Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Could not find nonce in bucket - key was not found in the airdrop tree #35

Open
sangaman opened this issue Feb 15, 2020 · 21 comments
Open

Comments

@sangaman
Copy link

I tried this tool to claim the airdrop with my github gpg key, which has been associated with my account for years.

NonceError: Could not find nonce in bucket [number].
    at findNonces (/home/daniel/hs-airdrop/bin/hs-airdrop:275:17)
    at async createKeyProofs (/home/daniel/hs-airdrop/bin/hs-airdrop:328:17)
    at async main (/home/daniel/hs-airdrop/bin/hs-airdrop:746:8)

This means your key was not found in the airdrop tree.

At 23 followers I'm over the 15 follower minimum, so I'd expect it to be included, although it's possible I was below 15 followers at the time the merkle tree was built. Is there anyway to tell for sure whether this is a bug or I'm doing something wrong vs that I'm just not in the airdrop?

@pinheadmz
Copy link
Member

Did you also register at Handshake.org for the faucet?

@sangaman
Copy link
Author

Did you also register at Handshake.org for the faucet?

No I didn't, I wasn't aware of that. Is that necessary for the GitHub account airdrop?

@pinheadmz
Copy link
Member

No but it's a common reason why users are not in the GitHub airdrop (the tree was deduped so users only get one).

Do you have another key you could try? PGP or SSH? Also make sure you are running the latest version of hs-airdrop.

@amsimoes
Copy link

How does one register at Handshake.org?

Also, I'm sure I had >15 followers on 04-02-2019, but I'm using a new SSH key since December 2019, and using the tool with the private pair of this key.

Would I need to retrieve the older one??

Thanks!

@pinheadmz
Copy link
Member

Yeah try the older key. I'm not sure when the data was scraped but it might've been just before that.

@amsimoes
Copy link

@pinheadmz I think it was scraped April 2019.

Since I didn't back up my older ssh private key, I've no chance right? :(

@chjj
Copy link
Contributor

chjj commented Feb 16, 2020

Replying to: cd90f42#r37314705

I want to be clear on this: the snapshot is from February 2019. There's a few reasons for this. I think the main thing I would point out is that we had also done the crawl 5 months before the final date. On the second crawl we noticed that not many people actually update their SSH keys. I think the diff was along the lines of couple dozen users out of 250k, and all of them were adding new keys, not revoking/removing old ones. Furthermore, most of the new people who made the 15 follower cut off on the second crawl didn't have any SSH keys associated with their account (go figure). So in a 5 month span, there was almost no changes to the set of users with >=15 followers.

During one of the preliminary crawls (crawling the list of users and not the keys, which can be done in a few hours instead of days/weeks), I noticed a lot of new github users had been created right after Handshake was announced, all with similar usernames. After looking at their profiles, it was very clear that they were sockpuppet accounts, all following each other. Luckily, it looked like these accounts were attempting to game the faucet and not the airdrop. Even luckier that they didn't have any SSH keys associated. This is probably because we didn't announce the airdrop to SSH keys until after the first crawl was complete. Nonetheless, this was something new to consider since now people could attempt to game the airdrop by making phony accounts.

That point in 2019 was also around the time Fedor also did the crawl and batch GCD to verify there were no shared primes in the set of RSA keys. As an aside, another fun fact about all these keys: no two users had the same SSH key, which I found very strange. Either github doesn't allow this, or it's very rare for people to have multiple github accounts (not counting the sockpuppets I mentioned above).

The other set from github was PGP keys which people change even less frequently than SSH keys.

It would have been nice to have fresher data, but I wasn't convinced that much would have changed. Honestly, running that crawl and the subsequent build for the tree, and all the micromanagement of all the scripts necessary to prepare all of this data was a nightmare for me. The crawl takes about a week to run due to API rate limiting, the script needs a journal, an actual database, and it requires monitoring for a week straight. It's not as passive as it may seem. I ended up creating a pretty complicated utility to do it and manage it all. As an extra headache, updating the tree requires various changes to the code, test vectors, and it was a hard fork each time for whatever testnet was up. Goosig was still under development and any time it changed significantly, the entire tree needed to be rebuilt. In the end, I was just sort of fed up with managing so much data and really didn't want to do the crawl all over again just for a very minimal amount of keys that may have changed, so we stuck with the Feb. 2019 snapshot.

@amsimoes, I'm sorry to hear you missed the cutoff. I didn't expect to see an issue like this. I suspect you're one of the few users on github who actually re-keys for SSH in a reasonable amount of time, which is normally a good thing. I would go so far as to say you probably have bragging rights over anyone on github for actually exercising good security practices. I can't do any debugging to verify whether you're in the tree or not since the crawl data was deleted to protect user privacy, but if the tool says you're not in the tree, you're probably not (short of a bug, or unless you can find your old key and try it).

@maguowei
Copy link

The same to me. I changed my key and lost the old one.

@daijiale
Copy link

@pinheadmz I think it was scraped April 2019.

Since I didn't back up my older ssh private key, I've no chance right? :(

@pinheadmz the same problem to me , I had changed my SSH Key in 4th Aug 2019. And the shell said:

NonceError: Could not find nonce in bucket 93.
at findNonces (/root/hs-airdrop/bin/hs-airdrop:275:17)

This means your key was not found in the airdrop tree.

What can I do then ?

@pinheadmz
Copy link
Member

@daijiale if your old key is gone then you can not claim.

@cmnord
Copy link

cmnord commented Feb 16, 2020

The same to me. I changed my key and lost the old one.

Me too 😞

@sangaman
Copy link
Author

Do you have another key you could try? PGP or SSH? Also make sure you are running the latest version of hs-airdrop.

I don't have any other PGP/SSH keys associated with my account, and my code was up to date with master at the time I created the issue. It's entirely possible I did not have 15+ followers on Feb 2019, I pay almost no attention to this count. I'm assuming I simply wasn't included at the time the crawl happened but I'd be happy to try something else if there are any other ideas.

@amsimoes
Copy link

Ahh it's a bit sad this happening :(

The older public key is still saved on my Github profile, isn't there a way to check against the crawl data?
@chjj I think it can be proved that I had (and still have) the public ssh key on my github profile, even If I don't own the private pair anymore...

Is there any other way to get this airdrop then?

@xlc
Copy link

xlc commented Feb 17, 2020

One of my old key is gone, along with my old machine. And another key that I didn't rotate is stored in my Yubikey. Any details of how to make a claim with Yubikey?

@alivebao
Copy link

alivebao commented Feb 17, 2020

So if we can't find the oldest ssh key then we can't meet the requirement right? Even our followers' count more than 15? sigh...

@withinboredom
Copy link

withinboredom commented Feb 17, 2020

Any details of how to make a claim with Yubikey?

See #31

@baebb
Copy link

baebb commented Feb 19, 2020

I know had 15 followers before the snapshot and tried with a key registered on Github from 2017.

Still didn't work.

A tool for to look up what the snapshot has for my Github ID would be useful- saves me dicking around and digging up old computers for their SSH key

@zh-h
Copy link

zh-h commented Feb 19, 2020

Oh no, I haven't authorized SSH before, so is my new generated one useless?

@amsimoes
Copy link

@zh-h If you didn't have a public ssh key, I don't know yet if there's a way to verify by your github id instead of the public ssh key matched to your profile. I think they only parsed by ssh and pgp keys...

@windrunner414
Copy link

I also did not have a ssh key...

@pinheadmz
Copy link
Member

@amsimoes @windrunner414 No keys, no coins. Sorry but this is how the airdrop was designed.

@handshake-org handshake-org locked as resolved and limited conversation to collaborators Feb 19, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests