Bitcoin Forum
December 15, 2024, 08:40:03 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 [154] 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 1154 »
  Print  
Author Topic: [4+ EH] Slush Pool (slushpool.com); Overt AsicBoost; World First Mining Pool  (Read 4382727 times)
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
June 23, 2011, 01:43:45 AM
 #3061

I found that at least one attacker compromised over 100 accounts, which is insane; it means that so many people had same login/password for both sites (pool, mtgox) and they even didn't changed password after strong recommendation in mtgox mass email.

I removed this wallet (http://blockexplorer.com/address/13F4yQfbzA6h2xiyqKVmhGr95zo5DGkK5R) from all pool accounts and thanks to email confirmations of wallet change, those attacks are over. Fortunately only 4.39 BTC was lost in total...

If you find that your wallet on pool profile is "Enter your address here", it means that your account was compromised and I removed attacker's wallet from your profile.

SchizophrenicX
Member
**
Offline Offline

Activity: 112
Merit: 100

"I'm not psychic; I'm just damn good"


View Profile
June 23, 2011, 04:01:00 PM
 #3062

Hi Slush,

I posted before the recent D jump to 877k, unfortunately soon after there was the attack on ur pool and I know you were really busy getting it up again. Now I'd like to bring my concern up again. I've not really arrived at an average that is close to my expected rate of BTC before and I have not now.

My expected at current difficulty is ~3.7 BTC/day and with 2% stales it's still ~3.6 BTC/day. I'm seeing 2.7ish and a 7-day average of 2.45ish. This is much similar to my previous post % of around 30% difference between my 7-day average and my expected returns. I've been busy to change my script to test out other pools and I'd like to ask for some sort of justification.

Judging from what I hear from others, they are getting pretty close to the expected value thus I'm feeling like there is some kind of fault on my end, however I'm not seeing it. Your previous reply indicated there might be some problems with my miners. I've stayed with them and I'm seeing no issues, just for info I'm running

Ubuntu 11.04
Phoenix 1.5 w/ phatk @ VECTORS BFI_INT WORKSIZE=256 AGGRESSION=13
CCC 11.5 + SDK 2.1
AMDOverdriveCtrl 1.2.0
2x5970 ~750 Mhash/s ea. (OC @ 850/300 FS: 100% ~ 75 celcius)
5x5850 ~355 Mhash/s ea. (OC @ 900/250 FS: 100% ~ 65 celcius)

Stales at around 2.3% average.

These are on 2 dedicated machines, I've got problems running my other 5850 and 4850 since my 3 year'o 600 W PSU blew but still. Please advice. TIA



finnthecelt
Full Member
***
Offline Offline

Activity: 140
Merit: 101


View Profile
June 23, 2011, 04:19:54 PM
 #3063

Hi Slush,

I posted before the recent D jump to 877k, unfortunately soon after there was the attack on ur pool and I know you were really busy getting it up again. Now I'd like to bring my concern up again. I've not really arrived at an average that is close to my expected rate of BTC before and I have not now.

My expected at current difficulty is ~3.7 BTC/day and with 2% stales it's still ~3.6 BTC/day. I'm seeing 2.7ish and a 7-day average of 2.45ish. This is much similar to my previous post % of around 30% difference between my 7-day average and my expected returns. I've been busy to change my script to test out other pools and I'd like to ask for some sort of justification.

Judging from what I hear from others, they are getting pretty close to the expected value thus I'm feeling like there is some kind of fault on my end, however I'm not seeing it. Your previous reply indicated there might be some problems with my miners. I've stayed with them and I'm seeing no issues, just for info I'm running

Ubuntu 11.04
Phoenix 1.5 w/ phatk @ VECTORS BFI_INT WORKSIZE=256 AGGRESSION=13
CCC 11.5 + SDK 2.1
AMDOverdriveCtrl 1.2.0
2x5970 ~750 Mhash/s ea. (OC @ 850/300 FS: 100% ~ 75 celcius)
5x5850 ~355 Mhash/s ea. (OC @ 900/250 FS: 100% ~ 65 celcius)

Stales at around 2.3% average.

These are on 2 dedicated machines, I've got problems running my other 5850 and 4850 since my 3 year'o 600 W PSU blew but still. Please advice. TIA




Are you saying that you are expecting 3.7 and only getting 3.6 and you are concerned about this? Please tell me you're not serious. Am I missing something?
pokermon919
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
June 23, 2011, 04:34:42 PM
 #3064

he is seeing 2.7ish, don't you read what you quote?



To Slush: Please enable a address lock, this will give ppl time to fix things when shit hits the fan for them. At least the thief can't steal unless the user is away for more than 24hours. PLEASE ENABLE THIS. It will make your pool more secure and I know alot of ppl LOVE BTCGuild because they have this safety feature.
super6
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
June 23, 2011, 04:48:53 PM
 #3065

My empty Mt. Gox account used the same password as my nearly empty BPM mining account. Just before 7AM EDT today someone tried to change my wallet address to:
1GM5hnKBFm2nJB4KLsFPrh55EKNwQjog4W
If you look at this address on block explorer you'll see that it started receiving coins today and has mostly gotten small amounts, presumably from doing what he tried to do to me (but failed at, because my email address has a different PW so he couldn't confirm the change).
I suggest you blacklist this wallet address from receiving coins from BPM and alert those accounts who were switched to it.
superweb
Newbie
*
Offline Offline

Activity: 36
Merit: 0


View Profile
June 23, 2011, 06:51:41 PM
 #3066

I suggest you blacklist this wallet address from receiving coins from BPM and alert those accounts who were switched to it.

It takes one second to create another one..this is no sollution. I just don't understand why the attacker does not use several(let say 50) different adresses to be less traceable.
finnthecelt
Full Member
***
Offline Offline

Activity: 140
Merit: 101


View Profile
June 23, 2011, 06:55:37 PM
 #3067

I suggest you blacklist this wallet address from receiving coins from BPM and alert those accounts who were switched to it.

It takes one second to create another one..this is no sollution. I just don't understand why the attacker does not use several(let say 50) different adresses to be less traceable.

Maybe because there not all that sophisticated. It's just THAT easy to get into some people's accounts....
super6
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
June 23, 2011, 07:53:29 PM
 #3068

I suggest you blacklist this wallet address from receiving coins from BPM and alert those accounts who were switched to it.

It takes one second to create another one..this is no sollution. I just don't understand why the attacker does not use several(let say 50) different adresses to be less traceable.

I don't think this would stop him but I'm assuming there are a lot of account that have pending wallet transfers. I think it'd be smart to go ahead and revert any pending wallet transfer to that address in the event someone unwittingly confirms it. I think it'd be wise to roll out mandatory password changes, too, or at least send out an advisory email. I didn't change mine because I switched to a different pool and didn't think about it (plus I had only a very small fractional balance left at BPM). Last time I looked at the address on block explorer it didn't look like he'd snagged any big sums of BTC so it could be the case that the only account with weak passwords were idle accounts but better safe than sorry.
pokermon919
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
June 23, 2011, 07:54:54 PM
 #3069

This is exactly why we need a payout address lock. Just so if something fishy happens, your coins won't move out for at least 24hours.
Vwlopez3
Member
**
Offline Offline

Activity: 78
Merit: 10


View Profile
June 23, 2011, 07:55:26 PM
 #3070

Slush-
So do wallet changes automatically need email conformation or how do we set that up? I thought you said you already added this feature.
super6
Newbie
*
Offline Offline

Activity: 28
Merit: 0


View Profile
June 23, 2011, 09:52:45 PM
 #3071

Slush-
So do wallet changes automatically need email conformation or how do we set that up? I thought you said you already added this feature.

I never remember opting in but I got email confirmation and, because my email didn't use the same PW as Mt Gox/BPM they weren't able to confirm it. I suspect it automatically requires email confirmation. If you were unlucky enough to use your BPM/Gox password for your email, too, though, then you'd be out of luck.
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
June 23, 2011, 11:31:54 PM
 #3072

This is exactly why we need a payout address lock. Just so if something fishy happens, your coins won't move out for at least 24hours.

Why we need 'lock'? I don't see any advantage in that. Email confirmation isn't enough? Afaik it works very well for pool users.

Some users has changed wallet, because attacker entered their account before I released email confirmation. But I detected many intrusions and cancelled attacker address on those accounts. But of course everybody have to check his account if wallet is correct.

As far as I can say, pool accounts are now safe, even if attacker know login/password for them.

sharky112065
Sr. Member
****
Offline Offline

Activity: 383
Merit: 250



View Profile
June 24, 2011, 01:15:17 AM
 #3073

This is exactly why we need a payout address lock. Just so if something fishy happens, your coins won't move out for at least 24hours.

Why we need 'lock'? I don't see any advantage in that. Email confirmation isn't enough? Afaik it works very well for pool users.

Some users has changed wallet, because attacker entered their account before I released email confirmation. But I detected many intrusions and cancelled attacker address on those accounts. But of course everybody have to check his account if wallet is correct.

As far as I can say, pool accounts are now safe, even if attacker know login/password for them.

Because if their email is also compromised it gives them time to fix it before a payout can be made.

Donations welcome: 12KaKtrK52iQjPdtsJq7fJ7smC32tXWbWr
marvinmartian
Full Member
***
Offline Offline

Activity: 224
Merit: 100



View Profile
June 24, 2011, 01:49:34 AM
 #3074

I tried the day after it went into effect.  All I got was the "ERROR:  Can't connect to Bitcoin:  Bitcoin returned unparsable JSON" message.

I'm trying to connect as follows:

--url http://me.something:pass@api.mining.cz:8332

what am I missing?

Thanks.

"... and the geeks shall inherit the earth."
marvinmartian
Full Member
***
Offline Offline

Activity: 224
Merit: 100



View Profile
June 24, 2011, 03:32:59 AM
 #3075

I tried the day after it went into effect.  All I got was the "ERROR:  Can't connect to Bitcoin:  Bitcoin returned unparsable JSON" message.

I'm trying to connect as follows:

--url http://me.something:pass@api.mining.cz:8332

what am I missing?

Thanks.

Of course, I should be pointing to api.bitcoin.cz ... still can't connect.  Have deleted and re-entered my IP into the whitelist several times.

"... and the geeks shall inherit the earth."
CanaryInTheMine
Donator
Legendary
*
Offline Offline

Activity: 2352
Merit: 1060


between a rock and a block!


View Profile
June 24, 2011, 03:51:09 AM
 #3076

I tried the day after it went into effect.  All I got was the "ERROR:  Can't connect to Bitcoin:  Bitcoin returned unparsable JSON" message.

I'm trying to connect as follows:

--url http://me.something:pass@api.mining.cz:8332

what am I missing?

Thanks.

Of course, I should be pointing to api.bitcoin.cz ... still can't connect.  Have deleted and re-entered my IP into the whitelist several times.

try "telnet api.bitcoin.cz 8332" from a command prompt. if you timeout and don't connect, it ain't your mining software and setup causing you issues.  you will then have to look to your network as the source of the problem.  if you do connect, then something isn't right with the mining client...  give it a try...
marvinmartian
Full Member
***
Offline Offline

Activity: 224
Merit: 100



View Profile
June 24, 2011, 04:25:32 AM
 #3077

I tried the day after it went into effect.  All I got was the "ERROR:  Can't connect to Bitcoin:  Bitcoin returned unparsable JSON" message.

I'm trying to connect as follows:

--url http://me.something:pass@api.mining.cz:8332

what am I missing?

Thanks.

Of course, I should be pointing to api.bitcoin.cz ... still can't connect.  Have deleted and re-entered my IP into the whitelist several times.

try "telnet api.bitcoin.cz 8332" from a command prompt. if you timeout and don't connect, it ain't your mining software and setup causing you issues.  you will then have to look to your network as the source of the problem.  if you do connect, then something isn't right with the mining client...  give it a try...

Ah, ok ... right.  It attempts to connect.  So my machines can see the server.  For whatever reason, DiabloMiner is not connecting properly.  ;-(

"... and the geeks shall inherit the earth."
CanaryInTheMine
Donator
Legendary
*
Offline Offline

Activity: 2352
Merit: 1060


between a rock and a block!


View Profile
June 24, 2011, 04:36:08 AM
 #3078

I tried the day after it went into effect.  All I got was the "ERROR:  Can't connect to Bitcoin:  Bitcoin returned unparsable JSON" message.

I'm trying to connect as follows:

--url http://me.something:pass@api.mining.cz:8332

what am I missing?

Thanks.

Of course, I should be pointing to api.bitcoin.cz ... still can't connect.  Have deleted and re-entered my IP into the whitelist several times.

try "telnet api.bitcoin.cz 8332" from a command prompt. if you timeout and don't connect, it ain't your mining software and setup causing you issues.  you will then have to look to your network as the source of the problem.  if you do connect, then something isn't right with the mining client...  give it a try...

Ah, ok ... right.  It attempts to connect.  So my machines can see the server.  For whatever reason, DiabloMiner is not connecting properly.  ;-(

Can you confirm that it actually connects using telnet?  If it only says attempting to connect then you are not connecting.  If telnet connects, most likely you will see a blank window with a blinking cursor in top left (on windows).  If it tells you that it's attempting to connect and eventually times out like this:

C:\>telnet blah.blah 8332
Connecting To blah.blah...Could not open connection to the host, on port 8332: Connect failed
C:\>

then it's not your mining client...
pdki
Newbie
*
Offline Offline

Activity: 27
Merit: 0


View Profile
June 24, 2011, 11:04:54 AM
 #3079

Hi,

I have a question. I am a small miner (1x5870) and was wondering if bigger miners, that happen to solve a full bitcoin block from time to time for the pool are able to cheat in the following way:
  • normally submit shares to the pool
  • in case the share solution is also a solution for the full blockchain block, disconnect from the pool and submit the solution just using their own bitcoin client

This way the miner could double its income by getting paid for useless shares by the pool and cashing in the 50BTC for the full solution for themselves from time to time. Are there any safeguards against this type of cheating in place?

This is NOT something I want to do! Would not make sense with a single 5870 anyway. Just want to be sure others cannot do this.
sharky112065
Sr. Member
****
Offline Offline

Activity: 383
Merit: 250



View Profile
June 24, 2011, 11:25:02 AM
Last edit: June 24, 2011, 11:44:24 AM by sharky112065
 #3080

Slush, This looks a little hinkey to me. Any idea why the two blocks are so low on payout for the ones I marked with "**"?
#   Block found   Duration   Total shares    Your reward    Block #   Validity   Cluster GHash/S   Your MHash/S

5995    2011-06-24 03:57:24    0:08:32    233715    0.08002712    133047    95 left    2013.97   3223.44
5994    2011-06-24 03:48:52    0:03:31    91624      0.08548592     133045     93 left     1915.85    3275.57
5993    2011-06-24 03:45:21    0:15:37    426907    0.07600799    133043    91 left    2010.15   3055.75
5992    2011-06-24 03:29:44    0:05:02    134393    none            133040      88 left                                    **
5991    2011-06-24 03:24:42    0:27:33    754159    0.02456564    133038    86 left    2012.92   988.97   **
5990    2011-06-24 02:57:09    0:33:19    917871    0.07541716    133033    81 left    2025.84   3055.66
5989    2011-06-24 02:23:50    0:07:10    189786    0.08329346    133028    76 left    1947.29   3243.93
5988    2011-06-24 02:16:40    1:14:23    2046477    0.07619624    133025    73 left    2023.09   3083.04
5987    2011-06-24 01:02:17    1:16:12    2101315    0.07161271    133016    64 left    2027.78   2904.29
5986    2011-06-23 23:46:05    0:30:22    823815    0.06638683    133010    58 left    1994.88   2648.68
5985    2011-06-23 23:15:43    0:34:41    934902    0.07003427    133006    54 left    1982.12   2776.32
5984    2011-06-23 22:41:03    0:22:22    585530    0.07118223    133001    49 left    1925.01   2740.52

This has not happened to me before.

On the 2nd one Cluster GHash/s is blank as well.


Donations welcome: 12KaKtrK52iQjPdtsJq7fJ7smC32tXWbWr
Pages: « 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 [154] 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 ... 1154 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!