newbuntu
Member
Offline
Activity: 61
Merit: 10
|
|
September 24, 2014, 03:02:45 PM |
|
|
|
|
|
IYFTech
|
|
September 24, 2014, 09:11:07 PM |
|
Well bugger me. Just found my first ever block - only took me 18 months......... That deserves a spliff. Nice
|
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
September 24, 2014, 10:12:29 PM |
|
Well bugger me. Just found my first ever block - only took me 18 months......... That deserves a spliff. Nice Cheers
|
|
|
|
-ck
Legendary
Offline
Activity: 4284
Merit: 1645
Ruu \o/
|
|
September 24, 2014, 10:49:59 PM Last edit: September 26, 2014, 01:13:59 AM by ckolivas |
|
Is there anyone mining here with an SP30 that wants to report how well they perform on p2pool please? Thanks.
I got the answer I needed on the spondoolies thread, thanks. It works fine.
|
Developer/maintainer for cgminer, ckpool/ckproxy, and the -ck kernel 2% Fee Solo mining at solo.ckpool.org -ck
|
|
|
bryonp
Member
Offline
Activity: 85
Merit: 10
|
|
September 25, 2014, 03:13:51 PM |
|
Well bugger me. Just found my first ever block - only took me 18 months......... That deserves a spliff. Nice Cool Dude!!!!! I guess I will never get one, just hung up my operation.... 4T and the income verses electric is not good..... Hope you find more!!!!
|
|
|
|
ravin
|
|
September 26, 2014, 05:28:30 AM |
|
Well bugger me. Just found my first ever block - only took me 18 months......... That deserves a spliff. Nice Sarcasm alert! :-)
|
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
September 26, 2014, 01:33:20 PM |
|
Shellshock, Aftershock & P2PoolIf you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server. Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you see: vulnerable this is a test You are vulnerable and should update bash immediately. Linux users should run: sudo apt-get update sudo apt-get install bash Apple has promised a security fix for Mac users soon.
|
|
|
|
norgan
|
|
September 26, 2014, 01:42:31 PM |
|
Shellshock, Aftershock & P2PoolIf you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server. Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you see: vulnerable this is a test You are vulnerable and should update bash immediately. Linux users should run: sudo apt-get update sudo apt-get install bash One advantage of running windows servers 😉 Apple has promised a security fix for Mac users soon.
|
|
|
|
jonnybravo0311
Legendary
Offline
Activity: 1344
Merit: 1024
Mine at Jonny's Pool
|
|
September 26, 2014, 02:21:33 PM |
|
Shellshock, Aftershock & P2PoolIf you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server. Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you see: vulnerable this is a test You are vulnerable and should update bash immediately. Linux users should run: sudo apt-get update sudo apt-get install bash Apple has promised a security fix for Mac users soon. Thanks for the heads up windpath! Once you've installed the patched shell this is what you'll see: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post. OSX 10.9.5 Mavericks is still vulnerable: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test
|
Jonny's Pool - Mine with us and help us grow! Support a pool that supports Bitcoin, not a hardware manufacturer's pockets! No SPV cheats. No empty blocks.
|
|
|
newbuntu
Member
Offline
Activity: 61
Merit: 10
|
|
September 26, 2014, 08:11:11 PM |
|
How high can the efficiency go? On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming). How is the efficiency deterermined / calculated? what are the criteria / factors? Thanks.
|
|
|
|
jonnybravo0311
Legendary
Offline
Activity: 1344
Merit: 1024
Mine at Jonny's Pool
|
|
September 26, 2014, 09:19:16 PM |
|
How high can the efficiency go? On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming). How is the efficiency deterermined / calculated? what are the criteria / factors? Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network. It compares your orphans/deads to the network. The lower your ratio of orphans/deads to the network's, the higher your efficiency. If you want to see the code... web.py: global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind) ... efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None
data.py: def get_average_stale_prop(tracker, share_hash, lookbehind): stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None) return stales/(lookbehind + stales)
|
Jonny's Pool - Mine with us and help us grow! Support a pool that supports Bitcoin, not a hardware manufacturer's pockets! No SPV cheats. No empty blocks.
|
|
|
newbuntu
Member
Offline
Activity: 61
Merit: 10
|
|
September 26, 2014, 09:52:34 PM |
|
How high can the efficiency go? On my node I'm running around 107% right now with 20 peers (9 incoming) (plus my miners), but last night it hit 117.6% when I had 14 peers ( 6 incoming). How is the efficiency deterermined / calculated? what are the criteria / factors? Thanks.
Efficiency is a measure of how your node is doing compared to the rest of the network. It compares your orphans/deads to the network. The lower your ratio of orphans/deads to the network's, the higher your efficiency. If you want to see the code... web.py: global_stale_prop = p2pool_data.get_average_stale_prop(node.tracker, node.best_share_var.value, look behind) ... efficiency=(1 - (stale_orphan_shares+stale_doa_shares)/shares)/(1 - global_stale_prop) if shares else None
data.py: def get_average_stale_prop(tracker, share_hash, lookbehind): stales = sum(1 for share in tracker.get_chain(share_hash, lookbehind) if share.share_data['stale_info'] is not None) return stales/(lookbehind + stales)
Thank you jonnybravo0311, that's exactly what I'm looking for.
|
|
|
|
simdude
Member
Offline
Activity: 97
Merit: 11
|
|
September 27, 2014, 05:35:34 PM |
|
I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.
|
|
|
|
phillipsjk
Legendary
Offline
Activity: 1008
Merit: 1001
Let the chips fall where they may.
|
|
September 27, 2014, 05:42:37 PM |
|
I am having issues with my bitcoind not responding after a few hours running. I am trying to keep my p2pool node active. Just cant figure out what bitcoind is crashing.
Do you have at least 2GB of RAM?
|
James' OpenPGP public key fingerprint: EB14 9E5B F80C 1F2D 3EBE 0A2F B3DE 81FF 7B9D 5160
|
|
|
Hunterbunter
|
|
September 28, 2014, 10:35:47 PM |
|
Shellshock, Aftershock & P2PoolIf you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server. Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you see: vulnerable this is a test You are vulnerable and should update bash immediately. Linux users should run: sudo apt-get update sudo apt-get install bash Apple has promised a security fix for Mac users soon. Thanks for the heads up windpath! Once you've installed the patched shell this is what you'll see: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post. OSX 10.9.5 Mavericks is still vulnerable: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test
I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal? The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10
|
|
|
|
norgan
|
|
September 28, 2014, 11:18:37 PM |
|
I just hit my biggest share to date I think: 169,159,254
|
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
September 29, 2014, 12:27:56 AM |
|
Shellshock, Aftershock & P2PoolIf you have not heard, a new vulnerability called Shellshock — also called the "Bash Bug" — is affecting both Linux computers and Macs, and it has the potential to let attackers take control of your computer or server. Many P2Pool nodes run on Linux and Mac, to test your node open up a shell and run: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" If you see: vulnerable this is a test You are vulnerable and should update bash immediately. Linux users should run: sudo apt-get update sudo apt-get install bash Apple has promised a security fix for Mac users soon. Thanks for the heads up windpath! Once you've installed the patched shell this is what you'll see: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test
That's on Ubuntu 14.04LTS fully updated as of the time of writing this post. OSX 10.9.5 Mavericks is still vulnerable: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test
I have 3 servers, 2 only says "This is a test" with no warnings...is that also normal? The 3rd one says "vulnerable" and "this is a test". I've done an apt-get update/upgrade, and it claims its the newest version. Any idea why that wouldn't have worked on there? That one is Debian 6.0.10 Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock... (note the aftershock fix was integrated before I first posted this) The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock). Ongoing discussion here: https://news.ycombinator.com/item?id=8361574If fixed after running env x='() { :;}; echo vulnerable' bash -c "echo this is a test" you should see bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test if still vulnerable you should see Aftershock has its own test: env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo If fixed you will see: bash: var: line 1: syntax error near unexpected token `=' bash: var: line 1: `' bash: error importing function definition for `var' date cat: echo: No such file or directory If vulnerable you will see: bash: var: line 1: syntax error near unexpected token `=' bash: var: line 1: `' bash: error importing function definition for `var' Fri Sep 26 09:20:00 UTC 2014 Hope this helps...
|
|
|
|
Hunterbunter
|
|
September 29, 2014, 06:41:12 AM |
|
Hunter, I'm not 100% on this, but you may have fixed Shellshock, but still be vulnerable to Aftershock... (note the aftershock fix was integrated before I first posted this) The bash fix for CVE-2014-6271 (Shellshock) was incomplete and command injection is possible even after the patch has been applied. The issue is being tracked as CVE-2014-7169 (Aftershock). Ongoing discussion here: https://news.ycombinator.com/item?id=8361574If fixed after running env x='() { :;}; echo vulnerable' bash -c "echo this is a test" you should see bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' this is a test if still vulnerable you should see Aftershock has its own test: env var='() {(a)=>\' bash -c "echo date"; cat echo; rm -f echo If fixed you will see: bash: var: line 1: syntax error near unexpected token `=' bash: var: line 1: `' bash: error importing function definition for `var' date cat: echo: No such file or directory If vulnerable you will see: bash: var: line 1: syntax error near unexpected token `=' bash: var: line 1: `' bash: error importing function definition for `var' Fri Sep 26 09:20:00 UTC 2014 Hope this helps... Thanks for the info. It looks like my first two servers are fixed with aftershock. The third one is still vulnerable. It's a VPS while the other two are full dedicated...I wonder if that has anything to do with it. Might have a bad source or something that hasn't updated yet. bleh!
|
|
|
|
|
windpath
Legendary
Offline
Activity: 1258
Merit: 1027
|
|
September 29, 2014, 09:48:08 PM |
|
Thanks, confirmed working...
|
|
|
|
|