Storj believes 88 !> 35

Generating key with a minimum a difficulty of 36…
Generated 201106 keys; best difficulty so far: 88
Found a key with difficulty 88!
Unsigned identity is located in “/root/.local/share/storj/identity/storagenode”

snip

Error: certificates peer error: authorization claim error: difficulty must be greater than: 35
root@thevector:~/storj #

Okay, what gives? Last time I checked 88>35.

The chances of the first key with a difficulty higher than 35 being difficulty 88 are 1 in 9,007,199,254,740,992. That’s 9 quadrillion! You’re not that lucky.

I’m going to guess that key is nowhere near difficulty 88. You’re either playing or there is a bug in key generation. Either way, you’re going to have to try again. Make sure you’re using the latest binary.

4 Likes

I ran it several times and tried keys with higher difficulty of 35 and all of them were rejected. When I got the last one, I decided to hold onto it and search the forums just in case.

Yeah, thanks for the help.

you wouldn’t happen to be running some weird OS and then maybe ruunning storj on linux this in a JAIL… perchance… just speculating here… because it seems very odd… and yes i got that idea from your name :smiley:

1 Like

@SGC: Define weird. :stuck_out_tongue:
I am not a kook, everybody else just thinks I am.

I am using a kernel module to run Linux binaries. Not using a jail (because I can trust any binary I pull off a website, right??), but to my knowledge the “linux” libraries are chrooted.

After checking the identity create -h I found the URL the program checks its version against. Wadda-knooow! Sho-nuff they have a FreeBSD compiled binary on github. Program is now running… although I like the results using the Linux binary better!

hmm, on the technical side, I have no freakin idea how I could get an exit status 0, not get a kernel panic, AND produce a key that was not representative of what the program claimed. Whoever is privy to the source code probably knows exactly what happened…

On the non-technical side, when posting the installation instructions, they could informed the reader that although they don’t have instructions for other “weird” OSs (:stuck_out_tongue: @SGC ), but they do have pre-compiled binaries for them.

sigh I just realized I’m running this outside a jail…

1 Like

Wadda know!! Source code on github…

been wanting to run freebsd, but didn’t really have much luck when trying to install it on my server… but most likely just me being to much of a rookie … seemed to work… but i was just totally lost in the terminal or something like that… so i tried proxmox and it just sprang to life with a webgui to get started… so i ended up using that…

i’m not sure i can stay with linux, it’s just well crazy userland i like when stuff makes sense… i also like the idea that i would be able to put my skills to use with stuff like freebsd if i decide to build something that requires a OS and i can use freebsd as a base for hardware products…

i would bet if it ran in a jail, it would work like it was suppose to… the linux binaries was ported to freebsd or whatever… but i don’t think anything linux would work by default inside freebsd without using a jail… but just a gutshot… im not really well versed in BSD… more like not at all

i believe freebsd can reboot it kernel without rebooting the device… so i would suppose stuff like a kernel panic or stuff that may cause that, might just make the kernel reset or something … maybe even without one noticing… but yeah… .i’m interested in freebsd, but still feel a bit to green to be using it… but when i do get some time… i do plan to start using it in a vm on proxmox… just to start playing with it… aside from pfsense which i also believe is running on a BSD port

@BSDuser It sounds like you’ve gotten better results with the Linux binary, but I’m still very curious how this could have happened on *BSD. Is it reproducible?

3 Likes

Note: The pre-compiled binary for FreeBSD successfully created and authenticated a key.

@thepaul

root@thevector:~/storj/linuxbin # ./identity create 1
Generating key with a minimum a difficulty of 36…
Generated 405476 keys; best difficulty so far: 128
Found a key with difficulty 128!
Unsigned identity is located in “/root/.local/share/storj/identity/1”
Please move CA key to secure storage - it is only needed for identity management and isn’t needed to run a storage node!
/root/.local/share/storj/identity/1/ca.key

I was going to do this several times, but it seems I’m better able reproducing the kernel panics today.

root@thevector:~/storj/linuxbin # ./identity create 3
Generating key with a minimum a difficulty of 36…
Generated 204000 keys; best difficulty so far: 26runtime: unexpected return pc f
stack: frame={sp:0xc000309ba8, fp:0xc000309cb0} stack=[0xc000309000,0xc00030a000
000000c000309aa8: 0000000000000000 0000000000be0c20
000000c000309ab8: 000000c0002c6000 0000000000000000
000000c000309ac8: 0000000000000000 0000000000000000
000000c000309ad8: 0000000000000000 0000000000000000
000000c000309ae8: 0000000000000000 000000c000309cf8
000000c000309af8: 000000000068651a <crypto/x509.MarshalPKIXPublicKey+442> 0000
Generated 204100 keys; best difficulty so far: 26000000c000309b08: 000000c0002c
000000c000309b18: 0000000000000000 0000000000000041
000000c000309b28: 000000000119d160 0000000000000006
000000c000309b38: 0000000000000006 0000000000000000
000000c000309b48: 0000000000000000 0000000000000000
000000c000309b58: 0000000000000000 0000000000000000
000000c000309b68: 0000000000000000 000000c000340000
000000c000309b78: 000000000000000a 000000000000000a
000000c000309b88: 0000000000000000 0000000000000000
000000c000309b98: 000000000119d160 0000000000651ff2 <crypto/elliptic.(*p256Poi
000000c000309ba8: <000000c000309d00 000000000000000c
000000c000309bb8: 000000000000000c 000000c000309d00
000000c000309bc8: 000000000000000c 000000000000000c
000000c000309bd8: 000000c000309c40 0000000000000008
000000c000309be8: 000000000000000c 0000000000000001
000000c000309bf8: 000000000000001f 000000000000003f
000000c000309c08: 000000000000003f ffffffffffffffff
000000c000309c18: ffffffffffffffff 00000000000000e9
000000c000309c28: 0000000000000027 000000000000001f
000000c000309c38: 0000000000000015 541d1636d7748ecd
000000c000309c48: 385aabf07b865c2e d2c2f9ece1dce431
000000c000309c58: ff1603258b95e052 0cde4c3f7a33077a
000000c000309c68: 675bdd5612e41f97 c35181ae71f5a6f1
000000c000309c78: d55600c8ae753ef8 0000000000000001
000000c000309c88: ffffffff00000000 ffffffffffffffff
000000c000309c98: 00000000fffffffe 0000000000000000
000000c000309ca8: !0000000000000000 >000000c0005c9d00
000000c000309cb8: 000000c0005c9ce0 0000000000000004
000000c000309cc8: 0000000000000004 0000000000000020
000000c000309cd8: 0000000000000020 4af03f1b9605a16b
000000c000309ce8: 3bf679aa62017501 982fe95b05a11ede
000000c000309cf8: b2d48361ea6310b0 122560652f6821f9
000000c000309d08: 00d4e1f37bc0b6e8 70cf95fa3c116088
000000c000309d18: 7cd11e24ddcc51b5 0bf79fdc4ff9da51
000000c000309d28: 188a9dc58734813f 1f4a385cd9612b46
000000c000309d38: 242bebfc2038f100 b0a4ae3bab35aeac
000000c000309d48: 58d581a04d03b152 9957891fe1000a28
000000c000309d58: 5314423b749c44aa 000000c0005c9dc8
000000c000309d68: 0000000000665c84 <crypto/ecdsa.GenerateKey+356> 000000c00007
000000c000309d78: 000000c0003178e0 0000000000000020
000000c000309d88: 0000000000000020 0000000000000020
000000c000309d98: 0000000000000020 0000000000000000
000000c000309da8: 0000000000000020
fatal error: unknown caller pc

runtime stack:
runtime.throw(0xc9aceb, 0x11)
/usr/local/go/src/runtime/panic.go:1116 +0x72
runtime.gentraceback(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xc0001a6600,
/usr/local/go/src/runtime/traceback.go:273 +0x1aec
runtime.copystack(0xc0001a6600, 0x1000)
/usr/local/go/src/runtime/stack.go:903 +0x299
runtime.shrinkstack(0xc0001a6600)
/usr/local/go/src/runtime/stack.go:1167 +0x13d
runtime.newstack()
/usr/local/go/src/runtime/stack.go:1032 +0x305
runtime.morestack()
/usr/local/go/src/runtime/asm_amd64.s:449 +0x8f

goroutine 54 [running]:
crypto/elliptic.p256PointAddAffineAsm(0xc000309d00, 0xc, 0xc, 0xc000309d00, 0xc,
/usr/local/go/src/crypto/elliptic/p256_asm_amd64.s:1733 +0x744 fp=0xc000
runtime: unexpected return pc for crypto/elliptic.(*p256Point).p256BaseMult call
stack: frame={sp:0xc000309ba8, fp:0xc000309cb0} stack=[0xc000309000,0xc00030a000
000000c000309aa8: 0000000000000000 0000000000be0c20
000000c000309ab8: 000000c0002c6000 0000000000000000
000000c000309ac8: 0000000000000000 0000000000000000
000000c000309ad8: 0000000000000000 0000000000000000
000000c000309ae8: 0000000000000000 000000c000309cf8
000000c000309af8: 000000000068651a <crypto/x509.MarshalPKIXPublicKey+442> 0000
000000c000309b08: 000000c0002c6000 0000000000000000
000000c000309b18: 0000000000000000 0000000000000041
000000c000309b28: 000000000119d160 0000000000000006
000000c000309b38: 0000000000000006 0000000000000000
000000c000309b48: 0000000000000000 0000000000000000
000000c000309b58: 0000000000000000 0000000000000000
000000c000309b68: 0000000000000000 000000c000340000
000000c000309b78: 000000000000000a 000000000000000a
000000c000309b88: 0000000000000000 0000000000000000
000000c000309b98: 000000000119d160 0000000000651ff2 <crypto/elliptic.(*p256Poi
000000c000309ba8: <000000c000309d00 000000000000000c
000000c000309bb8: 000000000000000c 000000c000309d00
000000c000309bc8: 000000000000000c 000000000000000c
000000c000309bd8: 000000c000309c40 0000000000000008
000000c000309be8: 000000000000000c 0000000000000001
000000c000309bf8: 000000000000001f 000000000000003f
000000c000309c08: 000000000000003f ffffffffffffffff
000000c000309c18: ffffffffffffffff 00000000000000e9
000000c000309c28: 0000000000000027 000000000000001f
000000c000309c38: 0000000000000015 541d1636d7748ecd
000000c000309c48: 385aabf07b865c2e d2c2f9ece1dce431
000000c000309c58: ff1603258b95e052 0cde4c3f7a33077a
000000c000309c68: 675bdd5612e41f97 c35181ae71f5a6f1
000000c000309c78: d55600c8ae753ef8 0000000000000001
000000c000309c88: ffffffff00000000 ffffffffffffffff
000000c000309c98: 00000000fffffffe 0000000000000000
000000c000309ca8: !0000000000000000 >000000c0005c9d00
000000c000309cb8: 000000c0005c9ce0 0000000000000004
000000c000309cc8: 0000000000000004 0000000000000020
000000c000309cd8: 0000000000000020 4af03f1b9605a16b
000000c000309ce8: 3bf679aa62017501 982fe95b05a11ede
000000c000309cf8: b2d48361ea6310b0 122560652f6821f9
000000c000309d08: 00d4e1f37bc0b6e8 70cf95fa3c116088
000000c000309d18: 7cd11e24ddcc51b5 0bf79fdc4ff9da51
000000c000309d28: 188a9dc58734813f 1f4a385cd9612b46
000000c000309d38: 242bebfc2038f100 b0a4ae3bab35aeac
000000c000309d48: 58d581a04d03b152 9957891fe1000a28
000000c000309d58: 5314423b749c44aa 000000c0005c9dc8
000000c000309d68: 0000000000665c84 <crypto/ecdsa.GenerateKey+356> 000000c00007
000000c000309d78: 000000c0003178e0 0000000000000020
000000c000309d88: 0000000000000020 0000000000000020
000000c000309d98: 0000000000000020 0000000000000000
000000c000309da8: 0000000000000020
crypto/elliptic.(*p256Point).p256BaseMult(0xc0005c9d00, 0xc0005c9ce0, 0x4, 0x4)
/usr/local/go/src/crypto/elliptic/p256_asm.go:491 +0x2d2 fp=0xc000309cb0
created by storj.io/common/identity.GenerateKeys
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/

goroutine 1 [chan receive]:
storj.io/common/identity.GenerateKeys(0xd81300, 0xc0000ac460, 0xc000460008, 0x4,
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
storj.io/common/identity.NewCA(0xd810c0, 0xc000077f00, 0x240000, 0x4, 0x0, 0x0,
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
storj.io/common/identity.CASetupConfig.Create(0x0, 0x0, 0x0, 0x0, 0x0, 0xc00029a
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
main.cmdNewService(0x1192500, 0xc0001bc1b0, 0x1, 0x1, 0xa57a68, 0x28)
/go/src/storj.io/storj/cmd/identity/main.go:137 +0x630
storj.io/private/process.cleanup.func1.4(0xd81300, 0xc0001c8460)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
storj.io/private/process.cleanup.func1(0x1192500, 0xc0001bc1b0, 0x1, 0x1, 0x0, 0
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
github.com/spf13/cobra.(*Command).execute(0x1192500, 0xc0001bc190, 0x1, 0x1, 0x1
/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:842 +0x47c
github.com/spf13/cobra.(*Command).ExecuteC(0x1192260, 0xc000078101, 0xccb498, 0x
/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:950 +0x375
github.com/spf13/cobra.(*Command).Execute(…)
/go/pkg/mod/github.com/spf13/cobra@v1.0.0/command.go:887
storj.io/private/process.ExecWithCustomConfig(0x1192260, 0x1, 0xccb498)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
storj.io/private/process.Exec(...)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
main.main()
/go/src/storj.io/storj/cmd/identity/main.go:84 +0x3e

goroutine 22 [chan receive]:
storj.io/private/debug.(*Server).Run.func1(0xc0000c8118, 0x0)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/debug/se
golang.org/x/sync/errgroup.(*Group).Go.func1(0xc0000ea060, 0xc00009e640)
/go/pkg/mod/golang.org/x/sync@v0.0.0-20200625203802-6e8e738ad208/errgrou
created by golang.org/x/sync/errgroup.(*Group).Go
/go/pkg/mod/golang.org/x/sync@v0.0.0-20200625203802-6e8e738ad208/errgrou

goroutine 8 [semacquire]:
sync.runtime_Semacquire(0xc0000ea070)
/usr/local/go/src/runtime/sema.go:56 +0x45
sync.(*WaitGroup).Wait(0xc0000ea068)
/usr/local/go/src/sync/waitgroup.go:130 +0x65
golang.org/x/sync/errgroup.(*Group).Wait(0xc0000ea060, 0xc00009e660, 0xd810c0)
/go/pkg/mod/golang.org/x/sync@v0.0.0-20200625203802-6e8e738ad208/errgrou
storj.io/private/debug.(*Server).Run(0xc0000d0640, 0xd810c0, 0xc0000be6c0, 0x0,
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/debug/se
storj.io/private/process.initDebug.func1(0xc0002ee300, 0xd7bdc0, 0xc0002ea3a0, 0
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
created by storj.io/private/process.initDebug
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/

goroutine 10 [syscall]:
os/signal.signal_recv(0x0)
/usr/local/go/src/runtime/sigqueue.go:147 +0x9d
os/signal.loop()
/usr/local/go/src/os/signal/signal_unix.go:23 +0x25
created by os/signal.Notify.func1.1
/usr/local/go/src/os/signal/signal.go:150 +0x45

goroutine 23 [IO wait]:
internal/poll.runtime_pollWait(0x827e87ff8, 0x72, 0x0)
/usr/local/go/src/runtime/netpoll.go:220 +0x55
internal/poll.(*pollDesc).wait(0xc00017ec98, 0x72, 0x0, 0x0, 0xc92ba4)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:87 +0x45
internal/poll.(*pollDesc).waitRead(…)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:92
internal/poll.(*FD).Accept(0xc00017ec80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
/usr/local/go/src/internal/poll/fd_unix.go:394 +0x1fc
net.(*netFD).accept(0xc00017ec80, 0xc00005bd98, 0xc000088000, 0x8011847d0)
/usr/local/go/src/net/fd_unix.go:172 +0x45
net.(*TCPListener).accept(0xc0002ea3a0, 0xc00005bdd8, 0x40f658, 0x30)
/usr/local/go/src/net/tcpsock_posix.go:139 +0x32
net.(*TCPListener).Accept(0xc0002ea3a0, 0xc23380, 0xc0000ea150, 0xb994c0, 0x1185
/usr/local/go/src/net/tcpsock.go:261 +0x65
net/http.(*Server).Serve(0xc0000d0658, 0xd7bdc0, 0xc0002ea3a0, 0x0, 0x0)
/usr/local/go/src/net/http/server.go:2937 +0x266
storj.io/private/debug.(*Server).Run.func2(0x0, 0x0)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/debug/se
golang.org/x/sync/errgroup.(*Group).Go.func1(0xc0000ea060, 0xc00009e660)
/go/pkg/mod/golang.org/x/sync@v0.0.0-20200625203802-6e8e738ad208/errgrou
created by golang.org/x/sync/errgroup.(*Group).Go
/go/pkg/mod/golang.org/x/sync@v0.0.0-20200625203802-6e8e738ad208/errgrou

goroutine 37 [chan receive]:
storj.io/private/process.Ctx.func1(0xc0002ee420, 0xc0002e3ba0)
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/
created by storj.io/private/process.Ctx
/go/pkg/mod/storj.io/private@v0.0.0-20200925142346-4c879709882f/process/

goroutine 26 [IO wait]:
internal/poll.runtime_pollWait(0x827e87f18, 0x72, 0xd70d40)
/usr/local/go/src/runtime/netpoll.go:220 +0x55
internal/poll.(*pollDesc).wait(0xc00020e498, 0x72, 0xc000382000, 0xe79, 0xe79)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:87 +0x45
internal/poll.(*pollDesc).waitRead(…)
/usr/local/go/src/internal/poll/fd_poll_runtime.go:92
internal/poll.(*FD).Read(0xc00020e480, 0xc000382000, 0xe79, 0xe79, 0x0, 0x0, 0x0
/usr/local/go/src/internal/poll/fd_unix.go:159 +0x1b1
net.(*netFD).Read(0xc00020e480, 0xc000382000, 0xe79, 0xe79, 0x203000, 0x827e7f77
/usr/local/go/src/net/fd_posix.go:55 +0x4f
net.(*conn).Read(0xc00020a140, 0xc000382000, 0xe79, 0xe79, 0x0, 0x0, 0x0)
/usr/local/go/src/net/net.go:182 +0x8e
crypto/tls.(*atLeastReader).Read(0xc00009e020, 0xc000382000, 0xe79, 0xe79, 0x23,
/usr/local/go/src/crypto/tls/conn.go:779 +0x62
bytes.(*Buffer).ReadFrom(0xc000247400, 0xd6e920, 0xc00009e020, 0x40ca05, 0xbb926
/usr/local/go/src/bytes/buffer.go:204 +0xb1
crypto/tls.(*Conn).readFromUntil(0xc000247180, 0xd6f100, 0xc00020a140, 0x5, 0xc0
/usr/local/go/src/crypto/tls/conn.go:801 +0xf3
crypto/tls.(*Conn).readRecordOrCCS(0xc000247180, 0x0, 0x0, 0xc000139d38)
/usr/local/go/src/crypto/tls/conn.go:608 +0x115
crypto/tls.(*Conn).readRecord(…)
/usr/local/go/src/crypto/tls/conn.go:576
crypto/tls.(*Conn).Read(0xc000247180, 0xc0005bc000, 0x1000, 0x1000, 0x0, 0x0, 0x
/usr/local/go/src/crypto/tls/conn.go:1252 +0x15f
bufio.(*Reader).Read(0xc000096660, 0xc0005be038, 0x9, 0x9, 0xc000139d38, 0xccb50
/usr/local/go/src/bufio/bufio.go:227 +0x222
io.ReadAtLeast(0xd6e7a0, 0xc000096660, 0xc0005be038, 0x9, 0x9, 0x9, 0xc000062060
/usr/local/go/src/io/io.go:314 +0x87
io.ReadFull(…)
/usr/local/go/src/io/io.go:333
net/http.http2readFrameHeader(0xc0005be038, 0x9, 0x9, 0xd6e7a0, 0xc000096660, 0x
/usr/local/go/src/net/http/h2_bundle.go:1477 +0x89
net/http.(*http2Framer).ReadFrame(0xc0005be000, 0xc0002a4000, 0x0, 0x0, 0x0)
/usr/local/go/src/net/http/h2_bundle.go:1735 +0xa5
net/http.(*http2clientConnReadLoop).run(0xc000139fa8, 0x0, 0x0)
/usr/local/go/src/net/http/h2_bundle.go:8240 +0x8d
net/http.(*http2ClientConn).readLoop(0xc00008ac00)
/usr/local/go/src/net/http/h2_bundle.go:8168 +0x6f
created by net/http.(*http2Transport).newClientConn
/usr/local/go/src/net/http/h2_bundle.go:7173 +0x66e

goroutine 53 [runnable]:
storj.io/common/identity.GenerateKey(0xd810c0, 0xc0000be380, 0x513c2b9c44300008,
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
storj.io/common/identity.GenerateKeys.func1(0xc0003da1a0, 0xc0000b0008, 0xc0003d
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
created by storj.io/common/identity.GenerateKeys
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/

goroutine 55 [runnable]:
crypto/elliptic.p256PointAddAffineAsm(0xc00053dd00, 0xc, 0xc, 0xc00053dd00, 0xc,
/usr/local/go/src/crypto/elliptic/p256_asm_amd64.s:1733 +0x744
crypto/elliptic.(*p256Point).p256BaseMult(0xc00053dd00, 0xc00053dce0, 0x4, 0x4)
/usr/local/go/src/crypto/elliptic/p256_asm.go:491 +0x2d2
crypto/elliptic.p256Curve.ScalarBaseMult(0xc000076080, 0xc0000a44a0, 0x20, 0x20,
/usr/local/go/src/crypto/elliptic/p256_asm.go:272 +0xdd
crypto/ecdsa.GenerateKey(0xd84460, 0xc000076080, 0xd6e8e0, 0xc0000326c0, 0xd56e4
/usr/local/go/src/crypto/ecdsa/ecdsa.go:158 +0x164
storj.io/common/pkcrypto.GeneratePrivateECDSAKey(...)
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/pkcrypto/
storj.io/common/pkcrypto.GeneratePrivateKey(0xc000600820, 0x0, 0x0, 0x0)
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/pkcrypto/
storj.io/common/identity.GenerateKey(0xd810c0, 0xc0000be380, 0x3d52a00b13810008,
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
storj.io/common/identity.GenerateKeys.func1(0xc0003da1a0, 0xc0000b0008, 0xc0003d
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
created by storj.io/common/identity.GenerateKeys
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/

goroutine 56 [runnable]:
crypto/elliptic.p256PointAddAffineAsm(0xc00030bd00, 0xc, 0xc, 0xc00030bd00, 0xc,
/usr/local/go/src/crypto/elliptic/p256_asm_amd64.s:1733 +0x744
crypto/elliptic.(*p256Point).p256BaseMult(0xc00030bd00, 0xc00030bce0, 0x4, 0x4)
/usr/local/go/src/crypto/elliptic/p256_asm.go:491 +0x2d2
crypto/elliptic.p256Curve.ScalarBaseMult(0xc000076080, 0xc0000a4420, 0x20, 0x20,
/usr/local/go/src/crypto/elliptic/p256_asm.go:272 +0xdd
crypto/ecdsa.GenerateKey(0xd84460, 0xc000076080, 0xd6e8e0, 0xc0000326c0, 0xd56e4
/usr/local/go/src/crypto/ecdsa/ecdsa.go:158 +0x164
storj.io/common/pkcrypto.GeneratePrivateECDSAKey(...)
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/pkcrypto/
storj.io/common/pkcrypto.GeneratePrivateKey(0xc0006005a0, 0x0, 0x0, 0x0)
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/pkcrypto/
storj.io/common/identity.GenerateKey(0xd810c0, 0xc0000be380, 0x96f6eead90280008,
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
storj.io/common/identity.GenerateKeys.func1(0xc0003da1a0, 0xc0000b0008, 0xc0003d
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
created by storj.io/common/identity.GenerateKeys
/go/pkg/mod/storj.io/common@v0.0.0-20200925121432-61f74bdf4b5c/identity/
root@thevector:~/storj/linuxbin #

Yikes! Looks like something went very wrong when it was compiled. Something is writing bytes to the wrong place on the stack, which is in some cases overwriting the “minimum difficulty found so far” value and in other cases overwriting the return address and causing the panic that you see.

Could it be a broken installation of Go that you used to build?

i think he found out he was running it outside a jail… which basically would mean he was running the command on freebsd, which would interpret it using it’s native linux binaries or something like that…

usually when running other programs meant for other operating systems, they should be run inside a jail which is basically the FreeBSD version of a virtual machine or container

so no surprise that it went all bonkers from being able to run on whats inherently a different OS

a bit like if we tried installing docker for windows on linux… to be fair i’m surprised that it actually got so close to working at all lol…

i think he ran it in a jail and it worked fine then,… like he was suppose to :smiley:
freebsd has all linux inside it’s code or something, to make it able to run all linux software natively… but since it’s not the same OS it won’t work ofc… but thats not why they imported it / integrated it

thats because when they run jails / vm / containers then the linux distributions can run basically flawlessly and natively just unprivileged i guess we could call it today.
thus getting baremetal like virtualization performance ages ago… think this may have been done 15 years ago now…

something in that regard… better to be roughly right than precisely wrong…

1 Like