Bitcoin Forum
July 01, 2024, 12:15:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 2 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 »
201  Bitcoin / Pools / Re: [92 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: June 01, 2012, 10:49:09 AM
Nothing mining pool specific, though there was a security update recently everyone should do if they haven't yet. (0.6.2)

We've been at 0.6.2.2 since a few days after the announcement of 0.6.2, which we initially heard about thanks to you.

I like the direction the bitcoind code is going but it's hard to argue that Gavin hasn't fouled up in how he's been dealing with the recent releases, with many things being done in secret.  BIP16 was initially stalled after it was announced while network consensus was being done.  Then when Deepbit finally switched over to BIP16, he gives pools two weeks to switch over to an unstable beta known to have lockup problems.  A few hours before the BIP16 deadline, the "stable" 0.6.0 release is announced after 2-3 hours of the "it compiles and runs" release candidate testing.  0.6.2 comes out of nowhere and pools must update or else a DoS or fork may occur; have you seen the kind of changes 0.6.1 made?  That is a major change from a deployment POV and needs heavy testing to make sure that there are no deadlocks and that no corruption occurs.  How much stress testing did it really have?  I've already noticed one area in the code where the locking differs between 0.6.0 and 0.6.2, which may be due to bad code updating (it's very easy to mess up), but have not investigated it.  And I've barely looked at the 0.6.2 code.  Backports were mentioned but no info was given on where they could be found.  Were 0.6.1 or 0.6.2 really ready or were they rushed?  Given the changes to 0.6.1, it might have been better to have a 0.6.0.1 patch instead.  We were already (accidently) using a seemingly stable pre-0.6.1 build so the switch to 0.6.2 wasn't a big deal.  If pools/services were made aware of the risk with 0.6.1, I don't think many would have updated right away.

Quote
I idle in the developers IRC chanel and subscribed to the dev mailing list ages ago, just to keep up - informing pools isn't anywhere I could find in developers job descriptions Wink.
There is talk of making a "poolop mailing list" so the devs can pass pool specific info along in a timely manner. talk...so far

The mailing list would be helpful.  Even a sticky in all bitcoin subforums indicating the current version and its release notes would help.  New version or release candidate annoucements usually get drowned in the sea of threads.
202  Bitcoin / Bitcoin Discussion / Re: [SOLVED] Bitcoin's chicken and egg problem on: June 01, 2012, 03:01:40 AM
How long does it take for a bitcoin transaction to be executed? Specifically a withdrawal to a private wallet?

The transaction is executed almost instantly.  It might take 10 minutes or more for the transaction to appear in a solved block, and it could take an hour or more before the transaction has the standard 6 confirmations (it's found in 6 solved blocks) to consider it fully verified.

Forgive me, I did not give the proper context. I was referring to when it is executed on Ogrr's server. I executed a btc withdrawal nearly an hour ago and the transaction has not yet been seen on the bitcoin network in general, nor my client specifically.
IIRC Ogrr does not use Bitcoin for trades. It uses internal credits. Bitcoin transactions in and out of Ogrr are done manually.

what's the difference?  1000 mBTC = 1 Bitcoin.  Yes, a human must manually approve any Bitcoin in/out.  This will become faster when we can afford to have someone around 24/7, but it shouldn't ever take more than 12 hours and in most cases it'd be processed in less than 1 hour.  Think of it as incentive to leave some credit in the system Wink

203  Bitcoin / Pools / Re: [92 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 31, 2012, 08:09:21 PM
Yeah, I'm not too sure what's going on but everything appears to be functioning correctly and in sync with the network.  The competing blocks have all been found within 20 seconds of each other and blockchain.info is seeing them (both ours and the competitors') within a minute after being found.  I'm not sure what the norm is but a quick browse of the orphans at blockchain.info shows a lot of orphans recently and seems to indicate that the smaller pool usually loses out against a bigger one.

Bitcoind was restarted to clear out a potentially slow selection of connected nodes and the number of connections were increased.  Hopefully Gavin's not doing another one of the required updates to bitcoind and not informing smaller pools.
204  Economy / Scam Accusations / Re: Beware of scammers! on: May 31, 2012, 01:49:29 AM
I purchased some Magic: the Gathering Online tickets from Alarmoz (https://bitcointalk.org/index.php?action=profile;u=55563) a few days ago and just today got contacted by Wizards about the tickets being stolen and my account being under investigation.  I suspect they will take the tickets back from me.

Perhaps a short review of what his personality was all about here before investing? All posts have been about selling easily stolen online deliveries or buying btc for reversible PayPal. What did you expect?

I didn't really care to check since he gave first and as far as I knew, MTGO tickets were irreversible.  Apparently they are not, however, after discussing with the Wizards support, they're going to let me keep the tickets.  His MTGO id was 'cyntrez', but I suspect he is banned by now.
205  Economy / Scam Accusations / Re: Beware of scammers! on: May 30, 2012, 05:33:55 PM
I purchased some Magic: the Gathering Online tickets from Alarmoz (https://bitcointalk.org/index.php?action=profile;u=55563) a few days ago and just today got contacted by Wizards about the tickets being stolen and my account being under investigation.  I suspect they will take the tickets back from me.
206  Bitcoin / Pools / Re: [92 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 23, 2012, 02:00:51 PM
Well, looks like your luck has turned - Maxbtc had the highest luck and lowest average shares per round for the last week for any of the 17 pools I monitor:

https://bitcointalk.org/index.php?topic=77000.0

I noticed!  thanks for doing those reports, btw.  pretty awesome.

Trying to payout a little over 7.2BTC and I'm still getting the error.

ok, lemme pm you for more info.
207  Bitcoin / Pools / Re: [92 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 23, 2012, 02:29:47 AM
Tried to do a payout and I get an error "failed to queue payout".

how much are you trying to queue?  bitcoin or namecoin?
208  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 08, 2012, 12:41:12 AM
All good now  Grin

great.  thanks for the update Smiley
209  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 07, 2012, 10:53:25 AM
I just tried refreshing the DNS settings at Rackspace.  Please give it a shot now and let me know if it's working.
210  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 07, 2012, 08:54:41 AM
I am having issues aswell. The website works, but the pool.maxbtc.com address won't resolve.

Edit: Just made a static record in my DNS forwarder and pointed it to 50.57.5.119 for the time beeing.

It could take up to 24 hours for negative DNS caching to clear.
211  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 07, 2012, 05:02:40 AM
down for me as well.

try clearing your browser cache and cookies.  try a ctrl+f5 to force refresh
212  Bitcoin / Pools / Re: The interesting case of pool-identity on: May 07, 2012, 04:35:23 AM
I suspect there are a number of factors at play here but my guess is that for most people it's just that they stand to gain very little from switching away from Deepbit and it's not worth the brainpower/time it'd take to determine the best new choice and get everything set up, and the chance that they could be wrong again, and more wrong than they are already.

http://en.wikipedia.org/wiki/Cognitive_dissonance

http://en.wikipedia.org/wiki/Confirmation_bias

http://en.wikipedia.org/wiki/Sticky_(economics)

http://en.wikipedia.org/wiki/Analysis_paralysis
213  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 06, 2012, 11:04:47 PM
Getting domain name expired.  Sad

Thanks for reporting that.  The domain should be back up.  If it's not, clear your cache.  Apparently, GoDaddy waits until your domain is expired to attempt to renew, and if there is any problem at all in billing you, you're shut down.  Might be nice if they renewed a day or so before you expired so if there were any problems you'd have time to correct them.  Anyway, I needed a reminder to move after the SOPA crap so we'll be off GoDaddy soon.  I apologize for the inconvenience.
214  Bitcoin / Bitcoin Discussion / Re: [SOLVED] Bitcoin's chicken and egg problem on: May 06, 2012, 12:16:59 PM
Thank you to jesse for resolving my issue.

you're welcome.  Thank you for being patient Smiley
215  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, Zero Fee, DGM, LP, API, SSL, Port 80 on: May 06, 2012, 06:16:01 AM
High o and low c does not result in low r. Even in the limiting case o=1, c=0 (which is exponential PPLNS) you can have r whatever you want. r is determined by the ratio between how close c is to 0 and how close o is to 1.

Ahh yes.  I'm more used to dealing with log(r) and log(o) than fiddling with the other parameters.
216  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, No Fee, DGM, LP, API, SSL, 2FA, Port 80 on: May 06, 2012, 01:56:44 AM
Added two-factor authentication to the site.  Yubikey and Google Authenticator (HOTP and TOTP) are supported.  You can set it up under Account > Password & Security.

Unfortunately, no fix yet for the rotten luck we're having.
217  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, Zero Fee, DGM, LP, API, SSL, Port 80 on: May 05, 2012, 10:06:13 PM
The lower the dropoff, the longer it will take to get your rewards to fully mature and you'll need to mine for a longer time period to reach equilibrium.
I wouldn't say that. In the language of the triangle, lowering the dropoff moves you away from the black line and into the blue line; while the black line is characterized by low maturity time, it can still be arbitrarily decreased on the blue line.

The main advantage of using aggressive parameters (high dynamic fee, low leakage) is decreasing the variance of small pools.

Thanks for the correction and link.  I haven't seen that and it should help people understand how the different variables come into play.

I was thinking along the lines of sites with extremely high o and extremely low c (resulting in a low r/high maturity time) to explain the low variance the poster was seeing.
218  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, Zero Fee, DGM, LP, API, SSL, Port 80 on: May 05, 2012, 09:31:01 PM
One problem though, it looks that the idle miner notifications aren't working. I have enabled them for three workers, donated 1.25% and enabled underperforming miners notification in my account.

Thanks for joining.

It looks like you've set it up properly except for the test worker.  Was that the one you were testing the idle miners notification with?
219  Bitcoin / Pools / Re: [151 GH] MaxBTC.com Pool - Merged NMC, Zero Fee, DGM, LP, API, SSL, Port 80 on: May 04, 2012, 01:16:59 PM
Hi everyone,

I am a newbie, but I am in, seems this is a friendly group. Is there any other way to find you guys beside bitcointalk?

Xin,

You can also find us at Ogrr: https://ogrr.com/forum.php?f=26
220  Economy / Trading Discussion / Re: Bitcoin-Central - why don't people use this exchange?? on: May 04, 2012, 10:45:24 AM
Interesting, prompted me to read this which really sums everything nicely up.

The first answer is a good summary but the designer's criticism of DES based encryption should also be viewed with the same type of criticism for bcrypt/scrypt.  DES and other NIST type encryptions are heavily studied and analyzed, resulting in the breakthroughs in finding the vulnerabilities that the designers claim as a failure of DES/SHA.  If the same amount of resources were put into bcrypt/scrypt analysis, it's likely that breakthroughs specific to those crypt methods would be found as well.  If you don't think it to be the case, the recent finding that the reference implementation of bcrypt that is used in almost all programs is flawed after 10 years of use should serve as a warning: http://news.ycombinator.com/item?id=2654586.  The creation of scrypt after 10 years is also a testament to bcrypt's lack of analysis; scrypt is an attempt to slow down the hashing even further due to the rise of technology that was available 10 years ago for those with big budgets.  In a sense, it is security through obscurity (very little research compared to the "defective" algorithms).  I don't think there has ever been any real proof that what's being done with bcrypt doesn't weaken the crypto and people are just taking the designer's word on it.  What is undeniable is bcrypt/scrypt are generally slower than SHA on easily accessible hardware.

The thing to get out of it is also in that answer under the "What NIST recommends" section:

Quote
While I recommend bcrypt, I still follow NIST in that if you implement PBKDF2 and use it properly (with a "high" iteration count), then it is quite probable that password storage is no longer the worst of your security issues.

So even though in theory scrypt is possibly better, PBKDF2 is safer and is sufficient (the principle of high iterations hashing behind bcrypt/scrypt is the same as PBKDF2).  The general recommendation is to use well established crypto instead of creating your own.  I'd put bcrypt/scrypt on that sort of level because there hasn't been enough crypto experts checking to see if what's being done with the secure blowfish encryption doesn't weaken the cryptography after many iterations.  In some cases, combining or using the same secure crypto will weaken it.  In other cases, doing it multiple times will make it more secure (3DES).

I'd avoid bcrypt altogether unless you have a fixed implementation, but that would mean you're now non-standard.  If you're going to compile your own code instead of using standard, unpatched code, I'd use scrypt instead.

Once something is "secure enough," you should focus on the next weak link.  If you're going to use secure password storage crypto, it's not going to be of much help if you allow users to use weak passwords like "password", which happens to be in the top 3 cracked passwords on several social networking sites.
Pages: « 1 2 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!