Bitcoin Forum
June 17, 2024, 06:32:40 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 [170] 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 ... 590 »
3381  Bitcoin / Bitcoin Discussion / Re: Antbleed: A remote shutdown backdoor in antminers on: April 26, 2017, 10:18:34 PM
This is something I was wondering about. Considering that they have the potential to shutdown hardware I would be surprised if there wasn't the possibility for them to start bricking hardware as well. I hope that Antminer gets this fixed, but it sure as hell might cause issues for a lot of people using their hardware if this doesn't start to get fixed quickly. Constant shutdowns and restarts aren't something that a miner wants to deal with a lot of the time, and a bricked piece of hardware is definitely not something they want.
There seems to be an exploit where you can send it more data than it is expecting and thus write into memory that you shouldn't thus allowing for a remote code execution exploit.

Edit: That is actually not exploitable. However bitmain supposedly has a way to reflash firmware remotely: https://www.reddit.com/r/Bitcoin/comments/67qwqv/antbleed_exposing_the_malicious_backdoor_on/dgsk6cf/
3382  Bitcoin / Bitcoin Discussion / Antbleed: A remote shutdown backdoor in antminers on: April 26, 2017, 09:22:30 PM
Quote
Antbleed is a backdoor introduced by Bitmain into the firmware of their bitcoin mining hardware Antminer.

The firmware checks-in with a central service randomly every 1 to 11 minutes. Each check-in transmits the Antminer serial number, MAC address and IP address. Bitmain can use this check-in data to cross check against customer sales and delivery records making it personally identifiable. The remote service can then return "false" which will stop the miner from mining.

Read http://www.antbleed.com/ for more info

The shutdown backdoor has been independently tested by multiple people.

Edit:

I have analyzed the code and I have determined how this is happening and most likely why it was put there.
First, let's start with the how. The firmware will spawn a thread which calls the send_mac function which, as the name implies, sends data about the machine to the AUTH_URL auth.minerlink.com. The device then will attempt to receive data from the server and check if the response is false. If it is, the function returns true which sets the stop_mining global variable to be true.

When that variable is true, in the temperature checking thread, it will set the status_error global variable to true. That will then tell the work update function to not send out jobs so it is no longer mining.



Now for the why.

Bitmain previously was going to launch a service called Minerlink. This service never launched, but it was intended get the "real-time miner status remotely". There is probably a feature that allows you to make sure that the only miners submitting work for you are your miners, hence the need for an auth url. It is also possible that another feature was to allow you to remotely stop a machine from mining if it were misbehaving. This would explain why this code was put there in the first place. However, since minerlink does not exist, this functionality is now a liability and should have been removed long ago.
3383  Bitcoin / Bitcoin Technical Support / Re: How to connect the qt-wallet with website? on: April 26, 2017, 09:12:12 PM
Use the JSON-RPC interface. You can write some php code that will send a POST request to the bitcoind to get the information that you need.
3384  Bitcoin / Bitcoin Technical Support / Re: About Raw Transactions on: April 26, 2017, 07:07:26 PM
Yes, I am using "tx_hash_big_endian" already
Ah, I missed that.

(also, if this helps, tx is not yet confirmed)
That is the problem. I just checked with my node. The transaction has been dropped from my node, so it has likely been dropped from most nodes on the network (block explorers being the exception). You will need to first broadcast the unconfirmed transaction which you are spending from and then broadcast your spending transaction.

Besides that, it looks like you are using the wrong public key as it does not match the hash specified in the output script you are spending from. You are probably using the wrong private key.
3385  Bitcoin / Bitcoin Technical Support / Re: 2 days - 0 confirmation on: April 26, 2017, 06:16:37 PM
What can I do about this to avoid delays in the future?
Use a different exchange. Since you have no control over how the transaction is made, there is nothing you can do.
3386  Bitcoin / Bitcoin Technical Support / Re: 2 days - 0 confirmation on: April 26, 2017, 06:05:12 PM
The transaction fee on all of your transactions is too low. It pays a fee of 100 sat/byte whereas the current recommended fee is 200 sat/byte according to https://bitcoinfees.21.co/.

Read https://bitcointalk.org/index.php?topic=1802212.0 for what you can do about the transactions. Unfortunately, because you are using exchange wallets, there is not much you can do besides waiting.
3387  Bitcoin / Bitcoin Technical Support / Re: About Raw Transactions on: April 26, 2017, 06:02:51 PM
The "missing inputs" error has nothing to do with input scripts. The problem is because you have the wrong txid. For some reason, the tx_hash given by blockchain.info is in little endian but basically everything takes the txid as a big endian argument. You should use "tx_hash_big_endian":"c54ffd2b302b03f81342fe0c2c42960dd160d6b1ad8db7d3539f83a1ca8cb5d5", for the txid of the transaction that you are spending from.
3388  Bitcoin / Electrum / Re: Receiving multiple payments with one adress with electrum on: April 26, 2017, 01:12:18 PM
It does not matter what address you use, they will all be tracked for payments. There is nothing you need to to do to "save" an address. All addresses after being generated are tracked forever. Addresses are never deleted nor is there anything that prevents you from using one multiple times.
3389  Bitcoin / Development & Technical Discussion / Re: Deriving an ECDSA uncompressed public key from a compressed one on: April 26, 2017, 01:10:45 PM
There are libraries (e.g. python-bitcoinlib) that do this stuff for you so you could use those instead of figuring out the calculation yourself.
3390  Bitcoin / Bitcoin Technical Support / Re: [HELP] Bitcoin Core application requested the Runtime to terminate on: April 26, 2017, 01:04:36 PM
Bitcoin Core is running out of memory since you only have 4 GB of RAM. Try upgrading to Bitcoin Core 0.14.1 which has reduced the memory usage in order to run on lower RAM systems.
3391  Bitcoin / Armory / Re: Armory address messed up? on: April 26, 2017, 01:01:14 PM
What version of Armory and Bitcoin Core are you using?

Can you please post the log files?

Is Armory fully synced? In the bottom right hand corner it says how many blocks it has synced. Check that that number matches what Bitcoin Core says and what a block explorer says.
3392  Bitcoin / Armory / Re: 95.1 is not working on either of my Macs... Is there any reason not to use 93.3? on: April 25, 2017, 06:55:27 PM
Please provide armorylog.txt and dbLog.txt.

What version of Bitcoin Core are you using? Have you removed the databases (moved, renamed, or deleted) in the Armory datadir when you upgraded? Are you running Bitcoin Core manually or letting Armory run it?

0.95.1 has many benefits over 0.93.3, including a much much smaller database (a few MB vs. several GB), faster loading time, and segwit compatibility.
3393  Other / Beginners & Help / Re: Having issues going from pre verified to verified on: April 25, 2017, 02:24:56 PM
Who are "they"? What service are you trying to get verified for?

Regardless of whoever it is, users here cannot help you. All you can do is wait for the service to process everything and contact their support.
3394  Alternate cryptocurrencies / Altcoin Discussion / Re: How do I get the private key from a BIP38 key genertated on WalletGenerator.Net? on: April 25, 2017, 02:35:47 AM
I just realized how vague my post was, so I have edited it to reflect my question better. Basically it is a LiteCoin wallet and I am looking to either decrypt the private key (Electrum LTC doesn’t support BIP38), or find wallet software that is compatible with BIP38 encryption.
Since you used walletgenerator.net to create the private key, you can also use it to decrypt the private key. In the wallet details tab, if you enter a BIP38 encrypted key in the "Private key" box, another box will appear for your password so you can get the decrypted private key to import into your wallet.
3395  Bitcoin / Development & Technical Discussion / Re: would a merkle root collision cause a network split on: April 25, 2017, 01:08:33 AM
i thought the merkle root was the hash of all the hashes in the merkle tree. this is not the block header hash?
The merkle tree consists of all of the transactions in the block. The merkle root is only one part of the block header though. There is a version number, the previous block hash, the time stamp, the bits (target), and the nonce in addition to the merkle root which forms the block header. All of those things are then hashed to get the block hash. The merkle root itself is not the block hash.
3396  Alternate cryptocurrencies / Altcoin Discussion / Re: How do I get the private key from a BIP38 key genertated on WalletGenerator.Net? on: April 24, 2017, 10:27:37 PM
You will need a wallet that supports importing BIP38 encrypted private keys. When you import, you will be prompted for your password by the wallet software so that it can decrypt the key.
3397  Bitcoin / Development & Technical Discussion / Re: would a merkle root collision cause a network split on: April 24, 2017, 08:46:54 PM
Both chains? I don't think there would be a chain split. In the case of just a merkle root collision (i.e. block hashes are different due to timestamp or nonce) the blocks with the collided merkle root are just two valid blocks and you just have the normal orphan race.

If you are talking about two block hashes colliding, that's an entirely different and more complex matter.
3398  Other / Meta / Re: My account - johnjack - was hacked on: April 24, 2017, 03:26:54 PM
There is an old database dump circulating where those that know how to 'decrypt' the password hashes, can access accounts from people that haven't changed their passwords yet.
The hack was in May 2015. OP's account was registered in Nov 2015. His account being hacked is due to something else.
3399  Bitcoin / Bitcoin Technical Support / Re: Dumping private keys vs sending coins (HD migration) on: April 24, 2017, 03:15:24 PM
The only way to make sure that your Bitcoin has the benefits provided by an HD wallet is to send the Bitcoin from your old wallet to your new wallet. Importing the private keys will not be any more useful.

First make sure that Bitcoin Core is shut down. Then make a backup of your wallet.dat file. Move or rename the wallet.dat file so that there is no longer a file named wallet.dat in the Bitcoin Core data directory. Start Bitcoin Core and it will generate a new HD wallet and a corresponding wallet.dat file. Get as many addresses as you need and copy them somewhere. Then stop Bitcoin Core and make a backup of the new wallet.dat file. Move or rename it so that there is no longer a file named wallet.dat in the datadir. Then move or rename your original wallet file back to wallet.dat in the datadir. Start Bitcoin Core again. Send Bitcoin to the addresses that you copied down. Then stop Bitcoin Core, and replace the wallet.dat with the new wallet.dat that was created.
3400  Bitcoin / Bitcoin Technical Support / Re: entropy on: April 24, 2017, 02:30:47 PM
@DannyHamilton: Thank you for your answer.

In otherwords, we ALWAYS use the random number directly as a private key.  We just represent that random number in a way that makes the most sense for it's use.

No, according to @achow101 this is not right.

Please have a look at the following thread:
https://bitcointalk.org/index.php?topic=1871338.0 (post #6)

I am now confused.
The PRNG still produces a random number that is based upon transforming the entropy. Your private key is still a random number.
Pages: « 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 [170] 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 ... 590 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!