Bitcoin Forum
December 07, 2016, 04:51:00 PM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Pages: « 1 ... 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 [538] 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 ... 744 »
  Print  
Author Topic: [1500 TH] p2pool: Decentralized, DoS-resistant, Hop-Proof pool  (Read 2032453 times)
-ck
Moderator
Legendary
*
Offline Offline

Activity: 2002


Ruu \o/


View Profile WWW
September 24, 2014, 10:49:59 PM
 #10741

Is there anyone mining here with an SP30 that wants to report how well they perform on p2pool please? Thanks.

I got the answer I needed on the spondoolies thread, thanks. It works fine.

Primary developer/maintainer for cgminer and ckpool/ckproxy.
Pooled mine at kano.is, solo mine at solo.ckpool.org
-ck
1481129460
Hero Member
*
Offline Offline

Posts: 1481129460

View Profile Personal Message (Offline)

Ignore
1481129460
Reply with quote  #2

1481129460
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481129460
Hero Member
*
Offline Offline

Posts: 1481129460

View Profile Personal Message (Offline)

Ignore
1481129460
Reply with quote  #2

1481129460
Report to moderator
1481129460
Hero Member
*
Offline Offline

Posts: 1481129460

View Profile Personal Message (Offline)

Ignore
1481129460
Reply with quote  #2

1481129460
Report to moderator
bryonp
Member
**
Offline Offline

Activity: 77


View Profile
September 25, 2014, 03:13:51 PM
 #10742

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

Cool Dude!!!!!
I guess I will never get one, just hung up my operation.... 4T and the income verses electric is not good.....

Hope you find more!!!!
ravin
Full Member
***
Offline Offline

Activity: 132


View Profile
September 26, 2014, 05:28:30 AM
 #10743

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

Sarcasm alert! :-)

windpath
Legendary
*
Offline Offline

Activity: 938


View Profile WWW
September 26, 2014, 01:33:20 PM
 #10744


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


norgan
Sr. Member
****
Offline Offline

Activity: 308

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
September 26, 2014, 01:42:31 PM
 #10745


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash
One advantage of running windows servers 😉

Apple has promised a security fix for Mac users soon.



Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1008


Mine at Jonny's Pool


View Profile WWW
September 26, 2014, 02:21:33 PM
 #10746


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
newbuntu
Member
**
Offline Offline

Activity: 61


View Profile
September 26, 2014, 08:11:11 PM
 #10747

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1008


Mine at Jonny's Pool


View Profile WWW
September 26, 2014, 09:19:16 PM
 #10748

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network.  It compares your orphans/deads to the network.  The lower your ratio of orphans/deads to the network's, the higher your efficiency.

If you want to see the code...

web.py:
Code:
global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind)
...
efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None

data.py:
Code:
def get_average_stale_prop(tracker, share_hash, lookbehind):
    stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None)
    return stales/(lookbehind + stales)

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
newbuntu
Member
**
Offline Offline

Activity: 61


View Profile
September 26, 2014, 09:52:34 PM
 #10749

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network.  It compares your orphans/deads to the network.  The lower your ratio of orphans/deads to the network's, the higher your efficiency.

If you want to see the code...

web.py:
Code:
global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind)
...
efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None

data.py:
Code:
def get_average_stale_prop(tracker, share_hash, lookbehind):
    stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None)
    return stales/(lookbehind + stales)
Thank you jonnybravo0311, that's exactly what I'm looking for.
simdude
Member
**
Offline Offline

Activity: 79


View Profile
September 27, 2014, 05:35:34 PM
 #10750

I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.
phillipsjk
Legendary
*
Offline Offline

Activity: 1008

Let the chips fall where they may.


View Profile WWW
September 27, 2014, 05:42:37 PM
 #10751

I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.

Do you have at least 2GB of RAM?

James' OpenPGP public key fingerprint: EB14 9E5B F80C 1F2D 3EBE  0A2F B3DE 81FF 7B9D 5160
Hunterbunter
Hero Member
*****
Offline Offline

Activity: 980


View Profile
September 28, 2014, 10:35:47 PM
 #10752


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal?

The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10
norgan
Sr. Member
****
Offline Offline

Activity: 308

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
September 28, 2014, 11:18:37 PM
 #10753

I just hit my biggest share to date I think: 169,159,254  Grin

Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
windpath
Legendary
*
Offline Offline

Activity: 938


View Profile WWW
September 29, 2014, 12:27:56 AM
 #10754


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal?

The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10

Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock...

(note the aftershock fix was integrated before I first posted this)

The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock).

Ongoing discussion here: https://news.ycombinator.com/item?id=8361574

If fixed after running
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
you should see
Code:
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
if still vulnerable you should see
Code:
vulnerable
this is a test

Aftershock has its own test:

Code:
env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo

If fixed you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
date
cat: echo: No such file or directory

If vulnerable you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
Fri Sep 26 09:20:00 UTC 2014

Hope this helps...

Hunterbunter
Hero Member
*****
Offline Offline

Activity: 980


View Profile
September 29, 2014, 06:41:12 AM
 #10755

Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock...

(note the aftershock fix was integrated before I first posted this)

The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock).

Ongoing discussion here: https://news.ycombinator.com/item?id=8361574

If fixed after running
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
you should see
Code:
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
if still vulnerable you should see
Code:
vulnerable
this is a test

Aftershock has its own test:

Code:
env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo

If fixed you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
date
cat: echo: No such file or directory

If vulnerable you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
Fri Sep 26 09:20:00 UTC 2014

Hope this helps...

Thanks for the info. It looks like my first two servers are fixed with aftershock. The third one is still vulnerable. It's a VPS while the other two are full dedicated...I wonder if that has anything to do with it. Might have a bad source or something that hasn't updated yet. bleh!
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1008


Mine at Jonny's Pool


View Profile WWW
September 29, 2014, 09:40:20 PM
 #10756

For anyone using some form of OSX, Apple just released the patch to the shell.  Here's the link for Mavericks: http://support.apple.com/kb/DL1769?viewlocale=en_US&locale=en_US

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
windpath
Legendary
*
Offline Offline

Activity: 938


View Profile WWW
September 29, 2014, 09:48:08 PM
 #10757

For anyone using some form of OSX, Apple just released the patch to the shell.  Here's the link for Mavericks: http://support.apple.com/kb/DL1769?viewlocale=en_US&locale=en_US

Thanks, confirmed working...

IYFTech
Hero Member
*****
Offline Offline

Activity: 686


WANTED: Active dev to fix & re-write p2pool in C


View Profile
October 01, 2014, 01:52:15 AM
 #10758

Anyone know if the XBTech Pacific 1250's work OK with p2pool?

Thanks.

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
-ck
Moderator
Legendary
*
Offline Offline

Activity: 2002


Ruu \o/


View Profile WWW
October 01, 2014, 02:31:44 AM
 #10759

I've set up a private pool solution for a reasonably large miner using a combination of p2pool and ckpool technology. You should all see a decent increase in the overall pool size over the next 24-48 hours.

Primary developer/maintainer for cgminer and ckpool/ckproxy.
Pooled mine at kano.is, solo mine at solo.ckpool.org
-ck
windpath
Legendary
*
Offline Offline

Activity: 938


View Profile WWW
October 01, 2014, 03:44:34 AM
 #10760

I've set up a private pool solution for a reasonably large miner using a combination of p2pool and ckpool technology. You should all see a decent increase in the overall pool size over the next 24-48 hours.

Very cool!

Any plans to release the p2pool+ckpool combined solution?

Pages: « 1 ... 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 [538] 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 ... 744 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!