<<  >> (p.6)
    Author Topic: tlsnotary - cryptographic proof of fiat transfer for p2p exchanges  (Read 42899 times)
    nomailing
    Full Member
    ***
    Offline Offline

    Activity: 126
    Merit: 100


    View Profile
    September 28, 2013, 05:00:17 PM
     #101

    The questions you raise wrt AML, orderbook spam and randomly chosen escrow are all valid and warrant consideration. They will however be not implemented for the proof-or-concept launch. Really what I'm concerned about at this juncture is providing free tools which existing crypto-only exchanges can plug into their infrastructure.

    Yeah, I know it's only a proof-of-concept implementation. And it's a very good idea to provide this as a tool to other p2p exchanges. I just wanted to raise the issue so that some people might start thinking about solutions esspecially to the AML problem. Because, if this problem is not solved, everybody who would use the system would have high risks to be involved in criminal activities. Still, I think, it is possible to solve it in a p2p way.

    wrt SSL:
    a banking session consists of one SSL session. However a single SSL session contains dozens on SSL connections. Each of those connections uses a unique encryption/decryption key.
    You are right in that banks don't allow renegotiation, but we don't use it anyway. Renegotiation implies starting a new SSL session, not a new SSL connection.

    You can try it out yourself and ascertain that there are multiple SSL connections withing an SSL session, this way:
    1. You must use Firefox and add an environment variable SSLKEYLOGFILE=/home/user/sslkeylog
    (on Linux we use export SSLKEYLOGFILE=/home/user/sslkeylog and then launch Firefox from the same terminal)
    2. Start Firefox and visit a https website like https://www.mozilla.org
    3. Look in you sslkeylog file: it will contain dozens of CLIENT_RANDOM lines.
    Each of those lines can usually decrypt only a single GET request and server's response.

    Start clicking around and you will see how the entries in sslkeylog grow. For every click you make, a new SSL connection is started.


    Thank you for the instructions! I will try it when I am back at home.

    BM-2D9KqQQ9Fg864YKia8Yz2VTtcUPYFnHVBR
Page 5
Viewing Page: 6