Bitcoin Forum
December 07, 2016, 10:52:24 AM *
News: To be able to use the next phase of the beta forum software, please ensure that your email address is correct/functional.
 
   Home   Help Search Donate Login Register  
Poll
Question: What type of pool payouts do you prefer?
Bitcoins - 3160 (80.5%)
Bank transfer / USD - 407 (10.4%)
Gold/silver coins and bars - 359 (9.1%)
Total Voters: 3924

Pages: « 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 [202] 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 ... 1105 »
  Print  
Author Topic: [40+ PH] SlushPool (slushpool.com); World's First Mining Pool  (Read 3928793 times)
cablepair
Hero Member
*****
Offline Offline

Activity: 854


https://btc-republic.com/index.php?ref=cablepair


View Profile WWW
October 20, 2011, 01:44:51 AM
 #4021

a) to the person that coined the Bitcoin term "asspenny" I hate you.

b) It's ridiculous to think one pool owner is responsible for all of these attacks

c) Slush, I love you man. You were the first pool I ever mined on way back when dont give up brother!

d) I honestly think that these denial of service attacks are coming from people that hate Bitcoin and consider this to be an opportune time to destroy it, the values are so low they think they can make wipe us out completely by doing this. I do not believe its an angry botnet owner who's only motivation is revenge, as a psychologist this does not make since to me, someone who owns a Bitcoin mining botnet is motivated by money and he is losing money like everyone else right now. Also the person that is holding down all these pools has tremendous bandwidth at his disposal. It's almost as if this is a sponsored attack by someone that has some serious (legit?) FIRE POWER. If it were a hacker -  This kind of attack would require a great deal of rooted *nix boxes to accomplish this.

1481107944
Hero Member
*
Offline Offline

Posts: 1481107944

View Profile Personal Message (Offline)

Ignore
1481107944
Reply with quote  #2

1481107944
Report to moderator
1481107944
Hero Member
*
Offline Offline

Posts: 1481107944

View Profile Personal Message (Offline)

Ignore
1481107944
Reply with quote  #2

1481107944
Report to moderator
1481107944
Hero Member
*
Offline Offline

Posts: 1481107944

View Profile Personal Message (Offline)

Ignore
1481107944
Reply with quote  #2

1481107944
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1481107944
Hero Member
*
Offline Offline

Posts: 1481107944

View Profile Personal Message (Offline)

Ignore
1481107944
Reply with quote  #2

1481107944
Report to moderator
1481107944
Hero Member
*
Offline Offline

Posts: 1481107944

View Profile Personal Message (Offline)

Ignore
1481107944
Reply with quote  #2

1481107944
Report to moderator
cbeast
Donator
Legendary
*
Offline Offline

Activity: 1722

Let's talk governance, lipstick, and pigs.


View Profile
October 20, 2011, 01:54:37 AM
 #4022

a) to the person that coined the Bitcoin term "asspenny" I hate you.

b) It's ridiculous to think one pool owner is responsible for all of these attacks

c) Slush, I love you man. You were the first pool I ever mined on way back when dont give up brother!

d) I honestly think that these denial of service attacks are coming from people that hate Bitcoin and consider this to be an opportune time to destroy it, the values are so low they think they can make wipe us out completely by doing this. I do not believe its an angry botnet owner who's only motivation is revenge, as a psychologist this does not make since to me, someone who owns a Bitcoin mining botnet is motivated by money and he is losing money like everyone else right now. Also the person that is holding down all these pools has tremendous bandwidth at his disposal. It's almost as if this is a sponsored attack by someone that has some serious (legit?) FIRE POWER. If it were a hacker -  This kind of attack would require a great deal of rooted *nix boxes to accomplish this.



a - agreed
b - I concur
c - amen brother
d - I'd like to see a discussion of the magnitude of this attack.

Any significantly advanced cryptocurrency is indistinguishable from Ponzi Tulips.
tinman951
Full Member
***
Offline Offline

Activity: 149


View Profile
October 20, 2011, 01:58:46 AM
 #4023


d) I honestly think that these denial of service attacks are coming from people that hate Bitcoin and consider this to be an opportune time to destroy it, the values are so low they think they can make wipe us out completely by doing this. I do not believe its an angry botnet owner who's only motivation is revenge, as a psychologist this does not make since to me, someone who owns a Bitcoin mining botnet is motivated by money and he is losing money like everyone else right now. Also the person that is holding down all these pools has tremendous bandwidth at his disposal. It's almost as if this is a sponsored attack by someone that has some serious (legit?) FIRE POWER. If it were a hacker -  This kind of attack would require a great deal of rooted *nix boxes to accomplish this.


What if it is the banking industry backed by the US government?  While I don't really wonder about this it would be the people who hate bitcoin the most.

Free micro bitcoins: http://www.bitvisitor.com/?ref=1DFw1VncjVhqdg6GWoQ6Qtc5ncR5RHXxfP
Donate BTC: 18b94MMTWd7bWaUWcq7VHmizgswP2dK6fM
Keninishna
Hero Member
*****
Offline Offline

Activity: 551



View Profile WWW
October 20, 2011, 02:29:56 AM
 #4024

Haters gonna hate.
sharky112065
Sr. Member
****
Offline Offline

Activity: 383



View Profile
October 20, 2011, 03:05:56 AM
 #4025

I have very strong evidence that btcguild.com is somehow related to those DDoS attacks to my pool and deepbit. I'll write later.

For now pool is down and won't be up today. I'm really sorry for downtime, but today it is more serious than before. However I'm solving it, as usually.

I'm pretty sure an apology will or at least should be coming from you soon.

I understand your frustration but finger pointing without posting strong evidence is just wrong.

Donations welcome: 12KaKtrK52iQjPdtsJq7fJ7smC32tXWbWr
c_k
Donator
Sr. Member
*
Offline Offline

Activity: 242



View Profile
October 20, 2011, 04:27:23 AM
 #4026

Since tomorrow I'll try harder to find any server provider which at least don't shut down pool infrastructure on first DDoS attack, but I cannot promise that I'll succeed. There's no point in running a service which is every week for one day offline thanks to attacks.

Have a look at the hosting offered by both awknet ( http://www.awknet.com/ ) and blacklotus ( http://www.blacklotus.net/ )

sd
Hero Member
*****
Offline Offline

Activity: 730



View Profile
October 20, 2011, 04:51:30 AM
 #4027


There are three ways I know of to beat a DDOS:

1. Buy a bigger pipe - not viable.

2. Change IP so often they can't keep up - maybe viable, likely not.

3. Peer to peer infrastructure so they have no target - should work.
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
October 20, 2011, 04:55:08 AM
 #4028

Since tomorrow I'll try harder to find any server provider which at least don't shut down pool infrastructure on first DDoS attack, but I cannot promise that I'll succeed. There's no point in running a service which is every week for one day offline thanks to attacks.

Have a look at the hosting offered by both awknet ( http://www.awknet.com/ ) and blacklotus ( http://www.blacklotus.net/ )

There's an issue with Awknet (I used them).  Their DDoS protection is okay, but the problem is their filtering kicks in based on high volume packet situations.  BTC Guild started at Awknet, and we had to request they turn the DDoS filters off back when we were much smaller because if the pool went down for even a few minutes, the PPS rates due to miner reconnect spam would kick in the DDoS filter, making the server practically impossible to connect to.  I'm sure it would work fine for some traditional DDoS tactics, but all the DDoSer has to do is spam connections to port 8332 as if it were a bunch of miners.  There is no easy way to decipher what traffic should come through and what shouldn't in that situation.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
sd
Hero Member
*****
Offline Offline

Activity: 730



View Profile
October 20, 2011, 05:01:41 AM
 #4029

What if it is the banking industry backed by the US government?  While I don't really wonder about this it would be the people who hate bitcoin the most.

That's ludicrous and I'll tell you why. If the banking industry and/or the US government wanted to take down BitCoin pools they would buy time on all the big botnets and we would be seeing a much bigger attack for an extended period. They would hit us so hard we would have no pools left.

This looks more like the hit them hard for a short period attack botnet herders use to extract protection money from on-line casinos.

finway
Hero Member
*****
Offline Offline

Activity: 714


View Profile
October 20, 2011, 05:10:53 AM
 #4030

WTF!  Cry

c_k
Donator
Sr. Member
*
Offline Offline

Activity: 242



View Profile
October 20, 2011, 05:18:55 AM
 #4031

https://twitter.com/slushcz/status/126850058195976193

Sad to see, hosting at blacklotus could probably have handled the problems

[Tycho]
Hero Member
*****
Offline Offline

Activity: 742



View Profile WWW
October 20, 2011, 05:59:11 AM
 #4032

Sad to see, hosting at blacklotus could probably have handled the problems
Well, may be after some REALLY deep tuning.
I already tried them and it was somewhat not suiting my needs.

Welcome to my bitcoin mining pool: https://deepbit.net - Both payment schemes (including PPS), instant payout, no invalid blocks !
ICBIT Trading platform : USD/BTC futures trading, Bitcoin difficulty futures (NEW!). Third year in bitcoin business.
fabrizziop
Hero Member
*****
Offline Offline

Activity: 602



View Profile
October 20, 2011, 11:38:46 AM
 #4033

It's sad you got DDOS'd but, are you keeping the coins of your pool(my coins, his coins, etc) or you will distribute them and close?
cosurgi
Sr. Member
****
Offline Offline

Activity: 298


View Profile
October 20, 2011, 11:54:25 AM
 #4034

Technical note: Because the downtime of mining.bitcoin.cz will be probably more significant than anytime before, I'll wait until all mined blocks will be matured and then will send all balances of users to their wallets. Don't worry, I'm not running away with your hardly mined coins!

Graet
VIP
Legendary
*
Offline Offline

Activity: 980



View Profile WWW
October 20, 2011, 11:55:19 AM
 #4035

It's sad you got DDOS'd but, are you keeping the coins of your pool(my coins, his coins, etc) or you will distribute them and close?
https://bitcointalk.org/index.php?topic=1976.msg584181#msg584181
would say neither

| Ozcoin Pooled Mining Pty Ltd https://ozcoin.net Double Geometric Reward System https://lc.ozcoin.net for Litecoin mining DGM| https://crowncloud.net VPS and Dedicated Servers for the BTC community
sadpandatech
Hero Member
*****
Offline Offline

Activity: 504



View Profile
October 20, 2011, 12:50:05 PM
 #4036

Since tomorrow I'll try harder to find any server provider which at least don't shut down pool infrastructure on first DDoS attack, but I cannot promise that I'll succeed. There's no point in running a service which is every week for one day offline thanks to attacks.

Have a look at the hosting offered by both awknet ( http://www.awknet.com/ ) and blacklotus ( http://www.blacklotus.net/ )
There is no easy way to decipher what traffic should come through and what shouldn't in that situation.

   Which means they suck. Because they could certainly filter at the packet level if they offered that type of service.  Sadly, most that offer such custom filtering are often quite expensive.. :/

If you're not excited by the idea of being an early adopter 'now', then you should come back in three or four years and either tell us "Told you it'd never work!" or join what should, by then, be a much more stable and easier-to-use system. - GA
It is being worked on by smart people. -DamienBlack
eleuthria
Legendary
*
Offline Offline

Activity: 1750


BTC Guild Owner


View Profile WWW
October 20, 2011, 01:36:06 PM
 #4037

Since tomorrow I'll try harder to find any server provider which at least don't shut down pool infrastructure on first DDoS attack, but I cannot promise that I'll succeed. There's no point in running a service which is every week for one day offline thanks to attacks.

Have a look at the hosting offered by both awknet ( http://www.awknet.com/ ) and blacklotus ( http://www.blacklotus.net/ )
There is no easy way to decipher what traffic should come through and what shouldn't in that situation.

   Which means they suck. Because they could certainly filter at the packet level if they offered that type of service.  Sadly, most that offer such custom filtering are often quite expensive.. :/

The problem is that the way many miners work is very similar to a DDoS if they're targetting your mining port while the server is unresponsive.  It's amazing how many people still use old miners that will reconnect with almost no delay, making it effectively a mini DDoS client when the pool is being attacked and having stability issues.

R.I.P. BTC Guild, 2011 - 2015.
BTC Guild Forum Thread
FoxMURDER
Jr. Member
*
Offline Offline

Activity: 49


View Profile
October 20, 2011, 01:53:41 PM
 #4038

The problem is that the way many miners work is very similar to a DDoS if they're targetting your mining port while the server is unresponsive.  It's amazing how many people still use old miners that will reconnect with almost no delay, making it effectively a mini DDoS client when the pool is being attacked and having stability issues.
well, solution to this part is quite easy ... upgrade or get banned ...
I'd even suggest to setup some kind of miner "RFC" saying how many connects per second is still ok. If enough pool admins agree on this and enforce it right away, ppl will force programmers to fix broken miners and users to update.

My guess about the "easiest" solution to this kind of ddos includes linking pool with the DDoS mitigation appliance.

If there was at least one share accepted in last 5 minutes, and accept/reject ratio is higher than 50%, don't screen it.
else screen it for ddos and allow at most 5 connects/minute or 50/10 minutes ... or whatever the RFC says (+10%) ... and of course somehow cache these rules and make a provision for adding manual exceptions to these rules (lot of miners behind nat - those can be solved using proxy though)...

Too bad ISPs/hosters probably won't let you do that and i guess pools aren't making enough at the moment, to buy their own ...


And btw. as the speculation about US banks ddosing pools goes, it might as well be some random joe like you playing with his botnet ... he doesen't need fat pipe, he doesen't need money, all he needs is some programming skill to build the bot ... and if there are botnets mining using infected hardware ... how hard could it be to have these bots updatable ... and once updatable, how hard can it be to update them to ddos while/instead mining Smiley
and if it is true, that there are botnets mining on btcguild, that may as well be the reason slush had a 'strong evidence' linking guild to ddoses ...

anyway just my two bitcents ...

Edit: i shouldn't have forgotten to say - Thanks slush for all the effort, even though it kind of a business for you, I believe you've done it the right way. I hope your're comming back soon in full strength. If you ever needed help with anything linux related, let me(us) know ;-)
slush
Legendary
*
Offline Offline

Activity: 1358



View Profile WWW
October 20, 2011, 02:22:42 PM
 #4039

tl;dr Explanation for my yesterday "accusation"

summary: I don't think eleuthria is an attacker, but he may have some indices to trace attacking botnet. If you want to reply to this subject, please do it in that new thread.

m3ta
Sr. Member
****
Offline Offline

Activity: 427



View Profile WWW
October 20, 2011, 02:27:08 PM
 #4040

using infected hardware

Infected HARDware? That's just... devious.

Why the frell so many retards spell "ect" as an abbreviation of "Et Cetera"? "ETC", DAMMIT! http://en.wikipedia.org/wiki/Et_cetera

Host:/# rm -rf /var/forum/trolls
Pages: « 1 ... 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 [202] 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 ... 1105 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!