Bitcoin Forum
April 20, 2024, 12:52:08 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: The biggest problem with cold storage wallets is making sure that your address..  (Read 5893 times)
no_alone (OP)
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
December 04, 2013, 11:01:25 PM
 #1

Hello,
I'm finding a problem making sure my cold storage wallet is secure.. I find that the only loop hole in cold storage is making sure that the address generated in the offline pc are really random..
I can think of several issues:

1. a ubunto developer change the source code so that all users that create new address in bitcoin will create address from a pool of 200 million address  ( so each one will get a different one) but the developer know the keys for all of them

2. downloading a bitcoin-qt client that new address generated from this client is from a pool of 200 million address ( so each one will get a different one) but the bitcoin-qt developer/hacker will have the keys for all address.


What is the best way to be absolutely sure my address is random|?
Has anyone ever thought about this issue?


Thank You.

Mine only when pc is IDLE totally indivisible...
http://forum.bitcoin.org/index.php?topic=9851.0
Mine on family computer without disturbing them

Donation : 1GjpJnLU8zdfEHW7FoCx2UUosJgc9prXN4
1713574328
Hero Member
*
Offline Offline

Posts: 1713574328

View Profile Personal Message (Offline)

Ignore
1713574328
Reply with quote  #2

1713574328
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713574328
Hero Member
*
Offline Offline

Posts: 1713574328

View Profile Personal Message (Offline)

Ignore
1713574328
Reply with quote  #2

1713574328
Report to moderator
1713574328
Hero Member
*
Offline Offline

Posts: 1713574328

View Profile Personal Message (Offline)

Ignore
1713574328
Reply with quote  #2

1713574328
Report to moderator
1713574328
Hero Member
*
Offline Offline

Posts: 1713574328

View Profile Personal Message (Offline)

Ignore
1713574328
Reply with quote  #2

1713574328
Report to moderator
grux
Member
**
Offline Offline

Activity: 67
Merit: 10


View Profile
December 04, 2013, 11:53:32 PM
 #2

This is a massive thing people look after. A ubuntu developer couldn't do something like that easily, as it would be extremely noticeable, and people would wonder what reason he had to do so. Sorta like what went down on the android bitcoin app, everyone was notified that it was using an insecure RNG that the developers choose . Rest assured, it's not going to be easy to rampantly harvest addresses like that as you described. There would be a notable amount of address collisions, and an insecure RNG in ubuntu would wreak havoc in other applications. The bitcoin client uses openSSL, which is trusted by companies who have way more at stake than bitcoin's current cap.
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
December 05, 2013, 02:57:35 AM
 #3

If you're doing cold storage and think that somehow involves Bitcoin-Qt you're doing something very wrong.

Use Armory for cold storage.
flatfly
Legendary
*
Offline Offline

Activity: 1078
Merit: 1011

760930


View Profile
December 05, 2013, 10:11:58 AM
 #4

A good way to bypass any RNG backdoors is to generate your random addresses using dice.
Several tools support that: NoBrainr (see link in signature), bitaddress.org, and a few others which you can find on this forum.
gglon
Member
**
Offline Offline

Activity: 64
Merit: 10


View Profile
December 05, 2013, 11:18:26 AM
 #5

dice hack http://www.youtube.com/watch?v=Wq-MDBFolXs
keystroke
Hero Member
*****
Offline Offline

Activity: 900
Merit: 1014


advocate of a cryptographic attack on the globe


View Profile
December 05, 2013, 01:25:10 PM
 #6

If you're doing cold storage and think that somehow involves Bitcoin-Qt you're doing something very wrong.

Use Armory for cold storage.
What's wrong with QT? It has been audited to an extreme. Armory is great with the paper wallets but putting a wallet.dat into cold storage should be ok.

"The difference between a castle and a prison is only a question of who holds the keys."
Automatic
Full Member
***
Offline Offline

Activity: 238
Merit: 105


View Profile
December 05, 2013, 03:12:03 PM
 #7


That's way to cheaty for me, if I used that, well, let's just say primedice would be out of their reserve for a long time. I'm a good person, however, so, I'll just report it as a bug to 'em.

Please ask for a signed message from my on-site Bitcoin address (Check my profile) before doing any offsite trades with me.
GhostGum
Newbie
*
Offline Offline

Activity: 29
Merit: 0


View Profile
December 06, 2013, 08:37:16 PM
 #8

If you're doing cold storage and think that somehow involves Bitcoin-Qt you're doing something very wrong.

Use Armory for cold storage.
What's wrong with QT? It has been audited to an extreme. Armory is great with the paper wallets but putting a wallet.dat into cold storage should be ok.


I recommend against just using the wallet,dat file for your cold storage, as the wallet.dat format may change in future client versions, possibly loosing compatability with the current file layout (berkleydb vrsion incompatibilities, or dropping bdb entirely); making it a pain for you to read the keys from it.
Just dump the privkeys (or evern better, theres a dumpwallet command addded to bitcoin client which dumps out the wallets whole keyppool in a nice table for you).  and save that for storage,  pipe strait into openssl, or gpg, or whatever if wanna store encrypted or just to aviod writing raw key to disk/stdout...
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
December 06, 2013, 08:38:35 PM
 #9

What's wrong with QT? It has been audited to an extreme. Armory is great with the paper wallets but putting a wallet.dat into cold storage should be ok.
Can you sign transactions offline with Bitcoin-Qt?
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
December 07, 2013, 01:39:46 PM
 #10

Hello,
I'm finding a problem making sure my cold storage wallet is secure.. I find that the only loop hole in cold storage is making sure that the address generated in the offline pc are really random..
I can think of several issues:

1. a ubunto developer change the source code so that all users that create new address in bitcoin will create address from a pool of 200 million address  ( so each one will get a different one) but the developer know the keys for all of them

2. downloading a bitcoin-qt client that new address generated from this client is from a pool of 200 million address ( so each one will get a different one) but the bitcoin-qt developer/hacker will have the keys for all address.


What is the best way to be absolutely sure my address is random|?
Has anyone ever thought about this issue?


Thank You.

Generate a random key yourself (e.g. by hashing some random input) at the cold wallet PC and import it to your bitcoin-qt wallet using "importprivkey".

Or use a different bitcoin wallet - one that does not rely on a random number source which you don't fully trust.

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
glitch003
Full Member
***
Offline Offline

Activity: 219
Merit: 101


View Profile
December 07, 2013, 06:35:56 PM
 #11

Hello,
I'm finding a problem making sure my cold storage wallet is secure.. I find that the only loop hole in cold storage is making sure that the address generated in the offline pc are really random..
I can think of several issues:

1. a ubunto developer change the source code so that all users that create new address in bitcoin will create address from a pool of 200 million address  ( so each one will get a different one) but the developer know the keys for all of them

2. downloading a bitcoin-qt client that new address generated from this client is from a pool of 200 million address ( so each one will get a different one) but the bitcoin-qt developer/hacker will have the keys for all address.


What is the best way to be absolutely sure my address is random|?
Has anyone ever thought about this issue?


Thank You.

This problem is what I created Piper to solve.  Piper is a permanently offline hardware paper wallet generator and printer and so much more powered by the Raspberry Pi platform.  It gets it's randomness from a hardware random number generator that uses thermal gradients to produce entropy. 

How do you know it safe though?  It uses community-accepted methods to do the key generation, and it's open source, so you can easily check the code yourself and make sure it's not doing anything sketchy.  All Piper software is written in python so the source is included, and it's not a lot of python so I believe most programmers could fully audit the code in a short period of time.  The only non-python part of the key generation is vanitygen.  But the source for vanitygen is included, and you can easily build it by typing "make' and then compare the binary you just built to the one used by Piper by doing an MD5 hash on both.  You can also compare the code on Piper to the code in the vanitygen github repo to make sure there is no foul play there as well. 

So if you want a turnkey solution to this problem, check out https://piperwallet.com
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
December 07, 2013, 06:38:28 PM
 #12

It gets it's randomness from a hardware random number generator that uses thermal gradients to produce entropy. 
I guess that is exactly what he is afraid of.
All these hardware random number generators are completely unauditable - its even worse than with the software.

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
grue
Legendary
*
Offline Offline

Activity: 2058
Merit: 1431



View Profile
December 07, 2013, 06:44:39 PM
 #13

flip 256 coins, then use those bits (heads/tails) as private keys.

It is pitch black. You are likely to be eaten by a grue.

Adblock for annoying signature ads | Enhanced Merit UI
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
December 07, 2013, 06:46:27 PM
 #14

flip 256 coins, then use those bits (heads/tails) as private keys.
that's also a method. Smiley

but I think hitting a hundred of random keys on your keyboard - and then getting e.g. sha256 hash of it, is usually much faster.
just don't use a wireless keyboard Wink

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
glitch003
Full Member
***
Offline Offline

Activity: 219
Merit: 101


View Profile
December 07, 2013, 07:39:31 PM
 #15

It gets it's randomness from a hardware random number generator that uses thermal gradients to produce entropy. 
I guess that is exactly what he is afraid of.
All these hardware random number generators are completely unauditable - its even worse than with the software.

Unauditable?  Check this tool out: http://www.phy.duke.edu/~rgb/General/dieharder.php

The RNG in Piper has passed all 26 tests in that program that have a rating of "good".  The "good" thing is because the developer also includes tests that are questionable, so we only tested Piper on the ones he rates as "good".  Here are the results: http://piperwallet.com/dieharder-results.txt

So the RNG in Piper has in fact been statistically audited for secure randomness and passed all tests to prove it.  I store my own coins in Piper and I wouldn't feel safe accepting anything less than that.
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
December 07, 2013, 07:47:28 PM
 #16

Unauditable?  Check this tool out: http://www.phy.duke.edu/~rgb/General/dieharder.php
But it is not an audit of the silicon - it is just a test of an entropy of the data that it outputs.

You can design a hardware in a way that it will output a high entropy data, though according to your pattern.
And then, when you know the secret pattern - you can predict what it would generate...

Of course its just a theory, but theorizing is what we do here.
But in any case hardware random number generators are in general unauditable - you don't know what they do and how they do it.
You need to trust the manufacturer and most of them are big corps that should not be trusted, as Google itself has already proven with their SecuredRandom class implementation in Android - I'm old enough to know that you don't usually make such a serious "screw ups" by mistake.

If you build your own hardware and then test it for entropy - such a hardware you can trust.
But usually its just easier and cheaper to trust yourself with picking a random seed-string Smiley

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
deepceleron
Legendary
*
Offline Offline

Activity: 1512
Merit: 1025



View Profile WWW
December 07, 2013, 07:53:34 PM
 #17

Unauditable?  Check this tool out: http://www.phy.duke.edu/~rgb/General/dieharder.php

But in any case hardware random number generators are in general unauditable...
Yup, SHA2 of passwords from aaaaa-ZZZZZ will also pass random tests.
glitch003
Full Member
***
Offline Offline

Activity: 219
Merit: 101


View Profile
December 07, 2013, 08:12:45 PM
 #18

Unauditable?  Check this tool out: http://www.phy.duke.edu/~rgb/General/dieharder.php
But it is not an audit of the silicon - it is just a test of an entropy of the data that it outputs.

Just one minor nitpick.  We're not testing the hardware RNG directly, we're testing the final output of /dev/random when it's being continuously fed entropy from the hardware RNG.  /dev/random has it's own whitening algorithms and doesn't JUST use the entropy provided from the hwrng, it pulls from a number of other places as well. 

I agree with you that using JUST the output from the hwrng is unsafe.  So that's why we feed the entropy into /dev/random and don't use it directly.  Our test is testing the system as a whole.

Your points are certainly valid though.
glitch003
Full Member
***
Offline Offline

Activity: 219
Merit: 101


View Profile
December 07, 2013, 08:18:48 PM
 #19

Unauditable?  Check this tool out: http://www.phy.duke.edu/~rgb/General/dieharder.php

But in any case hardware random number generators are in general unauditable...
Yup, SHA2 of passwords from aaaaa-ZZZZZ will also pass random tests.

Well of course, the whole point of SHA2 and other cryptographic hash functions is that they are designed to have very strong uniformity guarantees. 
johnyj
Legendary
*
Offline Offline

Activity: 1988
Merit: 1012


Beyond Imagination


View Profile
December 08, 2013, 01:55:49 AM
 #20

I still think that dice or coin is the purest random generator, just need to get some high quality dice (maybe some certified casino dice?)

Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!