Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1X7LGM-0003OM-Ab for bitcoin-development@lists.sourceforge.net; Wed, 16 Jul 2014 09:12:34 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.214.178 as permitted sender) client-ip=209.85.214.178; envelope-from=mh.in.england@gmail.com; helo=mail-ob0-f178.google.com; Received: from mail-ob0-f178.google.com ([209.85.214.178]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1X7LGL-0001u0-0W for bitcoin-development@lists.sourceforge.net; Wed, 16 Jul 2014 09:12:34 +0000 Received: by mail-ob0-f178.google.com with SMTP id nu7so629168obb.23 for ; Wed, 16 Jul 2014 02:12:27 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.182.233.230 with SMTP id tz6mr33515050obc.53.1405501946459; Wed, 16 Jul 2014 02:12:26 -0700 (PDT) Sender: mh.in.england@gmail.com Received: by 10.76.35.234 with HTTP; Wed, 16 Jul 2014 02:12:26 -0700 (PDT) In-Reply-To: References: Date: Wed, 16 Jul 2014 11:12:26 +0200 X-Google-Sender-Auth: UcBAS3hPGzDLvfvNpwESd95e_2c Message-ID: From: Mike Hearn To: Aaron Voisine Content-Type: multipart/alternative; boundary=001a11c300123ffe2304fe4becf1 X-Spam-Score: -0.5 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (mh.in.england[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1X7LGL-0001u0-0W Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] BIP 38 NFC normalisation issue X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Jul 2014 09:12:34 -0000 --001a11c300123ffe2304fe4becf1 Content-Type: text/plain; charset=UTF-8 I'm all for fixing bugs, but I know from bitter experience that outside the BMP dragons lurk. Browsers don't even expose Unicode APIs at all. You end up needing to ship an entire pure-js implementation, which can be too large for some use cases (too much time sunk on that issue in my last job). I'm hoping BIP 38 doesn't get widely used anyway, to be frank. People moving private keys around by hand has caused quite a few problems in the past, sometimes people lost money. It's better to work at the level of a wallet and ideally ask people to move money using regular transactions. Way less potential for errors. Regardless, I'll file a JVM bug and see what the outcome is. On Wed, Jul 16, 2014 at 12:23 AM, Aaron Voisine wrote: > If the user creates a password on an iOS device with an astral > character and then can't enter that password on a JVM wallet, that > sucks. If JVMs really can't support unicode NFC then that's a strong > case to limit the spec to the subset of unicode that all popular > platforms can support, but it sounds like it might just be a JVM > string library bug that could hopefully be reported and fixed. I get > the same result as in the test case using apple's > CFStringNormalize(passphrase, kCFStringNormalizationFormC); > > Aaron Voisine > breadwallet.com > > > On Tue, Jul 15, 2014 at 11:20 AM, Mike Hearn wrote: > > Yes, we know, Andreas' code is indeed doing normalisation. > > > > However it appears the output bytes end up being different. What I get > back > > is: > > > > cf930001303430300166346139 > > > > vs > > > > cf9300f0909080f09f92a9 > > > > from the spec. > > > > I'm not sure why. It appears this is due to the character from the astral > > planes. Java is old and uses 16 bit characters internally - it wouldn't > > surprise me if there's some weirdness that means it doesn't/won't support > > this kind of thing. > > > > I recommend instead that any implementation that wishes to be compatible > > with JVM based wallets (I suspect Android is the same) just refuse any > > passphrase that includes characters outside the BMP. At least unless > someone > > can find a fix. I somehow doubt this will really hurt anyone. > > > > > ------------------------------------------------------------------------------ > > Want fast and easy access to all the code in your enterprise? Index and > > search up to 200,000 lines of code with a free copy of Black Duck > > Code Sight - the same software that powers the world's largest code > > search on Ohloh, the Black Duck Open Hub! Try it now. > > http://p.sf.net/sfu/bds > > _______________________________________________ > > Bitcoin-development mailing list > > Bitcoin-development@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/bitcoin-development > > > --001a11c300123ffe2304fe4becf1 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable
I'm all for fixing bugs, but I know from bitter experi= ence that outside the BMP dragons lurk. Browsers don't even expose Unic= ode APIs at all. You end up needing to ship an entire pure-js implementatio= n, which can be too large for some use cases (too much time sunk on that is= sue in my last job).

I'm hoping BIP 38 doesn't get widely used anyway, to= be frank. People moving private keys around by hand has caused quite a few= problems in the past, sometimes people lost money. It's better to work= at the level of a wallet and ideally ask people to move money using regula= r transactions. Way less potential for errors.

Regardless, I'll file a JVM bug and see what the ou= tcome is.


On Wed, Jul 16, 2014 at 12:23 AM, Aaron Voisine &= lt;voisine@gmail.com= > wrote:
If the user creates a password on an iOS dev= ice with an astral
character and then can't enter that password on a JVM wallet, that
sucks. If JVMs really can't support unicode NFC then that's a stron= g
case to limit the spec to the subset of unicode that all popular
platforms can support, but it sounds like it might just be a JVM
string library bug that could hopefully be reported and fixed. I get
the same result as in the test case using apple's
CFStringNormalize(passphrase, kCFStringNormalizationFormC);

Aaron Voisine
breadwallet.com


On Tue, Jul 15, 2014 at 11:20 AM, Mike Hearn <mike@plan99.net> wrote:
> Yes, we know, Andreas' code is indeed doing normalisation.
>
> However it appears the output bytes end up being different. What I get= back
> is:
>
> cf930001303430300166346139
>
> vs
>
> cf9300f0909080f09f92a9
>
> from the spec.
>
> I'm not sure why. It appears this is due to the character from the= astral
> planes. Java is old and uses 16 bit characters internally - it wouldn&= #39;t
> surprise me if there's some weirdness that means it doesn't/wo= n't support
> this kind of thing.
>
> I recommend instead that any implementation that wishes to be compatib= le
> with JVM based wallets (I suspect Android is the same) just refuse any=
> passphrase that includes characters outside the BMP. At least unless s= omeone
> can find a fix. I somehow doubt this will really hurt anyone.
>
> ------------------= ------------------------------------------------------------
> Want fast and easy access to all the code in your enterprise? Index an= d
> search up to 200,000 lines of code with a free copy of Black Duck
> Code Sight - the same software that powers the world's largest cod= e
> search on Ohloh, the Black Duck Open Hub! Try it now.
> http://p.sf.net/= sfu/bds
> _______________________________________________
> Bitcoin-development mailing list
> Bitcoin-d= evelopment@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/bitco= in-development
>

--001a11c300123ffe2304fe4becf1--