oct 3, 2013 · 6 comments

Comments

Projects
None yet
3 participants

hickford commented Oct 3, 2013

The Bitcoin threat model assumes 'the user has obtained an authentic copy of the software'.

This user would be more confident if bitcoin.org and the downloads were served over TLS .

Right now neither bitcoin.org nor the downloads or checksums are served over https and are thus vulnerable to man-in-the-middle attack .

Contributor

luke-jr commented Oct 3, 2013

HTTPS is a centrally-trusted system.
bitcoin.org is also a centrally operated and maintained website.

Use the gitian signatures to verify downloads. Trust neither HTTPS nor bitcoin.org.

hickford commented Oct 3, 2013

That's true, a MITM in collusion with a certificate authority can attack https (though the CA might be caught later).

But https is still worthwhile--it is thought to protect against less powerful MITM (eg. Joe Blackhat running a Tor exit node).

Just read about Gitian:

Gitian is a secure source-control oriented software distribution method. This means you can download trusted binaries that are verified by multiple builders.

Gitian uses a deterministic build process to allow multiple builders to create identical binaries. This allows multiple parties to sign the resulting binaries, guaranteeing that the binaries and tool chain were not tampered with and that the same source was used. It remove the build and distribution process as a single point of failure.

That's very cool, but still the majority of users install Bitcoin (exactly like other software) by downloading binaries from the web. The norm to secure this is to host the downloads on https. Exactly how secure this is, only time will tell, but we can hope it's better than nothing.

Contributor

saivann commented Oct 3, 2013

I agree that https is better (while not a replacement for gitian / PGP signatures).

However, there is just no such a thing as a long-term funded DDoS protected dedicated server under control of core developers with enough bandwidth to serve binary files. I am also not aware if sourceforge can be replaced that easily for developers, or if sirius would be available to update the DNS.

Contributor

saivann commented Feb 2, 2014

Closing this issue; bitcoin.org is now served over https

@saivann saivann closed this Feb 2, 2014

hickford commented Feb 2, 2014

Good work. Consider deploying HSTS to frustrate SSL stripping
https://www.imperialviolet.org/2012/07/19/hope9talk.html

On 2 February 2014 23:01, saivann notifications@github.com wrote:

Closing this issue; bitcoin.org is now served over https


Reply to this email directly or view it on GitHubhttps://github.com/bitcoin/bitcoin.org/issues/253#issuecomment-33916250
.

Contributor

luke-jr commented Feb 2, 2014

HSTS seems to break plain-old-HTTP access, without adding any real security.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment