Pages:
Author

Topic: BIP 038 Bug - page 2. (Read 2540 times)

sr. member
Activity: 337
Merit: 250
May 01, 2014, 09:07:05 AM
#29
http://www.walletrecoveryservices.com/

If the amount is significant to you, give this guy a try.
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
May 01, 2014, 06:57:17 AM
#28

always make sure you have actual private keys and test them.
I am certain I tested it. The pw wasn't complex. I only wrote a hint because that's all I needed after testing it. We'll see someday if anyone else had this happen. Like I said though I may have been tricked into thinking I verified the pw because the older versions of bitaddress.org will sometimes just randomly pop up a bitcoin key pair. I should have double tested it but who does that? They usually ask you to enter the pw twice when you create them.
donator
Activity: 1218
Merit: 1079
Gerald Davis
May 01, 2014, 03:16:32 AM
#27
BIP38 uses scrypt to hash the password. Scrypt ASICs have been out for a few months now and faster devices are released all the time. Soon scrypt hashing will be very fast and someone will be able to brute force your keys for you.

That is completely wrong.

First Litecoin et al used an crippled version of scrypt making it many orders of magnitude less memory hard.   Before the history of Litecoin was revised it was designed to be anti-GPU because GPU farms were going to kill Bitcoin.   However it turns out the parameters chosen were "accidentally" too weak and it allowed GPU cache to be used very effectively.  BIP38 is designed to actually be memory hard.

Litecoin Scrypt paramters: n = 1024; p = 1; r = 1;
BIP38 Scrypt paramters: n = 16384; p = 8; r = 8;

Still even if BIP38 used the gimped parameters selected for Litecoin the ASICs would be next to useless.   Mining ASICs are heavily optimized to only be effective at mining.  They only hash block headers and the internally increment the nonce so that 4 billion hashes are computed for a given partial block header.   This makes them beyond useless for password cracking. 

BIP38 is the real deal.  Brute forcing is essentially impossible although in the OP case the fact that he may have a partial password means that a permutation attack may be effective but even that really depends on how different the remembered password and actual password are.  If it is a significant deviation it may be infeasible, Scrypt is that tough to crack (except when gimped to create a "CPU only POW which turns out it is GPU capable but turns out that is ok because ASICs are the real threat and ASIC Scrypts will never be possible except they are so it served no purpose except maybe to people who figured out it wasn't as memory hard as claimed early on").



legendary
Activity: 2660
Merit: 1023
May 01, 2014, 01:50:53 AM
#26
This encryption feature should be removed from all software until the bugs are worked out. I created a set of wallets with an easy to remember password in January 2014 and now it doesn't work. I tested the password to decrypt one of the wallets before loading them. Now I cannot recover them. I have a feeling this will be a problem for a lot of people that think their BIP 038 wallets are secure.

Edit:
Win7
Either Chrome, Mozilla, or Explorer (can't recall which I used) but probably Chrome
It was Bitaddress.org saved to my drive either v2.8.1 or 2.5.1 but probably the newer
I didn't write down the exact PW, but wrote down a hint to it.

I hope this isn't a bug and is merely human error. It will be much easier to fix that way.

always make sure you have actual private keys and test them.
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
May 01, 2014, 01:09:31 AM
#25
Check out this commit: https://github.com/pointbiz/bitaddress.org/commit/4f11d4fb62eff5421f56b28dc9cbfd332a22a9c4

It implies that you used to be able to make a BIP038 wallet with an empty passphrase. Why don't you try removing the check for an empty passphrase and see if that works.
Thanks for the suggestion. I removed that bit of code, but still got the incorrect passphrase alert when I tried to decrypt. I've spent over 20 hours casually trying to manually brute force my simple pw. It was a keyboard peck type pw similar to qwerty only longer.
cp1
hero member
Activity: 616
Merit: 500
Stop using branwallets
April 25, 2014, 12:52:13 PM
#24
U should also use the same os and browser version
If that were the case, then a lot of people will be surprised one day when their wallets won't open.

There actually was a bug for a while where a version of Safari was giving different encryption than every other browser.
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
April 25, 2014, 12:49:13 PM
#23
U should also use the same os and browser version
If that were the case, then a lot of people will be surprised one day when their wallets won't open.
legendary
Activity: 3724
Merit: 1586
April 25, 2014, 12:14:40 PM
#22
No, my brain wallets are much more complex. This was the kind of pw most websites would reject as too simple except for adding the salt. With BIP 38 you need the private encrypted key, so there wasn't the need for a tough pw. I am perplexed and befuddled. I still think it may have been a possible bug in which case I will need help someday.

BIP38 uses scrypt to hash the password. Scrypt ASICs have been out for a few months now and faster devices are released all the time. Soon scrypt hashing will be very fast and someone will be able to brute force your keys for you. In the meantime you would do well to get a notebook and write down everything you remember about your password. The more info you have the better the chances of cracking it.

The existence of ASICs for scrypt-mining has little to no effect on the strength of scrypt as a password-hashing-function. Mining ASICs perform a very specific operation on a very specific input-format and they can't be reconfigured to go password cracking. SHA-256 is being used to hash passwords across the globe, but we haven't seen the Bitcoin miners switch their equipment to crack some passwords. For the simple reason that it is impossible. You'd need a different device for it.

I see. I didn't know that. My mistake.
hero member
Activity: 784
Merit: 1000
https://youtu.be/PZm8TTLR2NU
April 25, 2014, 11:17:53 AM
#21
full member
Activity: 210
Merit: 100
April 25, 2014, 11:03:15 AM
#20
U should also use the same os and browser version
full member
Activity: 210
Merit: 100
April 25, 2014, 11:02:18 AM
#19
Try again like 10 times. Someppl reported it works after tring a couple times
hero member
Activity: 728
Merit: 500
April 25, 2014, 10:50:57 AM
#18
No, my brain wallets are much more complex. This was the kind of pw most websites would reject as too simple except for adding the salt. With BIP 38 you need the private encrypted key, so there wasn't the need for a tough pw. I am perplexed and befuddled. I still think it may have been a possible bug in which case I will need help someday.

BIP38 uses scrypt to hash the password. Scrypt ASICs have been out for a few months now and faster devices are released all the time. Soon scrypt hashing will be very fast and someone will be able to brute force your keys for you. In the meantime you would do well to get a notebook and write down everything you remember about your password. The more info you have the better the chances of cracking it.

The existence of ASICs for scrypt-mining has little to no effect on the strength of scrypt as a password-hashing-function. Mining ASICs perform a very specific operation on a very specific input-format and they can't be reconfigured to go password cracking. SHA-256 is being used to hash passwords across the globe, but we haven't seen the Bitcoin miners switch their equipment to crack some passwords. For the simple reason that it is impossible. You'd need a different device for it.
legendary
Activity: 1764
Merit: 1002
April 25, 2014, 10:24:03 AM
#17
Soon scrypt hashing will be very fast and someone will be able to brute force your keys for you.


Really?  any sources for that?

if true, there's going to be alot of surprised ppl who assumed this would stand the test of time.
legendary
Activity: 3724
Merit: 1586
April 25, 2014, 09:40:21 AM
#16
No, my brain wallets are much more complex. This was the kind of pw most websites would reject as too simple except for adding the salt. With BIP 38 you need the private encrypted key, so there wasn't the need for a tough pw. I am perplexed and befuddled. I still think it may have been a possible bug in which case I will need help someday.

BIP38 uses scrypt to hash the password. Scrypt ASICs have been out for a few months now and faster devices are released all the time. Soon scrypt hashing will be very fast and someone will be able to brute force your keys for you. In the meantime you would do well to get a notebook and write down everything you remember about your password. The more info you have the better the chances of cracking it.

Oh and if you want to try and get it bruteforced today you can consider this guy's services:

https://bitcointalksearch.org/topic/bitcoin-wallet-recovery-services-for-forgotten-wallet-password-240779


legendary
Activity: 1204
Merit: 1002
RUM AND CARROTS: A PIRATE LIFE FOR ME
April 24, 2014, 03:57:15 PM
#15
Honestly I think this sounds like user error. Which should be somewhat comforting as you seem like you know a good starting point from which to brute force the password. This is exactly the sort of situation my device I hope will help solve.

https://bitcointalk.org/index.php?topic=566626.80
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
April 24, 2014, 03:15:13 PM
#14
It was my most commonly used pw for sites I don't care about with one added salt. I have a few variations, but not many. It was such an easy pw that it was the only one I didn't bother to write it down precisely. I did test it as well before loading the bitcoins.
Is it one of your bible codes?
No, my brain wallets are much more complex. This was the kind of pw most websites would reject as too simple except for adding the salt. With BIP 38 you need the private encrypted key, so there wasn't the need for a tough pw. I am perplexed and befuddled. I still think it may have been a possible bug in which case I will need help someday.
legendary
Activity: 1400
Merit: 1013
April 24, 2014, 03:04:54 PM
#13
It was my most commonly used pw for sites I don't care about with one added salt. I have a few variations, but not many. It was such an easy pw that it was the only one I didn't bother to write it down precisely. I did test it as well before loading the bitcoins.
Is it one of your bible codes?
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
April 24, 2014, 02:22:17 PM
#12
I noticed bitcoinaddress v2.5.1 wallet details tab occasionally pops up a new address. It might have fooled me into thinking I verified the pw. No worries.
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
April 24, 2014, 01:10:11 PM
#11
Well anyway. If I don't recover the PW, perhaps I'll hire someone to brute force crack it.
donator
Activity: 1736
Merit: 1014
Let's talk governance, lipstick, and pigs.
April 24, 2014, 12:59:59 PM
#10
I didn't write down the exact PW, but wrote down a hint to it.



could this be the problem?
It was my most commonly used pw for sites I don't care about with one added salt. I have a few variations, but not many. It was such an easy pw that it was the only one I didn't bother to write it down precisely. I did test it as well before loading the bitcoins.
Pages:
Jump to: