Bitcoin Forum
June 16, 2024, 09:13:52 PM *
News: Voting for pizza day contest
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: What if a watching only wallet gets compromised....  (Read 694 times)
leemar (OP)
Full Member
***
Offline Offline

Activity: 193
Merit: 100


View Profile
June 05, 2016, 12:41:18 PM
 #1

..... are you vulnerable to someone brute forcing the password encryption on the watching only wallet.dat file (if that is a thing).  Or is that not sufficient to steal funds?
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3682
Merit: 1347

Armory Developer


View Profile
June 05, 2016, 12:48:18 PM
 #2

..... are you vulnerable to someone brute forcing the password encryption on the watching only wallet.dat file (if that is a thing)

It isn't a thing. WO wallets cannot currently be encrypted, and they only carry public data.

wallet.dat is Bitcoin Core's wallet format, which Armory does not use nor depend upon. Loosing Core's wallet.dat is an issue, as those carry private keys.

Armory's .watching_only.wallet files only carry public data. Compromising this file will leak your privacy. Any attacker can also choose to swap addresses in that file for his, so that you would serve his addresses instead of yours to receive payment.

Armory checks the consistency of all public data in wallets at start to prevent this sort of attack vectors (and data corruption in general, never know when a disk/stick of ram might fail).

leemar (OP)
Full Member
***
Offline Offline

Activity: 193
Merit: 100


View Profile
June 05, 2016, 12:59:56 PM
 #3

Thanks goatpig.

So to confirm. What would be leaked, and how are they able to create substitute addresses without the seed?
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3682
Merit: 1347

Armory Developer


View Profile
June 05, 2016, 02:07:07 PM
 #4

What would be leaked

All public keys and attached addresses that the wallet can have + any comments you left in there.

Quote
and how are they able to create substitute addresses without the seed?

The whole idea is to not use the wallet's deterministic chain. That would not benefit the attacker.

Replacing one of the addresses on the chain with the expectation the user will just trust content of the wallet is where the attack surface lies. Armory mitigates that threat by making sure all public data it reads from wallet files are derived from the wallet's public root key before it gets to sit in the RAM. It will also angrily warn you about inconsistencies if it finds any (it will literally harass you every run until you fix the wallet).

The new wallet format will introduce an even more robust approach on this regard.

leemar (OP)
Full Member
***
Offline Offline

Activity: 193
Merit: 100


View Profile
June 05, 2016, 02:33:05 PM
 #5

Thanks for the explanation on that attack vector, very helpful.

Quote
All public keys and attached addresses that the wallet can have + any comments you left in there.

At the risk of sounding really dumb, does the fact that the hacker can match the public key to the addresses in the wallet  make a brute force attack on existing address balances more likely?
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3682
Merit: 1347

Armory Developer


View Profile
June 05, 2016, 02:38:38 PM
 #6

Quote
At the risk of sounding really dumb, does the fact that the hacker can match the public key to the addresses in the wallet  make a brute force attack on existing address balances more likely?

What you are talking about is trying to brute force the private key from the public key (something you can't really consider if you only got the hash of the public key, in the case of addresses). If such an attack vector was credible, the network would have changed curve.

achow101
Staff
Legendary
*
Offline Offline

Activity: 3430
Merit: 6705


Just writing some code


View Profile WWW
June 05, 2016, 02:44:45 PM
 #7

Thanks for the explanation on that attack vector, very helpful.

Quote
All public keys and attached addresses that the wallet can have + any comments you left in there.

At the risk of sounding really dumb, does the fact that the hacker can match the public key to the addresses in the wallet  make a brute force attack on existing address balances more likely?
No. The point of a public key is to be public and shared with others without revealing the private key. The address is derived from the public key so it too can be shared. If it were possible to derive the private key from the public key, then the entirety of Bitcoin would be broken and there would be a massive problem not just with Armory but with Bitcoin itself.

All that would happen if someone got your watching only wallet is that he would be able to see every single transaction you make. At worst it is just a privacy leak for you.

leemar (OP)
Full Member
***
Offline Offline

Activity: 193
Merit: 100


View Profile
June 05, 2016, 02:46:15 PM
 #8

Thanks guys.  

Good luck with the ongoing work goatpig, it is much appreciated.

Let us know if you are taking donations yet.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!