Author

Topic: recover coinbase multisig wallet to electrum? (Read 471 times)

jr. member
Activity: 107
Merit: 8
October 29, 2023, 09:01:24 AM
#31
you need these three things for recovery User key- Seed and Public key. Shared key- Seed (encrypted) and Public key. Coinbase key- Public key.
legendary
Activity: 2268
Merit: 18509
regardless, I am getting a pop-up message stating: "Incorrect passphrase for this encrypted private key."
Then either that decryption passphrase does not match that encrypted key (most likely), or Coinbase have done something weird and non-standard with their implementation of BIP38 (although that is highly unlikely to be the case). I suppose you could try installing the BIP38 library from https://github.com/bitcoinjs/bip38 and trying again to decrypt your encrypted key, but I doubt very much that you would have a different result.
newbie
Activity: 17
Merit: 21
Yes, the encrypted shared seed starts with 6P.

The encrypted shared seed is 58 characters in length.

the "cold key" that I found in an old version of my password manager is 30 random characters, not words like a "seed phrase".

regardless, I am getting a pop-up message stating: "Incorrect passphrase for this encrypted private key."





legendary
Activity: 2268
Merit: 18509
As we discussed on the previous page, your encrypted seed starts with "6P", correct?

If it does, then it should be a BIP38 encrypted key, although these are supposed to be 58 characters long, not 30, so I'm not entirely sure what you have. The easiest way to decrypt a BIP38 key is going to be to download bitaddress.org from its GitHub (https://github.com/pointbiz/bitaddress.org), run it on an offline computer, click on "Wallet Details", enter your encrypted key beginning with "6P", click on "View Details", and then enter your decryption key in the new box which appears. I would try this first and see what happens.
newbie
Activity: 17
Merit: 21
I'm not sure if this thread can be revived but I may have located what I need but have no idea how to use it.   

Long story short, I found an old dead android phone, ordered a battery for it, got it unlocked and while the device was disconnected from the internet, opened my password manager on this device and found an old entry for Coinbase labeled "cold key used to encrypt other keys"

I would like to test decryption of the encrypted shared seed with this key but the only decryption tools I am finding need the "encrypted seed"  and a "seed phrase"...  I don't have a seed phrase... I have an actual 30 character key.   no words, no spaces...   

Any suggestions for this situation would be appreciated.
legendary
Activity: 2268
Merit: 18509
He seemed to be able to obtain everything he needed from getting access to the master private key and the extended private key using ONLY the user seed.  Sorry, not trying to be dense, but I am not understanding the difference
The user in that post does not reveal either his master public key nor the address he is trying to access, so I can't be sure, but it seems like he has used his user seed and user master public key on their own (i.e. as a single-sig wallet and without the multi-sig requirements of the shared seed or the Coinbase seed) to generate some addresses. Certainly the code provided by achow101 in response takes his user seed, uses it to derive a single master private key, a single master public key, and then a single address at a specific index, with no mention of the multi-sig requirements.

If you wanted, you could take your user public key and check the addresses it derives on its own, as has been done in the Stack Exchange post you linked to. There is no need to use python to do this. You can simply go to https://iancoleman.io/bip39/, paste your user public key in to the box named "BIP32 Root Key", select "BIP32" under the heading "Derivation Path", and then change the BIP32 Derivation Path to m from m/0. If any of those addresses hold a balance then you can access them only using your user seed, but it also means that Coinbase made a critical flaw that no one noticed when implementing their multi-sig vaults, which would be highly unlikely.
newbie
Activity: 17
Merit: 21
Thanks for saving me the couple hundred $$ trying to brute force it.   
 
I would, however, like to understand this post a little better
https://bitcoin.stackexchange.com/questions/57207/how-to-derive-the-private-key-associated-with-a-coinbase-multi-sig-vault-address

That seems pretty close to my situation, but I actually have more information than that user did.   I certainly don't have the comprehension of the problem that user does, unfortunately....   
This probably isn't the best place to ask but wanted to toss it out here.
He seemed to be able to obtain everything he needed from getting access to the master private key and the extended private key using ONLY the user seed.  Sorry, not trying to be dense, but I am not understanding the difference

I am attempting to contact the OP for that post as well
thanks

legendary
Activity: 2268
Merit: 18509
As my wallet is multisig, does that decrease the risk dramatically?
The risk of having your coins stolen is near zero. Even if the cloud computing is successful at decrypting your shared seed, then they only have access to one of the necessary seeds. As long as you don't mistakenly share or leak your user seed as well, then there is no chance of them being able to steal your coins.

Assuming my password generator did a great job and produced a really awesome completely random password is a decade going to even come close or are we talking over 100 years to crack?
I don't know how much power you could reasonable rent with vast.ai, but as pointed out above, BIP38 is specifically designed to be more difficult to brute force than, say, a seed phrase. Even if your password generator generated a weak password with only 60 bits of entropy, and even if you managed to rent enough computing power to give you 1 billion guesses a second (which is likely a gross overestimation and would be hugely expensive), then you are still looking at over 36 years of rented power to exhaust the search space. Most password generators today would generate a minimum of around 80 bits of entropy, which already takes us in to the area of millions of years.

If the password was randomly generated and you have absolutely no idea what it is, then you are wasting your time. The only other possible option I can think of is to contact Coinbase and see if they still have the Coinbase seed linked to your account stored somewhere and if they will provide it to you. Seems like a long shot though, given how terrible Coinbase support is and how little they care about their customers.
newbie
Activity: 17
Merit: 21
Users picked their own passphrase, so it depends on how good OP's password picking abilities at the time were. Also, there is hopefully a higher chance he remembers some of a password or passphrase he picked himself rather than one he was given.

In the event anyone else in the same boat is following this thread my post on stack exchange covers how to test decryption of shared seed for a multisig vault https://bitcoin.stackexchange.com/questions/111851/how-to-test-decryption-of-shared-seed-for-a-multisig-vault

Unfortunately, all my attempts at a password failed.   In addition to that, researching my email leads me to believe I was using a password manager that supports strong password creation at the time of the vault creation so I didn't pick a password.   That is what rubs me the wrong way in this situation since I stored (what I thought to be) all the essential information for the vault (user seed, shared seed, all three public keys, etc).  I was (and still am) a noob and didn't understand any of the working parts.  

Continuing down the rabbit hole...
On the topic of brute forcing, This YouTube video covers running BTCRecover with Vast.ai (rented servers) https://www.youtube.com/watch?v=8Zqc-2Te3zQ and in the first 10 seconds, he states that "In one 24 hour period, with $50 worth of hash power, this could knock over about as much as my CPU could do if it was running for 3 years straight"

I fully understand attempting BIP38 wallet recovery on rented servers is not secure, as there is no ability to do any kind of "Wallet Extract" or anything like that. The server owner would possess the key if decryption succeeds.  
My two questions are this:
As my wallet is multisig, does that decrease the risk dramatically?  
Assuming the answer to the above question is "yes", I'd be willing to throw a few hundred $$ at this which would get me over a decade of hashing power.  
Besides, it will make a funny story if nothing else.  
Assuming my password generator did a great job and produced a really awesome completely random password is a decade going to even come close or are we talking over 100 years to crack?
It is not easy to find answers on BIP38, everything seems to be focused on BIP39.


legendary
Activity: 2268
Merit: 18509
it's unlikely brute-force will success unless CoinBase used weak passphrase.
Users picked their own passphrase, so it depends on how good OP's password picking abilities at the time were. Also, there is hopefully a higher chance he remembers some of a password or passphrase he picked himself rather than one he was given.

Not ideal, but it doesn't look like he has any other options.
legendary
Activity: 2268
Merit: 18509
Yes, the encrypted shared seed starts with "6P".
In that case, just use a program such as https://btcrecover.readthedocs.io/ to try to brute force your unknown decryption key.

but I am thoroughly confused, there is a single vault password and single encrypted shared seed...    how does that correspond to two different public addresses?
As per the stack exchange answer from achow101 you linked to before, Coinbase turns the seeds in to BIP32 master keys and then uses them to create an HD wallet, which can therefore generate as many addresses as you want.
newbie
Activity: 17
Merit: 21
It would seem so. Is it indeed BIP38 encrypted? It should start with "6P" if it is.
Yes, the encrypted shared seed starts with "6P".

but I am thoroughly confused, there is a single vault password and single encrypted shared seed...    how does that correspond to two different public addresses? 
legendary
Activity: 2268
Merit: 18509
Instead of the bolded part, I assume you wanted to say 'shared seed'.
No, I didn't. I meant what I said.

The Coinbase 'user seed' is nothing but a master password allowing you complete access to a vault that is supposed to be protected by two factors. It essentially is protected by different keys and multiple factors, but you can use the one key you have to find the other keys in order to have the 2/3 necessary seeds Huh.
The Coinbase seed is protected by the password and 2FA to his Coinbase account.

Let me try explaining it another way. There are three seeds:

Coinbase seed - stored by Coinbase. The user accesses this seed by logging in to their Coinbase account.
Shared seed - stored by both parties, but encrypted. The user holds the decryption key.
User seed - stored by the user.

Ordinarily the user would log in to the Coinbase account with their email, password, and 2FA, which gives them access to their vault with 1 of the 3 seeds. They would then provide the decryption key for the shared seed, giving them access to 2 of the 3 seeds (Coinbase and shared) and therefore the ability to make a transaction.

If the user had forgotten their decryption key, then instead they could log in to the Coinbase account to access the Coinbase seed, and then provide the user seed, giving them access to 2 of the 3 seeds (Coinbase and user).

Now, as Coinbase have discontinued support for these vaults and removed the Coinbase seed from OP's account, his only solution is to decrypt the shared seed and combine it with his user seed.

You seem to missing the fact that you couldn't just log in to a vault by providing either the decryption key or the user seed - you had to first log in to the associated Coinbase account. This is really no different than, say, TrustedCoin providing a second signature when you provide the necessary 2FA code.

As I see it, my only option is to attempt to brute force the password used to (BIP38) encrypt the shared seed since coinbase is no longer signing tx, does that sound correct?
It would seem so. Is it indeed BIP38 encrypted? It should start with "6P" if it is.
newbie
Activity: 17
Merit: 21
I have found a way to test decrypting the shared user seed and none of the passwords that I have work.
As I see it, my only option is to attempt to brute force the password used to (BIP38) encrypt the shared seed since coinbase is no longer signing tx, does that sound correct?  

Looking into BIP38 brute forcing...  the encrypted seed and public address (and dictionaries) are used for the process.   
Another point of confusion for me...   which address?   Allow me to explain...   
I have two transactions going into "My Vault" and each transaction went into a separate bitcoin address. 

legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
Usually he would provide the decryption key for the shared seed so he would have the Coinbase seed and the shared seed, but in this alternative situation instead of providing the decryption key he provides the user seed, giving him the Coinbase seed and the user seed. In both scenarios, he has 2 out of the 3 necessary seeds.
Instead of the bolded part, I assume you wanted to say 'shared seed'.
I guess we have to agree to disagree. The way I see it is that the security level here is onefold. With the one element he has (the user seed), he is able to unlock and gain access to all the other elements necessary for the recovery. More precisely, he was when the vault was still functional.

The Coinbase 'user seed' is nothing but a master password allowing you complete access to a vault that is supposed to be protected by two factors. It essentially is protected by different keys and multiple factors, but you can use the one key you have to find the other keys in order to have the 2/3 necessary seeds Huh.

Would you be comfortable with the following "secure solution"?
The two of us set up a multisginature wallet. For simplicity, let's forget about the third key and public keys. We will have a 2/2 system. Let's call our keys user seeds. You have one user seed and I have the other. I don't know your key, and you don't know mine. Without the two keys, none of us can spend the coins in that address. Even though I don't know your key, I can just enter my user seed in the system and the wallet will reveal your user seed as well. Thanks to this incredibly secure setup, I now have 2/2 keys. How would you rate this scheme to store Bitcoin?
newbie
Activity: 17
Merit: 21
Have you tried entering your information in to their multisig vault recovery tool? Best to download this and go offline after it has scanned for balances for safety reasons. You should also be able to test your decryption key using it. https://github.com/coinbase/multisig-tool/blob/master/README.md

Unfortunately, the coinbase multisig github tool is no longer functional (these two threads detail my attempts with it)
https://bitcointalksearch.org/topic/--5316286

https://bitcointalksearch.org/topic/--5316286
legendary
Activity: 2268
Merit: 18509
I understand that. However, OP doesn't have the shared seed or the decryption key that gets him the shared seed. He only has the user seed. He owns 1 element to make a successful recovery. The 2nd element to get the shared seed is the decryption password. He doesn't have it. Therefore, he doesn't possess 2/3 necessary requirements for recovery.
The second key he would use in a such a scenario is the Coinbase seed. This is available to him since he can access his Coinbase account. Usually he would provide the decryption key for the shared seed so he would have the Coinbase seed and the shared seed, but in this alternative situation instead of providing the decryption key he provides the user seed, giving him the Coinbase seed and the user seed. In both scenarios, he has 2 out of the 3 necessary seeds.

If seems, however, that since Coinbase have completely discontinued support for their multisig vaults, he can no longer access the Coinbase seed, so this method is not available to him. He has the user seed, and is going to have to brute force the decryption key for the shared seed to give him the necessary 2 out of 3 seeds.
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
That's not what is happening. Coinbase have the Coinbase seed and the encrypted shared seed. Usually the user would enter the decryption key (the "vault password"), allowing their browser to decrypt the shared seed giving them the necessary two out of three seeds in which to sign a transaction. Should the user have forgotten the decryption key, then they can instead just enter the user seed. At this point, they have access to the Coinbase seed and the user seed, again meeting the two out of three requirement.
I understand that. However, OP doesn't have the shared seed or the decryption key that gets him the shared seed. He only has the user seed. He owns 1 element to make a successful recovery. The 2nd element to get the shared seed is the decryption password. He doesn't have it. Therefore, he doesn't possess 2/3 necessary requirements for recovery. If there is a way around all that by inserting the user seed in place where the decryption key goes, it defeats the whole security model of the vault. I would be glad for the user's sake if that works because it would give him access to his coins. But I am criticizing the set up and find it pointless.

Imagine having a passphrase-protected wallet and losing the passphrase. But instead of the passphrase, you can just insert your seed a 2nd time and get the same result? What's the point of the passphrase then? In both cases you only have 1 element that gives you access to coins that are supposed to be protected by two different layers of security. The seed + passphrase in the second example. The user seed and the decryption key in the first.  
legendary
Activity: 2268
Merit: 18509
If that ends up working, you will be the first person I know who gained access to a 2/3 multisig wallet by having only one of the private keys with two of them missing. Smiley
At this point, it can't even be considered a multisig solution. If it's possible for you to recover it with just your "user seed", I wonder if Coinbase could have done it on their end with just their "Coinbase seed" as well?!
That's not what is happening. Coinbase have the Coinbase seed and the encrypted shared seed. Usually the user would enter the decryption key (the "vault password"), allowing their browser to decrypt the shared seed giving them the necessary two out of three seeds in which to sign a transaction. Should the user have forgotten the decryption key, then they can instead just enter the user seed. At this point, they have access to the Coinbase seed and the user seed, again meeting the two out of three requirement.

I can see my vault on coinbase and when I click "withdraw from vault" nothing happens.
I believe that the current vaults on Coinbase are completely different to the old multi-sig vaults, which is what you are dealing with here.

Have you tried entering your information in to their multisig vault recovery tool? Best to download this and go offline after it has scanned for balances for safety reasons. You should also be able to test your decryption key using it. https://github.com/coinbase/multisig-tool/blob/master/README.md
newbie
Activity: 17
Merit: 21
 
I am not certain that I do not know the decryption key for the shared seed.  Unfortunately, there isn't any way to "test" it.   

So essentially what I need is to find someone that understands the decryption process discussed in the ReadMe on the coinbase multisig github https://github.com/coinbase/multisig-tool#bip38 since that is how coinbase decided to do it. and once I verify the password or verify I do not know the password, I could determine next steps...   does that sound accurate? 
newbie
Activity: 17
Merit: 21
So you my be able to download and tweak the .js files a bit to find what you need and change it.
I don't know enough about js and the app itself to be sure what would need to be changed. You would also have to find were the /addr is located and change it to /address and a few other things, but I don't see it as an impossible task. Just a long and annoying one.

-Dave

I could potentially make the change you are suggesting to the js file and I am not necessarily opposed to long and annoying (you have no idea how much work I have put into this already).  Unfortunately I am a terrible programmer and cannot read or write code well at all and I don't trust myself not to screw it up.   On top of that, this is only step 1 and I don't even comprehend steps 2 or step 3-a or step 3-b



I was under the impression that Coinbase's multisig vaults have long been discontinued and they removed all support for them, and so this will no longer be an option. But regardless of what I think - have you tried this? It seems like it would solve all your problems if it is possible.

If you do not have the decryption key (and the above is not possible), then your options are limited to either brute forcing the decryption key so you can use the user seed and shared seed, or seeing if Coinbase will give you access to the Coinbase seed linked to your account (which seems highly unlikely).

I can see my vault on coinbase and when I click "withdraw from vault" nothing happens. 
I am not certain that I do not know the decryption key for the shared seed.  Unfortunately, there isn't any way to "test" it.   
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
I do not have the decryption password recorded so that may be an issue but the good news is I have the user seed and according to Coinbase's email, (refereced in this post) https://bitcointalksearch.org/topic/--5316286
Code:
What if I don’t know my vault password?
If you don’t know your vault password, you can instead copy/paste the user seed into the password field. This will allow you to approve your withdrawal. The user seed was provided to you when you created your multisig vault.
If that ends up working, you will be the first person I know who gained access to a 2/3 multisig wallet by having only one of the private keys with two of them missing. Smiley
At this point, it can't even be considered a multisig solution. If it's possible for you to recover it with just your "user seed", I wonder if Coinbase could have done it on their end with just their "Coinbase seed" as well?!
legendary
Activity: 2268
Merit: 18509
I do not have the decryption password recorded so that may be an issue but the good news is I have the user seed and according to Coinbase's email, (refereced in this post)
I was under the impression that Coinbase's multisig vaults have long been discontinued and they removed all support for them, and so this will no longer be an option. But regardless of what I think - have you tried this? It seems like it would solve all your problems if it is possible.

If you do not have the decryption key (and the above is not possible), then your options are limited to either brute forcing the decryption key so you can use the user seed and shared seed, or seeing if Coinbase will give you access to the Coinbase seed linked to your account (which seems highly unlikely).
legendary
Activity: 3458
Merit: 6231
Crypto Swap Exchange
Pulling in from the other thread. If you take a look at constants.js you see:

Code:
"use strict";

var constants = {
  M: 2,
  MINIMUM_MINER_FEE: 20000,
  BITCOIN_SATOSHIS: 100000000,
  INSIGHT_API_URL_ROOT: "https://insight.bitpay.com/api/",
  DEBUG: false,
  REQUEST_PIPELINE_SIZE: 2,
  REQUEST_BACKOFF: 250,
  REQUEST_BACKOFF_CEILING: 3000,
  REQUEST_BACKOFF_MULTIPLIER: 1.25,
  REQUEST_RETRY_ATTEMPTS: 5
}

module.exports = constants;

So you my be able to download and tweak the .js files a bit to find what you need and change it.
I don't know enough about js and the app itself to be sure what would need to be changed. You would also have to find were the /addr is located and change it to /address and a few other things, but I don't see it as an impossible task. Just a long and annoying one.

-Dave
newbie
Activity: 17
Merit: 21

The lack of a seed phrase isn't the most pressing issue right now. You can worry about how to turn the private keys (rather than seed phrases) in to a wallet later. The first thing you need to obtain is 2 of the 3 private keys.

You have the user seed private key. You will never obtain the Coinbase seed private key, since that was only ever held on Coinbase's servers. You have the shared seed private key, but it is encrypted. If you cannot decrypt it, then you will never be able to recover your wallet?

Do you remember the decryption password? If not, then the first thing you are going to have to do is to try to brute force it.

Agreed, not the most pressing issue.  But the possession of a seed phrase as opposed to a "user seed" and a "user public key" and a "shared seed" and a "shared public key" and a "coinbase public key" and a password would simplify things incredibly and that is the frustration. 
Not at any of you, obviously...   In fact, I really appreciate all the responses I am getting. 

I do not have the decryption password recorded so that may be an issue but the good news is I have the user seed and according to Coinbase's email, (refereced in this post) https://bitcointalksearch.org/topic/--5316286
Code:
What if I don’t know my vault password?
If you don’t know your vault password, you can instead copy/paste the user seed into the password field. This will allow you to approve your withdrawal. The user seed was provided to you when you created your multisig vault.
So I should be good, right?  Grin   
I am sure there is a catch...    Huh
legendary
Activity: 2268
Merit: 18509
The lack of a seed phrase is what makes recovering a coinbase multisig vault as difficult as it is.
The lack of a seed phrase isn't the most pressing issue right now. You can worry about how to turn the private keys (rather than seed phrases) in to a wallet later. The first thing you need to obtain is 2 of the 3 private keys.

You have the user seed private key. You will never obtain the Coinbase seed private key, since that was only ever held on Coinbase's servers. You have the shared seed private key, but it is encrypted. If you cannot decrypt it, then you will never be able to recover your wallet?

Do you remember the decryption password? If not, then the first thing you are going to have to do is to try to brute force it.
newbie
Activity: 17
Merit: 21
So, Coinbase multisig vaults were a 2-of-3 multisig. One key was held solely by Coinbase. One key was held solely by the user. The third key was held by both Coinbase and the user in an encrypted form, with the password you have being the decryption key. When you logged in to the vault, you used your password to decrypt the shared key, which allowed you to make transactions on Coinbase's website using Coinbase's key and the shared key.

Based on that, a seed phrase and a password alone are not going to be enough to access your coins. You also need the shared key which your password decrypts. If you do not have this backed up as well, then your only hope is going to be to ask Coinbase nicely if they still have it stored and can send it to you.

I also don't think Coinbase provided a seed phrase at all for the user key; I think it was an actual private key. You should therefore have two strings of seemingly random letters and numbers, one which will be your user key and the other which will be your encrypted shared key.

You are absolutely correct, end users were not provided a seed phrase.  
Upon the creation of a (multisig) vault, Coinbase provided the following:
(these are just random numbers formatted to look real, they are not valid)

  • # User seed:  L3XCYcQ2pwY3YTuwyPXzWsvVtGnCp4zL2ajP3XQt2pVhPuKiVM7r
  • # User public key: xpub661MyMwAqRbcEzdGMFKZXuVwbyHY2zKhiw6YFTrULfNBF53QVfXyoAiKMZKWkQA5444NXtLj9HP mgyN1xLCiJJ9dKAy4nLZJ87trHRnwUDb
  • # Shared seed (encrypted): z3PCl3Goz8yXxYt9mx6I9B2YXNX7ulTU0O2a6T43OfjP23A2ahmwx72iJ
  • # Shared public key: xpub661MyMwAqRbcEzdGMFKZXuVwbyHY2zKhiw6YFTrULfNBF53QVfXyoAiKMZKWkQA5444NXtLj9HP mgyN1xLCiJJ9dKAy4nLZJ87trHRnwUDb
  • # Coinbase public key: xpub661MyMwAqRbcEzdGMFKZXuVwbyHY2zKhiw6YFTrULfNBF53QVfXyoAiKMZKWkQA5444NXtLj9HP mgyN1xLCiJJ9dKAy4nLZJ87trHRnwUDb

The lack of a seed phrase is what makes recovering a coinbase multisig vault as difficult as it is.  
I am no python coder (not coder at all) but was able to get the code from this post on stack exchange https://bitcoin.stackexchange.com/questions/57207/how-to-derive-the-private-key-associated-with-a-coinbase-multi-sig-vault-address to produce something similar to the following:
(these are just random numbers formatted to look real, they are not valid)

  • Master Private Key corresponding to seed: xprvz3PCl3Goz8yXxYt9mx6I9B2YXNX7ulTU0O2a6T43OfjP23A2ahmwx72iJVkmTWy0ZmBZMZcIkVv bZteiiHkucAZFdK1m1kjfMB6542qggKO
  • Master Public Key corresponding to seed: xpub661MyMwAqRbcEzdGMFKZXuVwbyHY2zKhiw6YFTrULfNBF53QVfXyoAiKMZKWkQA5444NXtLj9HP mgyN1xLCiJJ9dKAy4nLZJ87trHRnwUDb
  • Extended Private key at index 14: xprvz3PCl3Goz8yXxYt9mx6I9B2YXNX7ulTU0O2a6T43OfjP23A2ahmwx72iJVkmTWy0ZmBZMZcIkVv bZteiiHkucAZFdK1m1kjfMB6542qggKO
  • WIF format of that key: 3OfjP23A2ahmwx72iJVkmTWy0ZmBZMZcIkVvbZteiiHkucADVDA

Not sure what exactly to do with the values produced from the user seed as that is only 1 of the signatures for a 2 of 3 vault but I will ask in Electrum.  
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
Coinbase solely have one key, you solely has one key while both you ( Coinbase and you) have the third key. Which means you have two keys.
If the "user seed" is his seed phrase or private key and the "shared seed" is the password-encrypted shared private key that o_e_l_e_o mentioned in the post you quoted, I guess you are right and he has the essentials to recover a 2/3 multisig wallet without having to contact Coinbase for further assistance.
legendary
Activity: 1512
Merit: 4795
For you to understand, I have to quote from this thread, as I am not a Coinbase user.

Coinbase vault is 2-of-3 multisig wallet. Coinbase solely have one key, you solely has one key while both you ( Coinbase and you) have the third key. Which means you have two keys.

With your two keys you can move the funds.

with your 2 keys you could move funds.
There was also this option: https://coinbase.github.io/multisig-tool/
For you to dig through and get to your funds.

So, Coinbase multisig vaults were a 2-of-3 multisig. One key was held solely by Coinbase. One key was held solely by the user. The third key was held by both Coinbase and the user in an encrypted form, with the password you have being the decryption key. When you logged in to the vault, you used your password to decrypt the shared key, which allowed you to make transactions on Coinbase's website using Coinbase's key and the shared key.

Based on that, a seed phrase and a password alone are not going to be enough to access your coins. You also need the shared key which your password decrypts. If you do not have this backed up as well, then your only hope is going to be to ask Coinbase nicely if they still have it stored and can send it to you.

I also don't think Coinbase provided a seed phrase at all for the user key; I think it was an actual private key. You should therefore have two strings of seemingly random letters and numbers, one which will be your user key and the other which will be your encrypted shared key.

Hope this is helpful.
legendary
Activity: 2730
Merit: 7065
Farewell, Leo. You will be missed!
To get the best eyes on this, I suggest you move this thread to one of the sub-boards where technical issues are being discussed.
At the bottom of the page, you will see a button that says "Move Topic". Click on that and select the appropriate board. I am not sure what's the best fit, but it could be either Bitcoin Technical Support or Wallet software > Electrum I think.
newbie
Activity: 17
Merit: 21
if I have the "user seed" and the "user public key" and the "shared seed" and the "shared public key" and also a "coinbase public key"  can I recover a Coinbase multisig wallet (created in 2016) into electrum using the steps mentioned in this post
https://bitcointalksearch.org/topic/m.20875786

I have pybitcointools working with the sample data from this post
https://bitcoin.stackexchange.com/questions/57207/how-to-derive-the-private-key-associated-with-a-coinbase-multi-sig-vault-address
so I should be able to get my xprv but not sure I understand "child index".  

I've spent hours researching this and want to make sure I have things mostly figured out before I put any of my data in there.  
I am also not sure about the "shared seed" my notes say "shared seed (encrypted)" and I have read references about a vault password being used to encrypt it but I am not sure I have that. 

Thanks in advance for any assistance. 
Jump to: