i have noticed the same trait on similarly brillant people, e.g., gmaxwell
always try to squeeze as much information as possible in one single post
it's no exaggeration to say they could put in one post someone's life's worth of learning
omg, when can i have 120 people paying attention to my TLSNotary post? let alone trying it out
waxwing
120 isn't cool. You know what's cool? 120,000 :)
writing this down in case i forget it: imagine 2 arbitrators, both have to commit to their arbitration verdict and then reveal. if disagree, N other arbitrators check. the "loser" gets punished.
not a tlsnotary specific idea of course
oakpacific
waxwing: i am pondering about the fundamental question of the different natures of consensuses
also, the practical problem is how to bootstrap the network, such a scheme would work when we have already have a considerable number of arbitrators, but can't protect us when there are only a few
belcher joined the channel
belcher has quit
belcher joined the channel
waxwing
yeah, like i say, more just about decentralised arbitration, than about tlsnotary
belcher joined the channel
belcher joined the channel
mkarrer joined the channel
oakpacific
waxwing: it would be greatly appreciated if you can spare a minute to mail partners@bitreserve.org
waxwing
oakpacific: sure, just send it to me. is that what you mean?
oakpacific
waxwing: i can write the text no problem
but just say we see that you are interested in proving your bank balance, and we have a software that can do it without accessing the account is ok
waxwing
oakpacific: you sure you don't want to write it? i don't know anything about it :)
oakpacific
waxwing: well, they are basically like tether.to, we shouldn't pretend to know more than we do i guess
just talking about proving bank balance
and my english is not as good
waxwing
i'll proofread no problem :)
i can send it from the group mail
oakpacific
waxwing: cool
waxwing
oakpacific: mkarrer : this is what i was talking about last couple of days. robert sams' stablecoins idea: i think this whitepaper is excellently written
a pure market (auction) mechanism to separate speculative demand from transactional demand
dansmith_btc
waxwing, how is tls downgrade handled ? the server must respond with a lower tls version?
waxwing
dansmith_btc: hang on a sec
dansmith_btc: ok, now i have to remember :)
i believe the server provides its suggestion in the server hello
the biggest surprising thing to pay attention to is that the tls version in the premaster secret must be the same as what was originally suggested in the client hello, not the lower version negotiated during the handshake
dansmith_btc: i believe what i wrote there is basically correct, in particular see the 'server version' field of server hello in the RFC. Is that enough info?
waxwing, i grepped tlsn_ssl for tlsver and I cant see where the version in server hello is checked. I would expect it to be done in start_handshake but it is not done there.
i think that check_complete_records should now be unnecessary actually; i think its work has been replaced by tls_record_decoder etc. in the ssl.py file
not sure exactly why i chose to put it there.
oakpacific: you'll have to give me more than that :)
dansmith_btc: if you want me to expand on what i just said, let me know.
oakpacific
waxwing: i was referring to the article's author
waxwing
ok. still don't get it
oakpacific
well, the title is plain wrong, so...
waxwing
you mean because it says egopay is a bitcoin thing?
oakpacific
yeah, egopay simply cannot be called a bitcoin payment processor
it's a e-wallet platform that has existed many years before bitcoin
waxwing
right, that was my first thought when i saw the article, but i wasn't sure. so my 'ffs' was a mixture of that and the fact that ... people keep running off with the (various types of) money :)
dansmith_btc: if you understood what i said above, then to continue the thought, i'm wondering if it makes a lot more sense to put the downgrade check in the TLSServerHello constructor.
dansmith_btc
waxwing, ok, that makes sense now. Although checking every record for a downgrade is a hack. Also, what if reliable site PMS uses 1.1 but the audit site downgrades to 1.0 - then the prepared PMS will be rejected by the audit site because the prepared PMS contains 1.1
waxwing
a couple of things
first, it's not every record, but every handshake record
but i agree, we should put it somewhere else e.g. serverhello constructor
re: reliable site vs audit site. i thought i had this figured out, but now i'm confused again. let me have a think.
ah yes
the point is what i said above; the PMS must use *what the client hello originally suggested* , not what is negotiated afterwards
this is really lucky for us
because without that foible, we would not be able to do downgrades.
so we always suggest 1.1, so 1.1 is what appears always in the PMS starting bytes.
dansmith_btc: is it making sense?
dansmith_btc
ah, ok, thanx, making sense now.
HostFat joined the channel
oakpacific
waxwing: hoho, finally get back the key
waxwing: do you remember the time you signed into the group email account
google has shown a sign-in attempt from Lamaca Cyrpus at Jan 11