Bitcoin Forum
May 08, 2024, 02:32:27 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 »  All
  Print  
Author Topic: A breakable P2SH address - Bitcoin testnet inside  (Read 599 times)
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 03, 2020, 11:12:18 AM
Last edit: August 04, 2020, 01:18:37 PM by BTCW
Merited by NotATether (5), ABCbits (1)
 #1

Long story short, I created this not-very-standard P2SH public address: 2NA4ZpHbzfp7VkAXHjpZc8Ze6SpNfS7jSbF

And gave it some history on the blockchain (hint!) and just funded it again with 0.11111111 tBTC

Show me you can break it and sweep the coins!

It's NOT of those "try and bruteforce my 32-byte private key" or the like. The solution is simple.

If no one has touched the coins in a day or so, I'll show you exactly how.

Do it!



Edit: The updated challenge is here

SendBTC.me <<< amazing imitative
1715135547
Hero Member
*
Offline Offline

Posts: 1715135547

View Profile Personal Message (Offline)

Ignore
1715135547
Reply with quote  #2

1715135547
Report to moderator
"You Asked For Change, We Gave You Coins" -- casascius
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715135547
Hero Member
*
Offline Offline

Posts: 1715135547

View Profile Personal Message (Offline)

Ignore
1715135547
Reply with quote  #2

1715135547
Report to moderator
1715135547
Hero Member
*
Offline Offline

Posts: 1715135547

View Profile Personal Message (Offline)

Ignore
1715135547
Reply with quote  #2

1715135547
Report to moderator
stalker00075
Newbie
*
Offline Offline

Activity: 54
Merit: 0


View Profile
August 03, 2020, 12:10:25 PM
 #2

but tBTC has no price...


meaning to waste time
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 03, 2020, 12:59:08 PM
Last edit: August 03, 2020, 01:25:49 PM by BTCW
 #3

but tBTC has no price...


meaning to waste time

Who says this exact same setup doesn't exist on the mainnet? Testnet is great for exercises like this, so we can take what we learn and apply it to the mainnet after.

Edit/clarifiaction: Let's caluculate the "mainnet twin" to the address (Python):

Code:
>>> import binascii, hashlib, base58
>>> hash160 = binascii.hexlify(base58.b58decode_check(b'2NA4ZpHbzfp7VkAXHjpZc8Ze6SpNfS7jSbF')).decode()[2:]
>>> hash160
'b8761d30be6f2408882e0b458f8fdfc4c896ed45'
>>> base58.b58encode_check(binascii.unhexlify('05'+hash160)).decode()
'3JWMkYfy4Mc9YNtk4gwjWceqEUAViUiMF5'
>>> base58.b58encode_check(binascii.unhexlify('c4'+hash160)).decode()
'2NA4ZpHbzfp7VkAXHjpZc8Ze6SpNfS7jSbF'

In other words, if you can spend from 2NA4ZpHbzfp7VkAXHjpZc8Ze6SpNfS7jSbF on the testnet, you can use the exact same "recipe" to spend from 3JWMkYfy4Mc9YNtk4gwjWceqEUAViUiMF5 on the mainnet, should it ever pop up there.

Cool?

SendBTC.me <<< amazing imitative
DaCryptoRaccoon
Hero Member
*****
Offline Offline

Activity: 1202
Merit: 582


OGRaccoon


View Profile
August 03, 2020, 01:29:26 PM
 #4

This is very interesting @BTCW.

I have a few transaction I would like to ask you about that you may know how I can resolve.

PM sent

┏━━━━━━━━━━━━━━━━━┓
┃   💎 Mine Solo with CKPool 💎    ┃
┃    ➤ Hit Blocks on Your Own!      ┃
┃ ███▓▓  ███▓▓  ███▓▓  ███▓▓┃
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1292


There is trouble abrewing


View Profile
August 03, 2020, 05:15:36 PM
 #5

Show me you can break it and sweep the coins!

It's NOT of those "try and bruteforce my 32-byte private key" or the like. The solution is simple.

well unless you consider cheating to be a "solution", it is not possible to break something like this even if you knew the number of OP codes inside the script or knew the ballpark of their type. it contains 14 OP codes that are never used (ROT, SWAP, NIP, SIZE, ...) and 2 random data pushes!

There is a FOMO brewing...
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 03, 2020, 05:58:16 PM
 #6

Show me you can break it and sweep the coins!

It's NOT of those "try and bruteforce my 32-byte private key" or the like. The solution is simple.

well unless you consider cheating to be a "solution", it is not possible to break something like this even if you knew the number of OP codes inside the script or knew the ballpark of their type. it contains 14 OP codes that are never used (ROT, SWAP, NIP, SIZE, ...) and 2 random data pushes!

It is easier than you think to break it. And someone just did:

https://www.blockchain.com/btc-testnet/tx/023f0dde4d0b11581cb81214462170995b85ec6be41c78c5fb44084c7d9e671a

I don't know whether it was someone reading here or not.

Edit: I will update with a more exhaustive answer and an even more elegant solution than simply copying the signatures from the first spending, as the "thief" in this case apparently did.

SendBTC.me <<< amazing imitative
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 03, 2020, 10:33:58 PM
Last edit: August 03, 2020, 11:32:59 PM by BTCW
Merited by ABCbits (4), fronti (1)
 #7

Alright, let's talk about Bitcoin scripts and its opcodes.

A transaction is (partly - the most interesting part of it) an unlocking script and a locking script, which are combined - in that very order, evaluated (executed - run as a program), and must return "TRUE" (which technically means that the stack must contain a positive integer top value and nothing else).

A P2SH address is simply the base58check encoded version of the hashed locking script, so that it impossible to examine a "3-address" and determine its script (since it is hashed). This is where previous blockchain data comes in because my example address couldn't have been compromised if I hadn't prepared things for you and already spent from it once before writing the OP.

Let's take it step by step.

While there are some common formats for P2SH scripts (such as "OP_HASH160 20 <a 20-byte hex string> OP_EQUAL") there is nothing that says that a P2SH address must adhere to any certain format. In fact, more complex scripts not only allowed but actually encouraged by Bitcoin. Multisig scripts, for example, can be very complex and contain a shitload of IF/THEN conditions. Remember however that when making a script, there must exist conditions for it (together with its inputs in the unlocking script) so that it may return "TRUE". If not, it is an unspendable address (and such addresses are curiously simple to create; you have been warned - don't unintentionally create Bitcoin black holes).

Let me lay out the locking script, so I can comment on it (and yes, I did use a few uncommon opcodes, but that's not illegal - they are standard by definition):

Code:
OP_SIZE
OP_SWAP
OP_SIZE
OP_NIP
8 0xd9ac1d9c37b651db
OP_ROT
OP_ROT
OP_EQUAL
OP_ROT
OP_DROP
OP_SWAP
OP_DROP
OP_1
8 0x99ac1d9c37b651db
OP_DROP
OP_EQUAL

It is quite messy, and intentionally so, but it can be deciphered. Basically, what it does it that is takes two inputs, calculates their sizes (and not their values!) and if they are equal, it will (again together with the unlocking code below) return "TRUE".

This locking script shuffles around stack values like crazy and adds instances of gibberish 8-byte strings twice, which are never evaluated but simply dropped. Also, since the script will be serialized (converted to a hexadecimal string), I was very happy to end up with an exactly 32-byte script, since I figured that strings of that length are easily mistaken for hash values and/or signatures. The serialized locking script is thus

Code:
0x827c827708d9ac1d9c37b651db7b7b877b757c75510899ac1d9c37b651db7587

and this is easily converted to testnet public address 2NA4ZpHbzfp7VkAXHjpZc8Ze6SpNfS7jSbF and mainnet public address 3JWMkYfy4Mc9YNtk4gwjWceqEUAViUiMF5 with a few lines of Python (see previous post by yours truly) or if you're even lazier (or smarter, depending on your your world-view) using a web service (one linked below).

So, the unlocking script then. Again, I went for 32-byte strings, for the same reason; easily mistaken for hashes that actually represent something. But I simply generated two random hexadecimal numbers with bash command "openssl rand -hex 32" (which - by the way - is an excellent one-liner for producing unbreakable private keys), so that:

Code:
32 0x2803d055a4a133bde555a39d37762c8354b6f7418817c5c4b516cf413b280209
32 0x3dbb8323f94bf9acd13a5f92e0d0a7e87f34e31b09a866fdc80437a57e24a114

Looks really serious, doesn't it?

Remember though, these numbers are completely random and are never evaluated! The only requirement by my script is that two inputs of equal length are provided. This means that another unlocking script that would have and will work equally well for this address is (this is what I hoped someone would realize):

Code:
OP_1
OP_1

Oh yeah, this will work too:

Code:
OP_4
OP_7

Same length, not values - remember?


If you want to see the unlocking and locking scripts together, how they are evaluated step by step and how this crazy combination eventually leads to "TRUE", here they are together (this page is in my humble opinion awesome for P2SH experiments):

https://bitcoin-script-debugger.visvirial.com/?input=32%200x2803d055a4a133bde555a39d37762c8354b6f7418817c5c4b516cf413b280209%2032%200x3dbb8323f94bf9acd13a5f92e0d0a7e87f34e31b09a866fdc80437a57e24a114%20OP_SIZE%20OP_SWAP%20OP_SIZE%20OP_NIP%208%200xd9ac1d9c37b651db%20OP_ROT%20OP_ROT%20OP_EQUAL%20OP_ROT%20OP_DROP%20OP_SWAP%20OP_DROP%20OP_1%208%200x99ac1d9c37b651db%20OP_DROP%20OP_EQUAL

Note especially the green "Result: OK".

The person (or bot? - I still don't know who cracked it) simply did a copy/paste of the combined unlocking and locking script from my first spending

Code:
63202803d055a4a133bde555a39d37762c8354b6f7418817c5c4b516cf413b280209203dbb8323f94bf9acd13a5f92e0d0a7e87f34e31b09a866fdc80437a57e24a11420827c827708d9ac1d9c37b651db7b7b877b757c75510899ac1d9c37b651db7587

and used it unchanged to create a new transaction. To view the raw transation, it can be done in Bitcoin Core console using "getrawtransaction 023f0dde4d0b11581cb81214462170995b85ec6be41c78c5fb44084c7d9e671a" or in Electrum console using "gettransaction('023f0dde4d0b11581cb81214462170995b85ec6be41c78c5fb44084c7d9e671a')", but remember to start them in testnet mode before trying.

In other words, the next time you want to snatch coins from these addresses, try the shorter redeem code:

Code:
23515120827c827708d9ac1d9c37b651db7b7b877b757c75510899ac1d9c37b651db7587

Unless you didn't already know OP_1 is "51" in hexadecimal, why the string begins with two instances of that.

Phew... that took some time to write up...

I hope you liked it, and in that casse feel free to pass over some testnet coins to 2N2EJxoRy5hRE74aV4NDiC22dcH3QEqzf5G, because I was just robbed of almost all I had there Smiley



Edit/additions:

1) To clarify further, what I tried to accomplish with three different 32-byte strings as the Sigcode

Code:
2803d055a4a133bde555a39d37762c8354b6f7418817c5c4b516cf413b280209
3dbb8323f94bf9acd13a5f92e0d0a7e87f34e31b09a866fdc80437a57e24a114
827c827708d9ac1d9c37b651db7b7b877b757c75510899ac1d9c37b651db7587

which are the values you see when you look at a transaction in a block explorer was an attempted deception. I.e NOT "hey, this looks like a broken signature".

2) Speaking of signatures. I should have written earlier that my script does zero signature evaluation and there is no elliptic curve cryptography (ECC) anywhere, why the address is another "anyone-can-spend" now that the required inputs have been disclosed, so any old redeem code that has worked will work again.



SendBTC.me <<< amazing imitative
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1292


There is trouble abrewing


View Profile
August 04, 2020, 05:21:15 AM
Merited by ABCbits (1)
 #8

It is easier than you think to break it. And someone just did:

i don't know if you don't know the meaning of the word "break" or just misusing it but this is not what "breaking" means. breaking would be if and only if the only thing that was revealed were the hash of the script and nothing else.
as i said there is absolutely no way of breaking it when it is only the hash. but when you have already revealed the script here (which anyone can spend) all it takes is a copy and paste of it into a new transaction spending the new output(s).

There is a FOMO brewing...
TheArchaeologist
Sr. Member
****
Offline Offline

Activity: 310
Merit: 727


---------> 1231006505


View Profile WWW
August 04, 2020, 06:21:32 AM
Merited by El duderino_ (3), ABCbits (2)
 #9

I am not sure what you tried to accomplish with this "breakable P2SH address"  challenge. That would imply you could either reverse the hash so the input of the hash would become apparent or bruteforce the script content so it would hash to the same value and in turn to the same address of the "challenge".

Instead you created a unguessable complicated anyone-can-spend script,  and since you know what the script was you used it to unlock it in a testnet transaction. Then the solution to your "challenge" is to simply copy and paste the unlocking script from the previous transaction to re-use. So the content of the script itself is completely irrelevant, this would work for any script that is made up of anyone-can-spend content.

All in all there was nothing to break in your "challenge" in the first place.

Sooner or later you're going to realize, just as I did, that there's a difference between knowing the path and walking the path
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 09:13:59 AM
 #10

It is easier than you think to break it. And someone just did:

i don't know if you don't know the meaning of the word "break" or just misusing it but this is not what "breaking" means. breaking would be if and only if the only thing that was revealed were the hash of the script and nothing else.
as i said there is absolutely no way of breaking it when it is only the hash. but when you have already revealed the script here (which anyone can spend) all it takes is a copy and paste of it into a new transaction spending the new output(s).

I tried to disguise an anyone-can-spend P2SH address as well as I could so that a spending on the blockchain (the first) would contain three 32-byte strings as the sigscript. That was all.

After someone else redeemed the coins, I later showed that my much shorter unlocking code "OP_1 OP_1" can be used, tx here.

I'm honestly not convinced someone would have noticed anything if I hadn't written about it here. In fact, thus is very testable: I'll make another similar but not identical "crazy" script, fund it, spend from it, fund it again, but write nothing about it for several days. And see what happens.

I'm not sure I follow your reasoning around the word "breaking". R- and S-reuse, for example, the good old classic bad (static nonce) signature that leads to private key leakage, is that "breaking" or "f-ck obvious"?








SendBTC.me <<< amazing imitative
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 09:19:32 AM
 #11

I am not sure what you tried to accomplish with this "breakable P2SH address"  challenge. That would imply you could either reverse the hash so the input of the hash would become apparent or bruteforce the script content so it would hash to the same value and in turn to the same address of the "challenge".

Instead you created a unguessable complicated anyone-can-spend script,  and since you know what the script was you used it to unlock it in a testnet transaction. Then the solution to your "challenge" is to simply copy and paste the unlocking script from the previous transaction to re-use. So the content of the script itself is completely irrelevant, this would work for any script that is made up of anyone-can-spend content.

All in all there was nothing to break in your "challenge" in the first place.

I promise to be more pedagogical in coming write-ups (if there will be any). In this case, the challenge could have been "using different signatures" and the simplest answer would be "OP_1 OP_1".


SendBTC.me <<< amazing imitative
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1292


There is trouble abrewing


View Profile
August 04, 2020, 09:25:57 AM
 #12

I tried to disguise an anyone-can-spend P2SH address as well as I could so that a spending on the blockchain (the first) would contain three 32-byte strings as the sigscript. That was all.
well the moment you posted the link to that address here (the first line of this topic) that disguise stopped working.

Quote
After someone else redeemed the coins, I later showed that my much shorter unlocking code "OP_1 OP_1" can be used, tx here.
you found one case of transaction malleability.
it doesn't matter what you place before your redeem script, it can even be empty or it can contain lots of OP codes, it still evaluates the same.
by the way it has nothing to do with "breaking the redeem script".

Quote
I'm honestly not convinced someone would have noticed anything if I hadn't written about it here.
you are probably right but only because it is "testnet" and it has no value. doing the same on mainnet would surely lead to an immediate double spending of the same coins by multiple transactions, more if the value is high (like 0.1BTC which is worth $1100+).

Quote
I'm not sure I follow your reasoning around the word "breaking". R- and S-reuse, for example, the good old classic bad (static nonce) signature that leads to private key leakage, is that "breaking" or "f-ck obvious"?
well there is no signature involved anywhere in your transaction as there is no OP_CHECK(MULTI)SIG(VERIFY) OP codes anywhere in it. we are talking about an arbitrary script that anyone can spend and is also revealed already.

There is a FOMO brewing...
TheArchaeologist
Sr. Member
****
Offline Offline

Activity: 310
Merit: 727


---------> 1231006505


View Profile WWW
August 04, 2020, 09:36:44 AM
 #13

I promise to be more pedagogical in coming write-ups (if there will be any). In this case, the challenge could have been "using different signatures" and the simplest answer would be "OP_1 OP_1".
Maybe you should try to understand these thing a bit better yourself before trying to educate others. There are none, 0, zilch signatures involved in your "challenge".

Sooner or later you're going to realize, just as I did, that there's a difference between knowing the path and walking the path
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 09:37:56 AM
 #14


you found one case of transaction malleability.
it doesn't matter what you place before your redeem script, it can even be empty or it can contain lots of OP codes, it still evaluates the same.
by the way it has nothing to do with "breaking the redeem script".

This isn't correct. I designed the locking script so it requires exactly two pushes of equal string length. An empty unlocking script will fail. Also, "lots of OP codes" will fail too.

SendBTC.me <<< amazing imitative
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 09:44:51 AM
 #15

I promise to be more pedagogical in coming write-ups (if there will be any). In this case, the challenge could have been "using different signatures" and the simplest answer would be "OP_1 OP_1".
Maybe you should try to understand these thing a bit better yourself before trying to educate others. There are none, 0, zilch signatures involved in your "challenge".

You quoted me faster than I could edit my post. I shouldn't have used the word "signatures", it is misleading. As already said, this is an anyone-can-spend as there is no signing going on anywhere.

Again, all I did was to try and create a transaction that looked like it required signatures.

I hear you loud and clear. You don't like write-ups of this kind. Will refrain from posting further.

SendBTC.me <<< amazing imitative
BASE16
Member
**
Offline Offline

Activity: 180
Merit: 38


View Profile
August 04, 2020, 12:16:17 PM
 #16

A script can be anything.
Anything is quite a broad thing, since it includes everything.

Here is a small 1 BTC challenge for you to solve: https://bitaps.com/mnemonic/challenge

Those aren't test coins  Smiley
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 12:54:51 PM
 #17

A script can be anything.
Anything is quite a broad thing, since it includes everything.

Here is a small 1 BTC challenge for you to solve: https://bitaps.com/mnemonic/challenge

Those aren't test coins  Smiley

Nice bounty program. That address was funded six weeks or so ago, so I guess I wasn't in mind then. By the way, a point of the elliptic curve can be almost anything (well, within the secp256k1 parameters, an insanely large but not infinite space), but a script cannot "include everything", since it is a program that must run and evaluate to "TRUE".


SendBTC.me <<< amazing imitative
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 01:04:33 PM
 #18

A new challenge



You asked for it, and you will have it. This time around:

  • Includes signatures
  • Not an anyone-can-spend address

Check out 2MsucLKM489owxv6emXfCVRCZ3UFb7MnXCR

It has been funded once with 0.1 tBTC, spent from once, and is funded again with 0.1 tBTC

ALL INFORMATION NEEDED TO BREAK IT IS IN THIS THREAD

I will prove it by writing out the solution here, if no one has swept it within a day or so. I someone sweeps it sooner (and doesn't write anything here), I will publish the solution asap.

Go!




SendBTC.me <<< amazing imitative
BrewMaster
Legendary
*
Offline Offline

Activity: 2114
Merit: 1292


There is trouble abrewing


View Profile
August 04, 2020, 02:03:11 PM
 #19

...
This isn't correct. I designed the locking script so it requires exactly two pushes of equal string length. An empty unlocking script will fail. Also, "lots of OP codes" will fail too.

it is not "string" length despite what the wiki says, it is byte length and what i meant was that you can change the 2 initial data that are being pushed to the stack to be literary anything. then you can also add some other garbage code there for example the second thing you posted can be modified to this that even has an OP_CHECKSIG inside and it still passes:
Code:
OP_5 0x03ffffff OP_CHECKSIG OP_NOT OP_1 OP_1 <redeem_script>
and it still has nothing to do with breaking the redeem script Tongue

There is a FOMO brewing...
BTCW (OP)
Copper Member
Full Member
***
Offline Offline

Activity: 193
Merit: 235

Click "+Merit" top-right corner


View Profile
August 04, 2020, 02:14:22 PM
 #20

...
This isn't correct. I designed the locking script so it requires exactly two pushes of equal string length. An empty unlocking script will fail. Also, "lots of OP codes" will fail too.

it is not "string" length despite what the wiki says, it is byte length and what i meant was that you can change the 2 initial data that are being pushed to the stack to be literary anything. then you can also add some other garbage code there for example the second thing you posted can be modified to this that even has an OP_CHECKSIG inside and it still passes:
Code:
OP_5 0x03ffffff OP_CHECKSIG OP_NOT OP_1 OP_1 <redeem_script>
and it still has nothing to do with breaking the redeem script Tongue

Hm, two questions:

1) Correct me if I'm wrong but unlocking scripts must, to the best of knowledge, be "push only", and if you include any other opcode you will get "64: scriptsig-not-pushonly" (I've hit this wall a number of times)

2) If you fiddle around with the locking script, its hash will change which will invalidate the transaction?


SendBTC.me <<< amazing imitative
Pages: [1] 2 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!