blubberli
|
|
April 08, 2014, 08:51:39 PM |
|
The luck is NOT caused or effected by the attack, but I could certainly see the attacker using that as more fuel for the "leave Eligius" fire, unfortunately.
Bah, Eligius runs smooth and has great support. There is need for pool jumping. *gets a fire extinguisher and blows out the fire*
|
|
|
|
klondike_bar
Legendary
Offline
Activity: 2128
Merit: 1005
ASIC Wannabe
|
|
April 08, 2014, 08:52:00 PM |
|
tl;dr - There are are 3 likely suspects...
KNC, ghash or BTCGuild I doubt it's Discus Fish since many of the people who would leave Eligius for calmer waters would not pick a Chinese centric pool If it is not the above three, then it is something personal and/or jealously as the driving factor KNC does not make sense to me - disrupting other pools does not improve their own since it is private. And there are more chinese miners than you think - its entirely likely some eligius users would be able to speak or translate it (but I agree it *may* not be enough to warrant the attack by discus fish)
|
|
|
|
wizkid057 (OP)
Legendary
Offline
Activity: 1223
Merit: 1006
|
|
April 08, 2014, 08:53:05 PM |
|
I really would love to know who the culprit is.
|
|
|
|
cccminer
Newbie
Offline
Activity: 26
Merit: 0
|
|
April 08, 2014, 08:53:37 PM |
|
Maybe it's not malicious activity? Maybe there's something wrong with some piece of software being used?
For example, I have a number of S1s running through a Stratum proxy. How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?
M
Would you mind sharing what stratum proxy you are using? Version? I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors. I've seen other folks with the same issue
|
|
|
|
AbiTxGroup
|
|
April 08, 2014, 09:04:30 PM |
|
Maybe it's not malicious activity? Maybe there's something wrong with some piece of software being used?
For example, I have a number of S1s running through a Stratum proxy. How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?
M
Would you mind sharing what stratum proxy you are using? Version? I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors. I've seen other folks with the same issue I would like to know which stratum proxy you are using and how you set it up. I have tried using bfgminer, cgminer, and mining_proxy.exe to proxy the S1's without luck. Thanks.
|
|
|
|
DPoS
|
|
April 08, 2014, 09:05:04 PM |
|
tl;dr - There are are 3 likely suspects...
KNC, ghash or BTCGuild I doubt it's Discus Fish since many of the people who would leave Eligius for calmer waters would not pick a Chinese centric pool If it is not the above three, then it is something personal and/or jealously as the driving factor KNC does not make sense to me - disrupting other pools does not improve their own since it is private. And there are more chinese miners than you think - its entirely likely some eligius users would be able to speak or translate it (but I agree it *may* not be enough to warrant the attack by discus fish) perhaps, but there are probably more than a few hosted miners in KNC that point to Eligius.. those would be in play my gut feels something is bigger going on than just DDoS attacks. I keep thinking the HFT jockeys have analyzed pool mining nuts and bolts and are figuring out some minute disrupting tactics that provide advantages if I ran a pool I could look at some things but as an outsider I can only speculate. we all have heard of the selfish mining tactics and that may be going on but what if there is a way to mess with the work distribution in a way that you are boxing out large areas of the nonce for yourself through disruption people say, well the nonce is unique since it is attached to your address... well Eliguis posts everyone's address so couldn't that be taken and messed with by some script jockey if they knew what they were doing? all I am saying is think about something that isn't known yet as attacks since there are attacks ongoing and the 'luck' in Eligius and BTCGuild is more than just luck
|
|
|
|
anth0ny
|
|
April 08, 2014, 09:08:38 PM |
|
I really would love to know who the culprit is.
Maybe start by finding out if there's a particular account or group of accounts which are having bad luck, or if the bad luck is spread out among all the accounts? Even if it's coming from an unknown group of small-hash accounts that's a start. I'm tempted to do this myself, but I should probably work on something more important to me personally.
|
|
|
|
Lucko
|
|
April 08, 2014, 09:12:15 PM Last edit: April 08, 2014, 09:42:32 PM by Lucko |
|
OK this might be a stupid question. I just notice that 1,6 BTC was send out of my wallet. https://blockchain.info/tx/06bf4003e2fc2a25324baef92893a19f24d419fcbe7d04f25f96c2d90717a503Could this be another attack on miners hire or was I just hacked? See conformation warnings and it is still not confirmed... EDIT: Forget it... It was confirmed... So I guess I was hacked... Problem is that I have no idea how...
|
|
|
|
Threader
|
|
April 08, 2014, 09:12:32 PM |
|
whatever they are doing it's now directly affecting my 1.4 TH farm as some of my miners have been auto switching to my 2nd pool backups. My power and network are solid.
|
|
|
|
railzand
Sr. Member
Offline
Activity: 462
Merit: 250
Lux e tenebris
|
|
April 08, 2014, 09:13:29 PM |
|
Someone (Buffett?) wants to buy the pool cheap?
|
|
|
|
speicher
Newbie
Offline
Activity: 6
Merit: 0
|
|
April 08, 2014, 09:38:19 PM |
|
Is it possible that a "hacker" infected a bunch of PC's with mining software and pointed it to the Eligius pool, but mis-configured it so that it is causing a lot of problems for the pool.
This would not be an attack directly against the pool, but is causing a big problem none the less.
If this were the case the only way to get out of the way would be to change the DNS names and/or IP's so that the configuration of the infecting software would no longer point to a real server.
|
|
|
|
GrrOucH
Newbie
Offline
Activity: 38
Merit: 0
|
|
April 08, 2014, 09:59:07 PM |
|
I know one thing for sure. I'm happy here at Eligius and here is where I'm going to stay. Wizzy.. U are doin a great job keeping things together. I think I'm going to up my donation a bit though I'm such a small hasher I'll notice it for sure but.. I will be here for the long haul. So.. on another subject.. How bout that merged mining thing?. I would love to be doin namecoins as well as btc.
|
|
|
|
mdude77
Legendary
Offline
Activity: 1540
Merit: 1001
|
|
April 08, 2014, 10:10:33 PM |
|
Maybe it's not malicious activity? Maybe there's something wrong with some piece of software being used?
For example, I have a number of S1s running through a Stratum proxy. How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?
M
Would you mind sharing what stratum proxy you are using? Version? I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors. I've seen other folks with the same issue I would like to know which stratum proxy you are using and how you set it up. I have tried using bfgminer, cgminer, and mining_proxy.exe to proxy the S1's without luck. Thanks. I'm using Slush's stratum proxy. I don't like executables when I can run code, so I'm using the latest git through python on my windows machine. \python27\python mining_proxy.py -o stratum.mining.eligius.st -p 3334 -sp 3333 -gp 8330 -cu <your payout address> -rt -nm then I point my S1s to port 3333 on that machine with whatever username/pw I want. everything shows up on Eligius under the payout address. I watch the output from the proxy to see it actively hashing and the pool stepping up the vardiff. On the subject of luck ... it's awful right now. 47% over 24 hours? is everyone 100% sure there isn't some exploit going on here? Lastly.. anyone notice how network hashrate overall stabilized? According to my math we're looking at a 1% increase next change. The number of minutes between blocks (supposed to be 10): ((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins Divide 10 by that value to get the ratio.. Multiply that ratio times current difficulty to get projected next difficulty. Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty. M
|
I mine at Kano's Pool because it pays the best and is completely transparent! Come join me!
|
|
|
baddw
|
|
April 08, 2014, 10:20:21 PM |
|
Lastly.. anyone notice how network hashrate overall stabilized? According to my math we're looking at a 1% increase next change. The number of minutes between blocks (supposed to be 10):
((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins
Divide 10 by that value to get the ratio..
Multiply that ratio times current difficulty to get projected next difficulty.
Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty.
M
Looks like somebody took a big chunk of hash (8-10 Petahash) off of the network. Probably an ASIC manufacturer spooling them up for testing, then turning them off and shipping them out to customers... or simply moving them to a permanent location. I'm sure that all or most of that hash will re-appear before the next diff change. https://bitcoinwisdom.com/bitcoin/difficulty
|
BTC/XCP 11596GYYq5WzVHoHTmYZg4RufxxzAGEGBX DRK XvFhRFQwvBAmFkaii6Kafmu6oXrH4dSkVF Eligius Payouts/CPPSRB Explained I am not associated with Eligius in any way. I just think that it is a good pool with a cool payment system
|
|
|
mdude77
Legendary
Offline
Activity: 1540
Merit: 1001
|
|
April 08, 2014, 10:21:13 PM |
|
Get 0.9.1 immediately!! See the alert on the top: News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. !!!!! https://bitcoin.org/bin/0.9.1/M
|
I mine at Kano's Pool because it pays the best and is completely transparent! Come join me!
|
|
|
Lucko
|
|
April 08, 2014, 10:27:00 PM |
|
Get 0.9.1 immediately!! See the alert on the top: News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. !!!!! https://bitcoin.org/bin/0.9.1/M Yes this is what I'm using... How old is this news? And if this is how I got hacked is my key compromised? I just turn it on to get coins to my cold storage. When I got back they were gone. I was waiting for it to sync...
|
|
|
|
sconklin321
Sr. Member
Offline
Activity: 543
Merit: 250
Orjinal üyelik ToRiKaN banlanalı asır ol
|
|
April 08, 2014, 10:31:12 PM |
|
Lastly.. anyone notice how network hashrate overall stabilized? According to my math we're looking at a 1% increase next change. The number of minutes between blocks (supposed to be 10):
((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins
Divide 10 by that value to get the ratio..
Multiply that ratio times current difficulty to get projected next difficulty.
Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty.
M
According to bitcoinwisdom, that hasrate does appear to be stabilizing a bit...That'd be really nice. https://bitcoinwisdom.com/bitcoin/difficulty
|
|
|
|
mdude77
Legendary
Offline
Activity: 1540
Merit: 1001
|
|
April 08, 2014, 10:31:22 PM |
|
Get 0.9.1 immediately!! See the alert on the top: News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0. !!!!! https://bitcoin.org/bin/0.9.1/M Yes this is what I'm using... How old is this news? And if this is how I got hacked is my key compromised? I just turn it on to get coins to my cold storage. When I got back they were gone. I was waiting for it to sync... I just got the US-CERT notification today: https://www.us-cert.gov/ncas/alerts/TA14-098AApparently it was very quickly repackaged into bitcoin-qt/core. M
|
I mine at Kano's Pool because it pays the best and is completely transparent! Come join me!
|
|
|
not.you
Legendary
Offline
Activity: 1726
Merit: 1018
|
|
April 08, 2014, 10:45:47 PM |
|
whatever they are doing it's now directly affecting my 1.4 TH farm as some of my miners have been auto switching to my 2nd pool backups. My power and network are solid.
Yes I am also seeing a little bit of failover as well. Not much, a minute or two every 30 minutes or so.
|
|
|
|
Lucko
|
|
April 08, 2014, 10:46:27 PM |
|
Grate so my private key is compromised and I'm in line for payment in this block. I increased my payment threshold but it has no effect...
So another 0,1BTC that might be gone...
|
|
|
|
|