Bitcoin Forum
May 24, 2024, 12:09:46 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 280 »
  Print  
Author Topic: Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB  (Read 1061099 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 29, 2014, 05:55:07 PM
 #1821

I like eligius a lot as a pool, but whatever is causing these DDOS attacks needs to be dealt with properly rather that just fail-safeing the stats page every other day
I agree, please help figure out which government has jurisdiction and rant at them to make an arrest Sad

handytxg
Member
**
Offline Offline

Activity: 111
Merit: 10


View Profile
April 29, 2014, 06:09:10 PM
 #1822

is NMC payout still broken?
ajw7989
Legendary
*
Offline Offline

Activity: 924
Merit: 1000


View Profile
April 29, 2014, 06:14:44 PM
 #1823

is NMC payout still broken?

As far as I know yes. i am still waiting for my payouts back in march
un_ordinateur
Full Member
***
Offline Offline

Activity: 157
Merit: 100


View Profile
April 29, 2014, 06:23:41 PM
 #1824

I'm new to this, I don't know if they do or don't, I should read up on stratum to have a better understanding of how it works and sniff the traffic to understand what's being sent over the wire. Can someone can explain how the hijacked work is redirected/attributed to someone else? Please excuse my inexperience/lack of understanding. From what I've read in this thread it sounds like work is hijacked and sent to another pool, is that correct? Is the theory that the stats pages are being attacked to mask what's happening to miners by preventing them from seeing their stats?

I'l try to make a summary of what's happening, to the best of my understanding.

When you connect to a stratum server, the server sends a miner a message saying "Try solving this block, with nonce between X et Y, with difficulty Z". It may thus ensure no miner does duplicate work. When you find a nonce that solves the block for the given difficulty, you send it to the server, that verifies it, and credits you with a share if it's ok. The server may occasionally request you abort your work and work another block instead, such as when a new block is found by another server.

The protocol also allows for the server to request you connect to another server instead. It might be useful for load balancing on the server side.

What is happening now is that a rogue third party sends to your computer a forged packed, with it origin IP address spoofed to appear originating from the server, when it is not. The packed contains a request that you connect to an attacker-controlled server, which will accept any inbound connection regardless of credentials. Once the connection is established, it will then issue you new work, that your miner will happily solve, only, it's the attacker that will keep the profit, until you realise something's going on.

Now, doing such an attact is easy: packets are transmitted somewhat randomly over Internet. An attacker might monitor packets passing trough his node, and detect those who look like stratum packets, and trivially know the IP of the server, the miner and the port number of each.

Using that data to create and send a fake packet is easy. It does not require the attacker to intercept the connection, be in the middle, or anything. The software on both side must be resilient to such attack. There are some mechanisms to ensure that, such as a unique sequence number which is sequentially increased at each message between the two enpoints. A message with the wrong sequence number is discarded.

An attacker may however monitor the packets, and try to send a packet with the next sequence number in order. It's unlikely to succeed if the two endpoints are in active conversation, because odds are they will have moved on to a greater sequence number by the time his packet arrives, however, when the server is slow to respond (such as when it is under DDoS), the attacker might have enough time to slip his packet.

It's not surprising that the problem affect only some persons: The attacker must know you are connected to the pool, which will only happen if the packet goes by him: The packets might wander a bit around Internet, but it does no go to the other side of the world for no reason, so the attacked ones must be "near" a compromised computer. "Near", here, is network-wise, not geograhically-wise; sometimes network routing takes surprising paths.

Now, there are there two proposals to solve such problem:
a) Prevent redirect request across domains. The redirect mechanism of Stratum was designed for load balancing across different server of the same pool. All those servers should be in the same domain, so a redirect request across domains is highly suspicious.
b) Use TLS to encrypt/sign the connection, so that no third party might create a packet that legetimately appears to be coming from the pool, even if he guesses correctly the sequence number.

a is easy, as it only requires a small patch on miner clients. However, it is not torough, and does not address the underling vulnerability.
b is much more torough, but is more complicated, as it requires support from both miners and pool, and adds some overhead, especially to the pool.

However, both solutions are in the works. Patches have been submitted to BFGminer and cgminer to block suspicious redirects, and support TLS connections. Eligius pool server is testing supporting inound TLS connections. (Inbound TLS connections on other pools, though, is up to each pool operator)
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 29, 2014, 06:35:38 PM
 #1825

I'l try to make a summary of what's happening, to the best of my understanding.
Thank you for doing this, it covers the topic well.

Lucko
Hero Member
*****
Offline Offline

Activity: 826
Merit: 1000



View Profile
April 29, 2014, 06:46:00 PM
 #1826

An attacker may however monitor the packets, and try to send a packet with the next sequence number in order. It's unlikely to succeed if the two endpoints are in active conversation, because odds are they will have moved on to a greater sequence number by the time his packet arrives, however, when the server is slow to respond (such as when it is under DDoS), the attacker might have enough time to slip his packet.
That is probably good call how that was done. I noticed that my miners were restarting(watchdog) a lot when this was happening.
nwp
Newbie
*
Offline Offline

Activity: 8
Merit: 0


View Profile
April 29, 2014, 08:07:56 PM
 #1827

Is there a white list of IPs for mining Eligius? I'm already blocking the IP that users in this thread reported but I'm sure whomever is orchestrating the attack can/will switch to a different IP(s) at some point if not already.

Right now I should be mining exclusively on Eligius, my stats look about right for the past 12hrs (when I can see the page) and I see the following established connections in my router, are these valid Eligius IPs?

107.20.237.226:3334
54.243.41.185:3334
54.243.102.91:3334
GrapeApe
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
April 29, 2014, 09:23:56 PM
 #1828

Well we have kinda been all over the place on this subject from MITM to router backdoors and everything else...

I have blocked the suspect ip on my host machine but I cant figure out how to do it on my router so that doesn't help with my miners directly connected to the router (S1), just the ones I'm running on my host machine (chilis and what not).

I have noticed many resets in the stats and sometimes I will go several minutes without an accepted share with the S1 miners. I started noticing  this yesterday. At the moment all seems to working as it should and now that the stats are back up my earnings seem about right maybe a little low because of the long block earlier (is that long block a result of this attack?).

Someone earlier suggested mining p2pool (I'm not jumping ship), I'm just curious if they are immune to this attack?
ProfMac
Legendary
*
Offline Offline

Activity: 1246
Merit: 1001



View Profile
April 29, 2014, 09:40:58 PM
 #1829

I like eligius a lot as a pool, but whatever is causing these DDOS attacks needs to be dealt with properly rather that just fail-safeing the stats page every other day
I agree, please help figure out which government has jurisdiction and rant at them to make an arrest Sad

Seems that DDoS attacks are a problem the whole internet community is harmed by.  Shouldn't routers be able to tell that a spoofed return packet shouldn't be coming from a particular upstream?

I try to be respectful and informed.
PatMan
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


Watch out for the "Neg-Rep-Dogie-Police".....


View Profile WWW
April 29, 2014, 09:52:27 PM
 #1830

Someone earlier suggested mining p2pool (I'm not jumping ship), I'm just curious if they are immune to this attack?

I'm not trying to convert anyone, but I run a p2pool node & can confirm that there has been zero impact from this attack. As long as you run the node within your own network (local node) you should be OK. I haven't heard of anyone running a public p2pool node who has experienced any problems either, but that's not to say it couldn't happen, I'm guessing if the attacker/s decided to target the node - but I can't be sure, as it's not yet been decided for sure what kind of attack it is.

Peace  Smiley

"When one person is deluded it is called insanity - when many people are deluded it is called religion" - Robert M. Pirsig.  I don't want your coins, I want change.
Amazon UK BTC payment service - https://bitcointalk.org/index.php?topic=301229.0 - with FREE delivery!
http://www.ae911truth.org/ - http://rethink911.org/ - http://rememberbuilding7.org/
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 29, 2014, 10:01:19 PM
 #1831

Someone earlier suggested mining p2pool (I'm not jumping ship), I'm just curious if they are immune to this attack?
p2pool itself is, yes. Using someone else's p2pool node, however, is not.

nottm28
Hero Member
*****
Offline Offline

Activity: 574
Merit: 500



View Profile
April 29, 2014, 10:17:29 PM
 #1832

Someone earlier suggested mining p2pool (I'm not jumping ship), I'm just curious if they are immune to this attack?
p2pool itself is, yes. Using someone else's p2pool node, however, is not.

Are there any more ip addresses for the mitm attack that have been identified other than 46.28.205.80 ?

donations not accepted
GrapeApe
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
April 30, 2014, 02:43:38 AM
 #1833

So everything seems to be back to normal on my end. Not that I would know if something more nefarious was going on. How is everybody else doing?

SO what are so real solutions to prevent this happening again? I'm willing to listen.


Now, there are there two proposals to solve such problem:
a) Prevent redirect request across domains. The redirect mechanism of Stratum was designed for load balancing across different server of the same pool. All those servers should be in the same domain, so a redirect request across domains is highly suspicious.
b) Use TLS to encrypt/sign the connection, so that no third party might create a packet that legetimately appears to be coming from the pool, even if he guesses correctly the sequence number.

a is easy, as it only requires a small patch on miner clients. However, it is not torough, and does not address the underling vulnerability.
b is much more torough, but is more complicated, as it requires support from both miners and pool, and adds some overhead, especially to the pool.

However, both solutions are in the works. Patches have been submitted to BFGminer and cgminer to block suspicious redirects, and support TLS connections. Eligius pool server is testing supporting inound TLS connections. (Inbound TLS connections on other pools, though, is up to each pool operator)


Any new news on the potential use of these patches and their effectiveness?

GrapeApe

Multipulty
Sr. Member
****
Offline Offline

Activity: 399
Merit: 250



View Profile
April 30, 2014, 04:32:24 AM
 #1834

something is up today - i have been unable to properly load the stats page all morning, now its a 502

atop of that, all my miners went offline briefly nd just started mining normally again ~2minutes ago.   not sure if this was a pool issue or a network blip on my end though, since my teamviewer link dropped off briefly as well (but seemingly after the miners stopped hashing)

I like eligius a lot as a pool, but whatever is causing these DDOS attacks needs to be dealt with properly rather that just fail-safeing the stats page every other day

Quote
AUTO-NOTICE: The CPPSRB reward system appears to be in fail-safe mode.
Some stats are likely not updating as they should right now (128/256 second hash rates, balances, balance graph, payout queue). These items will correct themselves soon when CPPSRB is out of fail safe mode. This can take several hours. No earnings are lost as long as your shares are accepted! Sorry for the inconvenience!

as expected
norgan
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250

Decentralize your hashing - p2pool - Norgz Pool


View Profile WWW
April 30, 2014, 05:34:00 AM
 #1835

I like eligius a lot as a pool, but whatever is causing these DDOS attacks needs to be dealt with properly rather that just fail-safeing the stats page every other day
I agree, please help figure out which government has jurisdiction and rant at them to make an arrest Sad

Seems that DDoS attacks are a problem the whole internet community is harmed by.  Shouldn't routers be able to tell that a spoofed return packet shouldn't be coming from a particular upstream?


that's a very good point, I just enabled ip address spoof protection on my juniper ssg haha that should help!

Miner, tech geek, operator of NorgzPool - Sydney Australia P2Pool Node creator of p2pool fancy front end

Tips: 1NorganBbymShTN2MMpfGzRYJF8mcPeXjv Exchange BTC locally in Australia or Donate to p2pool miners
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
April 30, 2014, 08:31:22 AM
 #1836

What is happening now is that a rogue third party sends to your computer a forged packed, with it origin IP address spoofed to appear originating from the server, when it is not. The packed contains a request that you connect to an attacker-controlled server, which will accept any inbound connection regardless of credentials. Once the connection is established, it will then issue you new work, that your miner will happily solve, only, it's the attacker that will keep the profit, until you realise something's going on.

I have a question about this:
- I am using slush proxy from a laptop to handle my Antminers connections to Eligius, I have also installed DNSCrypt on said laptop connecting through to OpenDNS. Would this configuration help prevent the domain name spoofing attack?
http://www.opendns.com/about/innovations/dnscrypt/

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
Lucko
Hero Member
*****
Offline Offline

Activity: 826
Merit: 1000



View Profile
April 30, 2014, 01:48:47 PM
 #1837

Attack has nothing to do with DNS. So no...
cbmckay
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
April 30, 2014, 04:45:15 PM
 #1838

Just a thought about these DOS attacks:

I know that Ghash.io uses Cloudflare to block or mitigate DOS attacks (and I know some aren't too keen on Ghash.io).
Would a service like that help here? Is it expensive?
http://www.cloudflare.com/ddos
HellDiverUK
Hero Member
*****
Offline Offline

Activity: 1246
Merit: 501



View Profile
April 30, 2014, 04:48:50 PM
 #1839

Cloudflare is more bother than its worth more often than not. 
Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
April 30, 2014, 04:55:10 PM
Last edit: April 30, 2014, 05:47:32 PM by Luke-Jr
 #1840

Just a thought about these DOS attacks:

I know that Ghash.io uses Cloudflare to block or mitigate DOS attacks (and I know some aren't too keen on Ghash.io).
Would a service like that help here? Is it expensive?
http://www.cloudflare.com/ddos
It's a rather large security risk, incompatible with stratum (though - edit: theoretically - compatible with GBT), and probably wouldn't do much better (services have been unaffected by the DDoS for the most part).

Pages: « 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 [92] 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 ... 280 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!