Bitcoin Forum
May 22, 2024, 12:55:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 [86] 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 280 »
  Print  
Author Topic: Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB  (Read 1061098 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
anth0ny
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
April 26, 2014, 02:02:30 AM
 #1701

It is EXTREMELY LIKELY that a pool the person is connected to before it was redirected is the cause.
It is EXTREMELY UNLIKELY that it is a MITM attack unless there is a shoddy network somewhere in the middle.
I can agree with your probabilistic statements here, but in this case, it does indeed seem to be a TCP MITM attack.

Generally when I hear "TCP MITM attack" I think of a TCP connection being intercepted, not a client being tricked into going to the wrong IP address.  kano might have been thinking the same thing, maybe?
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 26, 2014, 02:11:14 AM
 #1702

It is EXTREMELY LIKELY that a pool the person is connected to before it was redirected is the cause.
It is EXTREMELY UNLIKELY that it is a MITM attack unless there is a shoddy network somewhere in the middle.
I can agree with your probabilistic statements here, but in this case, it does indeed seem to be a TCP MITM attack.
Generally when I hear "TCP MITM attack" I think of a TCP connection being intercepted, not a client being tricked into going to the wrong IP address.  kano might have been thinking the same thing, maybe?
Yes, the original pool connection (TCP) is being intercepted to inject a stratum mining.reconnect command; the TCP stream gets broken in the process, but the client has already moved on to the new server by then... :/

organofcorti
Donator
Legendary
*
Offline Offline

Activity: 2058
Merit: 1007


Poor impulse control.


View Profile WWW
April 26, 2014, 02:26:17 AM
 #1703

Everyone, please check your miner is actually connected to Eligius.
It seems there are some MITM attacks going on to redirect Eligius miners to another pool Sad
Do you know which pool, or at least an IP address? It'd be interesting to try and tie the pool-in-the-middle to a reused generation address.
Redirected clients show "Connected to 46.28.205.80..." in the miner.
This seems to be a scrypt "Worldcoin" mining server, and it seems likely they are just automatically MITM'ing any stratum connections they can inject into, regardless of the destination pool.


So it's not just you but a number of different pools that all have the same problem? Or is it a stratum problem that is pool agnostic?

Bitcoin network and pool analysis 12QxPHEuxDrs7mCyGSx1iVSozTwtquDB3r
follow @oocBlog for new post notifications
eleuthria
Legendary
*
Offline Offline

Activity: 1750
Merit: 1007



View Profile
April 26, 2014, 02:31:00 AM
 #1704

Everyone, please check your miner is actually connected to Eligius.
It seems there are some MITM attacks going on to redirect Eligius miners to another pool Sad
Do you know which pool, or at least an IP address? It'd be interesting to try and tie the pool-in-the-middle to a reused generation address.
Redirected clients show "Connected to 46.28.205.80..." in the miner.
This seems to be a scrypt "Worldcoin" mining server, and it seems likely they are just automatically MITM'ing any stratum connections they can inject into, regardless of the destination pool.


So it's not just you but a number of different pools that all have the same problem? Or is it a stratum problem that is pool agnostic?

It's definitely a localized problem.  I've yet to see a single report of it on BTC Guild.  It *did* happen to ScryptGuild at the same time as CleverMining a few months back, but the number of users affected was so low I believe it was local malware.  If it's some kind of ARP poisoning to intercept the traffic, that's possible (ScryptGuild is run out of OVH, while BTC Guild is not run in a shitty datacenter like that).

It is not a stratum bug, that much is absolutely certain (there's no way to relay messages to an independent stratum connection).  It is using a stratum method (client.reconnect) to perform the attack though, and make it so once the connection does have the message injected (how that's done I still have no damn clue), the client connects directly to "evilserver.com".

RIP BTC Guild, April 2011 - June 2015
anth0ny
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
April 26, 2014, 02:32:56 AM
 #1705

It is EXTREMELY LIKELY that a pool the person is connected to before it was redirected is the cause.
It is EXTREMELY UNLIKELY that it is a MITM attack unless there is a shoddy network somewhere in the middle.
I can agree with your probabilistic statements here, but in this case, it does indeed seem to be a TCP MITM attack.
Generally when I hear "TCP MITM attack" I think of a TCP connection being intercepted, not a client being tricked into going to the wrong IP address.  kano might have been thinking the same thing, maybe?
Yes, the original pool connection (TCP) is being intercepted to inject a stratum mining.reconnect command; the TCP stream gets broken in the process, but the client has already moved on to the new server by then... :/

Ah. I see.

Same problem as the one addressed by this patch, then? https://gist.github.com/gevans/9846423
azdarknet
Newbie
*
Offline Offline

Activity: 24
Merit: 0


View Profile
April 26, 2014, 05:05:20 AM
 #1706

Everyone, please check your miner is actually connected to Eligius.
It seems there are some MITM attacks going on to redirect Eligius miners to another pool Sad
Do you know which pool, or at least an IP address? It'd be interesting to try and tie the pool-in-the-middle to a reused generation address.
Redirected clients show "Connected to 46.28.205.80..." in the miner.
This seems to be a scrypt "Worldcoin" mining server, and it seems likely they are just automatically MITM'ing any stratum connections they can inject into, regardless of the destination pool.


So it's not just you but a number of different pools that all have the same problem? Or is it a stratum problem that is pool agnostic?

It's definitely a localized problem.  I've yet to see a single report of it on BTC Guild.  It *did* happen to ScryptGuild at the same time as CleverMining a few months back, but the number of users affected was so low I believe it was local malware.  If it's some kind of ARP poisoning to intercept the traffic, that's possible (ScryptGuild is run out of OVH, while BTC Guild is not run in a shitty datacenter like that).

It is not a stratum bug, that much is absolutely certain (there's no way to relay messages to an independent stratum connection).  It is using a stratum method (client.reconnect) to perform the attack though, and make it so once the connection does have the message injected (how that's done I still have no damn clue), the client connects directly to "evilserver.com".

Geee thanks for letting us know how awesome BTC Guild is!
HellDiverUK
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 501



View Profile
April 26, 2014, 09:37:08 AM
 #1707


My guess would actually be that the Eligius server itself has been hacked
(or it's connected to a shoddy network)


lol, you really are a boob, aren't you?  <- opinion of a EC-CEH
TechByPC
Full Member
***
Offline Offline

Activity: 168
Merit: 100


View Profile
April 26, 2014, 10:06:56 AM
 #1708


My guess would actually be that the Eligius server itself has been hacked
(or it's connected to a shoddy network)


lol, you really are a boob, aren't you?  <- opinion of a EC-CEH

When all else fails, call people names and throw around credentials. It's much more enlightening than anything technical.
norgan
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
April 26, 2014, 12:28:00 PM
 #1709

yup my miners went offline a few hours ago and when I logged on all showed 0MH/s. switched over to Emc and they are humming along nicely. Any ideas on when any fix may be applied and how best to stop it?

Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
HellDiverUK
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 501



View Profile
April 26, 2014, 01:19:54 PM
 #1710


So, what's an EC-CEH anyway and why should I care if they can't help Cheesy

http://bit.ly/1lSKDCY

 Grin
anth0ny
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
April 26, 2014, 02:14:28 PM
Last edit: April 26, 2014, 02:40:57 PM by anth0ny
 #1711

Well then let me put it in clearer terms for you then since you are unable to understand or explain it or even suggest a solution Smiley

Anyone still mining here is at risk and there is no way to mitigate it with the current setup.

Disabling client.redirect doesn't solve the initial connect redirect issue (since that's not stratum)
So if it really is as bad as a MITM then you are screwed anyway until you can stop the MITM or move your pool somewhere else.

It's a lot easier to insert a single TCP packet (containing a client.redirect command) in one direction than it is to intercept an entire TCP connection in both directions.

Whether or not you want to call the former a MITM attack is another matter. Really the attacker in that case isn't (necessarily) in the middle, she just pretends to be.

Not only that, but it would be important for Eligius to let us know what the data centre is that is doing or allowing one of their employees to do this MITM attack, so that we all know to not use that data centre.

By the way, neither requires being in the data centre of the server.  The latter (which I'd call a true MITM attack) just requires being somewhere in the middle (hence the name).

The former (which is probably more likely) doesn't even require that. It just requires correctly guessing TCP sequence numbers and spoofing of the source address. See, e.g., http://www.thegeekstuff.com/2012/01/tcp-sequence-number-attacks/

In any case, I think we have our answer to the question as to why the DOS is/was going on (*). Be careful what you wish for...

(*) Step 2: "[The attacker] floods Host B with new requests causing a Denial of service attack to stop Host B from communicating with A."
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 26, 2014, 02:40:14 PM
 #1712

Well then let me put it in clearer terms for you then since you are unable to understand or explain it or even suggest a solution Smiley

Anyone still mining here is at risk and there is no way to mitigate it with the current setup.

Disabling client.redirect doesn't solve the initial connect redirect issue (since that's not stratum)
So if it really is as bad as a MITM then you are screwed anyway until you can stop the MITM or move your pool somewhere else.

It's a lot easier to insert a single TCP packet (containing a client.redirect command) in one direction than it is to intercept an entire TCP connection in both directions.

Whether or not you want to call that a MITM attack is another matter.
It's the reply when you first connect ...
No, it isn't.

anth0ny
Full Member
***
Offline Offline

Activity: 196
Merit: 100


View Profile
April 26, 2014, 02:44:07 PM
 #1713

Well then let me put it in clearer terms for you then since you are unable to understand or explain it or even suggest a solution Smiley

Anyone still mining here is at risk and there is no way to mitigate it with the current setup.

Disabling client.redirect doesn't solve the initial connect redirect issue (since that's not stratum)
So if it really is as bad as a MITM then you are screwed anyway until you can stop the MITM or move your pool somewhere else.

It's a lot easier to insert a single TCP packet (containing a client.redirect command) in one direction than it is to intercept an entire TCP connection in both directions.

Whether or not you want to call that a MITM attack is another matter.
It's the reply when you first connect ...

I guess TechByPC was wrong about explaining things technically being more enlightening than calling people names...
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 26, 2014, 02:50:21 PM
 #1714

Well then let me put it in clearer terms for you then since you are unable to understand or explain it or even suggest a solution Smiley

Anyone still mining here is at risk and there is no way to mitigate it with the current setup.

Disabling client.redirect doesn't solve the initial connect redirect issue (since that's not stratum)
So if it really is as bad as a MITM then you are screwed anyway until you can stop the MITM or move your pool somewhere else.

It's a lot easier to insert a single TCP packet (containing a client.redirect command) in one direction than it is to intercept an entire TCP connection in both directions.

Whether or not you want to call that a MITM attack is another matter.
It's the reply when you first connect ...
No, it isn't.
You have removed this option from Eligius?
Go away, clueless troll.

MrTeal
Legendary
*
Offline Offline

Activity: 1274
Merit: 1004


View Profile
April 26, 2014, 03:20:40 PM
 #1715

I should probably mention again that I say something like this with a machine that was pointed to Slush. As I speak I just noticed that two rigs in physically separate locations and with different ISPs that were connected to Slush haven't submitted a share in 10 minutes.
The miners show them still connected to pool 0, but 46.28.205.80 instead of Slush.
One was running cgminer 4.0.0 on windows, the other is running cgminer 4.2.2
DaveF
Legendary
*
Offline Offline

Activity: 3486
Merit: 6304


Crypto Swap Exchange


View Profile WWW
April 26, 2014, 04:04:34 PM
 #1716

I should probably mention again that I say something like this with a machine that was pointed to Slush. As I speak I just noticed that two rigs in physically separate locations and with different ISPs that were connected to Slush haven't submitted a share in 10 minutes.
The miners show them still connected to pool 0, but 46.28.205.80 instead of Slush.
One was running cgminer 4.0.0 on windows, the other is running cgminer 4.2.2

My test boxes which were pointing to ghash just did this too.

What DNS server (s) are you using public or private?
What kind of firewall were they behind?

One was an ANT S1 the other was an generic avalon clone.

Both are running the openwrt / cgminer that came with it.

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
DaveF
Legendary
*
Offline Offline

Activity: 3486
Merit: 6304


Crypto Swap Exchange


View Profile WWW
April 26, 2014, 04:43:42 PM
 #1717

And I just noticed the share difficulty on the ant was set to 1K.

Has anyone else noticed this?

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 26, 2014, 04:53:00 PM
 #1718

And I just noticed the share difficulty on the ant was set to 1K.

Has anyone else noticed this?

-Dave
Sounds like you're MITM'd...

RealMalatesta
Legendary
*
Offline Offline

Activity: 2338
Merit: 1124



View Profile
April 26, 2014, 05:01:49 PM
 #1719

As you see, I'm a newby. However, the IP points to Solar Communications in Zurich, Switzerland. This company is run by two Russians and maintains a really weird and crappy homepage, offering colocation and other stuff.

Remarkable is that they accept payments in Litecoin and Nxt Cryptocurrency.

The whole site looks as if it was set up quickly, translated poorly and then put into the wilderness of the WWW.

On their Twitter-account, they refer to their partner coinshost.com.

Solar Communications as well as Coinshost have their data center at the same address in Zurich, Switzerland, an address, btw, which was used in the past by some Russians who were involved in extortion via ddos.

Another one in this group is incloudibly.net. And what do they all offer? Right: ddos-protected bitcoin-hosting.

I'm cautious with suspicions, but in the past, similar companies with the same address were used by the Russians. If contacted by possible clients who asked for their services and turned them down because of the prices, the possible clients soon became victims of ddos-attacks - until they went down or hired the services of the "specialised" companies.

So if anybody ever was contacted by them and has since then experienced a ddos-attack: This would explain a lot.
DaveF
Legendary
*
Offline Offline

Activity: 3486
Merit: 6304


Crypto Swap Exchange


View Profile WWW
April 26, 2014, 05:28:52 PM
 #1720

And I just noticed the share difficulty on the ant was set to 1K.

Has anyone else noticed this?

-Dave
Sounds like you're MITM'd...

I *knew* that, just trying to post more info. If it's a 1K share difficulty it's not like they are getting any work out of it. AND also that it was on ghash not just yours as Mr.Teal (slush) mentioned so it's a few more data points.

-Dave

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: « 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 [86] 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 ... 280 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!