Bitcoin Forum
June 25, 2024, 08:35:15 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Bitcoin / Bitcoin Technical Support / Re: [Raspberry Pi][Full Node][NFS] bitcoind keeps eating bandwidth after its up on: May 27, 2017, 07:29:50 PM
Set it to 500 manually, did not help sadly.

I'm running aarch64 on the pi3 if that is interesting in some extent.
2  Bitcoin / Bitcoin Technical Support / Re: [Raspberry Pi][Full Node][NFS] bitcoind keeps eating bandwidth after its up on: May 27, 2017, 06:38:45 PM
Desktop has 16GB.

Raspberry pi3 has the 1GB standard and i have gpu_mem=16 in /boot/config.txt to allow maximum RAM for the node.
I also have an extra 1GB Swap file derived from the Pi's SD-card.
But the memory is far from full.

An old launch option was -dbcache=50 but I still had this issue, i'll try to play around with this value a bit more and see if it affects it at all. Thnx for the tip.


EDIT: Tried setting -dbcache=4 (which is minimum) but no difference. Still keeps downloading something at ~92 Mbit/s  Huh
3  Bitcoin / Bitcoin Technical Support / [Raspberry Pi][Full Node][NFS] bitcoind keeps eating bandwidth after its up on: May 27, 2017, 05:13:06 PM
Hello,

I have been fault-tracing something fishy that is going on when i run a node on my raspberry pi but I don't seem to get any further on my own.

The problem:
After the blocks have been indexed/verified etc. the bitcoind process keeps downloading something constantly at around ~92Mbit+/s. I have verified this both using vnstat, bwm-ng locally and on the NAS itself on that side using similar tools so I am 100% that the node is requesting some data constantly from the datadir while the service is up and running.

My setup:
Raspberry Pi 3 running 0.14.1 daemon mounts a NFS share from my NAS to store the data.
I've tested adapted launch options for the rpi such as -dbcache etc. but during the more detailed fault tracing I was just using:
$ bitcoind -datadir=/mnt/bitcoin -printtoconsole

I downloaded bitcoind to my desktop to try to recreate the problem but it works flawlessly there.
It had the exact same circumstances, same NFS share with the same data on it.
It verifies the blocks (a lot faster though since it's a relatively fast computer compared to the pi3) and then just sits there pulling almost no data from the NFS share at all (like it should). Verfied using vnstat, bwm-ng locally and on the NAS itself as before.

It doesn't seem to be an NFS issue, the mounts are mounted exactly the same on both machines during seperate testing.
Could the PI3 not be processing something fast enough that it needs to keep reading something from the datadir?

What could possibly be wrong here? Huh
I really want to run this full node (without constantly draining my NASes bandwidth)

EDIT: The console/outputfile(s) mentions nothing suspicious from what I can tell
4  Bitcoin / Armory / External node/blockchain rather than two copies? on: July 30, 2015, 08:14:57 PM
Hi. I saw an old post from 2013 touching the following problem but there was no concrete solution.

My question is this:

I run a bitcoind full node on a dedicated machine on my home network. I then run armory/bitcoind on my desktop machine.
Is there a way to have armory use my full node over the network rather than having a duplicate copy of the blockchain just wasting space?
5  Bitcoin / Armory / Re: Question about wallet formats on: April 06, 2015, 01:39:48 PM
EDIT: So if I get this straight the encrypted wallet version is basically the same as the normal wallet just that I manually created it using the program. So the "encrypt"-text is just there to clarify it?

Exactly.


EDIT2: Are my private keys safe should someone get a hold of the "normal" wallet file?

Yes, with the same caveats as most other wallets--
  • Weak passwords can be brute-forced (but Armory's KDF is one of the best among Bitcoin wallet software, so it takes longer/costs more to perform brute-force attacks).
  • Your privacy is lost / transaction history is viewable (this is true of most, but not all, wallets).
  • If your wallet file is stolen by malware, that same malware can probably wait for you to type in your password and then steal it as well.
  • If you lose your wallet file with its encrypted private keys and any single private key associated with that wallet, then all of the private keys in that wallet are compromised (can be computed). This is true of many deterministic wallets.

Another great answer, thanks! Just wanted to know if it was safe to send around fairly publicly (for backup intentions).
6  Bitcoin / Armory / Re: Question about wallet formats on: April 05, 2015, 09:17:02 PM
What is the difference between these two:
  • armory_xxxxxxxx_.wallet
  • armory_xxxxxxxx_encrypt.wallet

That one is encrypted is fairly clear but isn't the normal file "encrypted" as well? Does the first file really contain private keys in plain text?

The armory_xxxxxxxx_.wallet file is your "normal" wallet file; it's what's used by Armory. Its private keys are always encrypted by Armory.

The armory_xxxxxxxx_encrypt.wallet file is an private-key-encrypted "digital backup" file which you made at some time in the past; you probably simply forgot that you (manually) made this backup (check its last modified date, it will be whenever you created that backup). It is safe to move this file to another location if you like (or delete it... you did make a paper backup, right? Wink)

You can also make a completely unencrypted "digital backup" (by default it would be called armory_xxxxxxxx_decrypt.wallet); if you choose to do so, you'll get a strongly-worded warning about the dangers of making it unencrypted.

I think it's binary, or a binary map. Just as usable to someone who's motivated to take the BTC inside (i.e. just as much raw information as a plain text privkey)


The wallet format (the "1.0" format) is pretty well documented over here: https://bitcoinarmory.com/wallet-format/

The optional encryption (which is always used for normal wallet files and for encrypted digital backups) individually encrypts each 32-byte private key (and only the private keys). Each private key is encrypted with AES-256 in CBC mode with no padding, and a randomly generated IV (stored alongside each private key). The single encryption key is derived from the user's password with a custom KDF based on Colin Percival's ROMix function, except it uses SHA-512 as the mixing function instead of BlockMixSalsa20/8 as originally specified in Percival's scrypt paper (and it also has a few other tweaks compared to ROMix). The KDF uses 16 bytes of salt. (ROMix is the memory-hard part of scrypt.)

Great answer, thanks!

EDIT: So if I get this straight the encrypted wallet version is basically the same as the normal wallet just that I manually created it using the program. So the "encrypt"-text is just there to clarify it?
EDIT2: Are my private keys safe should someone get a hold of the "normal" wallet file?
7  Bitcoin / Armory / Question about wallet formats on: April 05, 2015, 05:02:38 PM
What is the difference between these two:
  • armory_xxxxxxxx_.wallet
  • armory_xxxxxxxx_encrypt.wallet

That one is encrypted is fairly clear but isn't the normal file "encrypted" as well? Does the first file really contain private keys in plain text?
8  Bitcoin / Bitcoin Technical Support / Re: 0 connections on: June 04, 2011, 06:01:21 AM
This problem happened to me too. Solved it by opening port 8333.
Then what happened was that I had another computer in the same network I wanted to open another wallet on.

And this computer just remained idle with 0 connections. And I didn't want to use UPnP.


How I solved it:
My network structure is as follows:

10.0.0.1 NAT
10.0.0.2 Computer 1 running bitcoin
10.0.0.3 Computer 2 running bitcoin

Forward port 8333 from NAT to 10.0.0.2 and connections get through.

On Computer 2 launch bitcoin with:   bitcoin -addnode 10.0.0.2  and it recieves blocks from the other computer.

If you want to add additional computers with bitcoin just launch them as well with -addnode 10.0.0.2

I use 10.0.0.X for ease, this might be 192.168.0.X or similar for you.


Hope this helped someone!
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!