Bitcoin Forum
May 11, 2024, 08:11:17 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 [201] 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 ... 288 »
4001  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 05, 2013, 11:26:41 AM
Ask the user for their full name, DOB, and/or any other personal information. 
So I did a little informal study of this on IRC with a little test page, and it was basically impossible convince people that their personal information wasn't being "connected" to their account in some way.  (and to some extent it is: someone who had their credentials recovered would have a harder time denying them).   This is least recovers from the saltlessness problem, though it leaves the door open for targeted attacks against passwords which are almost never strong enough... but I can't figure out how to get the user past the "personal information" problem.
4002  Bitcoin / Development & Technical Discussion / Re: Feature Creep in Bitcoin (Payment Protocol) on: September 05, 2013, 10:52:19 AM
This sentence can be interpreted in a lot of ways Smiley
Well, that was intentional. I might be corrected, but I don't think Gavin has ever considered the feature particularly important. He isn't opposed to it, and its supported by other core developers but Gavin has been pretty insistent on someone doing a robust test plan for it (and I agree)— which no one has ever done.

Quote
Nah, I do not even have a strong opinion against the payment protocol but I think there is and has been too little discussion about it. For example, is it really worth all the effort and added complexity? In politics I would say connection to the base has been lost concerning this issue.
Most of the discussion on it has been on bitcoin-development, ... there has been hundreds of messages on it. The complexity is generally self contained. As I mentioned above, I don't personally care _that_ much about it, but I don't think it's problematic in the slightest.

Quote
I have always been running coin control since it has been available (sendfromaddress) but never ran into an issue IIRC. Also I donated lately though I rarely do that as I spend a lot time on Bitcoin/Namecoin without getting direct rewards, either. Link on website and I mention it on pretty much every occasion I can.
BTW: Cozz just release v0.8.4 yesterday! https://bitcointalk.org/index.php?topic=144331.0
Taking some time to describe all the things you'd normally do with coin control, what you expect the outcome to be, and then walking through them on testnet, and documenting the result and reporting any weirdness would help increase confidence that we could safely merge it.  The concern is that some bad outcome like "I selected less coins than my send value... and it sent all my coin to dev null!" happens for some rare mixture of behaviors. It's good that lots of people have been using it, but usually when someone documents what they're doing it will make some of the less tested interactions more obvious.
4003  Bitcoin / Development & Technical Discussion / Re: Feature Creep in Bitcoin (Payment Protocol) on: September 05, 2013, 09:40:17 AM
If I were a member of the US Bitcoin Foundation and v0.9 will not have CoinControl I would go nuts over this.
uhh. You're aware that the reference client is an open source project, right? The Bitcoin foundation is a organization primarily oriented in promoting Bitcoin on behalf of businesses and professionals, who are super eager for the payment protocol stuff.  The foundation doesn't control what goes into the reference client, and if it did that would be a pretty concerning event.

No one who has any interest in coin control spent any time on the payment protocol as far as I know. So is this your real motivation, you're out to attack features you don't care about in a misguided effort to boost the ones you do? As an aside, I do see that you appear to have contributed nothing to coin control, including any testing reports or help with test plans. Throwing mud at other features will do nothing to get the feature you want in, but stepping up to help out with testing absolutely will.
4004  Bitcoin / Bitcoin Discussion / Re: What if dev-team is compromised? on: September 05, 2013, 06:40:05 AM
Ok, how do you forcefully re-distribute coins that are buried more than 100 blocks deep already?
Pretty trivially when almost everyone is on a SPV node because a full node requires gigabits of network connectivity, and when everyone who isn't would have to accept the invalid blocks or otherwise be left behind by the economic supermajority of people who are. Tongue  (this is all in some fantasy world where Bitcoin is widely used enough for a seriously funded attack, right?)
4005  Bitcoin / Development & Technical Discussion / Re: Using the pubkey hash to generate other-chain addresses on: September 05, 2013, 06:15:08 AM
If you think this is interesting, your mind is going to be blown when you start looking a bit deeper.

You shouldn't be surprised most of the altcoins are just copies with bitcoin with only very very minor changes.

A bunch of people use the same keys on multiple bitcoin clone chains.  E.g. Petertodd's ltc bounty payment stuff was setup that way.
4006  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 05, 2013, 05:32:23 AM
Ok. I sent chocolate and Basketball. Give some more.
No you didn't. Tongue
4007  Bitcoin / Bitcoin Technical Support / Re: upgrade to 8.4 unnsuccessful due to windows error on: September 05, 2013, 04:07:11 AM
This sounds like someone who is trying to move leveldb files between architectures.
4008  Bitcoin / Development & Technical Discussion / Re: Feature Creep in Bitcoin (Payment Protocol) on: September 05, 2013, 02:51:49 AM
I suppose the concern is that it opens the door for legislators to rule that only payment-protocol payments are legal ....
I think thats silly, unenforceable, and doesn't actually change anything in any case.  A payment protocol payment can communicate as little as a pay to address can. ... and if you want to hypothesize about required communications, you could just as well assume that only transactions containing certain data would be legal,  which would be a lot more enforceable if in the future mining is like it is today: controlled by a hand full of super large mining entities.
4009  Bitcoin / Mining speculation / Re: Bitcoin: On our way to a Petahash on: September 05, 2013, 02:20:15 AM
Bitcoin's network is becoming a processing monster, and with dedicated ASIC core at it's heart is ready for a bigger world and a ton of transaction traffic. In the end, the network is quickly becoming larger, more distributed, and secure.

Really having a highly secure and robust network in place before Bitcoin takes its next giant leap forward is a really good thing. Not to equate GOX to mining directly, but we saw what it looks like when the infrastructure fails under the weight of a rapid push. Having a solid distributed net with multi-million dollar mining businesses involved should inspire further confidence in Bitcoin as a real currency.
You do realize that all this mining stuff has nothing to do with processing transactions, and that instead of running Bitcoin nodes that can process transactions practically all of these miners are just getting paid by pools to do outsourced sha256 calculations, and they never see transactions or even the blockchain at all, and as a result don't contribute much to improving Bitcoin's security— ... and that we're even in a worst state than we were a year ago,  now kidnapping or hacking _two_ people is enough to freely perform transaction reversals...

You realize this, right?
4010  Bitcoin / Development & Technical Discussion / Re: Feature Creep in Bitcoin (Payment Protocol) on: September 05, 2013, 12:12:56 AM
Isn't the payment-protocol-enabled-bitcoin compatible with non-payment-protocol-enabled-bitcoin? I was never that worried about the payment protocol because (besides thinking that it was a good thing) it seems to not interfere with any of the core bitcoin functionality. You can still just send to bitcoin addresses and pretend the payment protocol doesn't exist, right?
Yup, exactly.
4011  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 05, 2013, 12:07:33 AM
You probably have a duty to move the bitcoins somewhere safer for them before someone nefarious does and to serve as a warning to others  Smiley

It is kind of like finding a stash of cash poorly hidden under a rock in a public park ... and then you could maybe donate them to a charity of your choice? Or if you can't find the owner you could use a finders keepers ethical reasoning to disburse them as you see fit ....
Maybe. I mean, if the key was "password" then okay sure.  But if you threw three cpu months at it and the key was found as the product of some increasingly powerful analysis that you performed, some product of you and the victim being on a similar mental wavelength... it may reasonably be the case the the only people in the world who know the key are you and the victim.  But you don't know that.

Rather than stressing about it then, I suggest anyone considering doing this think ahead.

Besides, do you go around jiggling the neighbors doors and trying their windows? Why not? How is this different— beyond the possibility of getting caught being substantially reduced?
4012  Bitcoin / Bitcoin Discussion / Re: Hardware device and protocol for seeding and verifying Provably Fair gaming on: September 05, 2013, 12:03:05 AM
Because the game has a player you can user an interactive protocol. There is no need for a trusted device.

The house discloses a commitment for their seed, e.g. H(seed),  the user picks a random value and tells the house. The game uses H(seed||user random) as the CSPRNG start for the game.

4013  Bitcoin / Development & Technical Discussion / Re: Deterministic Usage of DSA and ECDSA Digital Signature Algorithms (RFC 6979) on: September 04, 2013, 11:29:00 PM
Quote
but in a hardware wallet implementation this is impossible
If the hardware is known, and it is running open source firmware, what concerns would there be?
Also, malicious firmware doesn't need to leak information through signatures to enable an attack vector.
How do you actually know that it is running the open source firmware and not a modified version installed by the manufacturer or replaced in transit?

Generally if your computing device is compromised you're kind of doomed, but in this case not so much... because the behavior of the device is sufficiently narrow and all communication mediated via the host, it should be possible to be a little more confident here.

Quote
Also, malicious firmware doesn't need to leak information through signatures to enable an attack vector.  It could be using a DRBG to select the private keys, seeded from a secret known to the attacker and a device specific id.  This would enable the attacker to calculate potential private keys and search the blockchain.  To an outside observer, the private keys would look random as usual.  (This is the same worry people have about the RdRand instruction)

My expectation is that you'd make your master key  some H(device randomness || user or initial host randomness).  You need a way to export the master key data for backup purposes, so with an addition that also lets the user obtain the contributing randomness after obtaining the device master key.  Effectively this means the the device cannot undetectable cheat in the way you suggest.

(now, any particular user may fail to detect it— but it changes the risk model for someone substituting the firmware, since after already committing itself to some behavior and signing transactions on behalf of the user the user could then demand it provide the device randomness and they could fully repeat the output)

Quote
it would sure be better if the device could be put in a mode which would make its behavior completely reproducible externally
Perhaps deterministic signatures could be a user configurable option, allowing expert users to "pick their poison".
[/quote]I prefer fewer options to more... but indeed.
4014  Bitcoin / Development & Technical Discussion / Re: BIP0032 HD Wallet private key derivation incorrect? on: September 04, 2013, 11:21:30 PM
There is a lot of additional documentation for BIP32 in addition to the BIP itself:

For example, http://www.youtube.com/watch?v=WcnMjkc31Fs

I'm disappointed that this is the first time I've heard your complaints.  It has now been independently implemented by at least four parties.  Your feedback sounds good though, do you have any proposed revised text? (And indeed, your understanding is correct).

The motivation there is that the ECC homomorphism based public derivation has that highly surprising backwards enumeration property.  In some use-cases it could easily cause a total loss.  E.g. I export a private key from my wallet and give it to you, and you already have the extended key for that chain for auditing... oops now you have all the coins on that chain.

The text on that is a bit weaker because we added it later... we'd hoped for a while that there would be a way to remove that property but couldn't find one.  The auditing behavior still exists, but works only in publicly derived chains.

Some client software may choose to only use public derivation, thus facilitating auditing. If they do they should probably avoid offering key export function for single private keys, simply because it has turned out to be really hard to educate users about the exposure.
4015  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 04, 2013, 10:14:24 PM
Ok. I sent chocolate and Basketball. Give some more.
Please don't crap up the utxo set keeping around more of these junk outputs.

When you redeem these things, send them to an OP_RETURN txout with a value of 0.  This will convert the output into fees and prevent a new output from being created in the txout set.
4016  Bitcoin / Bitcoin Discussion / Re: What if dev-team is compromised? on: September 04, 2013, 10:08:05 PM
If devs try to cheat, they will be busted within 30 seconds at most, and will be jailed/banned/replaced.
oh... if were true ...

But it's not.  The assumption that it is already true is probably a major reason that it isn't: a catch 22.
4017  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 04, 2013, 08:46:27 PM
Isn't it better to have a few large public failures based on this obvious weakness to inform and teach the community why this is a bad thing to do?   Pretending it's not a problem means more users will make the same dumb mistake because they haven't seen any negative repercussions derive from it.   I'd rather have good guys trying to break our money for the betterment of that money than rely on malicious actors who have all the incentives to maximize the value they extract and do it as covertly as possible to prevent exactly those lessons from being learned.   If security is an arms race, it always makes sense to have a red team of good guys.
People have been very loudly told not to do this and many people don't— sadly, many other people smugly think they are smart enough to do it safely (I would even bet that most posters in this thread are among them). People have been stolen from, those who needed that to learn already learned— many others just blame the victims "Oh, I wouldn't use a key that stupid", ... yes, yes you would.

In any case, you misunderstand my advice there.  I wasn't making that suggestion for the benefit of the victims— they're already doomed through their ignorance and actions.  I was making that suggestion for the benefit of Sothh. There is no good team here.  Once you embark down this path you potentially find keys and have to choose between becoming a thief yourself or sitting passively while some other thief takes the coin. If you don't want to find yourself in that situation, for sake of your own personal ethics, then you shouldn't be trying— you should instead work on educating people to behave more safely... and compromising bad coins appears to be ineffective, due to the aforementioned victim blaming.
4018  Bitcoin / Bitcoin Discussion / Re: (Successful) Dictionary Attack Against Private Keys on: September 04, 2013, 08:14:16 PM
They exist because of brainwallet.org. Amusingly, the site's creator started down his path much as you have, but then decided that "password derived" keys were useful so he setup a website.

Humans are unconditionally a terrible source of entropy. Many people using keys they sincerely believed were secure have been robbed. Often complicated "schemes", and even common password advice produce worse passwords instead of better ones.  This baddness is multiplied by the face that using JS tools make the performance of reasonable KDFs unacceptable and because the application prevents the use of effective salting, so the attacker gets an enormous simultaneous attack multiplier.

But there is really nothing that can be done except to keep telling people: Do Not Use Human Derived "entropy" for private keys.

It may be worth pointing out to you that a prudent person doesn't try doing this:  What happens if you find a key with 1000 BTC and can't determine the owner?  Your choice will be to rob them yourself or to leave it be and hope they move the coin before someone else robs them. If you don't want to potentially be in that situation you shouldn't be attempting to crack other people's ignorantly produced keys.
4019  Bitcoin / Bitcoin Technical Support / Re: HELP: Updated my client to version 8.4 and now my passphrase will not work! on: September 04, 2013, 07:49:39 PM
Perhaps you should also go to this website https://www.grc.com/haystack.htm and input a password of the same length and character type (although not obviously your exact password) into the box to see somerought stats on how difficult it is to be brute-forced. Not too difficult I would imagine, and now remember that some in this community will have GPU farms not mining much BTC anymore, which could possibly earn more in more 'malicious' ways...
Those estimates are usually worthless.

The encryption in bitcoin-qt's wallet uses powerful strengthening— on your own system it won't be able to test more than 10 attempts per second... even with a powerful GPU farm things will be limited.

(as compared to BC.i wallets, for example, which has gpu cracking tools that do millions of attempts per second)

That isn't to say that having a good key is important— it is... but for many people the strengthening is enough that the bigger risk is losing/forgetting the keys.
4020  Bitcoin / Bitcoin Discussion / Re: Bitcoin-Qt / bitcoind version 0.8.4 released, fixes critical DoS vulnerability on: September 04, 2013, 07:44:17 PM
It was not meant as criticism of the dev team. You all do a great job. It can't be as I don't know how to do it better. It is meant to raise awareness of how many people actually blindly install anything that comes as bitcoin.exe. The "criticism" also contains "it's maybe a lack of tools or maybe a lack of understanding on my side". It is a fact that the majority of users install without ever checking a sig.
You have my complete agreement there. In the future we should use an updater program (e.g. "gitian updater") which checks the signature for the users, so at least once users have one good copy they should be okay on future ones.
Pages: « 1 ... 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 [201] 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 ... 288 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!