Bitcoin Forum
December 14, 2024, 04:37:38 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: dgs  (Read 1388 times)
Anonymous
Guest

June 02, 2011, 11:31:52 PM
Last edit: September 11, 2011, 04:03:44 PM by davidonpda
 #1

asdg
njloof
Member
**
Offline Offline

Activity: 73
Merit: 10


View Profile
June 02, 2011, 11:33:34 PM
 #2

Sure, go for it. Setting up mining pools is the new mining.
Soros Shorts
Donator
Legendary
*
Offline Offline

Activity: 1617
Merit: 1012



View Profile
June 03, 2011, 12:21:16 AM
 #3

If you want it to be an invite-only pool, consider allowing only access via SSH tunnels. Each indidual user account also authenticates the SSH tunnel.

It would reduce the possibility of DDOS attacks significantly. Further, because you know which user account authenticated each tunnel if garbage traffic starts coming in from any one tunnel you would know who is responsible and deauthorize that user.

The SSH server is still susceptible to DDOS but you can easily put it on a separate box/datacenter from your pool server, e.g. on an small Amazon EC2 cloud instance which could be scaled up to multiple instances during a DDOS attack. That way your pool server is protected and nobody has to know where it is physically located.
Soros Shorts
Donator
Legendary
*
Offline Offline

Activity: 1617
Merit: 1012



View Profile
June 03, 2011, 01:09:51 AM
 #4

If apache isn't even running on the pool server, is push pool still attack able if say I block all ICMP requests?
Depends on your configuration. If you set up pushpool to listen on a publicly accessible IP/port then it can still be directly attacked by people who know the IP address and port. They might, for example, send a flood of tcp connects that just linger until you run out of available connections for valid miners. This doesn't attack require ICMP.
Genrobo
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
June 03, 2011, 01:18:35 AM
 #5

Someone needs to come up with a server script that, when multiple connections are incoming...
The first connection is answered in X time.
The next connection within Y seconds from the first connection is answered in X + (Y-1) seconds.
So if there's an instant connect attempt, the next one will take at least Y seconds to be answered/accepted.

In instances of a DDOS attempt of multiple logins, this would help mitigate the issue greatly.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!