Disable bitcoin: URI handling on Windows for the 0.6 release#991
Disable bitcoin: URI handling on Windows for the 0.6 release#991gavinandresen merged 1 commit intobitcoin:masterfrom
Conversation
|
|
Re: URLs that do bad things, any special reason that you think this is suddenly an issue? You ACKed it first time and I don't think this aspect changed. Given that there are no fatal bugs in boost::interprocess and the Qt URL parser, I think it's pretty unlikely there are security problems. |
RE: why do I suddenly think bad URLs are an issue: because when I see stupid-simple things like the setup.nsi file launching bitcoin.exe instead of bitcoin-qt.exe getting fixed this close to a final release it drives home the point that THIS FEATURE HAS NOT BEEN SUFFICIENTLY TESTED. Excuse me for yelling, this just feels like the wallet encryption (mis-)feature all over again. |
|
Since apparently URI's didn't work at all in windows releases so far, I really don't mind disabling URI's for now to get 0.6.0 out, and re-enable them as soon as they have actually been tested. |
|
I'm fine with disabling it for this release. |
The setup.nsi issue is an artifact of how old this stuff really is. Its been around forever, and so many people have seen it/looked over it/written it that I completely disagree with the assumption that it is untested. It was written by luke, rewritten by me, commented on by laanjw, gmaxwell, etc, etc. And has been in 0.6 since rc1. |
|
Right, the MITM issue is completely separate, and isn't worse with embedded URLs than with embedded addresses in pages or mails. The only way to protect against that would be to sign the URLs, but that brings the the whole web-of-trust/chain-of-trust shebang into bitcoin and should be considered carefully... |
|
If everyone thinks this needs disabled for 0.6, thats fine, though Im really tired of this getting kicked down the road, it was ready to go for 0.4... |
|
There are certainly risks involved when using URI's to transfer information, but this does not "worsen" the situation if even a copy-pasted static base58 address can get intercepted and replaced by a trojan. I hope we can enable this feature quickly. I also don't mind using very boost-specific patches to workaround a known bug on windows platforms. That said, I don't mind delaying it to 0.6.1 or very soon for 0.7.0 if nobody even noticed it didn't work since 0.6.0rc1, when the dirty hacks can be sufficiently tested. |
Disable bitcoin: URI handling on Windows for the 0.6 release
Disable bitcoin: URI handling on Windows for the 0.6 release
Remove dead code related to SizeForkExpiration consensus parameter
35ec3f8 [Build] Remove OpenSSL version check (warrows) b8fb2fc [Refactor] Remove unused OpenSSL includes (warrows) 6152805 Remove openssl info from init/log and from Qt debug window (Jonas Schnelli) Pull request description: Up until now we've been checking for OpenSSL version at configure time. It turns out that it's not needed anymore. We still use OpenSSL in a few places, but it's not consensus critical anymore. So this PR removes the check at configure time and cleans up a few places where includes were done of OpenSSL unnecessarily. ACKs for top commit: Fuzzbawls: ACK 35ec3f8 random-zebra: ACK 35ec3f8 and merging... Tree-SHA512: e1752261b7257c3392d319bac7749c61aa17ce33705ffc41c0cec7ab21dfb11941747f37ed82e3275c90a03e76ee59e016b1983edcf648bdb30a79083bb50f04
I don't think bitcoin: URI handling on Windows has had nearly enough testing, so this disables it for the 0.6 release.
I'm all for re-enabling it for a 0.6.1 and/or 0.7, but only we take a step back and do two things: