Author

Topic: Electrum RNG audit question (Read 871 times)

hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 08, 2015, 01:44:03 AM
#14

I dont trust hardware wallets, because its way easier to build backdoors in them than in softwares. Software can be open source, hardware can't...

Foolish and un-substantiated.

You should do some reading before making such statements.  I can direct you to some great read if you PM me.

Sorry but thats the truth, hardware wallet cannot be audited, and cannot have a hash to compare it's authenticity.

It can be easily modified to suit some agenda, and you have no way of knowing unless you check every microprocessor from top to bottom inside the device.


BTW: you advertise a website "CryptVPN" that charges $10/month for a VPN.  Please consider boxpn.com for $3/month...  basic searching and reading can benefit everyone!  Personally used them for the last 3 yrs - but, unlike you, I am not paid to post questions on bitcointalk.com to advertise for them.

My signature/avatar campaigs have absolutely nothing to do with this question I asked here. It is a genuine question and I have concerns about some security issues here, so please answer to those to be on topic.

The same way you could criticize here my beard but that wont make it more on-topic, so please answer to the topic questions Cheesy
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 08, 2015, 12:45:17 AM
#13

It's just that if Intel compromised the RNG they must have compromised other parts of the CPU as well right? Why stop at just RNG? Everything goes through the CPU so your entire system could be compromised.

Yea you are right there, I will just disregard this risk vector.

Anyway this is all just speculation. You are paranoid and I'm feeding your paranoia Smiley

When it comes to securing your money and not letting it on the hands of hackers, i think the paranoia is justified.

=======================

Ok so what about my original question, has Electrum been audited by some specialists. I know the wallets that are promoted on bitcoin.org have all undergone security audits, so how about Electrum? And where I can find that Cheesy

Thanks.

There has been no formal audit that I know of if that's what you mean. It's open source so lots of interested people look over the code from time to time. Some of them find security holes that they report. Also see open issues

You know you are worried about electrum's security when its open source but you forget about your closed source operating system. Only Microsoft knows what's going with Windows code.

Electrum has been released in Spring 2012 - almost 3 ½ yrs ago.  Plenty of time for hackers to beat the shit out of the software.  Any MtGox-style hack on Electrum since?  None, to my knowledge.   Did people lost bitcoins because of Electrum?  Absolutely...

-  many that didn't follow the instructions to save their seed words on a piece of paper
-  many that didn't even bother adding a password to their wallet
-  few that practiced unsafe internet behaviors and downloaded spooky software that incorporated keylogger malware

Other than the above - mostly flawless! Better than any short-time paid audit... IMHO.  Electrum has passed the test of time.

Electrum supports 3 types of wallet hardware (bye-bye key loggers!):

-  Budget - Sending BTC with Electrum is feasible, but a bit painful (no screens):  Ledger https://www.ledgerwallet.com  - $ 35
-  Great buy - easy integration with Electrum:   Trezor buytrezor.com  - $100
-  Luxury - if you can't read small characters on the Trezor, this one is for you:  KeepKey Keepkey.com - $240

There are no reasons anymore why people should deal with "software" wallets...

Software wallets are so.... 2013 ...
Hardware wallets is the way to go in 2015+

As a bonus, the same H/W wallets above (all three of them) can also hold your Litecoins, Dash, and many others, simultaneously on the same device.




I dont trust hardware wallets, because its way easier to build backdoors in them than in softwares. Software can be open source, hardware can't...
legendary
Activity: 3710
Merit: 1586
October 07, 2015, 08:48:38 AM
#12

It's just that if Intel compromised the RNG they must have compromised other parts of the CPU as well right? Why stop at just RNG? Everything goes through the CPU so your entire system could be compromised.

Yea you are right there, I will just disregard this risk vector.

Anyway this is all just speculation. You are paranoid and I'm feeding your paranoia Smiley

When it comes to securing your money and not letting it on the hands of hackers, i think the paranoia is justified.

=======================

Ok so what about my original question, has Electrum been audited by some specialists. I know the wallets that are promoted on bitcoin.org have all undergone security audits, so how about Electrum? And where I can find that Cheesy

Thanks.

There has been no formal audit that I know of if that's what you mean. It's open source so lots of interested people look over the code from time to time. Some of them find security holes that they report. Also see open issues

You know you are worried about electrum's security when its open source but you forget about your closed source operating system. Only Microsoft knows what's going with Windows code.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 05, 2015, 08:40:50 PM
#11

It's just that if Intel compromised the RNG they must have compromised other parts of the CPU as well right? Why stop at just RNG? Everything goes through the CPU so your entire system could be compromised.

Yea you are right there, I will just disregard this risk vector.

Anyway this is all just speculation. You are paranoid and I'm feeding your paranoia Smiley

When it comes to securing your money and not letting it on the hands of hackers, i think the paranoia is justified.

=======================

Ok so what about my original question, has Electrum been audited by some specialists. I know the wallets that are promoted on bitcoin.org have all undergone security audits, so how about Electrum? And where I can find that Cheesy

Thanks.
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 08:36:49 PM
#10
Anyway this is all just speculation. You are paranoid and I'm feeding your paranoia Smiley
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 08:35:22 PM
#9
I dont understand why you say that if the CPU RNG is insecure, then it is fatal because if I add other entropy it should be secure no? Please explain.

It's just that if Intel compromised the RNG they must have compromised other parts of the CPU as well right? Why stop at just RNG? Everything goes through the CPU so your entire system could be compromised.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 05, 2015, 08:31:23 PM
#8
If I use external entropy then I have to rely less on my processor RNG right? How safe is that?

Depends on the source of the external entropy. I don't really know why you are worried about this. If your CPU is insecure then everything is insecure.

If it's any consolation on Linux systems at least the output of the hardware RNG in the CPU is XORed with whatever entropy the system collects from its normal operation i.e. disk seeks, network activity, user mouse and keyboard activity etc.

https://plus.google.com/+TheodoreTso/posts/SDcoemc9V3J

Yea, that google+ chat also admitted that the main security hole is in relying on system RNG, which I dont.

Adding mouse movement, network log, sound card noise ,etc can be an additional security feature.

I dont understand why you say that if the CPU RNG is insecure, then it is fatal because if I add other entropy it should be secure no? Please explain.
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 08:17:06 PM
#7
Then it should create a very safe seed no? I would prefer a 512 bit seed an I think the 256 bit is not that secure.

Bitcoin addresses only have 128 bits of security. A larger seed is pointless.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 05, 2015, 08:14:59 PM
#6
Will that make me a 256 bit seed with that entropy? (I can use a much higher random number)

I am not sure. I suggest reading the source code.

https://github.com/spesmilo/electrum/

The entropy you provide has to be in base 10

I do know that if you give it a really large number for entropy it'll up the seed size.

Well i`m not that good at reading source code, but if somebody could confirm this it would be good.

If I put as entropy this number:
Code:
698375603659862009431843239381325604334403362818420357160210045015044461682851728328636141376996967175748222379039523316063548668536223247056

Then it should create a very safe seed no? I would prefer a 512 bit seed an I think the 256 bit is not that secure.
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 08:14:48 PM
#5
If I use external entropy then I have to rely less on my processor RNG right? How safe is that?

Depends on the source of the external entropy. I don't really know why you are worried about this. If your CPU is insecure then everything is insecure.

If it's any consolation on Linux systems at least the output of the hardware RNG in the CPU is XORed with whatever entropy the system collects from its normal operation i.e. disk seeks, network activity, user mouse and keyboard activity etc.

https://plus.google.com/+TheodoreTso/posts/SDcoemc9V3J
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 08:09:59 PM
#4
Will that make me a 256 bit seed with that entropy? (I can use a much higher random number)

I am not sure. I suggest reading the source code.

https://github.com/spesmilo/electrum/

The entropy you provide has to be in base 10

I do know that if you give it a really large number for entropy it'll up the seed size.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 05, 2015, 08:01:01 PM
#3
It uses the operating system RNG:

Quote
Under Linux and Unix like operating systems including Mac OS X that is /dev/urandom and under Windows it is CryptGenRandom().

https://bitcoinspakistan.com/blog/electrum-seed-explained/

You can make your own seed:

https://bitcoinspakistan.com/blog/make-your-own-electrum-seed/

BTW if your OS has been compromised then no wallet can protect you.

Well my OS is not compromized but my processor's RNG could be.

So if I use this command:

Code:
electrum --nbits=256 --entropy=123456 make_seedmake_seed

Will that make me a 256 bit seed with that entropy? (I can use a much higher random number)


If I use external entropy then I have to rely less on my processor RNG right? How safe is that?
legendary
Activity: 3710
Merit: 1586
October 05, 2015, 07:57:37 PM
#2
It uses the operating system RNG:

Quote
Under Linux and Unix like operating systems including Mac OS X that is /dev/urandom and under Windows it is CryptGenRandom().

https://bitcoinspakistan.com/blog/electrum-seed-explained/

You can make your own seed:

https://bitcoinspakistan.com/blog/make-your-own-electrum-seed/

BTW if your OS has been compromised then no wallet can protect you.
hero member
Activity: 854
Merit: 1009
JAYCE DESIGNS - http://bit.ly/1tmgIwK
October 04, 2015, 07:21:31 PM
#1
Was the Electrum RNG audited? For example the functions that create the RNG (even in linux systems).

And if yes, then what is the protection against weak hardware RNG?

For example if my processor's RNG has been tampered with and it generates weak RNG in a pattern, then how can electrum protect against this?

For example does it offer the solution to add extra entropy or does it generate the RNG from multiple sources of entropy?

I`m just curious, because this is a very important security question.
Jump to: