Author

Topic: [ESHOP launched] Trezor: Bitcoin hardware wallet - page 144. (Read 966173 times)

legendary
Activity: 1470
Merit: 1000
Want privacy? Use Monero!
just a small post to let you know my USB cable died today. I tried a different one and my Trezor is still ok.

(thanks for replying to our e-mail. We will reply in a few days)
full member
Activity: 120
Merit: 100
Got my Trezor today. Grin

I have successfully set up the multi-passphrase encryption structure.

It appears that every time that I access the Trezor, I have an opportunity to create a new hidden volume.  Out of curiosity, is there a limit to the number of volumes?  If I reach the limit, how will the Trezor behave when a new volume is attempted to be made.

My real question is about the no-passphrase entry.  I tried it, and it appears that I have no access to anything when a passphrase is not entered.  I recall reading somewhere about different behavior based on whether a passphrase box is checked.  Does anyone have any clarity on pitfalls to watch out for?

Overall, I'm very impressed with the Trezor!

There is no limit for the number of "hidden volumes". Trezor does not keep their list. It just can recover all those account addresses  when you enter that particular passphrase again. I don't understand the "no-passphrase entry" question. Can you please rephrase it? You have two options for setup: You either create 1. passphrase protected Trezor or 2. Trezor without passphrases. In the latter, you will never be prompted for passphrases. What does "no access to anything when a passphrase is not entered" mean? You are able to store your BTC on Trezor in second setup (without passphrases) as well.
full member
Activity: 120
Merit: 100
Is this just as secure as a paper wallet? I should imagine it isn't because it requires you the manufacturer to actually have access to the private keys?
The keys are generated using entropy from the trezor plus entropy from the computer you plug into.  There's no way for the manufacturer to know your keys.
Well, if the manufacturer of a hardware wanted to get the client's keys, they could do it very easily.  
If you use a special-purpose hardware to store your keys, you have to trust the manufacturer.  I see no way around it.
The hardware can be checked and the software is open source.
Checking the hardware is viable only with sophisticated lab equipment.  To check the software, someone whould have to carefully check the source code (at every release) for malicious backdoors or weaknesses, and then the client would have to check that the compiled firmware that he is loading, duly signed by the manufacturer,  matches that source code.  Obviously neither is viable in practice, except after the fact.

Back to the original question:
"Is this just as secure as a paper wallet?" No. It cannot be. However it's much more useful, because from this wallet you can actually spend. It's also very easy to use. Creating a really secure paper wallet is difficult. Setting up and using Trezor is easy.

"requires you the manufacturer to actually have access to the private keys" This statement is dead wrong. In many services out there, the main premise is that end user cannot keep his private keys secure, thus he should keep it with some online service that will take care of security. This creates just another issue for the user, because he now has to keep his service credentials secure and he has to trust the service provider so he is in even more difficult situation. Trezor is different. It lets you own your private keys without manufacturer knowing anything about you. In theory, Satoshi Labs can recover your seed from the device if the device is still working and they have physical access to it. But that is only if you are not using passphrases and give them the device and they actually want to recover your seed.

Without the physical access to the hardware, there is only a single way manufacturer could get your keys: backdoor. There is a catch though. If your bitcoins are stolen by a malware or a hacker, then you are just screwed. If your btc is stolen by an open software, open hardware backdoored device, then you can sue somebody. I assume their liability for a software bug is at the zero level. Their liability for a money stealing backdoors is a complete different story. That is fraud and you can sue it everywhere in the world.

Also, your statement that checking the software is not viable in practice is wrong. They use deterministic build so everybody can check that the software is what it is supposed to be. Also, the software is single purpose, thus small, thus verifiable for backdoors.
sr. member
Activity: 441
Merit: 268
But there's a "session_clear()" function which clears the PIN, cached root node and cached passphrase. There's also an accompanying protocol message to invoke it. Maybe it's the wallets responsibility to clear the session via this message.

Correct. Since firmware 1.2.1 there is a message called ClearSession that forces TREZOR to "forget" cached PIN and passphrase. The idea is that client sends this message after few minutes of user inactivity or when a screensaver kicks in or when a screen is locked.
sr. member
Activity: 319
Merit: 250
Seems interesting, will be adding this to my wishlist.
hero member
Activity: 496
Merit: 500
Checking the hardware is viable only with sophisticated lab equipment.  To check the software, someone whould have to carefully check the source code (at every release) for malicious backdoors or weaknesses, and then the client would have to check that the compiled firmware that he is loading, duly signed by the manufacturer,  matches that source code.  Obviously neither is viable in practice, except after the fact.

The hardware can be checked by feeding it known inputs and checking that the output matches what's expected.

Their build process is deterministic, so you can in fact check that the signed binary matches the open source code. It is also not true that every individual has to check the code every time there is a release, it can be done on an ongoing basis by a community of semi-trusted individuals.

You're really reaching, aren't you? What's your angle here exactly?
hero member
Activity: 910
Merit: 1003
Is this just as secure as a paper wallet? I should imagine it isn't because it requires you the manufacturer to actually have access to the private keys?
The keys are generated using entropy from the trezor plus entropy from the computer you plug into.  There's no way for the manufacturer to know your keys.
Well, if the manufacturer of a hardware wanted to get the client's keys, they could do it very easily. 
If you use a special-purpose hardware to store your keys, you have to trust the manufacturer.  I see no way around it.
The hardware can be checked and the software is open source.
Checking the hardware is viable only with sophisticated lab equipment.  To check the software, someone whould have to carefully check the source code (at every release) for malicious backdoors or weaknesses, and then the client would have to check that the compiled firmware that he is loading, duly signed by the manufacturer,  matches that source code.  Obviously neither is viable in practice, except after the fact.
jr. member
Activity: 50
Merit: 1
Got my Trezor today. Grin

I have successfully set up the multi-passphrase encryption structure.

It appears that every time that I access the Trezor, I have an opportunity to create a new hidden volume.  Out of curiosity, is there a limit to the number of volumes?  If I reach the limit, how will the Trezor behave when a new volume is attempted to be made.

My real question is about the no-passphrase entry.  I tried it, and it appears that I have no access to anything when a passphrase is not entered.  I recall reading somewhere about different behavior based on whether a passphrase box is checked.  Does anyone have any clarity on pitfalls to watch out for?

Overall, I'm very impressed with the Trezor!
donator
Activity: 2772
Merit: 1019
For some reason I assumed the PIN would be asked every time. But it seems the trezor will remember passphrase and pin auth, so anybody could walk up to my computer and make a transaction without knowing password or PIN.

It's the same with myTrezor, I believe the Trezor caches the PIN for some period of time or until it's unplugged, I'm not sure which.

Hm, just searched a bit in the firmware code.

Couldn't find anything about a timeout.

But there's a "session_clear()" function which clears the PIN, cached root node and cached passphrase. There's also an accompanying protocol message to invoke it. Maybe it's the wallets responsibility to clear the session via this message.




hero member
Activity: 496
Merit: 500
For some reason I assumed the PIN would be asked every time. But it seems the trezor will remember passphrase and pin auth, so anybody could walk up to my computer and make a transaction without knowing password or PIN.

It's the same with myTrezor, I believe the Trezor caches the PIN for some period of time or until it's unplugged, I'm not sure which.
donator
Activity: 2772
Merit: 1019
I just realized I had very bad security practices involving the trezor:

I use it with electrum (don't do this yet, it's not for the faint of heart, wait for electrum release 2.0).

I just leave my wallet (electrum) open with the trezor plugged in. That's a bad idea.

For some reason I assumed the PIN would be asked every time. But it seems the trezor will remember passphrase and pin auth, so anybody could walk up to my computer and make a transaction without knowing password or PIN.

So note to self: always unplug the trezor when done, especially when having entered the PIN.

Suggestion/question: could the trezor have a timeout on the PIN and re-ask after it has elapsed? Same for passphrase.
hero member
Activity: 910
Merit: 1003
Is this just as secure as a paper wallet? I should imagine it isn't because it requires you the manufacturer to actually have access to the private keys?
The keys are generated using entropy from the trezor plus entropy from the computer you plug into.  There's no way for the manufacturer to know your keys.
Well, if the manufacturer of a hardware wanted to get the client's keys, they could do it very easily. 

If you use a special-purpose hardware to store your keys, you have to trust the manufacturer.  I see no way around it.


full member
Activity: 162
Merit: 109
Hi, stick!

Can you answer what do you plan with same problem?
I described it into 113th page. But i didn't find your answer. But it can be very seriously

I think the mytrezor.com site has the future vulnerability
...
2) He will be able to change address for receiving to his fishing addresses (right in browser instead mytrezor's generated addresses)

If it possible here may be some workarounds:
...
2) This vulnerability can fix by checking new generated addresses in computer with showing new address in Trezor screen. For example: we ask to mytrezor.com generate new address for receiving. Site sends new address (path of BIP32) to the Trezor by HID interface, the Trezor knows private seed key, knows path of new generated address it generates same address too and shows it in screen. User checks both addresses and if ok - he uses new address for money receiving. It's ideal solution as i think. Because fishing address will differ completely (very difficult to make quickly even 1-3 prefix or sufix) i think will be enough to check 3-4 letters before (prefix) and 3-4 after (sufix) in addresses.

Here is only my fix now: path not BIP32 but path of BIP44
This problem can occur not only with infected computer but by using middle man attack in any part of routing.

And other user already asked you about this after my post:

Another question:

I like the confirmation on the TREZOR when I am sending to an address to ensure that the myTREZOR site has not been compromised.  However, it does not appear that there is any confirmation of the addresses shown on myTREZOR for receiving funds.  When I see an address on myTREZOR (to provide to someone to send me money), how can I be sure that it is actually an address associated with my TREZOR (and not a rogue address on a malicious computer)?  I would hope to be able to see the selected address on the computer replicated on the TREZOR so that I can be sure it is legitimate.  Is this how it works, but just not in the documentation?

Please don't suggest import xpub to other device. xpub key to be showed by mytrezor.com too so if computer was infected or there middle man attack the xpub key can be changed too. So i think you should add the check option for receiving addresses right in the Trezor.

If you think well, now there is no reliable way to trust and verify addresses for receiving money. Is not it so?
full member
Activity: 148
Merit: 100
Is this just as secure as a paper wallet? I should imagine it isn't because it requires you the manufacturer to actually have access to the private keys?

The keys are generated using entropy from the trezor plus entropy from the computer you plug into.  There's no way for the manufacturer to know your keys.
jr. member
Activity: 50
Merit: 1
Is there a place online that has the history and details of myTREZOR.com and firmware updates?

Probably now what you would expect, but Github has nice commit history: https://github.com/trezor/trezor-mcu (firmware) + https://github.com/trezor/webwallet (mytrezor)

A bit too complicated for us non-developers.  Smiley Hopefully a more consumer-friendly summary will be maintained someday.
full member
Activity: 136
Merit: 100
Is this just as secure as a paper wallet? I should imagine it isn't because it requires you the manufacturer to actually have access to the private keys?
sr. member
Activity: 441
Merit: 268
Is there a place online that has the history and details of myTREZOR.com and firmware updates?

Probably now what you would expect, but Github has nice commit history: https://github.com/trezor/trezor-mcu (firmware) + https://github.com/trezor/webwallet (mytrezor)
jr. member
Activity: 50
Merit: 1
Is there a place online that has the history and details of myTREZOR.com and firmware updates?
legendary
Activity: 1470
Merit: 1000
Want privacy? Use Monero!
Sorry to bother you here guys, but can you please look into my e-mail concerning a bulk purchase of 100 trezor devices? I am organizing a Bitcoin congress and we would like to be able to sell a Trezor Device to the people who show up. Most of them are not tech savvy and in one of the sessions we will be explaining the different wallet options. We would like to explain them how the Trezor works and I guess a lot of them will want to buy one.

Sorry for posting it here. I know you are busy, but the event takes place at the end of september. So we would like to know if it will be possible to have them delivered before that deadline.
sr. member
Activity: 441
Merit: 268
Is there a way to toggle the "request-password"-flag in the trezor without reinitializing it?
As no-password results in the same wallet as an empy password it would be nice to be able to switch between the settings (without having to generate a new seed).

I second this feature request.

We'd need to update the firmware to extend the API to allow this change. I noted that in my Trello board and once we ship this feature via a version update then we can add it to myTREZOR.
Jump to: