Bitcoin Forum
May 12, 2024, 12:22:29 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 [62] 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 233 »
1221  Bitcoin / Armory / Re: Armory 0.96.3 fragment ID during test backup does not match on: September 26, 2017, 05:45:13 AM
Will look at it.
1222  Bitcoin / Armory / Re: FRAGMENTED BACKUPS VULNERABILITY!! IF YOU USE THEM, READ THIS!! on: September 26, 2017, 05:40:46 AM
Is it fine if I don't care 1 sheet can now recover my Bitcoin? And just keep them as a paper backup? There's no actual leak right?

I'd rather you don't confuse the 2 for the sake of convenience, but that's a way to look at it.

I'll consider it 1 of 1 for now. Thanks.

That's a way to look at the security of the fragment. There is no code allowing to go from 1 fragment to your secret atm, and doing this off of the second version of the SSS scheme is non trivial, just so we are clear.
1223  Bitcoin / Armory / Re: Armory 0.96.3 fragment ID during test backup does not match on: September 26, 2017, 05:39:40 AM
The "Fragment:" field is not the wallet ID field. Are they mismatching in you restore attempt? Are you testing this with a pre or post fix backup?
1224  Bitcoin / Armory / Re: FRAGMENTED BACKUPS VULNERABILITY!! IF YOU USE THEM, READ THIS!! on: September 26, 2017, 05:36:40 AM
Is it fine if I don't care 1 sheet can now recover my Bitcoin? And just keep them as a paper backup? There's no actual leak right?

I'd rather you don't confuse the 2 for the sake of convenience, but that's a way to look at it.
1225  Bitcoin / Armory / Re: Armory 0.96 is out on: September 26, 2017, 05:14:10 AM
- I get a flashed-up-then-gone dialog on startup.  Finally caught it on video, it's "Mirroring Wallets".  Is this something I should be able to click on?

To allow for the use of segwit and compressed key in p2sh scripts, I developed a whole new wallet code. This stuff is in C++ and operates as companion code to the python stuff. The goal was to no disrupt the existing, time tested code, while providing new features for those willing to run new code.

This flashing dialog is for the operation the mirrors the python wallet containers into their new, C++ implemented counterparts. These wallets are WO only, as they only need the data necessary to register the scripts with the DB and construct unsigned transactions. And no, there's nothing to click on, it is just there for report progress on the mirroring, and closes on its own. I figured I'd rather let people see something progress than silently mirror wallets, which can take up to a couple minutes on large wallets.

You will see that dialog every run because you use an imported address, and the mirroring code goes through every import each run, since there is no deterministic way to verify the mirrored wallet is still in sync with the python counterpart.

I'm not sure where to take that part of the GUI atm (if letting the dialog flash is ok, or requiring user interaction to close it is gonna piss off people real quick).

Quote
- Bump fee via right-click fails (see error below).  This is my imported vanity addr 1RustyR...

Yep, I borked that when I fixed comments resolution in the main ledger.

Quote
- You told a previous user to use the RBF control dialog, hitting that gives this error (and no effect):

And apparently I borked that too... fml.

Thanks for the reports, will go over that stuff .4
1226  Bitcoin / Armory / Re: FRAGMENTED BACKUPS VULNERABILITY!! IF YOU USE THEM, READ THIS!! on: September 26, 2017, 05:08:12 AM
The SSS implementation in Armory is completely unrelated to that. It also predates that by a few years.

Since Greg Has concerns about every SSS version he has come across -

https://np.reddit.com/r/Bitcoin/comments/72dfy1/armory_wallet_fragmented_backups_may_be/dnho2w6/

I think we should be highly skeptical about entropy wallets until more peer review is done as well.

I think you're reading too much into gmax's words. His general concern with SSS implementations is that they are basically all done over prime fields, which the easier implementation, but introduces side channel attacks cause it relies on bignum operations.

A GF(256) implementation would be in constant time, but that's harder to pull and therefor brings in question whether it's worth the effort at all, considering multisig covers a lot of what SSS does. I argued that SSS still has an edge over multisig scripts (plausible deniability), therefor I'll consider implementing SSS over GF(256) for the new wallets.
1227  Bitcoin / Armory / Re: Armory 0.96.3 fragment ID during test backup does not match on: September 26, 2017, 02:45:44 AM
if you restore from a fragmented paper wallet backup, you will enter the keys into the program, it will then ask you to verify the fragment ID is the same as the one on your paper. You won't miss it. And the fragment ID will always be different from the paper backup because now the fragment IDs are always random.

Hmm there may be some misconceptions here. Fragments have always carried 2 IDs: the wallet ID, and the fragment ID. The new fragment ID is random instead of derived from the secret, but there always was these 2 IDs on the paper fragments to begin with. Are you saying the fragment ID from old backups is off now?

When restoring fragments, the code presents you with the fragment ID to check against your fragments at first. Once enough fragments are provided and the secret is reconstructed, it then asks you to compare the resulting wallet ID with the wallet ID on the fragments, which they also carry. This is a 2 step verification that should make sense on its own.

Let me know if you there are specifics in the GUI that you believe are off.
1228  Bitcoin / Armory / Re: FRAGMENTED BACKUPS VULNERABILITY!! IF YOU USE THEM, READ THIS!! on: September 25, 2017, 10:29:07 PM
Does this effect SSS with mycelium entropy?

I'm don't know what you are referring to.
1229  Bitcoin / Armory / Re: Armory 0.96.3 fragment ID during test backup does not match on: September 25, 2017, 09:49:47 PM
Understand. but when testing the backup or restoring a wallet from paper backup, the program prompts user to verify the fragment ID which do not match what was printed on the paper. It's a GUI issue i suppose. The wallet works perfectly after restoration. It's not a problem for veteran users but i think it will confuse new users.

You mean it tells you to check the fragment ID vs wallet ID? I thought I got rid of that stuff ugh. Can you pinpoint where that happens?
1230  Bitcoin / Armory / Re: Armory 0.96.3 fragment ID during test backup does not match on: September 25, 2017, 09:27:35 PM
From the changelog: https://github.com/goatpig/BitcoinArmory/blob/master/changelog.txt#L17

Quote
   - Fragment sets are now generated randomly, therefor an unique ID has been added to each set to identify them. You cannot mix
     and match sets.

The IDs are different because the fragments are different. You cannot mix and match fragments from within different sets. The randomized ID is by design, so that users don't end up mixing them.
1231  Bitcoin / Armory / Re: Using Armory on the BCH chain on: September 25, 2017, 05:27:06 PM
Granted, the only thing you are actually after is the blk file with the first post fork block. If that one is taken out, Armory can compute the chain past the fork point and you should be good.
since i have done some tx's of BTC post fork, i have to use your trick of this truncated blockchain from what i understand.  will this block file range work?

Only if you have not moved coins on the prefork chain past that point.

The logic is as follows: your last set of valid utxos pre fork is still valid on the Bcash chain (up until the point you move your bcash). If you roll back the BTC blockchain to a point in time where it stands past your last valid utxo set state and before you moved coins post fork on the BTC chain, these utxos are also valid on the Bcash chain.

Graphically, it would look like this:

Code:
]--------V------------F-------M--------[

- F is the fork point. Anything past F is the Bitcoin side of the fork on this graphic.
- V is the last block you transacted in pre fork. This is your last valid utxo set state pre fork.
- M is the first block you transacted in post fork on the Bitcoin side.

- Transacted means both sending and receiving coins.

Any chain tip between V and M has the utxo set state you need to move coins on the Bcash side of the fork (as there is no divergence in utxo sets yet in between the 2 sides of the fork).

So what you want to do is to feed Armory a copy of the chain with the tip belonging to [V, M[
1232  Bitcoin / Armory / Re: Using Armory on the BCH chain on: September 25, 2017, 02:53:07 PM
rev files shouldn't matter at all, they're only relevant for Core's reorgs. What you need to nuke as well is your ArmoryDB (if you're not going to use a fresh folder).

Also, there's no guarantee file 949 will do it for you. Core does not download files sequentially, there's a chance post fork blocks are embedded somewhere deeper down your blk files. This file # is only relevant if your node was running at the time of the fork. If you caught up for more than a day of blocks after the fork, chances are you have post fork blocks all over the place. Granted, the only thing you are actually after is the blk file with the first post fork block. If that one is taken out, Armory can't compute the chain past the fork point and you should be good.
1233  Bitcoin / Armory / Re: FRAGMENTED BACKUPS VULNERABILITY!! IF YOU USE THEM, READ THIS!! on: September 25, 2017, 02:50:05 PM
Non-random x values is probably relatively benign, since all information about the polynomial is in the f(x) values.  

You can choose any x as long as the coefficients are random. I don't quite see how randomizing x achieves anything, as you have to provide entire points (x, f(x)) as fragments, therefor x is public information. Maybe you were trying to say that the x values should be chosen at random, instead of say, as part of a sequence? I don't think that's relevant at all for SSS, since all operation are performed on a finite field.


Quote
Is there any way I can see on my 3-of-5 backup if it was made before or after that update was made?  I am of course going to move my funds, but doing so before a new 3-of-5 backup is in place is also a risk.

The coefficients are 32bytes, therefor your backup would have 5 lines (1 header line + 4 * (16bytes of data + 2bytes of checksum) lines) per fragment. If the fragment only has 1 header and 2 data lines, it's using implicit [1,...,N] for x.

Quote
Thus you only need N/2 sheets to recover the key !!!.  The seed can be recovered from a single sheet of what was supposed to be a 2-of-M backup, or from two sheets of a 3-of-M or 4-of-M backup, etc etc.   Shocked

It's far worse than that. Look at how the coefficients are constructed, they're hashes of the previous coefficient. Whatever fragment the attacker gets access to, he will be able to compute all following coefficients just by hashing x once.

Read this again and look at the code again. In the first scheme, anyone with access to a fragment that carries the first coefficient can compute *ALL* all of the coefficients. The single point he has with the fragment is then enough to reveal the secret.

This is slightly worsened by the fact that since there are more fragments than coefficients, certain coefficients reoccur on several fragments. Now people being people, when they distribute fragments they tend keep the first few for themselves, by happenstance. If the coefficients were distributed in order with fragments, this very human yet entirely irrelevant quirk would actually save these users from total disaster. Again, the order of coefficients matter since they are derived consecutively from one another
1234  Bitcoin / Armory / Re: ArmoryDB exits silently upon synchronization on: September 24, 2017, 06:05:26 PM
It's scanning two address sets independently for whatever reason. Do a rebuild & rescan.
1235  Bitcoin / Armory / Re: Using Armory on the BCH chain on: September 24, 2017, 05:11:14 PM
Read the "Tricks" section
1236  Bitcoin / Armory / Re: Armory 0.96.3 released on: September 24, 2017, 04:08:55 PM
I managed to nail it down to calling with --ram-usage=1. When I don't use the parameter, it scans tx history just fine. Please have an attempt to repro this.

Hmm that sounds unlikely but I will definitely test it out.

Quote
Several hours later, I am at this point able to tell that removing --ram-usage fixes all the issues and building completes with success. Looking at the memory usage, I'm not even noticing any differences(stays at around 700-900MB). Is that parameter still valid even or is it just legacy at this point?

This parameter controls the write queue depth for scan threads. It's only one element that controls total RAM footprint for scans, which would be broken down to these items:

- size of batches (hardcoded here: https://github.com/goatpig/BitcoinArmory/blob/master/cppForSwig/BlockchainScanner.h#L24)
- batch queue depth
- constant overhead from the container objects
- speed at which your system goes through the batches

After a substantial rework of the scanning queu mechanism, this parameter doesn't have much effect on full node scans as they're leaner, nor is it really necessary anymore. It is very significant for supernode however.
1237  Bitcoin / Armory / Re: ArmoryDB exits silently upon synchronization on: September 23, 2017, 10:14:30 PM
Use pastebin, my browser blocks that domain.
1238  Bitcoin / Armory / Re: Armory 0.96.3 released on: September 23, 2017, 10:13:15 PM
Something is off with how you pass your custom arguments. The cookie arg is not mandatory, if you start an instance of the DB and give that arg to your client you should be fine. Are you using something else than 127.0.0.1? Is localhost resolved to some other IP? You need to list out all parts of you setup that deviate from default settings and isolate them one after another.
1239  Bitcoin / Armory / Re: Armory 0.96.3 released on: September 23, 2017, 08:13:27 PM
ArmoryDB is running on localhost with no exotic IP:port setup. But it is running independently. What commandline should Qt use to connect?

It should find the DB instance by default.
1240  Bitcoin / Armory / Re: Armory 0.96.3 released on: September 23, 2017, 07:35:06 PM
ArmoryQt will first look for a DB on the given IP:port. If it can't find one, it will spawn a DB. If you are running a DB but ArmoryQt can't find it, you aren't giving it the proper IP:port to look at.
Pages: « 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 [62] 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 ... 233 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!