Bitcoin Forum
November 16, 2024, 04:12:42 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 [89] 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 1154 »
  Print  
Author Topic: [4+ EH] Slush Pool (slushpool.com); Overt AsicBoost; World First Mining Pool  (Read 4382630 times)
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 27, 2011, 11:21:58 AM
 #1761

Maybe slush recently made a change to not allow connections to worker account if one is already "connected"?

No, more miners using same worker account should not lead to connection troubles...

molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
April 27, 2011, 11:33:00 AM
 #1762

I'm having trouble connecting to mining.bitcoin.cz:80, chrome tells me ""

This has been the case for about 10 hours now, my ip is/was: 85.176.112.67

Weirdly enough, I can connect through tor (using exit 46.19.138.242)

Any explanation?

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 27, 2011, 11:39:56 AM
 #1763

Any explanation?

No, this IP isn't in blacklist and I don't know about any connection troubles on server side...

cdhowie
Full Member
***
Offline Offline

Activity: 182
Merit: 107



View Profile WWW
April 27, 2011, 03:04:40 PM
 #1764

I'm having trouble connecting to mining.bitcoin.cz:80, chrome tells me ""

This has been the case for about 10 hours now, my ip is/was: 85.176.112.67

Weirdly enough, I can connect through tor (using exit 46.19.138.242)

Any explanation?

Can you try a TCP traceroute?  I don't know if such a tool is available for Windows, but there is one for Linux.  It will essentially do a traceroute with TCP packets by setting the SYN packet's TTL to 1 initially and incrementing it for every packet sent thereafter, in an attempt to discover where the traffic is really going (using the ICMP TTL exceeded errors to determine the path, similar to how regular traceroute works).

This is an effective technique for discovering transparent proxies or other bizarre/evil things done by your ISP or any router between you and the destination.

Tips are always welcome and can be sent to 1CZ8QgBWZSV3nLLqRk2BD3B4qDbpWAEDCZ

Thanks to ye, we have the final piece.

PGP key fingerprint: 2B7A B280 8B12 21CC 260A  DF65 6FCE 505A CF83 38F5

SerajewelKS @ #bitcoin-otc
JackSparrow
Member
**
Offline Offline

Activity: 116
Merit: 10



View Profile
April 27, 2011, 06:19:23 PM
 #1765

Under Linux it is called traceroute and under Windows tracert.

Istead of telling people about SYN-Flags, TTL and TCP you could just link to wikipedia or somewhere.
Miner-TE
Hero Member
*****
Offline Offline

Activity: 499
Merit: 500



View Profile
April 27, 2011, 06:33:06 PM
 #1766

Traceroute and tracert are ICMP trace route utilities not TCP trace route.

I suggest searching on "TCP traceroute" and find what is available for your OS.

BTC - 1PeMMYGn7xbZjUYeaWe9ct1VV6szLS1vkD - LTC - LbtcJRJJQQBjZuHr6Wm7vtB9RnnWtRNYpq
JackSparrow
Member
**
Offline Offline

Activity: 116
Merit: 10



View Profile
April 27, 2011, 10:13:09 PM
 #1767

Traceroute can do a "TCP traceroute", just add -P TCP -p 80.

For more info use "man traceroute".
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2349


Eadem mutata resurgo


View Profile
April 27, 2011, 10:50:16 PM
 #1768

Traceroute can do a "TCP traceroute", just add -P TCP -p 80.

For more info use "man traceroute".

actually he needs to do it for port 8332, i.e. miner port
linux command

$sudo traceroute mining.bitcoin.cz -P TCP -p 8332

ChaosFox
Full Member
***
Offline Offline

Activity: 178
Merit: 100


Certified fox posing as a cat posing as a human


View Profile
April 27, 2011, 11:13:01 PM
 #1769

Getting a 502 Bad Gateway error on the main page right now, even though my miners can connect fine. Hmmm.

Look! An ad-free signature!
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 27, 2011, 11:49:10 PM
 #1770

Getting a 502 Bad Gateway error on the main page right now, even though my miners can connect fine. Hmmm.

Was fixed in few minutes. I really have to recompile bitcoind for webserver tomorrow...

Veldy
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 28, 2011, 01:54:36 AM
Last edit: April 28, 2011, 02:17:16 PM by Veldy
 #1771

Plese send me your IPs to PM. It's possible that they fall into IP blacklist because of server flooding - I'll check it.

You have business class hosting through your ISP, right?  Can't they get a handle on this for you?


If you have found my post helpful, please donate what you feel it is worth: 18vaZ4K62WiL6W2Qoj9AE1cerfCHRaUW4x
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 28, 2011, 07:21:28 AM
 #1772

You have business class hosting through your ISP, right?  Can't they get a handle on this for you?

Handle what? IP blacklist? I'm completely OK with managing this blacklist for myself.

To connection problems - I don't think it is problem on the pool side, because it works without problems for two thousands of workers, only two or three people reported some troubles. It definitely looks like problem of their firewalls, routers etc. I once had similar problems with my router box - I had high packet loss, slow roundtrips. Restarting helped. It's common problem of cheap router boxes...

Veldy
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 28, 2011, 02:20:33 PM
 #1773

You have business class hosting through your ISP, right?  Can't they get a handle on this for you?

Handle what? IP blacklist? I'm completely OK with managing this blacklist for myself.

To connection problems - I don't think it is problem on the pool side, because it works without problems for two thousands of workers, only two or three people reported some troubles. It definitely looks like problem of their firewalls, routers etc. I once had similar problems with my router box - I had high packet loss, slow roundtrips. Restarting helped. It's common problem of cheap router boxes...

My point is that they don't like a DOS attack passing through their network either and will often stop it at their routers.  The advantage is that their network is not strained, they have removed the traffic going into your network and taking up your resources and they also [usually] have a better idea how to best stop the attack and not just filter it.

Just my thoughts. 

If you have found my post helpful, please donate what you feel it is worth: 18vaZ4K62WiL6W2Qoj9AE1cerfCHRaUW4x
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 28, 2011, 03:47:32 PM
 #1774

My point is that they don't like a DOS attack passing through their network either and will often stop it at their routers.  The advantage is that their network is not strained, they have removed the traffic going into your network and taking up your resources and they also [usually] have a better idea how to best stop the attack and not just filter it.

How do they know which traffic is needed and which is not? Currently SYN flooding and similar is solved by pool server itself and the rest of possible attacks are usually application related, so I don't know how Linode can help with this...

Veldy
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 28, 2011, 04:13:31 PM
Last edit: April 28, 2011, 08:37:42 PM by Veldy
 #1775

My point is that they don't like a DOS attack passing through their network either and will often stop it at their routers.  The advantage is that their network is not strained, they have removed the traffic going into your network and taking up your resources and they also [usually] have a better idea how to best stop the attack and not just filter it.

How do they know which traffic is needed and which is not? Currently SYN flooding and similar is solved by pool server itself and the rest of possible attacks are usually application related, so I don't know how Linode can help with this...

SYN flooding should be easy for the provider(s) to handle.  Application specific attacks you are correct about; you must make sure they are not vulnerable and then if necessary filter [at the ISP if possible].  If it is just some script kiddie, then a complaint against the source IP pool owner will often put a halt to it.  You did mention it was coming from a single block if I remember correctly.  This isn't my area of expertise, so I don't have much to offer beyond that.

If you have found my post helpful, please donate what you feel it is worth: 18vaZ4K62WiL6W2Qoj9AE1cerfCHRaUW4x
slush (OP)
Legendary
*
Offline Offline

Activity: 1386
Merit: 1097



View Profile WWW
April 28, 2011, 04:32:40 PM
 #1776

SYN flooding should be easy for the provider to handle.

...which is also already solved on the server, so this is not an issue.

Veldy
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 28, 2011, 04:41:51 PM
 #1777

SYN flooding should be easy for the provider to handle.

...which is also already solved on the server, so this is not an issue.

Your server is still getting hit with the SYN packets ... why not have your ISP stop them and give your server a break [this is the sort of thing that is best blocked by a router, not a production server].  I assume you used IPTABLES on Linux to block syn attacks, but that still leaves your network bandwidth utilized and your CPU (Kernel) dealing with each of these.  Your choice, but handling attacks on the server when a router would do a better job [in this case] may prove to be resource expensive as you grow.

If you have found my post helpful, please donate what you feel it is worth: 18vaZ4K62WiL6W2Qoj9AE1cerfCHRaUW4x
molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
April 28, 2011, 06:11:32 PM
 #1778

I'm having trouble connecting to mining.bitcoin.cz:80, chrome tells me ""

This has been the case for about 10 hours now, my ip is/was: 85.176.112.67

Weirdly enough, I can connect through tor (using exit 46.19.138.242)

Any explanation?

Can you try a TCP traceroute?  I don't know if such a tool is available for Windows, but there is one for Linux.  It will essentially do a traceroute with TCP packets by setting the SYN packet's TTL to 1 initially and incrementing it for every packet sent thereafter, in an attempt to discover where the traffic is really going (using the ICMP TTL exceeded errors to determine the path, similar to how regular traceroute works).

This is an effective technique for discovering transparent proxies or other bizarre/evil things done by your ISP or any router between you and the destination.

Thanks for the hint. Unfortunately I can access the web-page again now :|

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
molecular
Donator
Legendary
*
Offline Offline

Activity: 2772
Merit: 1019



View Profile
April 28, 2011, 06:12:39 PM
 #1779

Traceroute can do a "TCP traceroute", just add -P TCP -p 80.

For more info use "man traceroute".

actually he needs to do it for port 8332, i.e. miner port
linux command

$sudo traceroute mining.bitcoin.cz -P TCP -p 8332

actually no, I need port 80. the webpage didn't work (problem resolved itself somehow), I could, however, mine fine.

PGP key molecular F9B70769 fingerprint 9CDD C0D3 20F8 279F 6BE0  3F39 FC49 2362 F9B7 0769
Veldy
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 28, 2011, 09:24:00 PM
 #1780

502 error yet again today.

If you have found my post helpful, please donate what you feel it is worth: 18vaZ4K62WiL6W2Qoj9AE1cerfCHRaUW4x
Pages: « 1 ... 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 [89] 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 1154 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!