Bitcoin Forum
March 03, 2024, 03:25:46 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 [315] 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 ... 1154 »
  Print  
Author Topic: [4+ EH] Slush Pool (slushpool.com); Overt AsicBoost; World First Mining Pool  (Read 4381743 times)
warlordluke
Newbie
*
Offline Offline

Activity: 44
Merit: 0



View Profile
April 17, 2013, 01:40:45 PM
 #6281

Good luck with that, taking out the 'drones' is like trying to hold the tide back. For every drone you stop, two or more replace it. To really stop this you need to locate the 'command' nodes and shut those down.

Only if you go 1:1 with it... when you tell them a DDoS is happening, the word tends to spread and they begin looking for servers. If everyone does exactly nothing about it, then nothing gets done.

The providers response tends to be hmmm.. I have a hundred thousand ip's smacking one IP here... Impacting my other business.. what to do.... Hmmm one vs thousands... Okay lets blackhole one upstream.. Other clients happy, one client unhappy.

Then there is the fact of where 99% of the traffic is coming from.
You start doing whois's and reverse lookups on things and get responses like this:
netname:        CHINANET-HB
descr:          CHINANET Hubei province network
descr:          China Telecom
descr:          A12,Xin-Jie-Kou-Wai Street
descr:          Beijing 100088

netname:        SPECTRA
descr:          Spectra ISP Networks Private Limited
descr:          42, Okhla Industrial Estate
descr:          Phase III

.in-addr.arpa. not found: 3(NXDOMAIN)

and so on...

and IF you happen to get a response on that, it will generally be a end user (cable modem or some such)

In short there isn't much that _can_ be done about it. The numbers favor the attacker.


If you have the IP what about doing a tracert to see where exactly it comes from? Though I'm guessing that may also give you roughly the same information as doing the whois and reverse lookups.
1709479546
Hero Member
*
Offline Offline

Posts: 1709479546

View Profile Personal Message (Offline)

Ignore
1709479546
Reply with quote  #2

1709479546
Report to moderator
1709479546
Hero Member
*
Offline Offline

Posts: 1709479546

View Profile Personal Message (Offline)

Ignore
1709479546
Reply with quote  #2

1709479546
Report to moderator
1709479546
Hero Member
*
Offline Offline

Posts: 1709479546

View Profile Personal Message (Offline)

Ignore
1709479546
Reply with quote  #2

1709479546
Report to moderator
Once a transaction has 6 confirmations, it is extremely unlikely that an attacker without at least 50% of the network's computation power would be able to reverse it.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1709479546
Hero Member
*
Offline Offline

Posts: 1709479546

View Profile Personal Message (Offline)

Ignore
1709479546
Reply with quote  #2

1709479546
Report to moderator
bitpop
Legendary
*
Offline Offline

Activity: 2912
Merit: 1060



View Profile WWW
April 17, 2013, 01:41:59 PM
 #6282

i dont blame the bot commanders. i blame the idiots that let their computers turn into virus laden festering bots.

centove
Full Member
***
Offline Offline

Activity: 194
Merit: 100


View Profile
April 17, 2013, 01:52:42 PM
 #6283

Not specifically about slushs pool...

http://arstechnica.com/security/2013/04/fueled-by-super-botnets-ddos-attacks-grow-meaner-and-ever-more-powerful/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29

Give me Btc: 1BRkf5bwSVdGCyvu4SyYBiJjEjbNiAQoYd Mine on my node: http://ask.gxsnmp.org:9332/
RoboCoder
Sr. Member
****
Offline Offline

Activity: 388
Merit: 250


Save A Life, Adopt a Pet Today!


View Profile WWW
April 17, 2013, 01:53:38 PM
 #6284

I will be willing to bet that the DDOS attack(s) are for one of the following reasons:

. Manipulate BTC price
. Manipulate Difficulty
. Destabilize BTC and crypto-currency in general.

Slush, we are all here for you man!

Is there anything I (we) can do, if so let us know.  Would server resources help you in any way? Or financial?

Please PM me if there is anything I can do to assist.

RoboCoder
BitcoinOxygen
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250



View Profile WWW
April 17, 2013, 01:54:21 PM
 #6285

I will be willing to bet that the DDOS attack(s) are for one of the following reasons:

. Manipulate BTC price
. Manipulate Difficulty
. Destabilize BTC and crypto-currency in general.

Slush, we are all here for you man!

Is there anything I (we) can do, if so let us know.  Would server resources help you in any way? Or financial?

Please PM me if there is anything I can do to assist.

RoboCoder

+1

BTCOxygen PPS Mining Pool 2% Fee  <<<  Join Now
Xenotron
Newbie
*
Offline Offline

Activity: 31
Merit: 0


View Profile
April 17, 2013, 01:56:20 PM
 #6286

I start to think that probably it's not a bad idea to have decentralized pool.
centove
Full Member
***
Offline Offline

Activity: 194
Merit: 100


View Profile
April 17, 2013, 02:02:00 PM
 #6287

If you have the IP what about doing a tracert to see where exactly it comes from? Though I'm guessing that may also give you roughly the same information as doing the whois and reverse lookups.

Not really it will give you the path and some hints on who owns it, whois will tell you who the space was assigned to by the registrar, so that's who is ultimately responsible for the ip in question. Whois also lists contact information to get in touch with someone (hopefully).

So for instance, lets talk bitcointalk.org.. -- 109.201.133.65

traceroute tells us thus:
18  30-239-159-85.rtr1.b06-s02-az16.gsa.nl.nforce.com (85.159.239.30)  106.420 ms  109.760 ms  109.593 ms
19  5-239-159-85.rtr1.dbn.nl.nforce.com (85.159.239.5)  120.049 ms  118.963 ms  119.622 ms
20 * * *
(probably filtered at this point)

whois however tells us this:
netname:        NFORCE_ENTERTAINMENT
descr:          Serverhosting
admin-c:        NFAR
(...)
person:         NFOrce Entertainment BV - Administrative role account
address:        Gewenten 8
address:        4704RD
address:        Roosendaal
address:        The Netherlands
phone:          +31 (0)206919299
fax-no:         +31 (0)206919409
abuse-mailbox:  abuse@nforce.com
nic-hdl:        NFAR
mnt-by:         MNT-NFORCE
source:         RIPE # Filtered
(...)


Give me Btc: 1BRkf5bwSVdGCyvu4SyYBiJjEjbNiAQoYd Mine on my node: http://ask.gxsnmp.org:9332/
centove
Full Member
***
Offline Offline

Activity: 194
Merit: 100


View Profile
April 17, 2013, 02:03:20 PM
 #6288

I start to think that probably it's not a bad idea to have decentralized pool.
Here ya go.

https://bitcointalk.org/index.php?topic=18313.0

Give me Btc: 1BRkf5bwSVdGCyvu4SyYBiJjEjbNiAQoYd Mine on my node: http://ask.gxsnmp.org:9332/
scouzi
Newbie
*
Offline Offline

Activity: 45
Merit: 0


View Profile
April 17, 2013, 02:05:34 PM
 #6289

I start to think that probably it's not a bad idea to have decentralized pool.

Seems that slush miners have gravitated towards 50BTC - not BTC Guild. Amazing that there is a collective ecosystem balancing at work.

http://blockchain.info/pools

jerethdaminer
Member
**
Offline Offline

Activity: 84
Merit: 10


View Profile
April 17, 2013, 02:13:50 PM
 #6290

seem to be getting loads more stales atm ideas
thehairymob
Full Member
***
Offline Offline

Activity: 152
Merit: 102


View Profile WWW
April 17, 2013, 02:30:03 PM
 #6291

Still down?
ewitte
Member
**
Offline Offline

Activity: 98
Merit: 10


View Profile
April 17, 2013, 02:31:19 PM
 #6292

Irritating have 1771 shares off the current round but since I can't get reconnected going to get barely any BTC

Donations
BTC - 13Lgy6fb4d3nSYEf2nkgBgyBkkhPw8zkPd
LTC - LegzRwyc2Xhu8cqvaW2jwRrqSnhyaYU6gZ
klotzenhotz
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250


View Profile
April 17, 2013, 02:35:33 PM
 #6293

Hi, are there problems again? Can't connect again for about 2 hours.
Camello_AR
Newbie
*
Offline Offline

Activity: 43
Merit: 0



View Profile
April 17, 2013, 02:37:14 PM
 #6294

Is up a little time and down again.

Someone has anything personal with slush as I see
salty
Full Member
***
Offline Offline

Activity: 562
Merit: 100



View Profile
April 17, 2013, 02:43:59 PM
 #6295

i dont blame the bot commanders. i blame the idiots that let their computers turn into virus laden festering bots.

What, like your grandma? (not a personal attack, but you get the idea)

It's not their fault they go into some big store and are sold a pup that runs windows in admin mode with Java, flash enabled, by some grinning salesperson that assures them their 'Norton' will keep them safe. My opinion is that the people who make the computer distros, and the people who sell them, should be providing more secure devices. But where's the incentive? That's where the blame and pressure should be going. Things have been getting better on this front and I suspect once all the windows XP and Vista computers have been retired this problem will seriously diminish.

Your argument suggests that if you don't have a CS degree you shouldn't be using a computer though.



solitude
Hero Member
*****
Offline Offline

Activity: 674
Merit: 500


View Profile
April 17, 2013, 02:59:01 PM
 #6296

Down at 11:00 AM Eastern

Hardly anyone speaks English on this forum.
Turok
Newbie
*
Offline Offline

Activity: 38
Merit: 0


View Profile
April 17, 2013, 03:07:30 PM
 #6297

appears to be down again. Another DDoS?
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 17, 2013, 03:11:29 PM
 #6298

Guys at OVH datacentre failed. They're even bigger idiots than Linode admins.

I'm migrating stratum backends to another datacentre. Please be patient, I'm working on it hard.

digital
Hero Member
*****
Offline Offline

Activity: 490
Merit: 500


View Profile
April 17, 2013, 03:13:23 PM
 #6299

appears to be down again. Another DDoS?

Likely the same one.   -Edit after slush's response.

DDoS aren't a static thing.  It's a flood of traffic to a specific IP or server in order to overload the target so it's inaccessible to other users.  By it's very nature the site will go up and down as the DDoS traffic fluctuates.

DDoS attacks can last for days.

If I help you out: 17QatvSdciyv2zsdAbphDEUzST1S6x46c3
References (bitcointalk.org/index.php?topic=): 50051.20  50051.100  53668.0  53788.0  53571.0  53571.0  52212.0  50729.0  114804.0  115468  78106  69061  58572  54747
roukkie
Newbie
*
Offline Offline

Activity: 29
Merit: 0



View Profile
April 17, 2013, 03:15:33 PM
 #6300

ddos gonna escalate in my opinion,we must implement some countermeasures,like udp and icmp filtering or engress filtering...
Pages: « 1 ... 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 [315] 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 ... 1154 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!