Bitcoin Forum
April 25, 2024, 05:58:10 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 [189] 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 »
  Print  
Author Topic: Armory - Discussion Thread  (Read 521678 times)
randomguy7
Hero Member
*****
Offline Offline

Activity: 527
Merit: 500


View Profile
June 16, 2014, 08:14:51 PM
 #3761

I'd recommend to encrypt the swap (maybe with a passphrase instead of a random one time password, I don't trust the entropy pool while booting up). No swap at all might get nasty if you hit your ram constraints.
1714024690
Hero Member
*
Offline Offline

Posts: 1714024690

View Profile Personal Message (Offline)

Ignore
1714024690
Reply with quote  #2

1714024690
Report to moderator
1714024690
Hero Member
*
Offline Offline

Posts: 1714024690

View Profile Personal Message (Offline)

Ignore
1714024690
Reply with quote  #2

1714024690
Report to moderator
1714024690
Hero Member
*
Offline Offline

Posts: 1714024690

View Profile Personal Message (Offline)

Ignore
1714024690
Reply with quote  #2

1714024690
Report to moderator
Once a transaction has 6 confirmations, it is extremely unlikely that an attacker without at least 50% of the network's computation power would be able to reverse it.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
etotheipi (OP)
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 16, 2014, 08:32:20 PM
 #3762

I'd recommend to encrypt the swap (maybe with a passphrase instead of a random one time password, I don't trust the entropy pool while booting up). No swap at all might get nasty if you hit your ram constraints.


Well the most sensitive keys will be kept on an offline computer which presumably runs nothing else except offline Armory.  There's not really a way to run through your RAM there.  Plus, I'd rather run out of swap than have the keys accidentally hit the hard drive unencrypted without warning.  But yes, it is possible to have encrypted swap, though I don't think you can use hibernate if you do that, so you'd be disabling hibernate which is 80% the reason you wanted encrypted swap to begin with.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
SebastianJu
Legendary
*
Offline Offline

Activity: 2674
Merit: 1082


Legendary Escrow Service - Tip Jar in Profile


View Profile WWW
June 16, 2014, 09:59:30 PM
 #3763

I'd recommend to encrypt the swap (maybe with a passphrase instead of a random one time password, I don't trust the entropy pool while booting up). No swap at all might get nasty if you hit your ram constraints.


Well the most sensitive keys will be kept on an offline computer which presumably runs nothing else except offline Armory.  There's not really a way to run through your RAM there.  Plus, I'd rather run out of swap than have the keys accidentally hit the hard drive unencrypted without warning.  But yes, it is possible to have encrypted swap, though I don't think you can use hibernate if you do that, so you'd be disabling hibernate which is 80% the reason you wanted encrypted swap to begin with.

Encrypt the whole OS with Truecrypt and you dont have to bother anymore... though TC is somewhat in a strange state... now that the devs dont want to work on it anymore.

Please ALWAYS contact me through bitcointalk pm before sending someone coins.
etotheipi (OP)
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 16, 2014, 10:38:07 PM
 #3764

I'd recommend to encrypt the swap (maybe with a passphrase instead of a random one time password, I don't trust the entropy pool while booting up). No swap at all might get nasty if you hit your ram constraints.


Well the most sensitive keys will be kept on an offline computer which presumably runs nothing else except offline Armory.  There's not really a way to run through your RAM there.  Plus, I'd rather run out of swap than have the keys accidentally hit the hard drive unencrypted without warning.  But yes, it is possible to have encrypted swap, though I don't think you can use hibernate if you do that, so you'd be disabling hibernate which is 80% the reason you wanted encrypted swap to begin with.

Encrypt the whole OS with Truecrypt and you dont have to bother anymore... though TC is somewhat in a strange state... now that the devs dont want to work on it anymore.

As far as I know, TrueCrypt doesn't do encrypted swap.  It makes sure that nothing touches your primary (storage) partitions unencrypted, but if you hibernate with key material in RAM, it will still end up on disk unencrypted.   I recommend both disabling swap (and hibernate), and use full-disk encryption.  TrueCrypt works for the disk encryption part, though most recent versions of Ubuntu have had home-partition encryption in the OS-install wizard for a while

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
acegilz
Full Member
***
Offline Offline

Activity: 211
Merit: 100

1ACEGiLZnZoG7KUNkMwAT8tBuJ6jsrwj5Q


View Profile
June 17, 2014, 01:32:33 AM
 #3765

any chance to issue bulk send to multiple addresses using armory with GUI ?
Corelianer
Full Member
***
Offline Offline

Activity: 309
Merit: 100



View Profile
June 17, 2014, 08:00:45 AM
 #3766

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.

bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
June 17, 2014, 08:13:18 AM
 #3767

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.



That's probably the most useless "security" detail you can think to look at

Corelianer
Full Member
***
Offline Offline

Activity: 309
Merit: 100



View Profile
June 17, 2014, 09:57:33 AM
 #3768

Really? So lets assume you have an up-to date antivirus system/ malware detector like most people do and then you look in the task-manager seeing running processes that you have no idea what they might do. The first thing is to check if they are from a known vendor. Then you might google the file to see what other people say.

If you had ever a Virus infected computer, then you know what I mean.

Right now the guardian.exe looks suspicious because I have no idea if its legit or not.

Most viruses don't pay attention to this stuff and thats where you can identify them easily.
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
June 17, 2014, 11:55:10 AM
 #3769

Really? So lets assume you have an up-to date antivirus system/ malware detector like most people do and then you look in the task-manager seeing running processes that you have no idea what they might do. The first thing is to check if they are from a known vendor. Then you might google the file to see what other people say.

If you had ever a Virus infected computer, then you know what I mean.

Right now the guardian.exe looks suspicious because I have no idea if its legit or not.

Most viruses don't pay attention to this stuff and thats where you can identify them easily.
This is false security.

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
June 17, 2014, 12:05:44 PM
 #3770

Really? So lets assume you have an up-to date antivirus system/ malware detector like most people do and then you look in the task-manager seeing running processes that you have no idea what they might do. The first thing is to check if they are from a known vendor. Then you might google the file to see what other people say.

If you had ever a Virus infected computer, then you know what I mean.

Right now the guardian.exe looks suspicious because I have no idea if its legit or not.

Most viruses don't pay attention to this stuff and thats where you can identify them easily.

You can edit it yourself

http://www.heaventools.com/resource-tuner.htm

SebastianJu
Legendary
*
Offline Offline

Activity: 2674
Merit: 1082


Legendary Escrow Service - Tip Jar in Profile


View Profile WWW
June 17, 2014, 12:38:15 PM
 #3771

I'd recommend to encrypt the swap (maybe with a passphrase instead of a random one time password, I don't trust the entropy pool while booting up). No swap at all might get nasty if you hit your ram constraints.


Well the most sensitive keys will be kept on an offline computer which presumably runs nothing else except offline Armory.  There's not really a way to run through your RAM there.  Plus, I'd rather run out of swap than have the keys accidentally hit the hard drive unencrypted without warning.  But yes, it is possible to have encrypted swap, though I don't think you can use hibernate if you do that, so you'd be disabling hibernate which is 80% the reason you wanted encrypted swap to begin with.

Encrypt the whole OS with Truecrypt and you dont have to bother anymore... though TC is somewhat in a strange state... now that the devs dont want to work on it anymore.

As far as I know, TrueCrypt doesn't do encrypted swap.  It makes sure that nothing touches your primary (storage) partitions unencrypted, but if you hibernate with key material in RAM, it will still end up on disk unencrypted.   I recommend both disabling swap (and hibernate), and use full-disk encryption.  TrueCrypt works for the disk encryption part, though most recent versions of Ubuntu have had home-partition encryption in the OS-install wizard for a while

If TC encrypted an OS then everything is encrypted, including the swap-file. You only can get back into the hibernated session if you insert the password first since the swapfile is only a file on the OS-Partition. And the whole OS-Partition is encrypted.

Please ALWAYS contact me through bitcointalk pm before sending someone coins.
Rampion
Legendary
*
Offline Offline

Activity: 1148
Merit: 1018


View Profile
June 17, 2014, 01:51:06 PM
 #3772

I have an old Armory wallet on an offline computer - if I upgrade my offline installation with the latest Armory version (0.9.2), will I be able to do an n-of-m paper backup or should I create a new wallet with the newest Armory and transfer my funds there to be able to print such a backup?

etotheipi (OP)
Legendary
*
Offline Offline

Activity: 1428
Merit: 1093


Core Armory Developer


View Profile WWW
June 17, 2014, 01:55:32 PM
 #3773

I have an old Armory wallet on an offline computer - if I upgrade my offline installation with the latest Armory version (0.9.2), will I be able to do an n-of-m paper backup or should I create a new wallet with the newest Armory and transfer my funds there to be able to print such a backup?

The new backup system is backwards compatible.  It has no problem doing fragmented backups of old wallets, though they will be four-line backups instead of the new two-line backups.  This is because the older versions of Armory (before fragmented backups were implemented) independently generated the root key and chaincode from secure-random data and thus both needed to be backed up.  This was unnecessary since there is already more than enough entropy in the 256-bit key, so we switched to computing it from the root key itself.  Thus, if you have the root key, the chaincode can be computed and doesn't need to be backed up.   

Just make sure you use the backup tester and/or actually remove the wallet and restore it.   It will give you the option to test your backup after you are done creating it.

Founder and CEO of Armory Technologies, Inc.
Armory Bitcoin Wallet: Bringing cold storage to the average user!
Only use Armory software signed by the Armory Offline Signing Key (0x98832223)

Please donate to the Armory project by clicking here!    (or donate directly via 1QBDLYTDFHHZAABYSKGKPWKLSXZWCCJQBX -- yes, it's a real address!)
Corelianer
Full Member
***
Offline Offline

Activity: 309
Merit: 100



View Profile
June 17, 2014, 02:48:09 PM
 #3774

@bibop

I opened ArmoryQt.exe but it failes to change any of those details. (Reffering this youtube video: https://www.youtube.com/watch?v=tPcrSpYqH0k )
I also tried to open the other executables (guardian.exe and w9xpopen.exe).



The only one that seem to work is the uninstall.exe



I still stick with my opinion that it's an indicator for a virus if the details are missing.
flipperfish
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251


Dolphie Selfie


View Profile
June 17, 2014, 03:13:21 PM
Last edit: June 17, 2014, 03:26:10 PM by flipperfish
 #3775

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.

[pictures]

The metadata on the details-tab alone is indeed pretty useless. However, there is the possibility to have executables signed with Microsoft's Authenticode [1], which is Microsoft's way of code signing. It's more or less the same as the GPG-Signatures the Armory Devs already provide, however it's far more easy to check on windows, as the functionality for this is already included in the OS and the NT-Kernel. Even more, these signatures can be used to instruct the OS to only allow execution of signed (even constrained by the signer) executables.

AFAIK Authenticode also protects the metadata in the executable, so the information in the details-tab becomes more reliable.

I would really like to have all Armory Windows executables also to be signed with Authenticode besides GPG.


[1] http://msdn.microsoft.com/en-us/library/ie/ms537359%28v=vs.85%29.aspx
     http://blogs.msdn.com/b/ieinternals/archive/2011/03/22/authenticode-code-signing-for-developers-for-file-downloads-building-smartscreen-application-reputation.aspx
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
June 17, 2014, 11:58:25 PM
 #3776

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.

[pictures]

The metadata on the details-tab alone is indeed pretty useless. However, there is the possibility to have executables signed with Microsoft's Authenticode [1], which is Microsoft's way of code signing. It's more or less the same as the GPG-Signatures the Armory Devs already provide, however it's far more easy to check on windows, as the functionality for this is already included in the OS and the NT-Kernel. Even more, these signatures can be used to instruct the OS to only allow execution of signed (even constrained by the signer) executables.

AFAIK Authenticode also protects the metadata in the executable, so the information in the details-tab becomes more reliable.

I would really like to have all Armory Windows executables also to be signed with Authenticode besides GPG.


[1] http://msdn.microsoft.com/en-us/library/ie/ms537359%28v=vs.85%29.aspx
     http://blogs.msdn.com/b/ieinternals/archive/2011/03/22/authenticode-code-signing-for-developers-for-file-downloads-building-smartscreen-application-reputation.aspx

You mean pay microsoft to sign it for you which can be social engineered? In addition to the private signing key owned by the nsa?

flipperfish
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251


Dolphie Selfie


View Profile
June 18, 2014, 12:13:05 AM
 #3777

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.

[pictures]

The metadata on the details-tab alone is indeed pretty useless. However, there is the possibility to have executables signed with Microsoft's Authenticode [1], which is Microsoft's way of code signing. It's more or less the same as the GPG-Signatures the Armory Devs already provide, however it's far more easy to check on windows, as the functionality for this is already included in the OS and the NT-Kernel. Even more, these signatures can be used to instruct the OS to only allow execution of signed (even constrained by the signer) executables.

AFAIK Authenticode also protects the metadata in the executable, so the information in the details-tab becomes more reliable.

I would really like to have all Armory Windows executables also to be signed with Authenticode besides GPG.


[1] http://msdn.microsoft.com/en-us/library/ie/ms537359%28v=vs.85%29.aspx
     http://blogs.msdn.com/b/ieinternals/archive/2011/03/22/authenticode-code-signing-for-developers-for-file-downloads-building-smartscreen-application-reputation.aspx

You mean pay microsoft to sign it for you which can be social engineered? In addition to the private signing key owned by the nsa?

No. I mean getting a Authenticode Certificate from a well known CA (eg. [2]) and use it to sign the executables. Microsoft does only provide the root keys, which are trusted by default (Microsoft also makes the OS, this whole procedure is used on, so the users, who do use Armory on Windows, do trust Microsoft anyways.) The private key for the code signing certificate can be stored in the same way as Armory's GPG key, so it's not owned by the NSA. (And actually, it's not the NSA I fear in this use case, but regular hackers.) Social Engineering is a concern only, if you don't check the metadata in the executable.

[2] https://www.thawte.com/code-signing/content-signing-certificates/microsoft-authenticode/index.html
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
June 18, 2014, 09:40:10 AM
 #3778

One thing that I noticed is that the Details in the Binaries are missing under Windows.
For most people, (including me) an executable looks suspicious if these Details are missing.

[pictures]

The metadata on the details-tab alone is indeed pretty useless. However, there is the possibility to have executables signed with Microsoft's Authenticode [1], which is Microsoft's way of code signing. It's more or less the same as the GPG-Signatures the Armory Devs already provide, however it's far more easy to check on windows, as the functionality for this is already included in the OS and the NT-Kernel. Even more, these signatures can be used to instruct the OS to only allow execution of signed (even constrained by the signer) executables.

AFAIK Authenticode also protects the metadata in the executable, so the information in the details-tab becomes more reliable.

I would really like to have all Armory Windows executables also to be signed with Authenticode besides GPG.


[1] http://msdn.microsoft.com/en-us/library/ie/ms537359%28v=vs.85%29.aspx
     http://blogs.msdn.com/b/ieinternals/archive/2011/03/22/authenticode-code-signing-for-developers-for-file-downloads-building-smartscreen-application-reputation.aspx

You mean pay microsoft to sign it for you which can be social engineered? In addition to the private signing key owned by the nsa?

No. I mean getting a Authenticode Certificate from a well known CA (eg. [2]) and use it to sign the executables. Microsoft does only provide the root keys, which are trusted by default (Microsoft also makes the OS, this whole procedure is used on, so the users, who do use Armory on Windows, do trust Microsoft anyways.) The private key for the code signing certificate can be stored in the same way as Armory's GPG key, so it's not owned by the NSA. (And actually, it's not the NSA I fear in this use case, but regular hackers.) Social Engineering is a concern only, if you don't check the metadata in the executable.

[2] https://www.thawte.com/code-signing/content-signing-certificates/microsoft-authenticode/index.html
If you use CA and not M$ Certs, its even more horrible and has more attack vectors.

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
Corelianer
Full Member
***
Offline Offline

Activity: 309
Merit: 100



View Profile
June 18, 2014, 09:41:50 AM
Last edit: June 18, 2014, 11:27:32 AM by Corelianer
 #3779

The Bitcoin Foundation bought their Code-Signing Certificate from here: http://www.instantssl.com/
169€ for 2 years.

You could also concider to let the Bitcoin Foundation sign the executables.
By doing so, you could avoid paying the certificate every year.

flipperfish
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251


Dolphie Selfie


View Profile
June 18, 2014, 12:08:11 PM
 #3780

I mean getting a Authenticode Certificate from a well known CA (eg. [2]) and use it to sign the executables. Microsoft does only provide the root keys, which are trusted by default (Microsoft also makes the OS, this whole procedure is used on, so the users, who do use Armory on Windows, do trust Microsoft anyways.) The private key for the code signing certificate can be stored in the same way as Armory's GPG key, so it's not owned by the NSA. (And actually, it's not the NSA I fear in this use case, but regular hackers.) Social Engineering is a concern only, if you don't check the metadata in the executable.

[2] https://www.thawte.com/code-signing/content-signing-certificates/microsoft-authenticode/index.html
If you use CA and not M$ Certs, its even more horrible and has more attack vectors.

I think there is a slight misunderstanding regarding the use case here. The proposal to have armory executables signed with Authenticode is by no means a magic bullet to make Armory bullet proof against any attack on Microsoft OSs. And in that regard, GPG also has its weaknesses. Maybe less than Authenticode, but by no means is it a bullet proof solution. However, checking the GPG-Signatures on Windows comes with quite annoying usability. With Authenticode this could be made much simpler and IMO usability is a main pillar of security (that's the reason we use Armory in the first place). So even if Authenticode has its weaknesses, it's still better than no check of the executable at all. And it eventually will happen (has already happened?), that a clueless windows user will use a malicious Armory executable, because he is to lazy to run through the GPG nightmare.
At this point one could argue, that it's GPG's fault, that its usabilty on windows is bad. One could argue, that one should not use windows at all. But that's not the point. The point is, that IMO the usability advantages of Authenticode outweigh its potential security issues by far. Additionally there is no security hole created by having an executable Authenticode signed. The GPG signatures would still work.
Pages: « 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 [189] 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!