Bitcoin Forum
May 07, 2024, 08:55:47 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 [537] 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 ... 814 »
  Print  
Author Topic: [1500 TH] p2pool: Decentralized, DoS-resistant, Hop-Proof pool  (Read 2591636 times)
newbuntu
Member
**
Offline Offline

Activity: 61
Merit: 10


View Profile
September 24, 2014, 03:02:45 PM
 #10721

Does anyone know of any good bitcoin p2pool scanners besides these two:
http://p2pool-nodes.info
http://p2pool.hostv.pl

Thanks!
http://p2pools.org/btc
1715072147
Hero Member
*
Offline Offline

Posts: 1715072147

View Profile Personal Message (Offline)

Ignore
1715072147
Reply with quote  #2

1715072147
Report to moderator
Even in the event that an attacker gains more than 50% of the network's computational power, only transactions sent by the attacker could be reversed or double-spent. The network would not be destroyed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715072147
Hero Member
*
Offline Offline

Posts: 1715072147

View Profile Personal Message (Offline)

Ignore
1715072147
Reply with quote  #2

1715072147
Report to moderator
1715072147
Hero Member
*
Offline Offline

Posts: 1715072147

View Profile Personal Message (Offline)

Ignore
1715072147
Reply with quote  #2

1715072147
Report to moderator
IYFTech
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


WANTED: Active dev to fix & re-write p2pool in C


View Profile
September 24, 2014, 09:11:07 PM
 #10722

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
windpath
Legendary
*
Offline Offline

Activity: 1258
Merit: 1027


View Profile WWW
September 24, 2014, 10:12:29 PM
 #10723

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

Cheers  Grin
-ck
Legendary
*
Offline Offline

Activity: 4102
Merit: 1632


Ruu \o/


View Profile WWW
September 24, 2014, 10:49:59 PM
Last edit: September 26, 2014, 01:13:59 AM by ckolivas
 #10724

Is there anyone mining here with an SP30 that wants to report how well they perform on p2pool please? Thanks.

I got the answer I needed on the spondoolies thread, thanks. It works fine.

Developer/maintainer for cgminer, ckpool/ckproxy, and the -ck kernel
2% Fee Solo mining at solo.ckpool.org
-ck
bryonp
Member
**
Offline Offline

Activity: 85
Merit: 10


View Profile
September 25, 2014, 03:13:51 PM
 #10725

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

Cool Dude!!!!!
I guess I will never get one, just hung up my operation.... 4T and the income verses electric is not good.....

Hope you find more!!!!
ravin
Full Member
***
Offline Offline

Activity: 132
Merit: 100


View Profile
September 26, 2014, 05:28:30 AM
 #10726

Well bugger me.  Just found my first ever block - only took me 18 months.........

That deserves a spliff.   Nice  Smiley

Sarcasm alert! :-)
windpath
Legendary
*
Offline Offline

Activity: 1258
Merit: 1027


View Profile WWW
September 26, 2014, 01:33:20 PM
 #10727


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.

norgan
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
September 26, 2014, 01:42:31 PM
 #10728


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash
One advantage of running windows servers 😉

Apple has promised a security fix for Mac users soon.



Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1344
Merit: 1023


Mine at Jonny's Pool


View Profile WWW
September 26, 2014, 02:21:33 PM
 #10729


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
newbuntu
Member
**
Offline Offline

Activity: 61
Merit: 10


View Profile
September 26, 2014, 08:11:11 PM
 #10730

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1344
Merit: 1023


Mine at Jonny's Pool


View Profile WWW
September 26, 2014, 09:19:16 PM
 #10731

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network.  It compares your orphans/deads to the network.  The lower your ratio of orphans/deads to the network's, the higher your efficiency.

If you want to see the code...

web.py:
Code:
global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind)
...
efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None

data.py:
Code:
def get_average_stale_prop(tracker, share_hash, lookbehind):
    stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None)
    return stales/(lookbehind + stales)

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
newbuntu
Member
**
Offline Offline

Activity: 61
Merit: 10


View Profile
September 26, 2014, 09:52:34 PM
 #10732

How high can the efficiency go?
On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming).
How is the efficiency deterermined / calculated? what are the criteria / factors?
Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network.  It compares your orphans/deads to the network.  The lower your ratio of orphans/deads to the network's, the higher your efficiency.

If you want to see the code...

web.py:
Code:
global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind)
...
efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None

data.py:
Code:
def get_average_stale_prop(tracker, share_hash, lookbehind):
    stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None)
    return stales/(lookbehind + stales)
Thank you jonnybravo0311, that's exactly what I'm looking for.
simdude
Member
**
Offline Offline

Activity: 97
Merit: 11


View Profile
September 27, 2014, 05:35:34 PM
 #10733

I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.
phillipsjk
Legendary
*
Offline Offline

Activity: 1008
Merit: 1001

Let the chips fall where they may.


View Profile WWW
September 27, 2014, 05:42:37 PM
 #10734

I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.

Do you have at least 2GB of RAM?

James' OpenPGP public key fingerprint: EB14 9E5B F80C 1F2D 3EBE  0A2F B3DE 81FF 7B9D 5160
Hunterbunter
Hero Member
*****
Offline Offline

Activity: 994
Merit: 1000


View Profile
September 28, 2014, 10:35:47 PM
 #10735


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal?

The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10
norgan
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
September 28, 2014, 11:18:37 PM
 #10736

I just hit my biggest share to date I think: 169,159,254  Grin

Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
windpath
Legendary
*
Offline Offline

Activity: 1258
Merit: 1027


View Profile WWW
September 29, 2014, 12:27:56 AM
 #10737


Shellshock, Aftershock & P2Pool

If you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server.

Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run:

Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"

If you see:

Quote
vulnerable
this is a test

You are vulnerable and should update bash immediately.

Linux users should run:

Code:
sudo apt-get update
sudo apt-get install bash

Apple has promised a security fix for Mac users soon.


Thanks for the heads up windpath!  Once you've installed the patched shell this is what you'll see:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post.  OSX 10.9.5 Mavericks is still vulnerable:
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
vulnerable
this is a test

I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal?

The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10

Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock...

(note the aftershock fix was integrated before I first posted this)

The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock).

Ongoing discussion here: https://news.ycombinator.com/item?id=8361574

If fixed after running
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
you should see
Code:
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
if still vulnerable you should see
Code:
vulnerable
this is a test

Aftershock has its own test:

Code:
env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo

If fixed you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
date
cat: echo: No such file or directory

If vulnerable you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
Fri Sep 26 09:20:00 UTC 2014

Hope this helps...
Hunterbunter
Hero Member
*****
Offline Offline

Activity: 994
Merit: 1000


View Profile
September 29, 2014, 06:41:12 AM
 #10738

Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock...

(note the aftershock fix was integrated before I first posted this)

The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock).

Ongoing discussion here: https://news.ycombinator.com/item?id=8361574

If fixed after running
Code:
env x='() { :;}; echo vulnerable' bash -c "echo this is a test"
you should see
Code:
bash: warning: x: ignoring function definition attempt
bash: error importing function definition for `x'
this is a test
if still vulnerable you should see
Code:
vulnerable
this is a test

Aftershock has its own test:

Code:
env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo

If fixed you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
date
cat: echo: No such file or directory

If vulnerable you will see:

Code:
bash: var: line 1: syntax error near unexpected token `='
bash: var: line 1: `'
bash: error importing function definition for `var'
Fri Sep 26 09:20:00 UTC 2014

Hope this helps...

Thanks for the info. It looks like my first two servers are fixed with aftershock. The third one is still vulnerable. It's a VPS while the other two are full dedicated...I wonder if that has anything to do with it. Might have a bad source or something that hasn't updated yet. bleh!
jonnybravo0311
Legendary
*
Offline Offline

Activity: 1344
Merit: 1023


Mine at Jonny's Pool


View Profile WWW
September 29, 2014, 09:40:20 PM
 #10739

For anyone using some form of OSX, Apple just released the patch to the shell.  Here's the link for Mavericks: http://support.apple.com/kb/DL1769?viewlocale=en_US&locale=en_US

Jonny's Pool - Mine with us and help us grow!  Support a pool that supports Bitcoin, not a hardware manufacturer's pockets!  No SPV cheats.  No empty blocks.
windpath
Legendary
*
Offline Offline

Activity: 1258
Merit: 1027


View Profile WWW
September 29, 2014, 09:48:08 PM
 #10740

For anyone using some form of OSX, Apple just released the patch to the shell.  Here's the link for Mavericks: http://support.apple.com/kb/DL1769?viewlocale=en_US&locale=en_US

Thanks, confirmed working...
Pages: « 1 ... 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 [537] 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 ... 814 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!