-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Determine Severity Benchmarks for 3rd edition #135
Comments
Some possible benchmarks for consideration:
|
A high-level formula: Weight is information profit. We should expect the following results:
Other security models in the past have used: Severity = Impact * Likelihood |
|
A few initial notes from myself and @dcousens comparing the Blockchain observer and network observer attacker categories: Blockchain attacker is:
Network attacker is:
These qualties can be distilled to these severity benchmarks:
|
Some assumptions we're using:
|
The cost for a Blockchain observer to attack the average user individually: 1 on scale of 1 to 5 (close to free) The cost for a Network observer to attack an individual: High cost, probably millions of dollars for a network attacker to insert himself into networks to observe particular users of non P2P wallets. The Network observer category has some attacks that pertain to P2P (SPV/full node) victims and some are more network infrastructure-based. We need to make sure that we're not underestimating the risk of the Network observer category against P2P users, nor the risk of the Wallet Provider category against non P2P wallet users. I need to think about whether we should move or copy any of the attacks in the Network observer category to the Wallet Provider category to make these two easier to weight. |
For reference, threat model: https://github.com/OpenBitcoinPrivacyProject/threat-model-scoring-system/blob/reorg-to-scoring-system/obpp3.json |
Blockchain AttacksI.A
I.B
I.C
I.D
I.E
I.F
|
I.C and I.D are equivalent from the attacker's perspective and so should have a very similar or same weight. |
@kristovatlas agreed, and I think they should be merged 👍 |
I.E could be split into a second attack: Link transactions or addresses to a single entity based on a common wallet client fingerprint. |
Addresses may have transactions. Therefore, leaking related transactions leaks related addresses. |
Going through the Network Observer attacks to make sure that the following two severity benchmarks are not very different values for full nodes vs SPV vs thin client:
WIP |
Need to reorg network attacks: 1 and 2 should be combined. 3 and 12 should be combined with a new attack, which is the tx version of 1 & 2 which deals with addresses. Need to create new countermeasures/criteria to discriminate. 3 is about clustering based on common IP address, whereas 4 can lead to more investigation about the particular IP address. Daniel suggests eliminating 6 (F): By using a bloom filter, the attacker can just look at the blockchain to infer relationships between address, they don't need to see a transaction broadcast from you. |
Network Observer Attack 5 of 16
Related Addresses, or |
2 valid criteria: The second is less robust b/c it's based on the probability that the peers aren't colluding. |
for I.D and II.G the info leaked is: related identities |
Tonight myself, @crwatkins, and @dcousens discussed re-organization of network attacks. We discussed proposed changes in the above comments and some offline work we've been doing. A few notes:
Note that Core's applying timelock to transactions based on current height may violate this countermeasure -- food for thought. a comment about a criterion in the Hjson doc:
Once we’re happy with our working draft in a Google Drive doc, I’ll make a PR to the working copy on GitHub and try to explain all the changes in commit messages. |
…fold into II.A Source: OBPP Network Attack Notes google doc, non-reorganized section. The Note in this doc says: > Notes: Daniel suggests removing this one, see GitHub issue OpenBitcoinPrivacyProject/wallet-ratings#135 > TODO: This looks like a good idea, already captured in criterion for II.A. Need to move CM23 to that attack or elsewhere. I moved CM23 to attack II.A and added an example scenario to help indicate that this scenario falls under that attack now. Note that this attack was excluded from the reorganized section of the doc on the basis of deleting it.
We'll put some notes about our discussion of severity benchmarks in this issue.
Severity benchmarks help us determine weight or effectiveness of elements in the threat model by providing more granularity and systematic metrics for obtain weights and effectiveness scores.
They should be
For this edition, I would suggest that we do not list the same benchmark in a node's children, and that we use the same set of benchmarks for all cousin nodes to ensure that we're doing apples-to-apples comparisons.
The text was updated successfully, but these errors were encountered: