Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id E7C67891 for ; Mon, 31 Dec 2018 16:52:37 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-ed1-f47.google.com (mail-ed1-f47.google.com [209.85.208.47]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id D165A782 for ; Mon, 31 Dec 2018 16:52:36 +0000 (UTC) Received: by mail-ed1-f47.google.com with SMTP id f9so22872593eds.10 for ; Mon, 31 Dec 2018 08:52:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=eYQU2kEWO1GPpaLc8A4c7EG2E9CkglfFfDneAIzVy5c=; b=gSodXUUFoeNVak8ux+2q/bsJbJdlLJnCxIun/1+NoH+f2bUFbs4Bj0RqJDctZg4gYV J1xNHO5OQH4A5YtyXQk0hw80gI1KO0gOi7bALPXdJSEn2HwbCQnc0AZsHPCuNGWch9hi GOO/mtD+n6tIP+fSpWDkJSkc+Tg5qO+gD6wi+H7m8QNwdM0HF2gmPy9tnIpkswKEQgOk bksns5UhTgEIV9zU4dWmmb4a0wRIqfQ6756eCAcV83RAGH8FD66RW9//5nqOIOSsoZqh oFsGcHNxTKTfrdHCmyL1ht+NVznCIN0/fqkPrtyC20sRA+50wrMS9GP27s42W/xl1qAq i0lg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=eYQU2kEWO1GPpaLc8A4c7EG2E9CkglfFfDneAIzVy5c=; b=QS2pB8SHhysaGskpYzNCSro+saBlKtS8bJBn+WxOtds51/OJANv339AuWg5TXnQHjY afYcUCyZw3+Qf6GZHabJtENvLox4SHA8ROVTe2owY8ZTejxA0HosatfyGBVOema5cdK5 g2d7fGETV8qEgU8g/IbkmlrP7b6qc6Txs3h097s98uTF10OBFbwhd8KBMFSaRWXr1AYE VbTGmsv0lIt/SQSHZ1f5qEdspC9nPOeUm0evLiIeBsezzOtUXMeNXxNtXCPHaeFzXbFm JyDgmcAvHaE6Pw8k2M32sreu0ccpqUN4iLIr5y3WhA+a9zqQOZ2kkDnGtNKTwCJYVM6r HOaA== X-Gm-Message-State: AA+aEWYbpnF5kDxE7vAK8mxXJ4cfSUtiqTZbFp0YHbfkzwd+7kD/kih3 SHRANEZba5nQdalxCosdDOoaUOdnDDmYcMQQGGbccsBR X-Google-Smtp-Source: AFSGD/VdVSbZXgIM4/YoThhOQxhhqsCsVRxHst9Yv6EVqDuVLesfFRmQUv/qoXRaUuVTkK1hSYsyx0viov5+5Tog2jI= X-Received: by 2002:a17:906:59cf:: with SMTP id m15-v6mr27333841ejs.199.1546275155248; Mon, 31 Dec 2018 08:52:35 -0800 (PST) MIME-Version: 1.0 References: <68330522-7e7c-c3b4-99a9-1c68ddb56f23@gmail.com> <743fb106-977e-1f34-47af-9fb3b8621e72@gmail.com> In-Reply-To: From: Alan Evans Date: Mon, 31 Dec 2018 12:52:24 -0400 Message-ID: To: Aymeric Vitte , Bitcoin Protocol Discussion Content-Type: multipart/alternative; boundary="0000000000005a8aeb057e543d58" X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM, HTML_MESSAGE, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Wed, 02 Jan 2019 03:39:35 +0000 Subject: Re: [bitcoin-dev] BIP39 seeds X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 31 Dec 2018 16:52:38 -0000 --0000000000005a8aeb057e543d58 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable > Using some algorithm to take some input and generate a bip39 phrase that you can use with any bip39 wallet sounds perfectly reasonable. I think any method that doesn't use real entropy, but some fake source of randomness, such as a book is asking to be hacked and so is not a reasonable idea. If an algorithm for book text to BIP39 sentence ever became well used, common books will be systematically searched for accounts. People will also choose their favourite passages, so I would expect to see collisions. You should also note that BIP39 does not need input that is from the word list. You can use *any text as its input*, the word list and checksum check is just recommended to be a warning, but again, text chosen from public sources or common phrases is a bad idea for many reasons. From BIP0039: *> The conversion of the mnemonic sentence to a binary seed is completely independent from generating the sentence. This results in rather simple code; there are no constraints on sentence structure and clients are free to implement their own wordlists or even whole sentence generators, allowing for flexibility in wordlists for typo detection or other purposes.= * *> Although using a mnemonic not generated by the algorithm described in "Generating the mnemonic" section is possible, this is not advised and software must compute a checksum for the mnemonic sentence using a wordlist and issue a warning if it is invalid.* What you could do is use a regular true random BIP39 sentence in conjunction with a phrase from a book as the "passphrase" giving you that plausible deniability, right up to the point you put that in your will or tell someone, i.e. for the "what if something happens to me" case. Though I still think redirecting people to a book phase is risky for this, e.g. books have editions, there may be a change in the key place. From BIP0039: *> The described method also provides plausible deniability, because every passphrase generates a valid seed (and thus a deterministic wallet) but only the correct one will make the desired wallet available.* Alan P.S. "I have seen many people completely lost with their wallets because of [BIP39]": I would say "despite" not "because". These people would have lost/miss recorded a BIP32 hex seed as well. On Thu, 27 Dec 2018 at 11:02, Aymeric Vitte via bitcoin-dev < bitcoin-dev@lists.linuxfoundation.org> wrote: > > Le 26/12/2018 =C3=A0 19:54, James MacWhyte a =C3=A9crit : > > > On Wed, Dec 26, 2018 at 11:33 AM Aymeric Vitte > wrote: > >> so, even with a tool like yours, they can be misleaded, for example >> trying a few words to replace the missing/incorrect one, get a valid see= d >> and stay stuck with it forever trying to play with BIP44/49 to find thei= r >> keys >> > > Just a small detail, but my tool actually looks up all the possible > combinations and then finds which one has been used before by looking for > past transactions on the blockchain. Therefore, it won't tell you your > phrase is correct unless it is a phrase that has actually been used befor= e > (preventing what you described). > > I saw that your tool was querying blockchain.info, but it cannot guess > what derivation path was used and if it is a standard one what addresses > were used, and even if successful it works only for bitcoin (so maybe it > should just output the ~1500 possible phrases and/or xprv, and be > completely offline, this is still doable for people) > > > Using some algorithm to take some input and generate a bip39 phrase that > you can use with any bip39 wallet sounds perfectly reasonable. > > I forgot to mention that this can help also solving the "what if somethin= g > happens to me" case giving to the family the seed and the parameter(s) fo= r > the derivation path, or an easy way to find it (better than something lik= e: > remind this passphrase, take the sha256 of it, then use some other stuff = to > find the encryption algo, take n bytes of the hash, use it to decode my > wallet or my seed... and then everybody looking at you like crazy) > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > --0000000000005a8aeb057e543d58 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
> Using some algorith= m to take some input and generate a bip39 phrase that you can use with any = bip39 wallet sounds perfectly reasonable.

I think any me= thod that doesn't use real entropy, but some fake source of randomness,= such as a book is asking to be hacked and so is not a reasonable idea.

If an algorithm for book text to BIP39 sentence=C2=A0= ever became well used, common books will be systematically searched for acc= ounts. People will also choose their favourite passages, so I would expect = to see collisions.

You should also note that BIP39= does not need input that is from the word list. You can use any text as= its input, the word list and checksum check is just recommended to be = a warning, but again, text chosen from public sources or common phrases is = a bad idea for many reasons.

From BIP0039:
>=C2=A0The conversion of the mnemonic sentence to a binary seed is= completely independent from generating the sentence. This results in rathe= r simple code; there are no constraints on sentence structure and cl= ients are free to implement their own wordlists or even whole sentence gene= rators, allowing for flexibility in wordlists for typo detection or other p= urposes.
> Although using a mnemonic not generated by t= he algorithm described in "Generating the mnemonic" section is po= ssible, this is not advised and software must compute a checksum for the mn= emonic sentence using a wordlist and issue a warning if it is invalid.<= /div>

What you could do is use a regular true random BIP= 39 sentence in conjunction with a phrase from a book as the "passphras= e" giving you that plausible deniability, right up to the point you pu= t that in your will or tell someone, i.e. for the "what if something h= appens to me" case. Though I still think redirecting people to a book = phase is risky for this, e.g. books have editions, there may be a change in= the key place.

From BIP0039:
> The described method also provides plausible deniability, bec= ause every passphrase generates a valid seed (and thus a deterministic wall= et) but only the correct one will make the desired wallet available.

Alan

P.S. "I hav= e seen many people completely lost with their wallets because of [BIP39]&qu= ot;: I would say "despite" not "because". These people = would have lost/miss recorded a BIP32 hex seed as well.


On Thu, = 27 Dec 2018 at 11:02, Aymeric Vitte via bitcoin-dev <bitcoin-dev@lists.l= inuxfoundation.org> wrote:
=20 =20 =20


Le 26/12/2018 =C3=A0 19:54, James MacWhyte a =C3=A9crit=C2=A0:
=20

On Wed, Dec 26, 2018 at 11:33 AM Aymeric Vitte <vitteaymeric@gmail.com> wrote:

so, even with a tool like yours, they can be misleaded, for example trying a few words to replace the missing/incorrect one, get a valid seed and stay stuck with it forever trying to play with BIP44/49 to find their keys


Just a small detail, but my tool actually looks up all the possible combinations and then finds which one has been used before by looking for past transactions on the blockchain. Therefore, it won't tell you your phrase is correct unless it is a phrase that has actually been used before (preventing what you described).

I saw that your tool was querying blockchain.info, but it cannot guess what derivation path was used and if it is a standard one what addresses were used, and even if successful it works only for bitcoin (so maybe it should just output the ~1500 possible phrases and/or xprv, and be completely offline, this is still doable for people)


Using some algorithm to take some input and generate a bip39 phrase that you can use with any bip39 wallet sounds perfectly reasonable.

I forgot to mention that this can help also solving the "what i= f something happens to me" case giving to the family the seed and the parameter(s) for the derivation path, or an easy way to find it (better than something like: remind this passphrase, take the sha256 of it, then use some other stuff to find the encryption algo, take n bytes of the hash, use it to decode my wallet or my seed... and then everybody looking at you like crazy)

_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev
--0000000000005a8aeb057e543d58--