utahjohn
|
|
March 25, 2014, 05:34:02 PM Last edit: March 25, 2014, 07:09:54 PM by utahjohn |
|
I have not completely given up on waffle, still in my fail-over. Some of the hostility and so called etiquite (spelling?) and arguing over stupid shit is not conducive to wanting to be here. Who is the most brilliant mathematician or other shit like that does not belong here. Help and support of the pool DOES. Granted the pool has been suffering from numerous attacks I may still return to mining here For now the pool has lost another's hashrate ... Like I said bye. One of my other pools must be having problems, failing over to waffle some hashrate still showing ...
|
|
|
|
|
|
|
|
Even in the event that an attacker gains more than 50% of the network's
computational power, only transactions sent by the attacker could be
reversed or double-spent. The network would not be destroyed.
|
|
|
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
|
|
|
phzi
|
|
March 25, 2014, 07:08:32 PM |
|
For now the pool has lost another's hashrate ... Like I said bye.
Good riddance. Please don't post here again. Bye! I mean damn... learn how to use a forum - double posts are stupid, but triple posts are downright ignorant. There is an EDIT function you know. -- And while we are talking about forum etiquite... damn, please everyone, you don't have to quote a whole page. Snip quotes to the part you are responding to. Ahhh
|
|
|
|
dogechode
|
|
March 25, 2014, 07:28:13 PM |
|
I love waffle pool but I don't have the time and patience to set up all kinds of failovers and constantly check on my stuff, and lately it's just too often that I check on my rigs (the ones pointed to waffle) and find I've lost a few hours worth of work for one reason or another. I'm switching pools for now, sorry, I will keep an eye on this thread and give it a shot again if things smooth out a bit.
|
|
|
|
mark613
Member
Offline
Activity: 86
Merit: 10
|
|
March 25, 2014, 07:42:03 PM |
|
Recent Shifts ID Ended Shares (yours / total) Blocks Found 15855 OPEN 4608 / 23064064 0 15854 2014-03-25 19:34:17 11776 / 50250240 0 15853 2014-03-25 19:27:12 14336 / 50664448 0 15852 2014-03-25 19:20:07 10752 / 50412032 0 15851 2014-03-25 19:12:57 14848 / 50208256 0 15850 2014-03-25 19:06:01 15360 / 53169152 0 15849 2014-03-25 18:58:32 11264 / 50439168 0 15848 2014-03-25 18:51:27 8704 / 50469376 0 15847 2014-03-25 18:44:22 8704 / 50545152 0
Streak of bad luck it appears.
|
|
|
|
jimprofit99
Newbie
Offline
Activity: 23
Merit: 0
|
|
March 25, 2014, 07:56:43 PM |
|
Any chance to see all the MintCoin pilled for weeks finaly exchanged?
|
|
|
|
ButterBread
Member
Offline
Activity: 84
Merit: 10
|
|
March 25, 2014, 07:59:08 PM |
|
See i would think that if i am mining with a specific pool such as wafflepool, i would want my fellow miners to help me with my config files after all as RedGreen would say "were all in this boat together" so it makes sense to me that this particular page is where i would go for support help, after all i would think, all other miners at wafflepool would want all others running as efficiently as possible thus maximizing profits.
You would think so, yet you would be wrong. People follow this forum to read about wafflepool-specific things that may affect their mining, going off-topic (even if it is still mining related) adds a lot of noise and effort * for everybody else * to keep up with what's going on with the pool. So in a way, going off-topic (and keeping at it) leaves a rather selfish impression about yourself. The comparison to entering a chemistry class and expect everyone to listen to your Q's about Med. lit. and like it, is pretty accurate. Just take the hint and head to the right forum, please.
|
|
|
|
|
malodin
Newbie
Offline
Activity: 21
Merit: 0
|
|
March 25, 2014, 08:43:12 PM Last edit: March 25, 2014, 08:56:53 PM by malodin |
|
See i would think that if i am mining with a specific pool such as wafflepool, i would want my fellow miners to help me with my config files after all as RedGreen would say "were all in this boat together" so it makes sense to me that this particular page is where i would go for support help, after all i would think, all other miners at wafflepool would want all others running as efficiently as possible thus maximizing profits.
You would think so, yet you would be wrong. People follow this forum to read about wafflepool-specific things that may affect their mining, going off-topic (even if it is still mining related) adds a lot of noise and effort * for everybody else * to keep up with what's going on with the pool. So in a way, going off-topic (and keeping at it) leaves a rather selfish impression about yourself. The comparison to entering a chemistry class and expect everyone to listen to your Q's about Med. lit. and like it, is pretty accurate. Just take the hint and head to the right forum, please. and yet here you are adding to the off topic discussion as has been explained to the the forum here that this is an off topic discussion...part of the problem not the solution Also there are no forum rules posted on page 1 regarding wafflepool specific comments only. I still maintain that improving my miner improves the overall pools capability. thus makes it a waffle pool specific question oh one more thing, as was stated about 2 pages back....just hit ignore under the name if you dont like it.
|
|
|
|
LuckyKey
|
|
March 25, 2014, 09:26:07 PM |
|
What's up with the waffle profit numbers? The most recent 24 hours about 50% off of what clever mining is producing? From what I read the denial of service attack had subsided awhile ago, and the profit number climbed to over 0.04 per Mh/s per day, and now has gone back down? currently: 0.0377 BTC per Mh/s per day - http://wafflepool.com/stats0.0531 BTC per MH/s per day - http://clevermining.com
|
|
|
|
ndevices
Newbie
Offline
Activity: 58
Merit: 0
|
|
March 25, 2014, 09:45:27 PM |
|
something wrong with pool. i see ~33% rejected share
|
|
|
|
LuckyKey
|
|
March 25, 2014, 09:55:49 PM |
|
What's up with the waffle profit numbers? The most recent 24 hours about 50% off of what clever mining is producing? From what I read the denial of service attack had subsided awhile ago, and the profit number climbed to over 0.04 per Mh/s per day, and now has gone back down? currently: 0.0377 BTC per Mh/s per day - http://wafflepool.com/stats0.0531 BTC per MH/s per day - http://clevermining.comThat's well below just mining for litecoin?! It sure looks like the multi pool system is flawed. According to the difficulty charts, mining litecoin right now at 1 Mh/s will yield you 0.00487 BTC per day…and that is due to go up in approx. 20 hours, as the litecoin difficulty is set to drop by 7.3% ( https://bitcoinwisdom.com/litecoin/difficultyIt depends on the mining power pointed at litecoin over this time period - considering that the big 5 multi pool sites can represent about a third of the current litecoin hashing power (about 50 GH/s of 150 GH/s). If they can lay off litecoin, it would set that rate even lower, which would be used for the subsequent 2K of blocks (about 4 days). A quick calc has the litecoin payment around 0.00524 BTC per Mh/s per day, at the current prediction, starting in 20 hours…and I bet it could climb higher if they collectively laid of litecoin for half a day. lol But what does this say for multi pooling? It sucks? ;-)
|
|
|
|
poolwaffle (OP)
|
|
March 25, 2014, 10:19:52 PM |
|
something wrong with pool. i see ~33% rejected share
More info would be appreciated. Very hard to look into with what you have there... What's up with the waffle profit numbers? The most recent 24 hours about 50% off of what clever mining is producing? From what I read the denial of service attack had subsided awhile ago, and the profit number climbed to over 0.04 per Mh/s per day, and now has gone back down? currently: 0.0377 BTC per Mh/s per day - http://wafflepool.com/stats0.0531 BTC per MH/s per day - http://clevermining.comThat's well below just mining for litecoin?! It sure looks like the multi pool system is flawed. According to the difficulty charts, mining litecoin right now at 1 Mh/s will yield you 0.00487 BTC per day…and that is due to go up in approx. 20 hours, as the litecoin difficulty is set to drop by 7.3% ( https://bitcoinwisdom.com/litecoin/difficultyIt depends on the mining power pointed at litecoin over this time period - considering that the big 5 multi pool sites can represent about a third of the current litecoin hashing power (about 50 GH/s of 150 GH/s). If they can lay off litecoin, it would set that rate even lower, which would be used for the subsequent 2K of blocks (about 4 days). A quick calc has the litecoin payment around 0.00524 BTC per Mh/s per day, at the current prediction, starting in 20 hours…and I bet it could climb higher if they collectively laid of litecoin for half a day. lol But what does this say for multi pooling? It sucks? ;-) Its either that, or that our stats account for about 12hrs of being DDOS'd, either one
|
|
|
|
LuckyKey
|
|
March 25, 2014, 10:27:05 PM |
|
Believe me, I am a fan, and appreciate the waffle open community feeling…I don't have the time to hit the digital pavement and crawl for profit. lol I want it to work!
Think we just need the whole coin industry to surge, where many coins will be generating profits…which I believe will happen in due time.
Nice to hear it could be as a result of the rough DOS period :-)
Thanks!
|
|
|
|
bbbbbb2014
Member
Offline
Activity: 93
Merit: 10
|
|
March 25, 2014, 11:02:39 PM |
|
Just so we can all get a feel for what is currently going on with regards to the miner hijacking / hashpower theft attack that started sometime during the early weekend (the event that occurred prior to the pool server ddos attack), has anyone noticed any of their miners connecting to an unknown rogue server after Monday at 12PM noon GMT (8am eastern US, 5am pacific US)? This is approximately the last 26.5 hours from the time of this posting. Or has that original attack at least subsided for now?
Please note that you do not have to post to say no. Just post if you have recently been affected. Thank you!
I can only say I implemented strict filters on my rigs - and mining became much more steady, no strange rejects, no sudden idle times. And I mine on many pools. On 30+ rigs I found strange connects on only one rig - but I am certain, stealing was in progress for a least 14 days or so. My opinion is that these attacks are still in progress - but many miners are simply not aware of the hijacking dangers. It seems also, whoever steals hash cycles, that he/she is not stealing a total hash power, but perhaps 10 percents here and 10 percents there. This way - everyone is looking for some server and network issues - but in fact a lot of problems is still caused by hijacking.
|
|
|
|
forcefedvr6
Member
Offline
Activity: 101
Merit: 10
|
|
March 25, 2014, 11:23:30 PM |
|
How do I verify what IP addresses my pools are connected to in cgminer, and then how do I know that those are the correct ones?
easiest way is to look at frontpage of pool and see if your hashrate seems correct . add 2>logfile.txt to your cgminer startup batchfile...and you can check for redirects ... Did this, but the logfile.txt does not list any i.p. addresses for any of the pools that I am connected to. It basically just copies what scrolls onto the cgminer display screen. So how do I verify what IP address I am supposed to be connected with, and what IP address that I actually am connected with, for each pool? I'm using cgminer 3.4.3 . I also added "no-client-reconnect" : true to my config in hopes of preventing future hijacking. Does anyone know if that will actually do any good?
|
|
|
|
LuckyKey
|
|
March 25, 2014, 11:29:57 PM |
|
Just so we can all get a feel for what is currently going on with regards to the miner hijacking / hashpower theft attack that started sometime during the early weekend (the event that occurred prior to the pool server ddos attack), has anyone noticed any of their miners connecting to an unknown rogue server after Monday at 12PM noon GMT (8am eastern US, 5am pacific US)? This is approximately the last 26.5 hours from the time of this posting. Or has that original attack at least subsided for now?
Please note that you do not have to post to say no. Just post if you have recently been affected. Thank you!
I can only say I implemented strict filters on my rigs - and mining became much more steady, no strange rejects, no sudden idle times. And I mine on many pools. On 30+ rigs I found strange connects on only one rig - but I am certain, stealing was in progress for a least 14 days or so. My opinion is that these attacks are still in progress - but many miners are simply not aware of the hijacking dangers. It seems also, whoever steals hash cycles, that he/she is not stealing a total hash power, but perhaps 10 percents here and 10 percents there. This way - everyone is looking for some server and network issues - but in fact a lot of problems is still caused by hijacking. I am confused as to how this could happen? How could my mining be hijacked? On my end? From mining sfw (i.e.; cgminer) I poll the mining pool host by dns name (which is not going to be hacked by my isp)? So, that would leave someone doing something on the pool hosting server to hijack my work? Sorry, little confused how this could happen. Can you explain your thoughts further? Thx
|
|
|
|
Rock6.3
Member
Offline
Activity: 70
Merit: 10
|
|
March 25, 2014, 11:46:10 PM |
|
I am confused as to how this could happen? How could my mining be hijacked? On my end? From mining sfw (i.e.; cgminer) I poll the mining pool host by dns name (which is not going to be hacked by my isp)? So, that would leave someone doing something on the pool hosting server to hijack my work? Sorry, little confused how this could happen. Can you explain your thoughts further?
Thx
If we could factually answer your question we could guarantee that the attacks are prevented. Too soon for that unfortunately.
|
|
|
|
comeonalready
|
|
March 26, 2014, 01:43:01 AM Last edit: March 26, 2014, 02:29:08 AM by comeonalready |
|
Just so we can all get a feel for what is currently going on with regards to the miner hijacking / hashpower theft attack that started sometime during the early weekend (the event that occurred prior to the pool server ddos attack), has anyone noticed any of their miners connecting to an unknown rogue server after Monday at 12PM noon GMT (8am eastern US, 5am pacific US)? This is approximately the last 26.5 hours from the time of this posting. Or has that original attack at least subsided for now?
Please note that you do not have to post to say no. Just post if you have recently been affected. Thank you!
I can only say I implemented strict filters on my rigs - and mining became much more steady, no strange rejects, no sudden idle times. And I mine on many pools. On 30+ rigs I found strange connects on only one rig - but I am certain, stealing was in progress for a least 14 days or so. My opinion is that these attacks are still in progress - but many miners are simply not aware of the hijacking dangers. It seems also, whoever steals hash cycles, that he/she is not stealing a total hash power, but perhaps 10 percents here and 10 percents there. This way - everyone is looking for some server and network issues - but in fact a lot of problems is still caused by hijacking. How can you be certain that the hash theft attack was in progress for at least 14 days or so? (And presumably what you are implicitly suggesting is that it was only noticed over the weekend as it might have scaled up to a much higher level?) I would tend to agree it is possible that some miners are still being hijacked to another rogue server but simply haven't noticed it. If whatever vulnerabilities were present to enable this attack in the first place have not been fixed, then the opportunity for an easy gain is a strong lure for them to try it again. However, without anyone reporting active hash theft, there is little to be done to trace anything at the moment. poolwaffle can comment here if he likes, but I would imagine from the perspective of pool servers, it just looks like clients are disconnecting during an attack, as they usually do all day every day, at random intervals based on the actions of their owners and network conditions. I had two ideas to address this problem. I already posted the first earlier which applies mostly to the long term for adding public/private key server authentication checks into the stratum mining protocol itself in such a manner that is does not break any combination of current client or server pairings -- which generated no interest from any of the parties involved.
|
|
|
|
comeonalready
|
|
March 26, 2014, 01:46:52 AM Last edit: March 26, 2014, 03:40:58 AM by comeonalready |
|
How do I verify what IP addresses my pools are connected to in cgminer, and then how do I know that those are the correct ones?
easiest way is to look at frontpage of pool and see if your hashrate seems correct . add 2>logfile.txt to your cgminer startup batchfile...and you can check for redirects ... Did this, but the logfile.txt does not list any i.p. addresses for any of the pools that I am connected to. It basically just copies what scrolls onto the cgminer display screen. So how do I verify what IP address I am supposed to be connected with, and what IP address that I actually am connected with, for each pool? I'm using cgminer 3.4.3 . I also added "no-client-reconnect" : true to my config in hopes of preventing future hijacking. Does anyone know if that will actually do any good? Create a table of your configured mining server host names and what their ip addresses and tcp port numbers should be (there are always subject to change, but only legitimately by the server operators), and learn how to use your operating system's netstat command to view a list of currently active tcp connections. For wafflepool search for tcp connection on appropriate ip address and port 3333. Should that line disappear from the list and your miner is still reporting that it is actively mining (and not having shifted to one of your other backup pools), then that would be indicative of a hash theft attack.
|
|
|
|
utahjohn
|
|
March 26, 2014, 03:03:34 AM Last edit: March 26, 2014, 06:02:47 AM by utahjohn |
|
@forcefeddvr6 you wrote: I'm using cgminer 3.4.3 . I also added "no-client-reconnect" : true to my config in hopes of preventing future hijacking. Does anyone know if that will actually do any good? In reply: "no-client-reconnect" was just added to cgminer-3.7.3 kalroth 20140324 and will have no effect on older versions it will be ignored. http://k-dev.net/cgminer/
|
|
|
|
|