poolwaffle (OP)
|
|
March 25, 2014, 12:35:57 AM |
|
U.S. west is still down Just looked and my hashrate dropped to Nil again Recent Shifts ID Ended Shares (yours / total) Blocks Found 15643 OPEN 0 / 18895360 1 15642 2014-03-25 00:13:46 0 / 50270208 1 15641 2014-03-25 00:04:21 0 / 50136576 1 15640 2014-03-24 23:55:21 1024 / 50039296 0 15639 2014-03-24 23:46:51 5120 / 50228224 0 DDOS stopped for about 30min, and its back again. I've got new boxes up in place, should be able to mine right now on new endpoints. Just make sure to bust any DNS cache you have (restart the miner should do it).
|
|
|
|
|
|
|
|
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
|
|
LPCobris
|
|
March 25, 2014, 12:47:59 AM |
|
U.S. west is still down Just looked and my hashrate dropped to Nil again Recent Shifts ID Ended Shares (yours / total) Blocks Found 15643 OPEN 0 / 18895360 1 15642 2014-03-25 00:13:46 0 / 50270208 1 15641 2014-03-25 00:04:21 0 / 50136576 1 15640 2014-03-24 23:55:21 1024 / 50039296 0 15639 2014-03-24 23:46:51 5120 / 50228224 0 DDOS stopped for about 30min, and its back again. I've got new boxes up in place, should be able to mine right now on new endpoints. Just make sure to bust any DNS cache you have (restart the miner should do it). Fuxing DDOS attacks... So what is needed from us miners to get that new endpoints? Restart the miners? Hold tight PW! LPC
|
|
|
|
utahjohn
|
|
March 25, 2014, 01:14:36 AM |
|
Going to try 20140324 kalroth again and see if this is a bug introduced by last patch.
So far so good, not stuck like it did yesterday ... will let it run a couple hours with logging and see. Maybe it was due to pools being DDOS ...
|
|
|
|
malodin
Newbie
Offline
Activity: 21
Merit: 0
|
|
March 25, 2014, 01:34:08 AM |
|
hi all,
total noob here, been mining on wafflepool for the past two weeks, with decent results but have some questions regarding the stalerate, since i am new to this i have not found a guide that explains all the different things in cgminer i.e. thread concurrency and intensity and all that. I copied my build from a youtube video i am running 6 r9 270x's with a h81btc motherboard etc... i have been successfully mining for the past two weeks using an intensity level of 20 and a thread concurrency of 24000 this seemed to have worked great for the first week and a half until the stratum change happened, now i have a stalerate of 15m Hashrate 15m Stalerate 2.21 MH/s 2.74%
is this a good number, the stale rate i see jumping all over clear up to 7%
i tried dropping the intensity level down to 17 and my hash rate stayed the same but my "Bitcoins earned (not yet sent): 0.00370838", stopped increasing as fast as it does with the 20.
the last two days i have gone from earning an average of 0.015 to less than 0.010, my most recent payout as you can see is .0079
2014-03-23 16:28:17 0.00797974 2014-03-22 23:08:36 0.01295763 2014-03-21 18:59:12 0.01042906 2014-03-20 18:55:37 0.01317510 2014-03-19 18:28:28 0.01780143
any suggestions would be greatly appreciated
2.21 sounds a bit low; I've got 5 270s (one of which is a 270x) and they run between 2.7 and 3.2 Mhs depending on how generous the hashing gods are feeling. Definitely switch to Kalroth's cgminer. I did and using xintensity (actually raw intensity) I was able to tune those cards to give me a solid 95 - 110% WUE. A good thread on these cards with xintensity is https://bitcointalk.org/index.php?topic=459419.0downloaded kalroths cgminer, set it up let it auto run for a few minutes the wrote the config file. when editing the config file it showed something other than scrypt in the kernel, so I switched it to scrypt. when doing this I get an error "concurrent_threads" is undefinded. const uit x=get_global_id(0)%concurrent_threads; failed to init gpu thread 0 disabling device 0 press enter to continue
|
|
|
|
utahjohn
|
|
March 25, 2014, 01:39:42 AM |
|
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.
EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL
|
|
|
|
tachyon_john
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 25, 2014, 01:47:40 AM |
|
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining): {"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]} I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one. If you happen to track one down, please do share what you find here as I will be reading! It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up. If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.
|
|
|
|
utahjohn
|
|
March 25, 2014, 01:50:00 AM |
|
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining): {"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]} I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one. If you happen to track one down, please do share what you find here as I will be reading! It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up. If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc. Whats to stop them from creating a new wallet and transferring to new wallet ... EDIT: I'll bet the coins have been "tumbled" multiple times and are lost by now ...
|
|
|
|
malodin
Newbie
Offline
Activity: 21
Merit: 0
|
|
March 25, 2014, 01:51:28 AM |
|
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.
EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL
found this on the net for an r9 270x so copied it "no-submit-stale" : true, "intensity" : "20", "vectors" : "1", "worksize" : "256", "kernel" : "scrypt", "auto-fan" : true, "temp-cutoff" : "85", "temp-overheat" : "75", "temp-target" : "70", "expiry" : "30", "log" : "5", "queue" : "1", "retry-pause" : "5", "submit-stale" : "false", "scan-time" : "30", "scrypt" : true, "temp-hysteresis" : "3", "shares" : "0", "shaders" : "0", "thread-concurrency" : "11263", "gpu-thread" : "0", "gpu-engine" : "1120", "sharethreads" : "32", "lookup-gap" : "2", "gpu-powertune" : "00", "gpu-memclock" : "1500" } with these settings I am pulling in 486 per card n average, gpu4 is a little low at 473 I want to force the fans to run pretty high not auto tune lie this one is but its getting me hash's now
|
|
|
|
tachyon_john
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 25, 2014, 01:57:39 AM |
|
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining): {"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]} I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one. If you happen to track one down, please do share what you find here as I will be reading! It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up. If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc. Whats to stop them from creating a new wallet and transferring to new wallet ... EDIT: I'll bet the coins have been "tumbled" multiple times and are lost by now ... They can do that as much as they want, but all transactions can be traced back to the blacklisted address because they are all in the blockchain. Any address that is only 1 or 2 hops away could be considered "tainted" by the blacklisted address...
|
|
|
|
utahjohn
|
|
March 25, 2014, 01:59:10 AM |
|
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.
EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL
found this on the net for an r9 270x so copied it "no-submit-stale" : true, "intensity" : "20", "vectors" : "1", "worksize" : "256", "kernel" : "scrypt", "auto-fan" : true, "temp-cutoff" : "85", "temp-overheat" : "75", "temp-target" : "70", "expiry" : "30", "log" : "5", "queue" : "1", "retry-pause" : "5", "submit-stale" : "false", "scan-time" : "30", "scrypt" : true, "temp-hysteresis" : "3", "shares" : "0", "shaders" : "0", "thread-concurrency" : "11263", "gpu-thread" : "0", "gpu-engine" : "1120", "sharethreads" : "32", "lookup-gap" : "2", "gpu-powertune" : "00", "gpu-memclock" : "1500" } with these settings I am pulling in 486 per card n average, gpu4 is a little low at 473 I want to force the fans to run pretty high not auto tune lie this one is but its getting me hash's now Some changes I would make: "submit-stale" : "true", "gpu-fan" : "60-100", "queue" : "0", EDIT : http://www.overclock.net/t/1461916/tutorial-ultimate-guide-to-tweaking-amd-cgminer-3-7-2-kalroth-edition-sgminer-instructions-included-aswell-get-the-most-hash-out-of-your-gpu
|
|
|
|
suchmoon
Legendary
Offline
Activity: 3654
Merit: 8922
https://bpip.org
|
|
March 25, 2014, 02:04:24 AM |
|
If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.
This is so wrong on so many levels... Without getting into technical details on how exactly would you do that, think about this: who decides that "an address involved in theft, fraud, etc."? What happens to a legitimate merchant who sells a product or a service to one of the addresses "involved"? It's seems you would like to bring over the clusterfuck that is credit card chargebacks/disputes over to crypto currencies. Thank you, but no (and thank Satoshi this is not really possible).
|
|
|
|
gtraah
|
|
March 25, 2014, 02:11:59 AM |
|
Guys I have been reading some comments and I am confused with a couple points and with some that I read, I may be reading them wrong,
1st - I saw something about " My miner being hi-jacked" Using Kalroths may stop this? Whats this about
2nd - What is this issue that i was reading with Cgminer and using quota option? I dont use this, whats the benefits?
3rd - Theft - what theft?
4th - Do we have to restart Cgminer, Seems i'm hashing ok on the stats (I am at work - not near the miner) I have 5 Fail-overs 1st 3 are Wafflepool and the last 2 are Clevermining, Seems I am still accepting shares at the correct Hashrates. It has been automatic since 10 hrs ago... Yes it did switch to clever-mining but then came back to waffle.. Is this the correct way to do this?
|
|
|
|
suchmoon
Legendary
Offline
Activity: 3654
Merit: 8922
https://bpip.org
|
|
March 25, 2014, 02:14:52 AM |
|
They can do that as much as they want, but all transactions can be traced back to the blacklisted address because they are all in the blockchain. Any address that is only 1 or 2 hops away could be considered "tainted" by the blacklisted address...
You do realize that you can generate any number of addresses at will, and create as many "hops" as you want for any amounts and there is nothing whatsoever to tie any of these addresses or transactions to any particular entity? Or just place a bet on satoshi dice and you can probably "taint" half the blockchain. Not to mention there are "shared" wallets out there specifically designed for laundering and probably about a million other ways to do it.
|
|
|
|
utahjohn
|
|
March 25, 2014, 02:17:35 AM Last edit: March 25, 2014, 10:26:36 AM by utahjohn |
|
Guys I have been reading some comments and I am confused with a couple points and with some that I read, I may be reading them wrong,
1st - I saw something about " My miner being hi-jacked" Using Kalroths may stop this? Whats this about
2nd - What is this issue that i was reading with Cgminer and using quota option? I dont use this, whats the benefits?
3rd - Theft - what theft?
4th - Do we have to restart Cgminer, Seems i'm hashing ok on the stats (I am at work - not near the miner) I have 5 Fail-overs 1st 3 are Wafflepool and the last 2 are Clevermining, Seems I am still accepting shares at the correct Hashrates. It has been automatic since 10 hrs ago... Yes it did switch to clever-mining but then came back to waffle.. Is this the correct way to do this?
Item 2: I am using "quota" in the pools section of .conf file to designate what percentages of hash I want to mine on several pools ... it's in the docs for cgminer. Example for pools section: "pools" : [ { "quota" : "10;stratum+tcp://us-west2.multipool.us:7777", "user" : "yourworker", "pass" : "yourpass" }, { "quota" : "30;stratum+tcp://uswest.wafflepool.com:3333", "user" : "yourworker", "pass" : "yourpass" }, { "quota" : "25;stratum+tcp://dmd.cryptotroll.com:3339", "user" : "yourworker", "pass" : "yourpass" }, { "quota" : "15;stratum+tcp://us1.cryptotroll.com:3333", "user" : "yourworker", "pass" : "yourpass" } ] If you are using "quota" you must also include this line down in lower section of conf: "load-balance" : true, From what I have read if you are using failover-only it will also fall back to first alive pool if a pool dies. Also if a pool dies it's share of quota is redistributed among alive pools EDIT: even if you have a pool with quota set to 0 it will be tried as a fallback
|
|
|
|
tachyon_john
Newbie
Offline
Activity: 28
Merit: 0
|
|
March 25, 2014, 02:19:38 AM |
|
If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.
This is so wrong on so many levels... Without getting into technical details on how exactly would you do that, think about this: who decides that "an address involved in theft, fraud, etc."? What happens to a legitimate merchant who sells a product or a service to one of the addresses "involved"? It's seems you would like to bring over the clusterfuck that is credit card chargebacks/disputes over to crypto currencies. Thank you, but no (and thank Satoshi this is not really possible). You say it's not possible, but if you have the complete list of transactions, it is possible to deny exchange to other currencies. You can't prevent exchange of coins within the currency, but there's no reason anyone has to willingly accept a bitcoin that was originally stolen from a miner in exchange for a traditional currency. In reality, the value of bitcoins today is only as good as what you are able to exchange them for in terms of real goods and services, or in traditional currencies. While a thief may steal a bitcoin and pawn it off on someone else, here's no rule that says an exchange has to accept that bitcoin address for exchange with a dollar, or other currency.
|
|
|
|
utahjohn
|
|
March 25, 2014, 02:38:34 AM |
|
Going to try 20140324 kalroth again and see if this is a bug introduced by last patch.
So far so good, not stuck like it did yesterday ... will let it run a couple hours with logging and see. Maybe it was due to pools being DDOS ...
Seems to be switching fine now "quota" is working
|
|
|
|
utahjohn
|
|
March 25, 2014, 02:52:53 AM |
|
Miners slowly returning to waffle Hashrate: 17.13 GH/s Miners: 3389
|
|
|
|
grendel25
Legendary
Offline
Activity: 2282
Merit: 1031
|
|
March 25, 2014, 03:04:45 AM |
|
Miners slowly returning to waffle Hashrate: 17.13 GH/s Miners: 3389 CM's hashrate about doubled during the WP DDOS and currently still shows about 22.4 GH/s
|
|
|
|
suchmoon
Legendary
Offline
Activity: 3654
Merit: 8922
https://bpip.org
|
|
March 25, 2014, 03:11:17 AM |
|
If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves. Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.
This is so wrong on so many levels... Without getting into technical details on how exactly would you do that, think about this: who decides that "an address involved in theft, fraud, etc."? What happens to a legitimate merchant who sells a product or a service to one of the addresses "involved"? It's seems you would like to bring over the clusterfuck that is credit card chargebacks/disputes over to crypto currencies. Thank you, but no (and thank Satoshi this is not really possible). You say it's not possible, but if you have the complete list of transactions, it is possible to deny exchange to other currencies. You can't prevent exchange of coins within the currency, but there's no reason anyone has to willingly accept a bitcoin that was originally stolen from a miner in exchange for a traditional currency. In reality, the value of bitcoins today is only as good as what you are able to exchange them for in terms of real goods and services, or in traditional currencies. While a thief may steal a bitcoin and pawn it off on someone else, here's no rule that says an exchange has to accept that bitcoin address for exchange with a dollar, or other currency. I'm sure you would love to be arrested in a bank because the greenbacks you gave to the cashier were touched by your friendly neighborhood drug dealer a couple of "hops" ago, based on an anonymous tip . What could possibly go wrong with that.
|
|
|
|
suchmoon
Legendary
Offline
Activity: 3654
Merit: 8922
https://bpip.org
|
|
March 25, 2014, 03:12:00 AM |
|
Miners slowly returning to waffle Hashrate: 17.13 GH/s Miners: 3389 CM's hashrate about doubled during the WP DDOS and currently still shows about 22.4 GH/s GHash.IO/LTC went from 8 to 30 back to 8 GH/s.
|
|
|
|
|