d3m0n1q_733rz
|
|
August 19, 2011, 05:05:13 AM |
|
I agree. Ufasoft has becomes a Windows miner while CGMiner has dominated the Linux scene. Both have a small leak into the others realm, but I think that Ufasoft could probably have dominated both if they tried. I'm not certain why they stopped updating the Linux source, but I imagine it has something to do with the required intrinisics and compiling programs used. You see, I believe that Ufasoft is compiled using the Intel compiler which isn't 100% compatible with GCC and the source for each would have to be modified separately. GCC doesn't have as good of optimizations as Intel, but the platform isn't as power hungry which makes it a really good tradeoff in the long run. Ultimately, I believe it to be in everyone's best interests if someone (even if not Ufasoft) were to pick up the Linux source and play around with it. Maybe add a few paralleling commands, make room for some of the more up-to-date CPU commands in the SSE3-SSE4 range to be used in the earlier SHA-256 cycles that are all basically equal to 0 anyway (see Phatk2 for example)...the more you can do at once, the faster it gets done is the general rule.
But yeah, let's stop asking and just start doing.
|
Funroll_Loops, the theoretically quicker breakfast cereal! Check out http://www.facebook.com/JupiterICT for all of your computing needs. If you need it, we can get it. We have solutions for your computing conundrums. BTC accepted! 12HWUSguWXRCQKfkPeJygVR1ex5wbg3hAq
|
|
|
Diapolo
|
|
August 19, 2011, 12:09:29 PM |
|
Avira marks the current version as malware and even if you report a false alert they think it's not clean. Any ideas?
Dia
|
|
|
|
shaps
Newbie
Offline
Activity: 15
Merit: 0
|
|
August 19, 2011, 03:45:51 PM |
|
I also contacted Avira to report a false positive for the latest version (0.20) and got the below response. Ufasoft, if you want the miner to be trusted and used broadly please release the source for the latest version (current available version is 0.10) and build instructions/environment for windows/linux. Dear Sir or Madam,
Thank you for your recent inquiry.
The submitted file does not show a false positive detection by AntiVir. It does indeed contain malicious behaviour, the detection is correct.
For further questions don't hesitate to contact us.
-- Freundliche Gruesse / Best regards Avira Operations GmbH & Co. KG
|
|
|
|
Paul4games
Newbie
Offline
Activity: 46
Merit: 0
|
|
August 19, 2011, 04:38:19 PM |
|
Well i uploaded the latest ufasoft miner to anubis and in the report i wasn't able to detect any malicious action performed, but it might have anti-anubis or idk...
|
|
|
|
ufasoft (OP)
|
|
August 19, 2011, 06:07:39 PM |
|
It does indeed contain malicious behaviour, the detection is correct.
I suspect they think that any BITCOIN software is malware. Anyway, to users who afraid about backdoors: 1. Create separate user account in your Windows. 2. Limit this account to access any files on your disk (except %USERPROFILE% of this account) 3. Launch the miner via "Run As" context menu. 4. Add Firewall rule, allowing the miner connect only to the Pool's IP addresses. This way any software is safe to run. It cannot to steal or damage anything, or use your PC for Spamming.
|
Bitcoin donations: 18X598V8rVdjy3Yg1cjZmnnv4SpPthuBeT
|
|
|
village.idiot
|
|
August 19, 2011, 06:32:09 PM |
|
Can that user run the miner while I'm (another user) using other things on the same computer?
|
|
|
|
The00Dustin
|
|
August 19, 2011, 07:09:21 PM |
|
I also contacted Avira to report a false positive for the latest version (0.20) and got the below response. Ufasoft, if you want the miner to be trusted and used broadly please release the source for the latest version (current available version is 0.10) and build instructions/environment for windows/linux. Dear Sir or Madam,
Thank you for your recent inquiry.
The submitted file does not show a false positive detection by AntiVir. It does indeed contain malicious behaviour, the detection is correct.
For further questions don't hesitate to contact us.
-- Freundliche Gruesse / Best regards Avira Operations GmbH & Co. KG
I think you should try to inquire as to what malicious behavior it contains. It sounds to me like they are reselling rebranded software and have no clue what they are talking about. I was able to get Symantec and GFI to reclassify the previous version as a potentially unwanted tool, which is accurate, unless there is behavior that would classify it as something else.
|
|
|
|
d3m0n1q_733rz
|
|
August 19, 2011, 08:16:52 PM |
|
I also submitted it to Avira using two different e-mail accounts to see if they utilize copy-paste techniques or if they actually put some human element into their work. My theory, they're lazy.
|
Funroll_Loops, the theoretically quicker breakfast cereal! Check out http://www.facebook.com/JupiterICT for all of your computing needs. If you need it, we can get it. We have solutions for your computing conundrums. BTC accepted! 12HWUSguWXRCQKfkPeJygVR1ex5wbg3hAq
|
|
|
village.idiot
|
|
August 19, 2011, 10:28:26 PM |
|
I suspect they think that any BITCOIN software is malware.
Anyway, to users who afraid about backdoors:
1. Create separate user account in your Windows. 2. Limit this account to access any files on your disk (except %USERPROFILE% of this account) 3. Launch the miner via "Run As" context menu. 4. Add Firewall rule, allowing the miner connect only to the Pool's IP addresses.
This way any software is safe to run. It cannot to steal or damage anything, or use your PC for Spamming.
Haven't seen an answer to my question Can that user run the miner while I'm (another user) using other things on the same computer?
But I suspect the answer is no. What about this... I use Comodo Internet Security, and found I could run bitcoin-miner in a sandbox at a restricted level. I don't know if this would be secure enough.
|
|
|
|
The00Dustin
|
|
August 19, 2011, 11:44:43 PM |
|
Haven't seen an answer to my question Can that user run the miner while I'm (another user) using other things on the same computer? But I suspect the answer is no. What about this... I use Comodo Internet Security, and found I could run bitcoin-miner in a sandbox at a restricted level. I don't know if this would be secure enough. You suspect wrong. When you right-click on a program and click "Run as..." you are already logged in as the user who is using the computer, the run as allows you to give programs you are running more (or in this case less) permissions. I'm not sure the Comodo sandbox would be good enough, though, it would still allow access to (a virtual copy of) your documents and settings. It might prevent it from corrupting the real thing, but wouldn't prevent it from, for instance, stealing your wallet.
|
|
|
|
village.idiot
|
|
August 19, 2011, 11:52:22 PM |
|
Thank you for the clarification. (which I'm still a little unclear on)
So I just need to use the Run as... on the cmd.exe as a different user following ufasoft's instructions posted earlier.
Right?
|
|
|
|
The00Dustin
|
|
August 20, 2011, 02:19:17 AM |
|
Thank you for the clarification. (which I'm still a little unclear on)
So I just need to use the Run as... on the cmd.exe as a different user following ufasoft's instructions posted earlier.
Right? You could do that, or you could create an lnk file (or a bat file or whatever) that runs the miner with your parameters automatically. Then you could just do the run as on that to save a step. Either way, same end result. Note that you'll have to choose "The following user:" and type in the username and password. Also note that if you don't see "Run as..." in the right-click menu that you can Shift+Right click to see it.
|
|
|
|
village.idiot
|
|
August 20, 2011, 02:25:51 AM |
|
Okay.
I'll have to study that a bit.
Thanks for being so helpful to a n00b
|
|
|
|
d3m0n1q_733rz
|
|
August 20, 2011, 10:00:16 AM |
|
It does indeed contain malicious behaviour, the detection is correct.
I suspect they think that any BITCOIN software is malware. Anyway, to users who afraid about backdoors: 1. Create separate user account in your Windows. 2. Limit this account to access any files on your disk (except %USERPROFILE% of this account) 3. Launch the miner via "Run As" context menu. 4. Add Firewall rule, allowing the miner connect only to the Pool's IP addresses. This way any software is safe to run. It cannot to steal or damage anything, or use your PC for Spamming. Guys, I wouldn't worry too much over Ufasoft being malware. I've been all through the ASM of their program looking for means to optimize it (disassembling Intel compiled code and going through it is a huge pain) and there's nothing I've seen that even strikes me as suspicious. Heck, the most suspicious thing I've seen from it was maintaining a single network connection for an extended period of time; but we call that long-polling.
|
Funroll_Loops, the theoretically quicker breakfast cereal! Check out http://www.facebook.com/JupiterICT for all of your computing needs. If you need it, we can get it. We have solutions for your computing conundrums. BTC accepted! 12HWUSguWXRCQKfkPeJygVR1ex5wbg3hAq
|
|
|
|
Remember remember the 5th of November
Legendary
Offline
Activity: 1862
Merit: 1011
Reverse engineer from time to time
|
|
August 20, 2011, 08:37:21 PM |
|
It does indeed contain malicious behaviour, the detection is correct.
I suspect they think that any BITCOIN software is malware. Anyway, to users who afraid about backdoors: 1. Create separate user account in your Windows. 2. Limit this account to access any files on your disk (except %USERPROFILE% of this account) 3. Launch the miner via "Run As" context menu. 4. Add Firewall rule, allowing the miner connect only to the Pool's IP addresses. This way any software is safe to run. It cannot to steal or damage anything, or use your PC for Spamming. Oh, so a malware program cant delete the wallet? Get real..
|
BTC:1AiCRMxgf1ptVQwx6hDuKMu4f7F27QmJC2
|
|
|
village.idiot
|
|
August 20, 2011, 09:07:45 PM |
|
Didn't he mean if you follow the listed steps?
|
|
|
|
shaps
Newbie
Offline
Activity: 15
Merit: 0
|
|
August 20, 2011, 11:07:42 PM |
|
I think you should try to inquire as to what malicious behavior it contains. It sounds to me like they are reselling rebranded software and have no clue what they are talking about. I was able to get Symantec and GFI to reclassify the previous version as a potentially unwanted tool, which is accurate, unless there is behavior that would classify it as something else.
Sent them an email asking them to clarify. Will see what they respond with...
|
|
|
|
d3m0n1q_733rz
|
|
August 21, 2011, 06:58:49 AM |
|
The truth is, they do. Many anti-virus companies use a central means of updating their virus signatures as one anti-virus will see one sort of virus that another might not. And so, to keep them somewhat up-to-date, they share this information between each other via a central database. Unfortunately, this also means that false positives spread like wildfire.
|
Funroll_Loops, the theoretically quicker breakfast cereal! Check out http://www.facebook.com/JupiterICT for all of your computing needs. If you need it, we can get it. We have solutions for your computing conundrums. BTC accepted! 12HWUSguWXRCQKfkPeJygVR1ex5wbg3hAq
|
|
|
ufasoft (OP)
|
|
August 21, 2011, 08:30:24 PM |
|
Source Code of 0.20 for Linux released. GCC requirement lowered to 4.4 AMD CAL/OpenCL supported (compilation works, but really not tested under linux).
|
Bitcoin donations: 18X598V8rVdjy3Yg1cjZmnnv4SpPthuBeT
|
|
|
|