Bitcoin Forum
May 12, 2024, 05:31:05 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 [93] 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 280 »
  Print  
Author Topic: Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB  (Read 1061085 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
eleuthria
Legendary
*
Offline Offline

Activity: 1750
Merit: 1007



View Profile
April 30, 2014, 05:24:28 PM
 #1841

Just a thought about these DOS attacks:

I know that Ghash.io uses Cloudflare to block or mitigate DOS attacks (and I know some aren't too keen on Ghash.io).
Would a service like that help here? Is it expensive?
http://www.cloudflare.com/ddos

Cloudflare is explicitly a HTTP based DDOS prevention service.  They will not help mining at all.  Stratum would not work at all, and GBT would break as soon as the server was under attack.  During an attack, Cloudflare's proxy servers use various methods to try to block attack vectors, which would break GBT as well.  You'd also take a big hit to performance trying to mine over a cloudflare HTTP connection.  Additionally, Cloudflare's proxy server uptimes are not remotely as stable as most pool servers.

RIP BTC Guild, April 2011 - June 2015
1715491865
Hero Member
*
Offline Offline

Posts: 1715491865

View Profile Personal Message (Offline)

Ignore
1715491865
Reply with quote  #2

1715491865
Report to moderator
Every time a block is mined, a certain amount of BTC (called the subsidy) is created out of thin air and given to the miner. The subsidy halves every four years and will reach 0 in about 130 years.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715491865
Hero Member
*
Offline Offline

Posts: 1715491865

View Profile Personal Message (Offline)

Ignore
1715491865
Reply with quote  #2

1715491865
Report to moderator
1715491865
Hero Member
*
Offline Offline

Posts: 1715491865

View Profile Personal Message (Offline)

Ignore
1715491865
Reply with quote  #2

1715491865
Report to moderator
helipotte
Hero Member
*****
Offline Offline

Activity: 650
Merit: 500


Pick and place? I need more coffee.


View Profile
April 30, 2014, 05:47:51 PM
 #1842

Is port 12234 no longer available?  I have been using it for Leaserig.net for some time and last night I could no longer connect to it.  Now port 3334

works for leaserig.  Any thoughts?
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
April 30, 2014, 08:50:42 PM
 #1843

Attack has nothing to do with DNS. So no...

Now that I think about it a bit more, of course it wouldn't. Thanks Lucko.

Now, doing such an attact is easy: packets are transmitted somewhat randomly over Internet. An attacker might monitor packets passing trough his node, and detect those who look like stratum packets, and trivially know the IP of the server, the miner and the port number of each.

How widespread is this attack, how many users have been affected so far? Are other pools experiencing the same problem, or just Eligius? If its just Eligius, it could be because an attacker, having discovered the originating IP address and public key ( wallet address ) from intercepting packets that pass through their node, can then go to the users pool stats page and see what their average hashrate is without the need of any authentication ***.

If this is the case, and its just a guess, along with encrypting the connections between miners and servers, the stats feature might need to have authentication added to it as well?

*** assuming that the attacker would be doing this because it would not be worth their time to do a sequencing attack on a user with a low hashrate

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
Lucko
Hero Member
*****
Offline Offline

Activity: 826
Merit: 1000



View Profile
April 30, 2014, 09:19:04 PM
 #1844

Attack has nothing to do with DNS. So no...

Now that I think about it a bit more, of course it wouldn't. Thanks Lucko.

Now, doing such an attact is easy: packets are transmitted somewhat randomly over Internet. An attacker might monitor packets passing trough his node, and detect those who look like stratum packets, and trivially know the IP of the server, the miner and the port number of each.

How widespread is this attack, how many users have been affected so far? Are other pools experiencing the same problem, or just Eligius? If its just Eligius, it could be because an attacker, having discovered the originating IP address and public key ( wallet address ) from intercepting packets that pass through their node, can then go to the users pool stats page and see what their average hashrate is without the need of any authentication ***.

If this is the case, and its just a guess, along with encrypting the connections between miners and servers, the stats feature might need to have authentication added to it as well?

*** assuming that the attacker would be doing this because it would not be worth their time to do a sequencing attack on a user with a low hashrate
No it has noting to to with that too... It is just stratum traffic that is identified and attacked. I don't understand how would help the attacked to know wallet addresses and used that to his advantage... I also don't understand how would knowing hashrate be of any help too...EDIT:didnt read the last part. It is just looking for stratum traffic and injecting redirect command to miner.

Anyway it happens to me on BTCGuild, Ghesh and Scryptguild too...
baddw
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500



View Profile
April 30, 2014, 11:44:39 PM
 #1845

Attack has nothing to do with DNS. So no...

Now that I think about it a bit more, of course it wouldn't. Thanks Lucko.

Now, doing such an attact is easy: packets are transmitted somewhat randomly over Internet. An attacker might monitor packets passing trough his node, and detect those who look like stratum packets, and trivially know the IP of the server, the miner and the port number of each.

How widespread is this attack, how many users have been affected so far? Are other pools experiencing the same problem, or just Eligius? If its just Eligius, it could be because an attacker, having discovered the originating IP address and public key ( wallet address ) from intercepting packets that pass through their node, can then go to the users pool stats page and see what their average hashrate is without the need of any authentication ***.

If this is the case, and its just a guess, along with encrypting the connections between miners and servers, the stats feature might need to have authentication added to it as well?

*** assuming that the attacker would be doing this because it would not be worth their time to do a sequencing attack on a user with a low hashrate

Interesting hypothesis.  I wonder if all of those attacked are running full Bitcoin nodes at the same public IP addresses?

BTC/XCP 11596GYYq5WzVHoHTmYZg4RufxxzAGEGBX
DRK XvFhRFQwvBAmFkaii6Kafmu6oXrH4dSkVF
Eligius Payouts/CPPSRB Explained  I am not associated with Eligius in any way.  I just think that it is a good pool with a cool payment system Smiley
norgan
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
May 01, 2014, 12:28:10 AM
 #1846

Attack has nothing to do with DNS. So no...

Now that I think about it a bit more, of course it wouldn't. Thanks Lucko.

Now, doing such an attact is easy: packets are transmitted somewhat randomly over Internet. An attacker might monitor packets passing trough his node, and detect those who look like stratum packets, and trivially know the IP of the server, the miner and the port number of each.

How widespread is this attack, how many users have been affected so far? Are other pools experiencing the same problem, or just Eligius? If its just Eligius, it could be because an attacker, having discovered the originating IP address and public key ( wallet address ) from intercepting packets that pass through their node, can then go to the users pool stats page and see what their average hashrate is without the need of any authentication ***.

If this is the case, and its just a guess, along with encrypting the connections between miners and servers, the stats feature might need to have authentication added to it as well?

*** assuming that the attacker would be doing this because it would not be worth their time to do a sequencing attack on a user with a low hashrate

Interesting hypothesis.  I wonder if all of those attacked are running full Bitcoin nodes at the same public IP addresses?

I am not running a node at my public IP. I have seen this issue on Eligius and on Ghash

Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
May 01, 2014, 12:29:49 AM
 #1847

If they were targeting specific servers, they wouldn't be redirecting Bitcoin miners to a scrypt server - kinda pointless Wink

proclivity
Member
**
Offline Offline

Activity: 67
Merit: 10


View Profile
May 01, 2014, 12:33:52 AM
 #1848

Is port 12234 no longer available?  I have been using it for Leaserig.net for some time and last night I could no longer connect to it.  Now port 3334

works for leaserig.  Any thoughts?

I recall wizkid posting a few weeks back that the special KNC port was going away soon to reduce the failsafe blocks. Here's the post:

https://bitcointalk.org/index.php?topic=441465.msg6178552#msg6178552

For tips only - 12QT6zPJM5kQ5piZfn7tyFfcJrbgvSnMLn
anth0ny
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
May 01, 2014, 01:11:15 AM
 #1849

Edit: well ... OK I'm stupid now aren't I Smiley

I think we tried to say that several times, in various different ways Cheesy
w00tcoin
Member
**
Offline Offline

Activity: 98
Merit: 10

w00t!coin


View Profile
May 01, 2014, 03:18:15 AM
 #1850

Looks like the site is down right now.

Any Eligius admins aware?

>> __ AntMiner S1 for sale. Message me. __ <<
>> __ 9 of 10 left. One sold so far. w00t! __ <<
PlanetCrypto
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250



View Profile
May 01, 2014, 03:23:09 AM
 #1851

FYI,

It appears that google's DNS does not have an "A" record for eligius.st.
Amazon's DNS resolves correctly.

Just got:
"Server not found

Firefox can't find the server at eligius.st."

Prompted me to do a little checking.

kinda looks like somebody is screwing around with a DNS re-direct/kill.

50.16.187.58 works just fine, BTW.

Inquiring minds wanna' know.



 

            ▄▄████▄▄
        ▄▄██████████████▄▄
      ███████████████████████▄▄
      ▀▀█████████████████████████
██▄▄       ▀▀█████████████████████
██████▄▄        ▀█████████████████
███████████▄▄       ▀▀████████████
███████████████▄▄        ▀████████
████████████████████▄▄       ▀▀███
 ▀▀██████████████████████▄▄
     ▀▀██████████████████████▄▄
▄▄        ▀██████████████████████▄
████▄▄        ▀▀██████████████████
█████████▄▄        ▀▀█████████████
█████████████▄▄        ▀▀█████████
██████████████████▄▄        ▀▀████
▀██████████████████████▄▄
  ▀▀████████████████████████
      ▀▀█████████████████▀▀
           ▀▀███████▀▀



.SEMUX
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
  Semux uses 100% original codebase
  Superfast with 30 seconds instant finality
  Tested 5000 tx per block on open network
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
█ █
AbiTxGroup
Sr. Member
****
Offline Offline

Activity: 447
Merit: 250


View Profile
May 01, 2014, 03:38:53 AM
 #1852

Miners are still connecting to stratum and mining, that's all I care about.  Well, that and the payouts.   Grin
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
May 01, 2014, 03:51:30 AM
 #1853

Interesting hypothesis.  I wonder if all of those attacked are running full Bitcoin nodes at the same public IP addresses?

I have never run a bitcoin node, so have little insight as to what can be harvested by way of intel from the relayed traffic. But I don't think that running a node would make you any more or less susceptible to this type of attack.

If they were targeting specific servers, they wouldn't be redirecting Bitcoin miners to a scrypt server - kinda pointless Wink

Gawd, well that pretty much sums it up.

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
warren9999
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
May 01, 2014, 03:58:46 AM
 #1854

More than 3hr, No block found from ELigius
 Shocked Shocked
Multipulty
Sr. Member
****
Offline Offline

Activity: 399
Merit: 250



View Profile
May 01, 2014, 04:01:39 AM
 #1855

Looks like the site is down right now.

Any Eligius admins aware?

what to do?
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
May 01, 2014, 04:10:40 AM
 #1856

More than 3hr, No block found from ELigius
 Shocked Shocked

Nothing unusual there. Miners seem to be mining fine. This 'appears' to be just a website issue.

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
baddw
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500



View Profile
May 01, 2014, 05:28:47 AM
 #1857

Interesting hypothesis.  I wonder if all of those attacked are running full Bitcoin nodes at the same public IP addresses?

I have never run a bitcoin node, so have little insight as to what can be harvested by way of intel from the relayed traffic. But I don't think that running a node would make you any more or less susceptible to this type of attack.

All bitcoin nodes are discoverable due to the peer-to-peer nature of the network.  It would take some time and effort, but it would not be difficult to get a large list of bitcoin node IP's.  And IP's running bitcoin nodes are probably more likely to be mining than IP's not running bitcoin nodes.

Quote
If they were targeting specific servers, they wouldn't be redirecting Bitcoin miners to a scrypt server - kinda pointless Wink

Gawd, well that pretty much sums it up.

Yeah, I didn't realize that it was a redirect to a scrypt pool.  Interesting.  That shows that this is a pretty indiscriminate stratum attack, nothing about particular coins or pools.  Which, in one way, is comforting; in another way, it's not, since it implies that some fairly major routers are being tapped somehow.

Or... maybe somebody did some IP recon with heartbleed on this forum?  People logged in to this forum are obviously more likely to be miners than the Internet population at large.  Scrape a bunch of IP addresses and try those.... hmm.  But again, you'd think that such an attacker would at least have an SHA256 pool set up.

BTC/XCP 11596GYYq5WzVHoHTmYZg4RufxxzAGEGBX
DRK XvFhRFQwvBAmFkaii6Kafmu6oXrH4dSkVF
Eligius Payouts/CPPSRB Explained  I am not associated with Eligius in any way.  I just think that it is a good pool with a cool payment system Smiley
Lucko
Hero Member
*****
Offline Offline

Activity: 826
Merit: 1000



View Profile
May 01, 2014, 05:49:24 AM
 #1858

If they were targeting specific servers, they wouldn't be redirecting Bitcoin miners to a scrypt server - kinda pointless Wink

No if you look at google for "46.28.205.80 p2pool" you can still see it was running Bitcoin P2Pool node. But it is/was running Wordcoin pool to... http://bitinfocharts.com/worldcoin/nodes/switzerland/unknown.html That IP found at lest 1 block if you look for "46.28.205.80 blockchain" in google.
goldar
Newbie
*
Offline Offline

Activity: 25
Merit: 0


View Profile
May 01, 2014, 05:56:30 AM
 #1859

Looks like the site is down right now.

Any Eligius admins aware?

what to do?

No it is not down
Try: 50.16.187.58
freebit13
Hero Member
*****
Offline Offline

Activity: 616
Merit: 500

I got Satoshi's avatar!


View Profile
May 01, 2014, 06:35:14 AM
 #1860

Looks like the site is down right now.

Any Eligius admins aware?
Page loads fine for me... seems to be more stable than yesterday...

Decentralize EVERYTHING!
Pages: « 1 ... 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 [93] 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 280 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!