Bitcoin Forum
April 27, 2024, 01:59:49 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 [176] 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 ... 294 »
  Print  
Author Topic: [POOL][Scrypt][Scrypt-N][X11] Profit switching pool - wafflepool.com  (Read 465521 times)
gaalx
Sr. Member
****
Offline Offline

Activity: 411
Merit: 250



View Profile
March 26, 2014, 05:41:42 PM
 #3501

pw, A friend told me - do not engage in this nonsense)

Make sure you back up your wallet regularly! Unlike a bank account, nobody can help you if you lose access to your BTC.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714226389
Hero Member
*
Offline Offline

Posts: 1714226389

View Profile Personal Message (Offline)

Ignore
1714226389
Reply with quote  #2

1714226389
Report to moderator
1714226389
Hero Member
*
Offline Offline

Posts: 1714226389

View Profile Personal Message (Offline)

Ignore
1714226389
Reply with quote  #2

1714226389
Report to moderator
gaalx
Sr. Member
****
Offline Offline

Activity: 411
Merit: 250



View Profile
March 26, 2014, 05:49:10 PM
 #3502

thanks for Fluttercoin. shown as a stable medium fork. watching him for over a week

zneww
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250



View Profile
March 26, 2014, 06:44:52 PM
 #3503

pw, A friend told me - do not engage in this nonsense)

PW, i can say is one of the best ops out there. but been having problems as all other pools have been having.
phzi
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
March 26, 2014, 06:54:48 PM
 #3504

Depends on what wallet you use.  There should be an option somewhere for "sign message" for a certain address (proves you own the address essentially)
one - btc-e; second - a conventional purse. as purse btc-e write to you?
btc-e is an exchange, not a wallet.  If you weren't using an address that you hold the private key to (you don't for any deposit address on an exchange), then you can't sign a message from that address.

quick question --does adding shaders make your gpu more stable whilst mining? regarding 290x or 290
Specifying shaders has no effect if you have also specified thread-concurrency.  TC is a better tuning method, generally.  I have found the best values for the 290s are a tc at 20479 or 28672 (depends on the BIOS/card as to which is more optimal).  Various other tc values are commonly used, but these have been the most optimal for me (and I have tested 100s of tc values on my banks of 290s).

Wonder what is CleverMining mining, they're on 0.00583 BTC/MH, although their reject rates are crazy high.
I have never seen CM profits actually pass WP profits in reality.  I have run side by side tests many times, and the CM numbers never bear true after you take into account under-reported hashrate and rejected shares.

Because Wafflepool mining ALWAYS doge, mintcoin flapycon, worldcoin => POOR PROFITS

Today LTC = 0.0052 BTC/Day/Mh and Wafflepool = 0.0044

CONCLUSION = MINE YOURSELF LITECOIN ! or go to clevermining...

It seemed that wafflepool mining the most profitable crypto?  Undecided Huh
lol... WafflePool does mine the most profitable scrypt coins.  And the litecoin diff JUST changed.  Give it 24 hours to see what WP profits are like.

Besides, unless you are using a real PPS pool (only one I know of is litecoinpool.org, as LTCRabbit is a modified PPS scheme), mining LTC will never earn you "100%" of LTC profits - some days will be less, some more.

Looks like the pool has been mainly mining Fluttercoin, DogeCoin, and Litecoin so far today.  These would indeed be the most profitable coins to mine.  (We haven't mined mint in ages - we just have unexchanged coins stuck in coinmarket.io from a long time ago, we aren't mining flappycoin - we are sitting on a bunch because there is no buy interest, and I haven't seen worldcoin being mined yet today).

thanks for Fluttercoin. shown as a stable medium fork. watching him for over a week
Ya, glad you added it, PW. Manually trading will hopefully be worthwhile - profitability has been good on this coin lately, and the random doubling of spends is kinda an interesting feature.  Maybe we'll get lucky and our deposits to the exchange will get multiplied =).

--

@PoolWaffle: how about adding DigiByte (DGB)?  Seems to be doing pretty well lately after the publicity from their code being used in Doge.  Diff staying above 10, and listed on crypsty.  Can't recall if there is anything particularly odd about their implementation that would make it unprofitable, but I don't believe so.
zneww
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250



View Profile
March 26, 2014, 07:20:19 PM
 #3505

CoinSolver mines DigiByte, so it should be fine to be added.
bbbbbb2014
Member
**
Offline Offline

Activity: 93
Merit: 10


View Profile
March 26, 2014, 07:43:10 PM
Last edit: March 26, 2014, 07:55:24 PM by bbbbbb2014
 #3506

I am confused as to how this could happen?  How could my mining be hijacked?  On my end?  From mining sfw (i.e.; cgminer) I poll the mining pool host by dns name (which is not going to be hacked by my isp)?  So, that would leave someone doing something on the pool hosting server to hijack my work?  Sorry, little confused how this could happen.  Can you explain your thoughts further?

If I understood the problem, a yet to be hijacked miner got a valid message - to redirect its hashing power to another IP & destination port.

Basically, this happened on different miner versions and different operating systems.

Injecting TCP packets into sessions is not an easy task - but it is possible. For a starter, one must know the IP address of the miner and source & destination ports (and some other details regarding specific TCP session).

Now, Waffle claims, nobody broke into the wafflepool. Please note, it's good enough to sniff (read) the packets - not modify them. Injection of packages can be done separately on the other part of the world. To be fair to waffle, hijacking happened also to people mining to other pools also - albeit it is not clear if packets were sniffed on one pool only. For example, you hash at pool #2 (not waffle), hacker sniffed up the session, sent a redirect package, redirecting your mine to someplace else.

What should be considered is that data is leaking at some of the pools, but the redirect happens to miners, currently mining at some other pool. Technicaly speaking cgminer connects to EVERY pool stated in the config - even to reserve pools. I think that this is very possible explanation, how on earth hacker managed to inject packages to miners. Besides ignoring the redirect message, two other security measures comes to my mind (kalroth - r u reading this???):

a) is it possible that a redirect message comes from a session /w pool A and redirects the pool B? I think a check should be done, to honor only redirects from the session limited to a pool to which the session belongs - it would also mean that if a message tries to redirect other session's pool - it is probably hacker's redirect. Please note that in that case one would clearly know which pool is sniffed up. Of course - perhaps packages are not sniffed at pool's side - but perhaps someone broke into some router and it is sniffing interesting packages. But in this case, a trace route can be compared and perhaps some common point crops up. So - knowing from which session pool the redirect message came, would be very useful.

b) injection is possible if session is open; is it possible that a sesion to a pool is established only after for example primary pool is down - this way, this would radicaly lower the exposure to hijacking


Somebody else even suggested that a communication can be intercepted and redirected. That's also true.

So what can be done?

Either use kalroth latest version of cgminer, where there is a new option, to ignore the redirection command.

Other option is to strictly limit where the miner can connect to -- basically, even if mining is redirected, cgminer will not be able to communicate - thus no hash power is stolen.

A long term solution would be that the miner would be able to verify a true identity of the pool.
lagster
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
March 26, 2014, 08:02:08 PM
Last edit: March 26, 2014, 08:27:32 PM by lagster
 #3507


Injecting TCP packets into sessions is not an easy task - but it is possible. For a starter, one must know the IP address of the miner and source & destination ports (and some other details regarding specific TCP session).

does anyone else think of a pool that attracted hundreds of miners with "foolish" proposal of 200% profit?
i wonder if every single one of hijacked miners were mining there and if anyone of them had dinamic ip.. i was not poolswitched yet and i was mining there with no static ip.
The Fat Miner
Member
**
Offline Offline

Activity: 84
Merit: 10

Please give me Bitcoins so I can buy more food


View Profile
March 26, 2014, 08:09:00 PM
 #3508

Can scrypt n coins be mined on a pool like this ?
phzi
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
March 26, 2014, 08:29:25 PM
 #3509


Injecting TCP packets into sessions is not an easy task - but it is possible. For a starter, one must know the IP address of the miner and source & destination ports (and some other details regarding specific TCP session).

does anyone else suspect a pool that attracted hundreds of miners few weeks ago with "foolish" proposal of 200% profit?
i wonder if anyone of hijacked miners had dinamic ip
No...

Here is my speculative analysis of the attack (when I re-enabled redirect on one of my miners, it was redirected repeatedly to a server in Panama and I was able to do a bit of analysis):
- I do not believe this attack involves DNS manipulation
- The attack seems more closely related to the NTP Amplification attacks, whereby it abuses networks that do not properly implement BCP38 (speculative, but makes sense).

Here is how I would attempt to execute such an attack, based on :
- buy a server in the same data center as a large pool
- sniff packets intended for the pool (this used to be possible on OVH if you were on the same subnet as the intended host, probably still is)
- when a miner connects to the pool, snag it's IP, and pass that IP to another server that is hosted on a network that allows source IP address spoofing (e.g., it does not follow BCP38).
- from your server that can spoof source IP addresses, send a packet to the miner with a redirect command, using the WP server as the source.
lagster
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
March 26, 2014, 08:52:03 PM
 #3510

Here is how I would attempt to execute such an attack, based on :
- buy a server in the same data center as a large pool
- sniff packets intended for the pool (this used to be possible on OVH if you were on the same subnet as the intended host, probably still is)
is this really possible? i mean of course it is possible if you are working in that datacenter, but for outsider and only knowing pool ip..?
phzi
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
March 26, 2014, 08:58:12 PM
 #3511

Here is how I would attempt to execute such an attack, based on :
- buy a server in the same data center as a large pool
- sniff packets intended for the pool (this used to be possible on OVH if you were on the same subnet as the intended host, probably still is)
is this really possible? i mean of course it is possible if you are working in that datacenter, but for outsider and only knowing pool ip..?
It's definitely possible.
utahjohn
Hero Member
*****
Offline Offline

Activity: 630
Merit: 500


View Profile
March 26, 2014, 09:09:20 PM
 #3512

From MP frontpage:
Mar 26 12:02 PM The Luckycoin network appears to be under some sort of timewarp attack which is causing the client to reject 95%+ of our blocks. It is not recommended to mine LKY at this point.

The attacks are appearing to be on multiple fronts.  First redirect then ddos ...

Is it possible that the perpetrator(s) have gained a "51%" position from these attacks?
gaalx
Sr. Member
****
Offline Offline

Activity: 411
Merit: 250



View Profile
March 26, 2014, 09:13:47 PM
 #3513

Depends on what wallet you use.  There should be an option somewhere for "sign message" for a certain address (proves you own the address essentially)
one - btc-e; second - a conventional purse. as purse btc-e write to you?
btc-e is an exchange, not a wallet.  If you weren't using an address that you hold the private key to (you don't for any deposit address on an exchange), then you can't sign a message from that address.

quick question --does adding shaders make your gpu more stable whilst mining? regarding 290x or 290
Specifying shaders has no effect if you have also specified thread-concurrency.  TC is a better tuning method, generally.  I have found the best values for the 290s are a tc at 20479 or 28672 (depends on the BIOS/card as to which is more optimal).  Various other tc values are commonly used, but these have been the most optimal for me (and I have tested 100s of tc values on my banks of 290s).

Wonder what is CleverMining mining, they're on 0.00583 BTC/MH, although their reject rates are crazy high.
I have never seen CM profits actually pass WP profits in reality.  I have run side by side tests many times, and the CM numbers never bear true after you take into account under-reported hashrate and rejected shares.

Because Wafflepool mining ALWAYS doge, mintcoin flapycon, worldcoin => POOR PROFITS

Today LTC = 0.0052 BTC/Day/Mh and Wafflepool = 0.0044

CONCLUSION = MINE YOURSELF LITECOIN ! or go to clevermining...

It seemed that wafflepool mining the most profitable crypto?  Undecided Huh
lol... WafflePool does mine the most profitable scrypt coins.  And the litecoin diff JUST changed.  Give it 24 hours to see what WP profits are like.

Besides, unless you are using a real PPS pool (only one I know of is litecoinpool.org, as LTCRabbit is a modified PPS scheme), mining LTC will never earn you "100%" of LTC profits - some days will be less, some more.

Looks like the pool has been mainly mining Fluttercoin, DogeCoin, and Litecoin so far today.  These would indeed be the most profitable coins to mine.  (We haven't mined mint in ages - we just have unexchanged coins stuck in coinmarket.io from a long time ago, we aren't mining flappycoin - we are sitting on a bunch because there is no buy interest, and I haven't seen worldcoin being mined yet today).

thanks for Fluttercoin. shown as a stable medium fork. watching him for over a week
Ya, glad you added it, PW. Manually trading will hopefully be worthwhile - profitability has been good on this coin lately, and the random doubling of spends is kinda an interesting feature.  Maybe we'll get lucky and our deposits to the exchange will get multiplied =).

--

@PoolWaffle: how about adding DigiByte (DGB)?  Seems to be doing pretty well lately after the publicity from their code being used in Doge.  Diff staying above 10, and listed on crypsty.  Can't recall if there is anything particularly odd about their implementation that would make it unprofitable, but I don't believe so.

support in many ways, but would not have contact with coins less Network Hashrate 1-2 GH / s. Uncertain condition.

Like behavior Spaincoin (SPA), especially soon to introduce Cryptsy.com. Eyeing.

gaalx
Sr. Member
****
Offline Offline

Activity: 411
Merit: 250



View Profile
March 26, 2014, 09:17:47 PM
 #3514

Can scrypt n coins be mined on a pool like this ?
during DDOS, I tried script-n. can not be parallel to mine and then it requires individual settings. perhaps in time we need to convince, pw, another pool on a script-n.

Reddcoin (RDD)
Network Hashrate: 1.71 GH/s
Potcoin (POT)
Network Hashrate: 1.71 GH/s

phzi
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
March 26, 2014, 09:23:02 PM
 #3515

Can scrypt n coins be mined on a pool like this ?
during DDOS, I tried script-n. can not be parallel to mine and then it requires individual settings. perhaps in time we need to convince, pw, another pool on a script-n.
The real work that needs to be done is extending the stratum implementation to also pass the value of N to the sgminer (and have sgminer understand).  Then a pool could switch between different scrypt-n coins.

I did some vertcoin mining while WafflePool was being DDoS'd, and I am planning to stay long on vertcoin for now - I think it's likely to do quite well as scrypt ASIC power ramps up.  Already, vertcoin is consistently more profitable to mine then LTC by my calculations (and we are still at the very beginning of the scrypt ASIC era).
The Fat Miner
Member
**
Offline Offline

Activity: 84
Merit: 10

Please give me Bitcoins so I can buy more food


View Profile
March 26, 2014, 09:23:40 PM
 #3516

Can scrypt n coins be mined on a pool like this ?
during DDOS, I tried script-n. can not be parallel to mine and then it requires individual settings. perhaps in time we need to convince, pw, another pool on a script-n.

Yeh I was just reading it can't be mined alongside normal script coins on a pool, And there's not enough of them for a multicoin pool yet, At least I don't think.

Well lets hope they take off and we soon see a new Wafflepool address with script n coins.
The Fat Miner
Member
**
Offline Offline

Activity: 84
Merit: 10

Please give me Bitcoins so I can buy more food


View Profile
March 26, 2014, 09:32:29 PM
Last edit: March 26, 2014, 09:48:24 PM by The Fat Miner
 #3517

I did some vertcoin mining while WafflePool was being DDoS'd, and I am planning to stay long on vertcoin for now - I think it's likely to do quite well as scrypt ASIC power ramps up.  Already, vertcoin is consistently more profitable to mine then LTC by my calculations (and we are still at the very beginning of the scrypt ASIC era).

Where is it possible to sell the new scrypt n coins ?

And if you don't mind saying where are you mining Vertcoin ?

(Edit nevermind looks like Vertcoin is on Cryptsy)
bbbbbb2014
Member
**
Offline Offline

Activity: 93
Merit: 10


View Profile
March 26, 2014, 09:53:11 PM
 #3518

- sniff packets intended for the pool (this used to be possible on OVH if you were on the same subnet as the intended host, probably still is)

Which pools were you connected to?

Sniffing details about packets.... I am not sure if this is possible, as the ethernet switch would prevent sniffing a traffic meant for a different port.

But you know... One could sniff the traffic also on Internet exchanges or redirect the traffic on BGP level - just to catch the traffic.

One cannot reasonably expect that Internet traffic would be hidden - as it is not.
phzi
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


View Profile
March 26, 2014, 10:18:08 PM
 #3519

Which pools were you connected to?

Sniffing details about packets.... I am not sure if this is possible, as the ethernet switch would prevent sniffing a traffic meant for a different port.

But you know... One could sniff the traffic also on Internet exchanges or redirect the traffic on BGP level - just to catch the traffic.

One cannot reasonably expect that Internet traffic would be hidden - as it is not.
WafflePool West - I removed all other pools from the config.  I do not believe this is a at all related to a rogue pool.

Switches, by very nature of the equipment, cannot isolate traffic to a specific port without the use of VLANs.  Routing requests based on IP data (Transport layer - layer 4 in the OSI model) requires a "ROUTER" - switches function only on the data link layer (layer 2), aka MAC addresses.  Suffice to say, a switch does not generally know what port a packet is intended for.

I know from personal experience that you used to be able to sniff traffic at OVH in their France datacenter.  I doubt this has changed.

It could be someone with access to some significant backbone routers - but I highly doubt that.

And if you don't mind saying where are you mining Vertcoin ?
I went solo (found 1 block) and some p2pool.

Yeh I was just reading it can't be mined alongside normal script coins on a pool, And there's not enough of them for a multicoin pool yet, At least I don't think.
Kinda.  Scrypt-Adaptive-N is fully backwards compatible with Scrypt.  "Scrypt" PoW is simply with N=10.  It wouldn't be difficult to automatically switch between scrypt and scrypt-n coins, although different intensity values would likely be desirable.  The main things that needs to be done, is to have stratum pass the value of N along with work - this will ultimately be necessary for ease of use with adaptive-n coins anyway, as the value of N is of course adaptive (changes - in the case of vertcoin, increasing periodically over time).

The latest version of SGMiner already supports Nscrypt by simply specifying --nfactor in your config.
lagster
Newbie
*
Offline Offline

Activity: 56
Merit: 0


View Profile
March 26, 2014, 10:28:13 PM
 #3520

Here is how I would attempt to execute such an attack, based on :
- buy a server in the same data center as a large pool
- sniff packets intended for the pool (this used to be possible on OVH if you were on the same subnet as the intended host, probably still is)
is this really possible? i mean of course it is possible if you are working in that datacenter, but for outsider and only knowing pool ip..?
It's definitely possible.
any proves that you can sniff my traffic if i give you an ip? not just some virtual hoster that you managed to get it working 5 years ago?
so no one else think of ghash when looking for place where they have given their address and probably some more information to get listed?
so was anyone of those who got redirected not having a static ip and never mined at ghash?
Pages: « 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 [176] 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 ... 294 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!