Bitcoin Forum
June 29, 2024, 03:25:54 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
381  Other / MultiBit / Re: Can I brute force a multibit password? on: February 25, 2015, 10:35:00 PM
I Just Remembered My Password!!!

Thanks!!!

Glad to hear it, that's always the easiest solution Cheesy

Exactly. By the way, are you the developer of that software?

That depends... do you like it? Wink (yes, I am)
382  Other / MultiBit / Re: Can I brute force a multibit password? on: February 25, 2015, 10:21:22 PM
I Just Remembered My Password!!!

Thanks!!!

Glad to hear it, that's always the easiest solution Cheesy
383  Other / MultiBit / Re: Can I brute force a multibit password? on: February 25, 2015, 09:14:33 PM
Here's a password recovery tool that might help (open source, written in Python): https://github.com/gurnec/btcrecover

Just a warning: it may take you a bit of reading to get it up and running. The quick start is here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#btcrecover-tutorial

Please take special note that it works on MultiBit .key files, not on the wallet files themselves (more details are in the Tutorial linked above).

If you have any questions about it, please feel free to ask me.

Good luck!

I tried that, but it threw an error with google.protobuf, and I found how to fix it on linux, but I am running windows...

I've bolded it above....

Although it is possible to use btcrecover against a MultiBit wallet file, it's much slower and it's harder to install the prerequisites on windows (I haven't even added instructions for this in the tutorial yet, but will eventually). Instead use one of your .key files, see here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#finding-multibit-wallet-files
384  Other / MultiBit / Re: Can I brute force a multibit password? on: February 25, 2015, 08:39:01 PM
Here's a password recovery tool that might help (open source, written in Python): https://github.com/gurnec/btcrecover

Just a warning: it may take you a bit of reading to get it up and running. The quick start is here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#btcrecover-tutorial

Please take special note that it works on MultiBit .key files, not on the wallet files themselves (more details are in the Tutorial linked above).

If you have any questions about it, please feel free to ask me.

Good luck!
385  Bitcoin / Armory / Re: Armory 0.93 testing release! (with 0.05 BTC bug bounty) on: February 25, 2015, 12:53:04 PM
is now showing "Building Databases 61.5%"

Are you sure you're running 0.93 (this is the 0.93 thread after all...)?

0.92 and older had a Building Databases step, 0.93 replaced this with a much faster (1 - 2 hours long) Organizing Blockchain step AFAIK.
386  Bitcoin / Armory / Re: Armory - Discussion Thread on: February 23, 2015, 07:37:41 PM
You may want to consider some updates to the online dllinks.txt file at some point...

Will Bitcoin 0.10.0 become available through the secure downloader, now that Armory officially supports it?

Speaking of updates to the dllinks.txt file Wink (that's the file that would need updating and re-signing for 0.10.0 to become available).
387  Bitcoin / Armory / Re: Armory - Discussion Thread on: February 23, 2015, 07:24:39 PM
getting dependency error not satifiable:  libstdc++6(>=4.7) in Ubuntu 12.04 32 bit on attempted install of 0.93

Note that 0.93 can't go online in x86. Also, it requires C++11 so you'll need a libstd that is recent enough. You can probably get that package from the LTS backports repo.

Quote
do we have to install 0.93 on both online and offline pc's?

Only the online machine

Ugh, I just realized I bet we broke the 12.04 offline bundle with this release.  I bet no one tested that... we really need to widen the testing net better.  In the future, we might offer quadruple bounties for the first bug found in each of a bunch of categories.  That would include testing the offline bundles, and lots of corner case features...

I might need to update the offline bundles and re-release 0.93...

You may want to consider some updates to the online dllinks.txt file at some point to reflect all of this...

E.g., removing the 32 (bit) flag from all of the Armory 0.93 versions (keeping it for ArmoryOffline though), and removing 12.04 from the Armory & ArmoryOffline Ubuntu lines until/unless you intend to distribute your own libstdc++6 (FYI a newer version isn't in the backports repo unfortunately).

It's a judgement call though....
388  Bitcoin / Armory / Re: My computer is acting funky these days on: February 20, 2015, 02:26:16 AM
Easiest thing would probably be to backup the full Armory data directory, if you are able to. That would save you from having to let Armory build the database again, and you will backup any wallets, transaction comments, etc.

Hrm, good point.  Not having to let Armory build the database again would be a pretty big benefit to that approach, so I think I'll do that. 

If you think there's any chance of a hardware issue, I'd avoid copying anything besides the wallet files if I were you.... I had an issue that turned out to be bad RAM causing Armory database corruption issues each time I tried a rebuild... copying a potentially bad database might propagate whatever problem you're having.

Also, with the 0.93 just around the corner, you can either wait for 0.93 or grab the most recent beta from the 0.93 thread which offers much faster database rebuild times thanks to goatpig's efforts (I recently did a database rebuild and it took about 1.5 hours on a HD, not even an SSD).

Even Bitcoin Core blockchain downloads with 0.10 are much better, if you choose not to copy over its data directories. It can still take a number of hours, but that's a whole lot better than the day or two it used to take.
389  Bitcoin / Armory / Re: Armory 0.93 testing release! (with 0.05 BTC bug bounty) on: February 19, 2015, 02:59:54 PM
Quote
You should probably be sure to point this out the download page (and in future download links here) so that people stuck on 32-bit machines do not inadvertently overwrite their 32-bit versions with non-working 64-bit versions... just a suggestion.

That's for Windows only, and something we should do at installer level really. We won't remove the link to 0.92.3 till we got a x86 Windows build for 0.93.1.

Yup, I meant only for the future. And if you've never done it in NSIS before, it's as easy as "!include x64.nsh" and then "${IfNot} ${RunningX64}" to check...
390  Bitcoin / Armory / Re: Armory 0.93 testing release! (with 0.05 BTC bug bounty) on: February 19, 2015, 02:09:04 PM
I notice that this version is 64-bit only (I haven't checked earlier 0.92.99 releases though). Was that intentional? Historically the installs have been 32-bit executables, even on 64-bit Windows. Do you plan to drop support for pre-built Win32 binaries? Just wondering...

(also, an extremely minor nitpick: the installer installs this 64-bit executable into the x86 Program Files directory, probably because the installer itself is a 32-bit app and its directories are being virtualized by Windows)

LMDB maps the entire underlying dataset in RAM. Can't address 30GB of data in x86. And that's just fullnode, supernode requires 3x that currently. For 0.93.1, fullnode should be around 120MB so it could function in x86, but we still do not plan on releasing x64 Windows builds for online Armory. There will be a x86 Windows build to support people using Windows on their offline signer (hopefully I'll manage something for WinXP), but it won't be able to sync due to LMDB's RAM requirement.

Thanks for the detailed response.

...but we still do not plan on releasing x64 Windows builds for online Armory.

You meant no x86 releases for online Armory, correct? (otherwise I'm confused)

You should probably be sure to point this out the download page (and in future download links here) so that people stuck on 32-bit machines do not inadvertently overwrite their 32-bit versions with non-working 64-bit versions... just a suggestion.
391  Bitcoin / Armory / Re: Armory 0.93 testing release! (with 0.05 BTC bug bounty) on: February 18, 2015, 05:45:40 PM

I notice that this version is 64-bit only (I haven't checked earlier 0.92.99 releases though). Was that intentional? Historically the installs have been 32-bit executables, even on 64-bit Windows. Do you plan to drop support for pre-built Win32 binaries? Just wondering...

(also, an extremely minor nitpick: the installer installs this 64-bit executable into the x86 Program Files directory, probably because the installer itself is a 32-bit app and its directories are being virtualized by Windows)
392  Bitcoin / Bitcoin Technical Support / Re: What is the minimum memory requirements for bitcoind? on: February 15, 2015, 01:41:02 PM
But if I use "disablewallet=1" the "dbcache=4" option won't reduce the needed amount of RAM, or am I wrong?

(By the way I've upgraded the RAM size to 1024 MB of my VPS and now bitcoind is more responsive, but still far from the perfect!)

I guess my post was too long, sorry Wink

disablewallet=1 disables the wallet cache, which is 1MiB. It won't save you much, but it doesn't hurt.

dbcache=4 decreases the other caches to 4 MiB, which by default total 100 MiB. Setting this too low might decrease performance, though... I don't know what a good number would be, but if DnT and shorena both say 4 is a good starting point, I'd trust them, and then maybe tweak it up a bit if you have any spare ram.
393  Bitcoin / Bitcoin Technical Support / Re: What is the minimum memory requirements for bitcoind? on: February 14, 2015, 05:15:47 PM

I dont know, gmaxwell DnT suggested it when I someone else had problems with memory and it worked like a charm. Let me dig that thread up. See the thread linked below[1]. I remember that it reduced the amount of RAM my node needs, while I had problems with 2 GB before.

It used to be that Berkeley DB was used for the wallet, block indexes and tx indexes. -dbcache affected the in-memory cache for Berkeley DB. Version 0.8.0 moved the block and tx indexes to Google's LevelDB (it's faster), and kept the wallet in Berkeley DB format (presumably so that the wallet.dat format remained unchanged for backwards compatibility). In 0.8.0, -dbcache affected both the Berkeley DB and LevelDB caches.

The patch referenced above was introduced in 0.8.2, and it modified the -dbcache option so that it only affected the LevelDB caches (since the wallet is relatively small, there shouldn't be any need to adjust it's cache size, so it was hard-coded to 1 MiB). The default -dbache in 0.8.0 was 25 MiB.

Version 0.9.0 increased the default to 100 MiB. It has a hard-coded minimum of 4 MiB (and a maximum of 1 GiB on 32-bit machines, 4 GiB on 64-bit machines). I'd imagine setting it down to 4 MiB would have a noticeable affect.
394  Bitcoin / Development & Technical Discussion / Re: Interesting github forks? on: February 12, 2015, 09:31:00 PM
Interesting tree: Peter Todd's replace-by-fee fork.

Interesting, and also quite controversial Wink

A (slightly related) interesting fork: Tom Harding's Double-Spend Relay and Alerts. It actually made it into Bitcoin Core's master for a short while before being reverted (which I think is a shame; he put a lot of work into it and it had at least some chance of being very useful, but there were some legitimate concerns as well).

Quote
Double-Spend Relay and Alerts

VERY IMPORTANT: It has never been safe, and remains unsafe, to rely
on unconfirmed transactions.


Relay
When an attempt is seen on the network to spend the same unspent funds
more than once, it is no longer ignored.  Instead, it is broadcast, to
serve as an alert.  This broadcast is subject to protections against
denial-of-service attacks.

Wallets and other bitcoin services should alert their users to
double-spends that affect them.  Merchants and other users may have
enough time to withhold goods or services when payment becomes
uncertain, until confirmation.

Bitcoin Core Wallet Alerts
The Bitcoin Core wallet now makes respend attempts visible in several
ways.

If you are online, and a respend affecting one of your wallet
transactions is seen, a notification is immediately issued to the
command registered with `-respendnotify=<cmd>`.  Additionally, if
using the GUI:
 - An alert box is immediately displayed.
 - The affected wallet transaction is highlighted in red until it is
   confirmed (and it may never be confirmed).

A `respendsobserved` array is added to `gettransaction`, `listtransactions`,
and `listsinceblock` RPC results.

Warning
If you rely on an unconfirmed transaction, these changes do VERY
LITTLE to protect you from a malicious double-spend, because:


 - You may learn about the respend too late to avoid doing whatever
   you were being paid for.
 - Using other relay rules, a double-spender can craft the double-
   spend to resist broadcast.
 - Miners can choose which conflicting spend to confirm, and some
   miners may not confirm the first acceptable spend they see.
395  Bitcoin / Development & Technical Discussion / Re: Pywallet 2.2: manage your wallet [Update required] on: February 12, 2015, 09:12:12 PM
JackJack,

do you have any plans to support AES encrypted JSON wallets in future releases? I've toyed around with PYwallet and its cool!

Are you talking about Blockchain.info wallets? That's the only wallet client I can think of that uses AES encrypted JSON. Or something else?
396  Other / Beginners & Help / Re: Lost double encryption password on blockchain.info, now what? on: February 11, 2015, 12:24:10 AM
btcrecover supports searching for blockchain.info passwords, including double encryption/second passwords (you must use the --blockchain-secondpass command-line option). It's free and open source, but it does require a bit of reading to get it up and running. The tutorial is available by clicking here.

Let me know if you have any questions about it.

Edited to add: a number of individuals have commented that blockchain.info support will be able to help... unfortunately that's not true. Blockchain.info claims (and I have no reason to disbelieve them) that they have no access to either your main nor your second password.
397  Bitcoin / Electrum / Re: Are addresses generated from a single Electrum seed linkable? on: February 07, 2015, 02:36:40 PM
For example, if a single Electrum seed was used to deterministically generate address A and address B, would it be possible to somehow link the two addresses together and deduce that they are both owned by the same individual? (Of course this is assuming that both addresses are kept separate with no mixing of coins occurring between them.)

Assuming, of course, that your adversary does not have access to your master public key, deducing that the two addresses were produced from the same seed is roughly as difficult (mathematically) as stealing bitcoin from those addresses. It would involve solving four SHA256 preimages and the two discrete logarithms (which is what secures transaction signatures in bitcoin), and would in the process give the attacker access to your master private key as well.

If it were possible, there'd be far worse problems to be worrying about....
398  Bitcoin / Mycelium / Re: Recreating a wallet using a mnemonic in different software? on: February 06, 2015, 02:36:04 PM
Is electrum 2 using bip32
Yes.

39?
No.

Even if they chose to use both bip32 & bip39, that would not be sufficient to guarantee mnemonic interoperability. I said something fairly bone-headed above:

(and many other wallets I hope) will be interoperable and support BIP39 in the not-very-distant future.
I don't know what I was thinking.... Even if wallets supported bip39+bip32+bip44, it would be close but it still wouldn't be quite enough to guarantee a mnemonic could be moved easily from one wallet software to another.
399  Bitcoin / Armory / Re: Tool to brute-force offline armory password? on: February 06, 2015, 12:52:56 AM
I've written (and have been improving I hope) a password recovery tool for a while now, and it includes support for Armory (that was the first wallet it supported as a matter of fact). You can find it here (it's open source): https://github.com/gurnec/btcrecover; the quick start is here: https://github.com/gurnec/btcrecover/blob/master/TUTORIAL.md#btcrecover-tutorial

Although it's not the easiest to use, it is fairly well documented, and it doesn't required that you send your wallet information to anyone else if that's a problem (if you run it offline, of course).

It's also probably faster than any alternative -- it's multi-threaded, so if you have a quad-core CPU, it'll run about four times faster than most alternatives. It also supports GPU-accelerated searches, although it's not very effective on that front for Armory.*

Instead of directly encrypting the private key with the user passcode, we could encrypt the private key with a long random key, which is encrypted with the user passcode. When a user forgot the passcode, he may pay other people to brute-force the random key, without the risk of losing bitcoin.

That would be excellent. Of all of the wallets currently supported by btcrecover, Armory is the only one where I couldn't find a way to extract enough information from a wallet file to test for passwords without putting funds at risk.

Armory encodes private keys as 32-bit blobs with no padding (which is not a weakness by any means, just an inconvenience when it comes to this particular task). Every other wallet I've encountered so far offers some form of "trick" that allows me to extract only a portion of a private key (or a hash thereof) for password testing purposes. For example, many wallets add PKSC7 padding to the end, which allows me to extract just 16 bytes of key material (50%) plus the (useless) 16-byte padding in order to search for passwords. Others encode their passwords in hex or base58 prior to encryption, which allows a similar trick of extracting only a portion of any private key/seed material. It's not that Armory is inferior for being more concise (by not including padding and by using binary instead of unnecessary encoding) -- it's just that it's the only wallet I've encountered so far where you need an entire private key to test for password validity.**



* It depends a whole lot on your GPU memory size and the KDF parameters used during wallet creation to determine whether or not GPU-based acceleration can help in password searches. Armory's excellent use of ROMix makes GPU acceleration hard (even with btcrecover's time-space tradeoff), so a GPU might help by a factor of 5x or so, or it might not help at all....

** which in combination with the (unencrypted) chaincode and master public key does put funds at risk

400  Bitcoin / Mycelium / Re: Recreating a wallet using a mnemonic in different software? on: January 30, 2015, 10:28:34 PM
Electrum 2.x (and many other wallets I hope) will be interoperable and support BIP39 in the not-very-distant future.

This is not true. Electrum 2.0 uses BIP39 wordlists, but seed generation is non-standard, so it is not technically BIP39 compliant.

You will not be able to import BIP39 mnemonics into Electrum.

That's a shame, but thank you for the correction.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 [20] 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!