BitAddict
Legendary
Offline
Activity: 1190
Merit: 1001
|
|
December 30, 2013, 04:59:37 PM |
|
I think for the whole system to work, there has to be a tax against money not put into circulation. Cfb , is it possible to design such a scheme?
Not after Mixing is implemented. You won't get any results with this. You can just move your funds to another account you own. I think the right direction is lowering fees nearly 0, so if someone wants to hoard is ok, but he won't see his stack grow significally. In my opinion protecting the network is enough reward for all of us holding NxT, no need of extra fees.
|
|
|
|
S3MKi
Legendary
Offline
Activity: 1540
Merit: 1016
|
|
December 30, 2013, 05:00:08 PM |
|
can someone explain why my online wallet not syncing, its syncing to the latest block when i open it but when i leave it open for like 3h it is still at same block???
can someone plz help me i have read several different guides but it is still not working
Do u use 0.4.7e?
|
|
|
|
opticalcarrier
|
|
December 30, 2013, 05:00:15 PM |
|
From my IT guy: DDoS Deflate is a bash shell script which purpose is blocking a denial of service attack. the following installation guide is about cent os . How to install 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/install.sh" b. "chmod 0700 install.sh" c. "./install.sh" Configure After installing the script the following directories and files will be created program directory =/usr/local/ddos program =/usr/local/ddos/ddos.sh ignore_ip_list=/usr/local/ddos/ignore.ip.list cron (scheduller) =/etc/cron.d/ddos.cron apf ( advanced policy firewall) =/etc/apf/apf ipt (iptables) =/sbin/iptables edit configuration file run the following command on terminal cd /usr/local/ddos vi ddos.conf ( to edit the file with vi editor just type "i" , when finished press escape then ":" "w" "q" and enter ) Configuration file settings Freq= ( how often the script is executed in minutes ) Ddos - cron ( cron sceduller update ) No_of_connections ( number of connections received before an IP is blocked ) Apf_ban ( 1 means that it will use apf , 0 it will use iptables ) Ban_period ( time in seconds to block an IP ) Email_to ( address to send an email when an IP is blocked ) Kill ( when value is 0 no IP is banned ) In case you get blank IP edit the main script ddos.sh and replace "netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST" with this one "netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST" ( be sure to keep the command in a single line ) Uninstall DDos Deflate 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh" b. "chmod 0700 uninstall.sh" c. "./uninstall.sh" can you verify with your IT guy how that DDOS prevention works? Cause Im not certain yet if that will help us, as I thought the DDOS we were seeing was a specialized protocol that worked well above OSI layers 4/5. I thought the DDOS attacks we were seeing were well into the cient protocol operation. IF that is the case then Im not sure this DDOS thing you have will help. Can an expert who has analyzed the DDoS attacks comment here? Please let us know what your IT guy says. If this is viable then we all really need to go figure out how to make this work on our particular distros on our VPSs
|
|
|
|
cryptobanks
Newbie
Offline
Activity: 29
Merit: 0
|
|
December 30, 2013, 05:18:37 PM |
|
Does anyone know if we're still set to gain additional features at block 30,000?
|
|
|
|
chanc3r
|
|
December 30, 2013, 05:23:29 PM |
|
Just got this sending a transaction - transaction appears ok in my list so hope it gets confirmed - but here is the error list I got when I posted it.
2013-12-30 17:18:59.443:WARN:oejs.ServletHandler:qtp1596783631-1809: /nxt java.lang.IllegalStateException: WRITER at org.eclipse.jetty.server.Response.getOutputStream(Response.java:931) at Nxt.doGet(Unknown Source) at javax.servlet.http.HttpServlet.service(HttpServlet.java:687) at javax.servlet.http.HttpServlet.service(HttpServlet.java:790) at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:696) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1568) at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.java:457) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:326) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:299) at org.eclipse.jetty.servlet.ServletHandler$CachedChain.doFilter(ServletHandler.java:1539) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:524) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:568) at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:221) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1110) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:453) at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:183) at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1044) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141) at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:199) at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:109) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:97) at org.eclipse.jetty.server.Server.handle(Server.java:459) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:280) at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:229) at org.eclipse.jetty.io.AbstractConnection$1.run(AbstractConnection.java:505) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:607) at org.eclipse.jetty.util.thread.QueuedThreadPool$3.run(QueuedThreadPool.java:536) at java.lang.Thread.run(Thread.java:744)
|
|
|
|
gbeirn
|
|
December 30, 2013, 05:27:12 PM |
|
From my IT guy: DDoS Deflate is a bash shell script which purpose is blocking a denial of service attack. the following installation guide is about cent os . How to install 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/install.sh" b. "chmod 0700 install.sh" c. "./install.sh" Configure After installing the script the following directories and files will be created program directory =/usr/local/ddos program =/usr/local/ddos/ddos.sh ignore_ip_list=/usr/local/ddos/ignore.ip.list cron (scheduller) =/etc/cron.d/ddos.cron apf ( advanced policy firewall) =/etc/apf/apf ipt (iptables) =/sbin/iptables edit configuration file run the following command on terminal cd /usr/local/ddos vi ddos.conf ( to edit the file with vi editor just type "i" , when finished press escape then ":" "w" "q" and enter ) Configuration file settings Freq= ( how often the script is executed in minutes ) Ddos - cron ( cron sceduller update ) No_of_connections ( number of connections received before an IP is blocked ) Apf_ban ( 1 means that it will use apf , 0 it will use iptables ) Ban_period ( time in seconds to block an IP ) Email_to ( address to send an email when an IP is blocked ) Kill ( when value is 0 no IP is banned ) In case you get blank IP edit the main script ddos.sh and replace "netstat -ntu | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort -nr > $BAD_IP_LIST" with this one "netstat -ntu | grep ‘:’ | awk ‘{print $5}’ | sed ‘s/::ffff://’ | cut -f1 -d ‘:’ | sort | uniq -c | sort -nr > $BAD_IP_LIST" ( be sure to keep the command in a single line ) Uninstall DDos Deflate 1. Login to Cent OS as root 2. run terminal 3. run the following commands a. "wget http://www.inetbase.com/scripts/ddos/uninstall.sh" b. "chmod 0700 uninstall.sh" c. "./uninstall.sh" can you verify with your IT guy how that DDOS prevention works? Cause Im not certain yet if that will help us, as I thought the DDOS we were seeing was a specialized protocol that worked well above OSI layers 4/5. I thought the DDOS attacks we were seeing were well into the cient protocol operation. IF that is the case then Im not sure this DDOS thing you have will help. Can an expert who has analyzed the DDoS attacks comment here? Please let us know what your IT guy says. If this is viable then we all really need to go figure out how to make this work on our particular distros on our VPSs Yes I would like to know this as well. If if does, I can deploy it on my VPSs
|
NXT VPS Server Donations can be sent here: 6044921191674841550At the end of each month I will donate some of them back to the community. This is separate from my main wallet so you can keep track of them. I will keep them in there and only use them for hosting.
|
|
|
ferment
Full Member
Offline
Activity: 168
Merit: 100
IDEX - LIVE Real-time DEX
|
|
December 30, 2013, 05:30:36 PM |
|
just added a way to get information on an alias: http://22k.io/ALIAS/infoFor example: http://22k.io/acct22k/infoOnce I get all the aliases and accounts indexed, I'll be able to show what account owns an alias. From there, if the same account registers an alias containing contact info using a standardized tag, theoretically it could work like whois.
|
|
|
|
Passion_ltc
|
|
December 30, 2013, 05:33:55 PM |
|
I have an idea which would help distribute some of your Nxt and also help Nxt develop for the long term.
We will start a contest where the 10 best ideas for a client feature or application which would help Nxt grow over the next 5 years.
We would be open to entries from all Nxters and the community will vote for the best 10 ideas which would get funding.
The development fund would be managed by those currently in charge of the bounty program.
10 idea's each get 200,000 NXT to implement their feature or application to the Nxt ecosystem.
Total Development Fund Needed: Nxt 2,000,000
I can immediately start the thread where idea's can be deposited....Final voting can begin in a weeks time.
What do you guys think?
Make it happen!
|
|
|
|
klee
Legendary
Offline
Activity: 1498
Merit: 1000
|
|
December 30, 2013, 05:49:53 PM |
|
can you verify with your IT guy how that DDOS prevention works? Cause Im not certain yet if that will help us, as I thought the DDOS we were seeing was a specialized protocol that worked well above OSI layers 4/5. I thought the DDOS attacks we were seeing were well into the cient protocol operation. IF that is the case then Im not sure this DDOS thing you have will help.
Can an expert who has analyzed the DDoS attacks comment here? Please let us know what your IT guy says. If this is viable then we all really need to go figure out how to make this work on our particular distros on our VPSs
Yes I would like to know this as well. If if does, I can deploy it on my VPSs
Forwarded this to him, I will let u know asap...
|
|
|
|
landomata
Legendary
Offline
Activity: 2184
Merit: 1000
|
|
December 30, 2013, 06:23:50 PM |
|
Colored coins are called "NXT colored coins". Is this a temporary name for it or why do we call it "NXT colored coins" but normal coins just "NXT"? Assets in the Nxt Asset Exchange are called Asset or Tokens....or whatever its still evolving as we speak
|
|
|
|
BitCoiner2012
|
|
December 30, 2013, 06:24:27 PM |
|
Still haven't received my second tx from DGEX, maybe my blocks aren't updating?
|
BTC Long.
|
|
|
pinarello
Full Member
Offline
Activity: 266
Merit: 100
NXT is the future
|
|
December 30, 2013, 06:25:53 PM |
|
|
|
|
|
wesleyh
|
|
December 30, 2013, 06:32:11 PM |
|
That weird format: https:\/\/vircurex.com\/welcome\/index?referral_id=667-22323 is OK - there's no error here. This is JSON format.
I tried nxt:vircurex in firefox and it works as it should, what output do you get?
It will not forward me to the URL. It just stays at nxt:vircurex and the webpage opens up all messed up. If your add-on is working, then it is ALL GOOD!!! ...I wanted to give you a heads up just in case... The web page opens up though? And it's not an issue with your webpage? How is it supposed to look like? Just visit the referral link I quoted and see if they are different on your end too. Please try http://nxtra.org/alias/NxtAliasSystem.xpi - you may want to remove the old extension first. Let me know if this fixes it.
|
|
|
|
S3MKi
Legendary
Offline
Activity: 1540
Merit: 1016
|
|
December 30, 2013, 06:45:56 PM |
|
|
|
|
|
landomata
Legendary
Offline
Activity: 2184
Merit: 1000
|
|
December 30, 2013, 06:46:58 PM |
|
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 06:50:19 PM |
|
Cfb, when connect to a publicly accessible node
node.ip:7875/nxt?requestType=getState
doesn't work - I get
{"errorCode":7,"errorDescription":"Not allowed"}
even if i log in with a passphrase..
Is this by design or am I doing something wrong? Ian
This is by design. allowedBotHosts is not set to *.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 06:56:15 PM |
|
Hey CfB
how about some thoughts on blocks not forging? I have 280k and have attempted to keep myself logged in for the last two weeks. there have been overnight crashes and freezes, but my countdown timer keeps ticking, but never gets to zero. I have forged two blocks in two weeks, when according to my calculations it should be every 4000 minutes, but it never happens. I'm showing a week since I earned a fee 7213693579568855752 my account is 15436509232181115695 I understand it's not going to make me rich, but I wonder if there is something I can do to improve this
thanks
If u forge empty blocks u don't see them in ur transactions list.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 06:58:50 PM |
|
can someone explain why my online wallet not syncing, its syncing to the latest block when i open it but when i leave it open for like 3h it is still at same block???
can someone plz help me i have read several different guides but it is still not working
Does F5 help?
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 07:06:39 PM |
|
http://localhost:7874/nxt?requestType=getBalance&account=100000 and you only need to crack for the 1st 14 digits of a candidate shortform/visible account ID to be zeros. But I think I may have been wrong on the keyspace part. Is it 2^64 or is it 2^(256-64) I cant think right now. Regardless of all that, can someone explain how the first 64bits of a 256bit long account# is translated into the "shortform" or visible ID we see as 20digits? I cant figure out that math in my head either. Is it some kind of weird BCD? Keyspace is just 2^64, this is equal to 2^71 double-SHA256 operations. U could save some ticks by doing SHA256(Curve25519(ANY_256_BITS)) instead of SHA256(Curve25519(SHA256(SECRET_PHRASE))). Short form is unsigned long of first 64 bits in little-endian form.
|
|
|
|
Come-from-Beyond
Legendary
Offline
Activity: 2142
Merit: 1010
Newbie
|
|
December 30, 2013, 07:11:54 PM |
|
[2013-12-30 16:56:13.621] 15: java.lang.NullPointerException
Getting loads of these.... ideas for debugging? Ur node is fed with incorrectly generated transactions. Is pullThreshold > 0? If yes, then one of the hallmarked nodes is controlled by an adversary. Switch logging on, later we can vote on destroying all the coins that marked this rogue node, MUAHAHAHAHAHA. Edit: There is a chance that someone pushes incorrect transactions to ur node. NRS doesn't log such requests yet.
|
|
|
|
|