Bitcoin Forum
July 02, 2024, 07:34:18 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 [799] 800 »
15961  Bitcoin / Bitcoin Discussion / Re: Are you struggling for passwords for wallet encryption ? on: September 24, 2011, 02:18:34 AM
He goes as far as claiming that "D0g....................." is stronger than "PrXyc.N(n4k77#L!eVdAfp9" based simply on the length. That's preposterous ! The first password has 36 bits of entropy while the second has 150 bits, assuming a cracker aware of the "technique". Presuming that you are smarter than the attacker is the road to security hell.

I've been wondering about that-- is it possible to write a password cracker that generates all the lower-entropy passwords first?

That's the kind of theoretical computer science problem that it seems like should have an answer, or have a proof that it is equivalent to the halting problem.

There are engines that work that way but they don't handle the example provided well.

One well known example is Jack the Ripper an open source powerful cracking engine.  It starts with a root word dictionary of common root words used in passwords (pull from prior password compromises, the largest being an hotmail password hash file which didn't use a per user salt.  This allowed pools of hackers to brute force that list to determine common password root words with a very large sample.

Essentially the engine takes a root word and "mangles it".  
Applies permutations of
1) capitalization changes
2) simple substitutions d0g for dog
3) apply suffix of symbols & numbers

so words with small amount of deviation from a root password have a reasonable chance of being compromised. However quickly the number of pemutations start adding up and it is better to just try brute force of all permutations.

In the example above both the high and low entropy passwords would be tough to brute force.  While the more complex one is indeed stronger they are both beyond limits of current algorithms and an attacker would need to resort to brute force.  The only exception would be if the attacker knew you were using a single repeated symbol  Even if they did one would greatly increase the effective entropy by using a second symbol.

d0g.....................................................!

In most password breaches it simply isn't worth it for an attacker to search exhaustively.  In Mt Gox attack the attackers obtained the password hash file and compromised accounts until further cracking didn't warrant the risk of delaying the attack.  Since the attack space grows geometrically at some point it isn't worth it to try and compromise more accounts.  Simply put the accounts breaches were the ones that were so easily cracked it was worth delaying the attack. Once the had got all the low hanging fruit they attacked.

The unique challenge with bitcoin is that an attacker could keep brute forcing a wallet for a very long time.  The counter solution would be to periodicaly move funds to a new address.  Maybe some future version of bitcoin client (or a high security variant) could do something like that.  One address (or group of adresses) would be designated the "savings account" and keep the large balance of coins. 

Now say wallet.dat is stolen and attacker begins to brute force it.  The bitcoin client would periodically (period set by user say once per month) create a new address transfer funds to that address and then stop using old saving account addresses.  This now limits the attacker attack horizon to < 15 days on average.  IF the compromise the wallet.dat they stole AFTER the funds are moved it is worthless.






15962  Bitcoin / Mining software (miners) / Re: CGMINER CPU/GPU miner overclock monitor fanspeed in C linux/windows/osx 2.0.4 on: September 24, 2011, 02:01:03 AM
Also: lets say you mine 500Mh/s to Bitcoin
Please tell me how it is possible to add hashes to Namecoin, without reducing the hashs sent to Bitcoin?

THAT IS WHAT MERGED MINING DOES.

Look I am no fan of merged mining but you ranting on about things you don't understand is equally stupid.

The longest part (i.e. 99+) of mining is creating the hash from the nonce.

This is how bitcoin mining works.
Take nonce and create hash.
Check if Hash matches BITCOIN Target.
Repeat.

This is how namecoin mining works.
Take nonce and create hash
Check if Hash matches NAMECOIN Target.
Repeat.

See anything similar?  See any way you could do both at the same time?

This is how bitcoin mining works.
Take nonce and create hash.
Check if Hash matches BITCOIN Target.
Check if Hash matches NAMECOIN Target.
Repeat.

One hash two target checks.  While cgminer doesn't support it today it would take a small code change for it to support namecoin. If it doesn't honestly I don't really care I just find it annoying when people rant on and on about something they are clueless about.
15963  Bitcoin / Bitcoin Discussion / Re: Are you struggling for passwords for wallet encryption ? on: September 24, 2011, 12:10:59 AM
It's quite possible, depending on the algorithm used and the size of the attacker. The key-space for 9 characters is 6.37 x 10^17 so assuming it's a SHA256 salted hash then the current bitcoin mining network at 15THash/sec will exhaust the keyspace in 12 hours. The US government can probably do it in minutes. You could rent the current mining network for a small multiple of t 6*50BTC*5$ = 1500$/hour, assuming a market for cracking SHA256 hashes would exist.
To escape even the US government use a 16 character random password not generated by a human (no inter-character memory, characters are statistically independent). That is indeed hard to remember.

You obviously haven't heard of key strengthening.  Nobody (including the bitcoin client) simple takes password -> SHA1 -> key.  That would allow the average GPU to attempt 100 million to 1 billion passwords per second.  An obvious an huge security flaw.

Instead you take password -> SHA1 -> output -> SHA1 -> output .... 10K iterations -> key.  Now the number of permutations is limited by how fast you want the client to respond.  An excel file for example does 17,500 permutations.  The bitcoin client picks a permutation count that is dynamic depending on how fast the owners computer is.   The goal is to increase the length of time to hash one password.  The user isn't hindered.  Do you really care if it takes bitcoin client 1.2 seconds to open instead of 0.00000000000000000000000000000000000000001 seconds?  However by increasing the computation load to try one password you vastly reduces the effectiveness of attacker's hardware.


So your hypothetical example of 15TH/s exhausting the keyspace in 12 hours.  that is for 1 hash = 1 key.  If it is 10K hashes = 1 key then it isn't 12 hours it is 120,000 hours = 14 years.  If it is 100K hashes per key it is now 140 years.    Even if the govt had 100 TH of computing power it would take them over a year to crack.  Here is the great thing .... adding a single digit would increase size of keyspace by a factor of 94x.  So now 100TH would take almost a century.  Even 1 PH would take a decade.

The bitcoin implementation goes a step even further by using dynamic key strengthening.  Every time you set or change the password it sets the permutations of key strengthening based on current hardware.  So as computer hardware gets faster your passphrase gets more difficult.  Everytime you change your passphrase it changes the permutation count based on how powerful your hardware is.

If someday a bitcoin client uses GPU to hash the password well then the permutation count could be in the millions.  In that scenario even a 15 TH network could only try 1.5 million passwords per second.  Sounds like a lot but to exhaust a 9 random digit password would require over 12,000 years.

More info on key derivation functions:
http://en.wikipedia.org/wiki/Key_derivation_function
http://en.wikipedia.org/wiki/PBKDF2
15964  Bitcoin / Bitcoin Discussion / Re: Are you struggling for passwords for wallet encryption ? on: September 23, 2011, 09:23:59 PM
The MtGox incident showed that people writing password crackers are much more clever than most people think, so these kinds of passwords are likely to be cracked. 8-9 bytes of random chars is better than fairly long strings of words, even if they are obfuscated.

No it didn't.  Show me one example of someone with a 20+ char password that was brute forced.  It is computationally infeasible with current technology.

There exists databases of know COMMON passwords taken from prior online hacks (hotmail was one of the largest).  The most popular one contains roughly 14.1 million known passwords and substitutions of known passwords.  So one can hash every password in the database and compare it against stolen password hash file looking for matches.

Remember in an attack like Mt Gox, 90%+ of accounts WEREN'T hacked.  If an attacker gets hash file they don't need to hack every account.  Just the 1% that are the weakest.  Mt Gox was a combination of rookie mistakes by Mt. Gox combined with weak passwords combined with people who didn't update their password.

Still password databases don't contain long complex pass-phrases because as password length increases the likelihood the password is used decreases and it isn't cost effective to selectively attempt those less likely pass-phrases.  Brute forcing 20+ characters is beyond our computational ability even IF you told the attacker it is all lowercase assuming some key-strengthening was done.

That remind me I should check if bitcoin client does any key-strengthening to reduce the number of attacks per second (i.e. PBKDF2) http://en.wikipedia.org/wiki/PBKDF2

On edit:  Looks like bitcoin wallet does some dynamic key strenghening.  Nice feature.  Now if they just used OpenCL to generate key it would vastly reduce the ability to execute a brute force attack.

Quote
Technical details of wallet encryption
--------------------------------------
Wallet encryption uses AES-256-CBC to encrypt only the private keys
that are held in a wallet.  The keys are encrypted with a master key
which is entirely random.  This master key is then encrypted with
AES-256-CBC with a key derived from the passphrase using SHA512 and
OpenSSL's EVP_BytesToKey and a dynamic number of rounds determined by
the speed of the machine which does the initial encryption (and is
updated based on the speed of a computer which does a subsequent
passphrase change).
Although the underlying code supports multiple
encrypted copies of the same master key (and thus multiple passphrases)
the client does not yet have a method to add additional passphrases.

At runtime, the client loads the wallet as it normally would, however
the keystore stores the keys in encrypted form.  When the passphrase
is required (to top up keypool or send coins) it will either be queried
by a GUI prompt, or must first be entered with the walletpassphrase
RPC command.  This will change the wallet to "unlocked" state where the
unencrypted master key is stored in memory (in the case of GUI, only for
long enough to complete the requested operation, in RPC, for as long as
is specified by the second parameter to walletpassphrase).  The wallet is
then locked (or can be manually locked using the walletlock RPC command)
and the unencrypted master key is removed from memory.


Quote
8-9 bytes of random chars is better than fairly long strings of words
This is true.  Nobody said otherwise.  However most people tend to forget 9 random characters (and it must be purely random to have more entropy AND never be used on any other site/application.   As a result most people don't use purely random single use passwords and figure an easier substitution password (as indicated in the cartoon) is good enough.  The reality is despite it being harder to remember they lack any useful entropy and can be brute forced relatively easily.  

So yes if you:
a) use 9 random digit (containing upper, lower, number & punctuation).
b) always generate them randomly.
c) never re-use them (password re-use kills any security you have).
d) never store a backup copy digitally.

then nothing is safer.  It is impossible to brute force or use a lookup table assuming the implementation is secure.  You still need to worry about social engineering attacks, fraud, trojans, keyloggers, etc.

Most people don't do that.  Hell I would wager that you likely don't do that.
15965  Bitcoin / Bitcoin Discussion / Re: Are you struggling for passwords for wallet encryption ? on: September 23, 2011, 08:17:59 PM
Meh.  Pick a password that is hard for computers to solve and easy for you to remember.



http://xkcd.com/936/

I tend to use a longer passphrase but one not completely random.

For example:
"To be or not to be a toaster"  (I will remember the famous quote combined with toaster = Battlestar)
"This is my password for Google Universal Life" (A play on the whole password as a password combined with inside joke that someday google will own everything)
"In cryptography we trust, in quantum computing we fail" (an unofficial bitcoin motto and fear of a future SHA-256 killer)

The long password length maxes a large bruteforce attack space.   A smarter attacker would use dictionary to search for word combinations however using more than 4 words makes that prohibitive even with a hashing network.  Even if the attacker used a dictionary of 100K words the bottom password would require 100,000^9 (equivalent to 2^150) for an exaustive search.

There is a danger is using a passphrase that is well known as it could be subject to a precomputation attack which is why we conduct word substitution.

The nice thing is the weirder you are the less likely any phrase you use come up with be in precomputation database:
"A salt a day keeps both snails and rainbow tables away"

Less entropy than random words (of equal length) but still stronger than most cryptic short passwords and easier to remember than just random words which allow a longer passphrase.  

Be sure to modify a quote to make it psuedo unique (and don't use any I used here).
15966  Bitcoin / Bitcoin Discussion / Re: Article: Citi Bank Slaps Down Bitcoin on: September 23, 2011, 08:07:55 PM
In terms of having a serious discussion, I don't see what their problem is.  I mean, what answer would have been convincing?  And, can Citi quell world citizens' concerns about money laundering through the banking 1.0 system?  They brought up the fact that they work with the regulations of the 149 countries that they have banking licenses in.  Am I supposed to infer that if somebody says an institution complies with banking regulations, then that institution isn't used to launder money?  Why should I believe that?  I don't know yet exactly how the discussions went at the conference, but this article makes it sound like a bunch of fifth graders trying to sound like adults at a school hosted debate.

That is their game plan.

Step 1) Pretend current bank system is immune to money laundering.
Step 2) Require any competitor to be immune to money laundering.
Step 3) Point out competition can be used for money laundering and use that as an angle to attack it.

Of course is informed consumer questions step 1 the sham false apart.  Then again 99.9% of consumers aren't informed.
Epilogue:  Rampant money laundering continues on existing banking network.
15967  Economy / Securities / Re: Now seeking investors for BitCorp Mining Company on: September 23, 2011, 07:58:52 PM
I like the proposal. 

Can you estimate how much capacity space you have at all three locations. 
Do you have any photos of your rigs / datacenter?
What is the company cost to rent/occupy the three locations?
15968  Economy / Securities / Re: Now seeking investors for BitCorp Mining Company on: September 23, 2011, 07:54:41 PM
Quote
BitCO currently has 1,000 shares outstanding, and no more will be issued.  We would like to sell 100 shares initially,

Huh Huh

It it has 1000 shares already outstanding and no more will be issued then how are you selling 100 shares?  

Is the company selling shares (to raise capital for the company) or is an existing shareholder selling their shares (no capital to company, merely ownership change).
Maybe it is just the wording but I read it a  couple times and kept coming back to Huh

15969  Bitcoin / Bitcoin Discussion / Re: Centralization in a decentralized Bitcoin world makes it unstaneble - idea on: September 23, 2011, 07:50:05 PM
Illegal?

I choose the wrong word, but I think you understand my point of view. Change it to wrong/unethical/improper. Everyone of us can vote with our BTC and fiat currency's, if a exchange do have a "unethical" way of doing business, then they shouldn't be in the Bitcoin Economy, it's all about common sense.

Well that makes a little more sense.  Still people HAVE voted w/ their BTC.  They have voted for Mt. Gox.  Like any democratic function if you want it to be open you also have to respect the choice made.

The thing to do now is to educate others.  Still that will be a tough task.  Mt Gox provides liquidity.  Centralized or not that is a tangible benefit.  It will be tough to convince people the intangible risk of centralized exchange is more important than the very tangible benefit of higher liquidity and smaller spreads.
15970  Bitcoin / Bitcoin Discussion / Re: Centralization in a decentralized Bitcoin world makes it unstaneble - idea on: September 23, 2011, 07:18:33 PM
Illegal?

Even if that was a good idea (which I don't think it is) how exactly does a goup of bitcoin users make something illegal?  Going to arrest them w/ bitcoin police?  Try them in bitcoin court?  Put them in bitcoin jail?

If distributed exchanges provide a superior product then they will gain marketshare, otherwise they wont't.
15971  Bitcoin / Mining / Re: Mining Farm Cooling on: September 23, 2011, 05:13:44 PM
The upside is Koolance coolant is non-conductive and that's important. I had a small leak develop and didn't hurt any components. It was messy as hell but did not cost me anything to fix it. Engine coolant isn't designed to be non-conductive so you could end up with a very expensive experiment if your not careful.

Distilled water is non-conductive, costs <$1 per gallon and has higher thermal conductivity.
15972  Other / CPU/GPU Bitcoin mining hardware / Re: VRM temperatures on: September 23, 2011, 05:00:39 PM
My aircooled 5970 (Core @ 920) runs 80C.  A pair of 6950s (unlocked and core @ 900) run 85-90C.  Both are with 25C ambient temps.  I don't have access to the other machines to check.

I just switched to some watercooling and 3x 5970 have VRM running @ 63C (max over 48 hours).  Grin  That is just at Core 880 taking it slow as that is a lot of thermal energy to dissipate.

A lot may depend on the cooling design and be board specific.  The 5970 reference design for example has an outlet "duct" from the fan that diverts some of the cool air directly across the VRM.  Since the fan is located at the VRM "end" of the card the coolest air actually hits the VRM (compared to a design with fan in the middle).
15973  Bitcoin / Pools / Re: [~30 GH/s] BitMinter.com *** 150 BTC promotion! *** 6-11% MORE BITCOINS *** on: September 23, 2011, 04:52:34 PM
One thing I have noticed and I am not sure if it is a true slowdown or just a bug is that when minimized the program runs faster (or at least reports it does).

Simple experiment.

I have a 5970.  I get ~720MH/s.  If I minimize bitminter, wait a few minutes and then open it the "speedometer" is at 750MH/s.  It then predictably falls off slowly back to 720MH/s.

750 vs 720 ~ 5% so not insignificant.    I just noticed this today over a RDP session so maybe it only happens when viewing remote?

I just don't have detailed enough stats to see if it really is a speed change or if it some graphical/reporting bug.

On edit:  I guess I could use the reset counter.  Run it for a couple hours "visible" record time & shares.  Reset.  Run it for a couple hours "hidden".  Compare shares to expected hashrate.  I will try that tonight.

Anyone else notice this.  Pretty easily to replicate.

1) start bitminter.
2) run w/ bitminter app visible until hashrate stabilizes.  record hashrate
3) minimize bitminter
4) restore bitminter and confirm changed hashrate.
5) watch hashrate decay back to number recorded in step 2.
15974  Bitcoin / Pools / Re: [~30 GH/s] BitMinter.com *** 150 BTC promotion! *** 6-11% MORE BITCOINS *** on: September 23, 2011, 04:49:34 PM
The problem with opening the source is that this alone does not solve the trust problem. When you start the client, Java WebStart checks the server to see if there is a newer version. If there is, it replaces the binary code you have with new code from the server. So I could show you some clean source code, and then serve you bad binary code the next time you start up the program. Kind of like a bait and switch.

True but one could hash both a "known good" version and the version downloaded from server.  If the hashes don't match then the code has been changed/tampered.

Quote
The same thing goes for open-source miners. If you just download a binary compiled by someone else, how do you know which source code they compiled it from? They could have put anything into the binary. You have to download the source code and compile it yourself. Preferably you should also do a security review on it yourself, but you can of course hope that someone else did, if it is a popular program and the source has been available for a while.

The community is safer even those who download precompiled versions because if ANYONE who does compile notices something unusual they can notify others, start and investigation, create a thread, etc.  With source completely closed you choices are limited to a) run it b) don't run it.  Period.

Quote
I see Java WebStart as one of the big benefits of this miner. You don't have to download, compile or even install anything. Just click and off it goes. Maybe it helps to just open source it even if that by itself gives no real security. Security theatre often works to calm people.  Cheesy Just kidding.

W/ java webstart 99.9% of users likely will still just run it but it is more difficult to get away with malfeasance if source code is available for the other 0.1%. 

How many people compile chrome (technically chromium)?  Those that don't still benefit from those that do.  While open-source isn't a magic bullet to call it security theater is silly.
15975  Other / CPU/GPU Bitcoin mining hardware / Re: VRM temperatures on: September 23, 2011, 03:45:30 PM
I wouldn't fell comfortable with VRM @ 100+ 24/7.  When they fail they fail big.

Most of the time unless a card is defective it will crash before it can sustain core temps that permanently damage it.  Not so with VRM.  They can provide stable power (and thus prevent a crash which would save them) right up till the end. 
15976  Bitcoin / Mining / Re: Why You Haven't Seen Miners Leave in Hordes..... on: September 21, 2011, 02:42:48 AM
Also the previous ROI% were simply unsustainable.

Mining has no barrier to entry and there is minimal advantage when it comes to economies of scale.
Somewhat unusual the highest ROI is for people doing it "part time" reusing existing hardware.  For example a gamer who already owns and uses a high end gaming rig that discovers bitcoin and mines for some beer money (or the hope/chance to get rich).  His hardware has an effective cost of $0 because it is a sunk cost.  He already bought it and would buy it again even if bitcoin didn't exist.

High ROI situations only exist when there is some competitive advantage or barrier to entry.  Also anyone using open-source mining software and off the shelf hardware has no competitive advantage (that can be exploited for higher ROI%) over other miners.   There is no market in the world that has no barrier to entry where one can earn 5000% annual ROI.  Free markets don't work that way.  High ROI attacts competition unless the ROI is crushed.

Eventually the "mining market" will stabilize on a low but sustainable ROI.  Something in the 5% to 20% annually range based on how risky mining is perceived to be.  Ironically the thing that people want the most will result in even LOWER profits for miners.  If bitcoin takes off and becomes very mainstream and daily volatility falls then the risk in mining decreases and economic theory tells us the margin (profit) will decline also.

Now granted if your write a customer miner (and keep it a secret) that gets 10% higher hashes than public miners then you have a competitive advantage.  If you discover a FPGA breakthrough and build a massive FPGA cluster lowering your operating expense then you also have a competitive advantage.  However so far everything about bitcoin is rather open.  People share miners, kernels, fixes, enhancements.  There is an open source FPGA project, etc. 
15977  Bitcoin / Bitcoin Discussion / Re: Beenz vs Bitcoin on: September 20, 2011, 08:22:02 PM
Value is guaranteed.

I have to admit the "value is guaranteed" is open to debate on 40% swings in price every 12 hours.

Well the value has grown over 1000x since the inception of Bitcoin two years ago. I think it's safe to say it's still ahead albeit going through a growing pain.

That isn't a guarantee.  Those that bought BTC @ $30+ can they exchange them back for $30 cash ea?  If not then there is NO guarantee of value.
15978  Other / CPU/GPU Bitcoin mining hardware / Re: Gigabyte X79-UD7 on: September 20, 2011, 08:14:16 PM
I am guessing when it is released, maybe somewhere around 200 bucks.

I wish.

The current model ($379)
http://www.newegg.com/Product/Product.aspx?Item=N82E16813128472

If I remember right when this model first launched it was $450+.

Yeah X79 is a new chipset and socket but this is Gigabytes top of the top of the topline model.  You won't even see a refurb OEM going for <$299.
15979  Bitcoin / Mining / Re: Low mhas issue on: September 20, 2011, 08:13:28 PM
Come on your got to provide at least some details.

"I have this car and one time it went good but now when I go it is slow"  Please fix.

OS?
Miner & Version?
GPU Temps?
Driver version?
Overclocked?  How hot did the cards get?
Do you have any details on the last run (voltage, temp, power draw, etc)?
Is this a dedicated rig or are you running other apps on it?
15980  Bitcoin / Mining / Re: Best pps pool on: September 20, 2011, 08:05:51 PM
I hop ..... but ars is my backup pool.  Never had a problem with them.   Seems very solid outfit.
Pages: « 1 ... 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 [799] 800 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!