Bitcoin Forum
May 26, 2024, 02:09:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 [15] 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 233 »
281  Bitcoin / Armory / Re: Amory stuck at Scanning Database history 1s left on: December 27, 2020, 11:54:10 PM
Either there is a zombie armorydb instance or there is another process listening on the port it is trying to use.
282  Bitcoin / Armory / Re: Help accessing missing P2SH-P2WPKH Segwit address from restored wallet? on: December 21, 2020, 04:03:12 PM
Armory is offline if it isn't allowing you to use SegWit address types. You need to post your logs to get help on that front.
283  Bitcoin / Armory / Re: Passing the watch only wallet file to online PC -security on: December 19, 2020, 11:53:27 PM
Look up the stuxnet story for an example of attacking air gapped machines via a USB rootkit. Spoilers: it was pulled by a state actor, took untold resources and still required physical access to the laptop of one of the engineers working on the target system.

I just wish I could pass the watch-only wallet from offline to online in the same way like a transaction (with QR, sound, webcam,etc).

You can extract WO wallet backups. You'll get 4 lines instead of 2. You can recreate the WO on your online machine in this way, without having to rely on a flash drive.
284  Bitcoin / Armory / Re: Ubuntu 18.04 Armory Error log. Help please on: December 18, 2020, 07:24:00 PM
This is typically when the progress bars are passed a value that is below 0 or above 100. Floating point rounding will do that near 100%.
285  Bitcoin / Armory / Re: Passing the watch only wallet file to online PC -security on: December 18, 2020, 07:22:55 PM
As long as you verify the signature on the software you have downloaded (or built if from source, verifying the sig on the tag), you know your wallet software isn't compromised. Here we're assuming the developer is well established and trusted. This will be our premise for the practical attacks on air gapped signers. We're also assuming there isn't just someone able to point a camera at your screen/keyboard when you type in your password then walk in and steal the signer. We're only addressing software attacks.

At payment time, there are 3 attack angles:

1. Swap the payment and/or change address when constructing the unsigned transaction.

2. Read decrypted private keys at signature time and write them to the flash drive for extraction.

3. Corrupt the offline software to facilitate either of these 2 attacks (swap addresses at sign time instead of during creation).

At receive time, there is just one:

1. Swap the payment address with the attackers.


Defense against these practices are as follow:

a. Your signer should have a strong user and root password. The wallet's binary files should be set to [execute + read only]. This will prevent malware from modifying the code files.
b. Thanks to the previous step, you can have a strong expectation the code that is running is the one you verified. You can therefor trust the addresses it is rendering on screen.
c. You should always verify what addresses you are paying to and what change amount you are getting back before signing any transaction. You should also procure your payment addresses from the offline signer instead of the online machine (which may be compromised). These practices will thwart address swapping attacks

If you are paranoid about the flash drives you are using and USB rootkits, you need to take extra steps:
d. No amount of USB flashdrive corruption can steal coins until after you bring the flashdrive back from the offline signer.
e. In this case using a brand new flash drive per operations when taking data from the online machine to the offline machine prevents all possible leaks through the flash drive. Discard the flash drive, never reuse it. Formatting it is useless, rootkits persist that because they embed themselves in the USB drive's own controller, not the NVRAM.

f. Extract the signed transaction from your signer through other means. You can print out signed transactions in hex. Either write them down (~260 bytes tx will be ~520 characters), or use fancier stuff, specifically QR codes with a camera on the recipient device.
g. Used a 3rd device. The purpose of this device is to receive the signed transaction for inspection before moving to the online machine. This device must be air gapped as well. This device does not need to run Armory, but it can.
h. On the 3rd device, decode the transaction with some piece of software (a very simple offline html page can do that for you), and check the payment addresses.

Finally, take that signed transaction to an online machine (ideally not the one that generated the transaction, so potentially a 4th) and broadcast it.

Note that this is a super paranoid setup, but if you're worried about USB root kits, you have to understand that they are very difficult to deploy since they need to target the victims specific USB hardware (both online and offline machine) + the USB dongle, as well as the software stack used. Introducing new machines and adding hops where the USB dongle isn't involved, as well as cycling dongles, blocks what is an overly expensive and convoluted attack to pull off in the first place.

Honestly, you can boil down good security practices to the following few steps and sleep safe:
- check the sig on the software you download
- don't install garbage on your online machine, bitcoin related or otherwise, do not trust any wallet you had to pay for, only use open source software. If you can't help yourself, have a machine that's cleaner for your actual personal stuff (email, banking, WO wallet, etc...).
- use an offline signer
- keep some fractions of a coin in a hot wallet on your online machine, makes spending small sums painless and acts as a canary.
- check your payment and change addresses at signature time.
- grab payment addresses from your offline machine, not the online one.
286  Bitcoin / Armory / Re: offline dramas on: December 18, 2020, 06:16:14 PM
Get rid of that space in the path. Start ArmoryDB manually with --satoshi-datadir=[/path/to/block/data], see if it starts syncing.
287  Bitcoin / Armory / Re: Armory PaperBackup on: December 17, 2020, 06:53:23 PM
im new here - is it against the rules to send/post btc adresses here on the forum?

I don't think so, some people post theirs in their signature even.
288  Bitcoin / Armory / Re: Ubuntu 18.04 Armory Error log. Help please on: December 17, 2020, 06:52:39 PM
What CPU are you using? I'm guessing it's old. Install the noasm version and try again. I suggest you avoid spaces in your paths too.
289  Bitcoin / Armory / Re: Unable to download updates from "extensions.gnome.org" on: December 17, 2020, 06:51:30 PM
This happens when the installer tries to register the shortcuts in the start menu. I guess the call is either outdated for your version of gnome or you're not using gnome at all.
290  Bitcoin / Armory / Re: Unable to download updates from "extensions.gnome.org" on: December 17, 2020, 12:53:44 AM
Where are you seeing this error?
291  Bitcoin / Armory / Re: Armory PaperBackup on: December 17, 2020, 12:52:59 AM
I've reworked this code into the C++ side recently, I may be confusing the old functionality with the new one. He could get his wallet to restore by modifying the Python code to ignore checksum errors.
292  Bitcoin / Armory / Re: Ubuntu 18.04 Armory Error log. Help please on: December 17, 2020, 12:52:01 AM
Turn off auto bitcoind in the File -> Settings menu.
293  Bitcoin / Armory / Re: Armory PaperBackup on: December 15, 2020, 08:00:57 AM
Last 4 characters shouldn't affect the final ID. Maybe you are getting combinations that have a "repair" candidate. At any rate, you can only use characters from the narrow set.

This is the character set:

https://github.com/goatpig/BitcoinArmory/blob/master/armoryengine/ArmoryUtils.py#L2246

This is the checksum calculation:

https://github.com/goatpig/BitcoinArmory/blob/master/armoryengine/ArmoryUtils.py#L2265
https://github.com/goatpig/BitcoinArmory/blob/master/armoryengine/ArmoryUtils.py#L2404

The hash function is 2 passes of sha256
294  Bitcoin / Armory / Re: Armoury 0.96.5 not going online on: December 13, 2020, 03:30:05 PM
Out of curiosity, are there spaces at all in your paths?
295  Bitcoin / Armory / Re: Armory PaperBackup on: December 13, 2020, 03:28:03 PM
The last 4 characters are checksums. The actual 16 bytes of data per line are encoded in the first 8 "words". You can write gibberish for the last 4 characters if you want. Armory will complain the checksums are invalid and will ask you to explicitly check the proposed wallet id with the one written on your backup. If the two match, you're all good.
296  Bitcoin / Armory / Re: Armory on macOS 10.15 (Catalina) on: December 07, 2020, 08:42:18 PM
Next version will run natively on OSX
297  Bitcoin / Armory / Re: dev branch currently broken? on: December 07, 2020, 07:09:18 PM
Maybe none of this actually affects you. I just remembered the arg list passed to CppBridge has --testnet hardcoded in there. You need to run ArmoryDB with --testnet too.
298  Bitcoin / Armory / Re: Created btc wallet when armory was offline and sen bitcoin to it... on: December 07, 2020, 04:06:12 PM
How many addresses are in your wallet? Consider deleting the Armory /databases folder and letting rebuild. Should take 15~60min.
299  Bitcoin / Armory / Re: dev branch currently broken? on: December 07, 2020, 04:04:53 PM
Here I had to add:
   bridgeArgs.append(["satoshi-datadir", BTC_HOME_DIR])

satoshi-datadir in ArmoryQt/CppBrdige does not currently have an effect. This an argument that only ArmoryDB uses. You are spawning ArmoryDB manually.

Quote
At this point it launches the UI but still doesn't show any progress just as before, and state remains disconnected.

Sorry about the delay. I was gonna tell you to give me the log files but then I realized CppBridge overwrites ArmoryDB's log file, so I went about fixing that and... got into a giant refactoring. Pulled a string, unraveled the whole sweater kinda thing. I'll let you know when I push the new code, couple days from now I expect. Then you'll be able to run CppBridge again and feed me the logs for troubleshooting.
300  Bitcoin / Armory / Re: Armoury 0.96.5 not going online on: December 04, 2020, 10:28:03 AM
Glad that you managed to get it all sorted... I'm beginning to think we need a "sticky" at the top of the Armory section titled "Basic Troubleshooting" that includes the most common things:

1. Is Bitcoin Core actually installed and synced?
2. Is Bitcoin Core running in "pruned" mode? If so, turn it off, go back to Step 1.
3. Are you using the latest version of Armory from https://btcarmory.com/ ? (NOT from bitcoinarmory .com)
4. Are you using the latest version of Bitcoin Core from https://bitcoincore.org?

etc etc...

If you're willing to write it, I'll sticky and lock the thread. Thanks for the help at any rate.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 [15] 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 233 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!