Bitcoin Forum
May 26, 2024, 06:57:52 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 [181] 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 ... 233 »
3601  Bitcoin / Armory / Re: Armory Cold Storage Questions on: October 12, 2014, 03:54:25 PM
Sorry my replies are so staggered, I have a time limit I must wait between posts.

Why would I be unable to get Armory online?

You can receive coins with offline Armory, but you can't spend unless you get Armory online. So get Armory online before you fund your wallet. Common sense. Also, you have to read the tutorials and get familiar with Bitcoin and Armory to get it online. After all, Armory requires a full node.

On the other hand, starting offline Armory is cake and any Bitcoin inept can go as far as creating a wallet and funding it. Then comes the day you want to spend these coins and you realize you don't even have an adequate machine, or have never downloaded the blockchain, and best case scenario, you have to wait a couple days to spend your coins.

So do yourself a favor and make sure you can go online first.
3602  Bitcoin / Armory / Re: Armory Cold Storage Questions on: October 12, 2014, 01:14:24 AM
Once again, thanks for all the help!  Glad I've gotten this all figured out, looking forward to transferring all my coins over to cold storage.  Hoping to get it done sometime this weekend, I'll let you know how it goes!

Please make sure you can get Armory online first.
3603  Bitcoin / Armory / Re: Armory Cold Storage Questions on: October 12, 2014, 12:58:14 AM
1) I didn't read the tutorial, hence idk

2) For offline signing, 12.04 or 14.04 LTS are your better choices. We have offline bundles targeted specifically at those. For the online counterpart, frankly anything can fly as long as you have the necessary hardware resources, granted OSX is the least stable of all due to its love/hate relationship with Qt4.

3) https://bitcoinarmory.com/download/building-armory-from-source/

4) I got no idea, but I suspect you can somehow find equivalent command line calls in OSX's terminal. Either that or run a Ubuntu/Debian VM on your OSX and do it from there.

5) Afaik, if none of the files in the USB have the exe bit set, they can't run, so maybe a chmod -R 600 ./* would make you feel better. Generally, if the attack medium is something as trivial as an autorun file, you'll catch it with a little scrutiny. If it's something like the Stuxnet USB rootkit, you're kebab anyways.
3604  Bitcoin / Armory / Re: Unable to send. Issue with addresses with many small deposits. Logs included on: October 09, 2014, 03:09:20 PM
Reassigned you to CircusPeanut, he should fix that for you.
3605  Bitcoin / Armory / Re: Unable to send. Issue with addresses with many small deposits. Logs included on: October 09, 2014, 12:29:15 AM
Ok, got most of it out, but the only address left with a balance (the original problem address) now has 0.21 BTC that I can't move at all Smiley    I tried some pretty small amounts but it started complaining about fees so I gave up.  I'd like to get it out though, seems like a fairly decent issue.

Coin control gives you control over addresses but not UTXOs. An address can have several UTXOs and in that sense coin control doesn't give you the necessary control to spend that one. Make a ticket (https://bitcoinarmory.com/support), link to this thread and one of us will craft you a custom unsigned transaction to spend the left overs minus the dust.
3606  Bitcoin / Armory / Re: Funds indication error - 0.000000 BTC on: October 07, 2014, 11:04:12 PM
Toy around with the wallet filter, that should help.
3607  Bitcoin / Armory / Re: Armory - Discussion Thread on: October 06, 2014, 11:47:10 PM
Every time I updated Armory (windows 64 bit version) my antivirus software quarantines “guardian.exe”  I wasn’t able to find a satisfactory explanation as to its function.

can anyone shed some light on the following questions:

What does it do? Why does Armory need it?
My Armory seems to functions just fine without it, is there anything I should know or be concerned about? 
Is it safe to ask my antivirus to ignore this file?

Thanks,


If you use auto managed bitcoind, it will be ran monitor the bitcoind instance spawned by Armory. If Armory was to crash, it will kill that bitcoind instance and exit.
3608  Bitcoin / Armory / Re: (!) Armory Brain Wallet on: October 06, 2014, 11:42:24 PM
Address chain extension:

https://github.com/etotheipi/BitcoinArmory/blob/master/armoryengine/PyBtcWallet.py#L1047

Deriving the first key:

https://github.com/etotheipi/BitcoinArmory/blob/master/armoryengine/PyBtcWallet.py#L912
3609  Bitcoin / Armory / Re: (!) Armory Brain Wallet on: October 06, 2014, 03:50:08 PM
About brute forcing. Why I didn't make more iterations? If Armory does complicated scrypt-like work to restore wallet's private key from the Root Key, I really don't need more. Because brute-forcer have to do this work too. So our password is additionally protected from brute-forcing by Armory's algorithm.

We use a precursor to scrypt and a target derivation time on the extend wallet passphrases, that are used to encrypt the entries in your wallet if you choose to encrypt the wallet, on disk.

Wallet passphrases are completely different from root keys. Root keys come from a CSPRNG. Passphrases are created by users, so they are extended properly for added security.
3610  Bitcoin / Armory / Re: (!) Armory Brain Wallet on: October 05, 2014, 02:08:42 PM
Do you have even one reasons why I shouldn't use not-bruteforceable password

Think of entropy as search space:

1) By using brain wallets you will most likely reduce your search space per byte from 2^8 to 2^6 (A-Z a-z 0-9 and some punctuation signs). On a 32 bytes/characters passphrase that's significant, and that's assuming people use passphrases that long.

2) To support such long passphrases people will probably resort to mnemonics. This will crush the search space to brute force your key, opening up the way for dictionary attacks and rainbow tables.

3) People who would rather not resort to mnemonics will reduce their passphrase length and expose themselves that way instead.

4) 2 sha iterations for a password derivation function is terribly weak. It's not unusual to see forum passwords hashes at 10k+ iterations. At least use something like scrypt to involve some RAM in the derivation function (like it's done in Armory as an example)

Overall you are taking these comments as attacks directed at you, when they state a couple simple truths: not everyone understands entropy and it's consequences, and less informed/involved users will usually turn towards the simplest solution.

Also you fail to see our standpoint. We can't support a tool that will have users do stupid things and lose coins, because we'll end up being liable in some way. We are an open source company. We don't have the resources to support customers who won't follow the proper security guidelines, so we simply won't promote bad practices.
3611  Bitcoin / Armory / Re: Updated Online wallet from 0.88 to 0.92 and now showing 0 balance on: September 23, 2014, 06:20:08 PM
Make a ticket, attach your log files

https://bitcoinarmory.com/support
3612  Bitcoin / Armory / Re: Armory - Discussion Thread on: September 18, 2014, 03:22:54 PM
so im assuming that after trezor support is included in armory, its going to be easy to implement other hardware wallets, since the ground work has been done, am i correct?

Not necessarily. There are 4 steps to integrating a hardware wallet:

1) Implement the standard. That's a one time cost, but there's no knowing which BIPs future hardware wallets will require.
2) Communication layer. With Trezor that part is overly simple (for us, we use Python on the front end), but again, no guarantee other wallets will go down that path.
3) UI integration. A portion of the Trezor code can be recycled for new wallets, but maybe not as large as we hope.
4) Unit tests. Depending on how many features the hardware wallet supports and its API, this can take its sweet time.

The good side is that we will most likely release support for these devices in the form of plugins, so it won't have to wait for a major release.
3613  Bitcoin / Armory / Re: Armory - Discussion Thread on: September 17, 2014, 02:19:24 PM
Any eta on when you will be working on hardware wallets?

Trezor support at best in the next release, that's late October/early November if everything goes according to plan.
3614  Bitcoin / Armory / Re: Risk of Exporting Wallet on: September 17, 2014, 12:42:11 AM
goatpig,

ok perfect that answers my questions. So there is basically no risk if I was to use the import feature on blockchain to transfer some coins from some addresses (but not all addresses in the wallet)?

I think there is a confusion here. When I say the blockchain, I am NOT referring to Blockchain.info, only to the actual blockchain.

Generally, the only risk you expose yourself to by exporting public keys from Armory to an web wallet is de-anonymisation. You are trusting a 3rd party with informations about coins you may be controlling, but it isn't enough data to reproduce any other addresses on your public chain. However I'm unsure this is the scenario you are referring to and what you mean by "transferring coins".

Also I wonder if you are trying to mean more than just the ripemd(sha(sha(pubKey))) + checksum when you use the word address.

For the sake of the discussion: privKey -> pubKey -> bitcoin address. These are all distinct values with different purposes, and you can't perform any of these operations backwards.
3615  Bitcoin / Armory / Re: Risk of Exporting Wallet on: September 16, 2014, 11:07:18 PM
Thank you for clearing this up. But if my wallet address (not priv key) is known or shown as a transaction on the blockchain, one could not have access to all of my wallet addresses?

Your public addresses lay unencrypted on an online machine so anyone with access to that file has your entire WO. However, someone that identifies any amount of your addresses on the blockchain cannot compute any other address without the chaincode. Even if they identify 2 consecutive addresses, since the multiplier (pubKey N XOR chaincode) is hashed before the modulo multiplication, they can't retrieve your chaincode from that.

The chaincode is never used on anything that hits the blockchain, so any amount of blockchain only data cannot be used to compute any keys on your chain. The chaincode is an Armory only thing and completely alien to the Bitcoin protocol. So someone trying to reveal your public chain has to go after your wallet file.
3616  Bitcoin / Armory / Re: Raspberry Pi: strange performance. on: September 16, 2014, 04:25:03 PM
Was the wallet consistency check running by any chance?

I don't know.  It could be running simultaneously in a separate thread.  The user interface did not indicate it, but it might be.

Is there a way to disable the wallet consistency check?  An inconsistent watch-only wallet would be a disaster, but if something happens with the "real" wallet all that happens is that I would not be able to sign until it was fixed.  On the other hand, if the consistency check takes 15 min on a RPi, it is a problem.


The consistency check at start up runs in its dedicated thread. If you don't see a progress bar in the bottom left corner then it isn't running at all. The consistency check should be disabled by default on ARM archs (i.e. RPi) I'm asking partly to make sure this is in place.

As for the signing, this may be a first time thing only. I presume you initiated the offline transaction from a WO with some history already. It is possible it picked a change address that wasn't on the restored (RPi) full wallet chain (yet), or that it was on the chain but deep enough that it triggered a chain extention (which comes in batches of 100 addresses at a time).

Did you try signing another transaction with that wallet?
3617  Bitcoin / Armory / Re: Raspberry Pi: strange performance. on: September 16, 2014, 02:08:51 PM
Was the wallet consistency check running by any chance?
3618  Bitcoin / Armory / Re: Risk of Exporting Wallet on: September 16, 2014, 02:07:28 PM
TLDR: if you expose a private key from your wallet's chain, the wallet is fully compromised, period.

The extention code uses a modulo multiplication to get privKey N+1 from privKey N. The multiplier is pubKey N XOR chaincode.

So if:

a = privKey N
A = privKey N+1
M = pubKey N XOR chaincode
G = secp256k1's order

We have:

A = a * M (mod G)

This is also true:

A * M^-1 (mod G) = a * M * M^-1 (mod G) = a

Sure you can't get pubKey N from pubKey N+1, but that's irrelevant in our case. A single private key N and your chaincode will reveal all private keys past N. Any private key N + chaincode + all your public addresses from 0 to N-1 will reveal your entire wallet.

Since the chaincode always comes with the precomputed public keys, it is safe to assume that if an attacker can get your chaincode, he can also get your public keys. If he gets access to a single private key, you are kebab. So just don't do it. Private keys are meant to remain private.
3619  Bitcoin / Armory / Re: Raspberry Pi: strange performance. on: September 16, 2014, 03:55:21 AM
The encryption code uses scrypt's precursor to derive the encryption key from your password (that's to reduce the brute force attack vector). When the wallet is encrypted for the first time, Armory defaults to a flat derivation processing time (I think ~2sec).

That time is obviously based on the performance of the machine encrypting the wallet. Take that back to a RPi, and what was expected to be 2 sec will become much longer. You can manually set the kdf size for your wallet in order to reduce that time. Or restore the wallet through your backup on the Pi and encrypt from it instead.

There is also another case. If your wallet has address entries without the private keys (if you extended the chain without decrypting the wallet first), it will have to compute the missing keys up until the highest one needed in for the transaction to be signed, which is outrageously long on a RPi. This will only happen once per missing key however.
3620  Bitcoin / Armory / Re: Feature request: better functionality of sendmany Txs & Tx task scheduling on: September 09, 2014, 02:05:42 AM
This can all be part of a plugin for sure.

Additionally, a client should permit task scripting. I should be able to set a daily, weekly, or annual time for a particular payment script to execute - with user confirmation required, of course. This last feature request has so many use cases, I don't think I need to spell them out for anyone. Smiley

As long as your wallet is either encrypted or offline it can't spend coins for you. It could however prepare a transaction for you to sign at the due date.


I agree, automatic recurring payments would be awesome. Even awesomer if they could integrate with an price discovery API, like bitcoinaverage.com  (useful for people that have to send x-amount of fiat every month).

There are plans to add a price ticker plugin.
Pages: « 1 ... 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 [181] 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 ... 233 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!