This has been assigned CVE-2022-35913: 
https://www.cve.org/CVERecord?id=CVE-2022-35913

/dev/fd0

Sent with Proton Mail secure email.

------- Original Message -------
On Thursday, July 14th, 2022 at 9:25 AM, alicexbt via bitcoin-dev 
<bitcoin-dev@lists.linuxfoundation.org> wrote:


> Hi bitcoin-dev list members,
> 
> 
> STONEWALLx2[1] is a p2p coinjoin transaction in Samourai wallet. The miner 
> fee is split between both participants of the transaction.
> 
> 
> ==========================
> Problem
> ==========================
> 
> Antoine Riard shared the details of DoS attack in an [email][2] on 21 June 
> 2022.
> 
> Proof of Concept:
> 
> 1) Download Samourai APK, create testnet wallet, get some coins from faucet 
> and claim a paynym in 2 android devices. Consider Bob and Carol are using 
> these devices.
> 
> 2) Bob and Carol follow each other's paynyms. Carol is the attacker in this 
> case and she could make several paynyms.
> 
> 3) Bob initiates a Stonewallx2 transaction that requires collaboration with 
> Carol.
> 
> 4) Carol confirms this request in the app.
> 
> 5) Carol spends the UTXO from wallet configured in electrum with same seed 
> before Bob could complete the last step and broadcast STONEWALLx2 
> transaction. It was non RBF [transaction][3] with 1 sat/vbyte fee rate and 
> was unconfirmed during testing.
> 
> 6) Bob receives an [error][4] in the app when trying to broadcast Stonewallx2 
> transaction which disappears in a few seconds. The [progress bar][5] appears 
> as if wallet is still trying to broadcast the transaction until Bob manually 
> go back or close the app.
> 
> 
> ==========================
> Solution
> ==========================
> 
> Suggestions:
> 
> a) Error message that states collaborator spent her UTXO used in STONEWALLx2, 
> end the p2p coinjoin process, unfollow collaborator's paynym and suggest user 
> to do such transactions with trusted users only for a while.
> 
> b) Once full RBF is used by some nodes and miners, attacker's transaction 
> could be replaced with a higher fee rate.
> 
> Conclusions by Samourai:
> 
> a) As the threat involves the collaborator attacking the spender. We strongly 
> advise that collab spends be done w/ counterparties with which some measure 
> of trust is shared. As such, this does not seem to have an important threat 
> surface.
> 
> b) Bumping fee won't be simple as fees are shared 50/50 for STONEWALLx2 
> spends. Change would have to be recalculated for both spender and 
> collaborator. Collab would either have had already authorized a possible fee 
> bump beforehand or would have to be prompted before broadcast.
> 
> 
> ==========================
> Timeline
> ==========================
> 
> 22 June 2022: I emailed Antoine after testing STONEWALLx2
> 
> 23 June 2022: I shared the details of attack in a confidential issue in 
> Samourai wallet [repository][6]
> 
> 07 July 2022: TDevD (Samourai) acknowledged the issue and wanted to discuss 
> it internally with team
> 
> 14 July 2022: TDevD shared the conclusions
> 
> 
> ==========================
> Credits
> ==========================
> 
> Antoine Riard discovered DoS vector in p2p coinjoin transactions and helped 
> by responding to emails during testing.
> 
> 
> [1]: https://docs.samourai.io/spend-tools
> [2]: 
> https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-June/020595.html
> [3]: 
> https://mempool.space/testnet/tx/42db696460a46f196f457779d60acbf46b31accc5414b9eac54b2e785d4c1cbb
> [4]: https://i.imgur.com/6uf3VJn.png
> [5]: https://i.imgur.com/W6ITl4G.gif
> [6]: https://code.samourai.io/wallet/samourai-wallet-android
> 
> 
> /dev/fd0
> 
> 
> Sent with Proton Mail secure email.
> 
> _______________________________________________
> bitcoin-dev mailing list
> bitcoin-dev@lists.linuxfoundation.org
> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to