kp5995
Newbie
Offline
Activity: 36
Merit: 0
|
|
June 12, 2014, 10:48:39 AM |
|
Just a stats issue, although I did a rewind on CPPSRB back several hours to make sure it gets corrected properly. Should correct itself shortly.
Thank You
|
|
|
|
merv77
|
|
June 12, 2014, 11:53:57 AM |
|
thanks wizkid, stats working now
|
|
|
|
fubly
|
|
June 12, 2014, 12:00:52 PM |
|
where can I see the nmc payouts, or the nmc I mined?
thx
|
each time you send a transaction don't forget to use a new address, each time you receive one also!
|
|
|
Bitskint
Member
Offline
Activity: 79
Merit: 10
|
|
June 12, 2014, 12:51:17 PM |
|
where can I see the nmc payouts, or the nmc I mined?
thx
There are no stats at the moment for those. You have to wait for them to turn up in your wallet .
|
1M68XehjYww77DLgwW9rk2zRid8Z8B7uw7 <-- my new BTC addy since Cryptsy took everything
|
|
|
jcumins
Full Member
Offline
Activity: 312
Merit: 100
Bcnex - The Ultimate Blockchain Trading Platform
|
|
June 12, 2014, 02:32:14 PM |
|
Looks like it is broken again, for the pay out process that is. Looks like the shares are still working.
I truly feel for Wizkid he works hard keeping this running.
|
|
|
|
kp5995
Newbie
Offline
Activity: 36
Merit: 0
|
|
June 13, 2014, 02:12:48 AM |
|
Looks like it is broken again, for the pay out process that is. Looks like the shares are still working.
I truly feel for Wizkid he works hard keeping this running.
What's broken? My payment has not been confirmed 4plus hrs
|
|
|
|
wizkid057 (OP)
Legendary
Offline
Activity: 1223
Merit: 1006
|
|
June 13, 2014, 02:15:29 AM |
|
Nothing broken.
|
|
|
|
wizkid057 (OP)
Legendary
Offline
Activity: 1223
Merit: 1006
|
|
June 13, 2014, 02:19:01 AM |
|
Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well. A block withholding attack is where a miner submits low difficulty shares but does not submit block solutions— so they appear to be working for the pool and continue to get paid while not actually doing useful work for the pool.
It is unknown how many other pools they’ve executed this attack against. While withholding attacks are detectable, they are not possible to prevent: the risk of block withholding is inherent in how Bitcoin pooling works. Since the attacker does not gain any direct benefit by performing the attack it is usually assumed to not be a serious risk. A withholding attacker can’t profit, except through indirect effects like making a pool look less “lucky” and driving miners to other pools.
My guess is that they never expected to get caught and suffer income loss as a result of their attack. But, once they were caught, I put a filter in place to block them from the payout queue (similar to the block on known MtGox addresses). Eligius’s offline wallet now has roughly 200 BTC work credits held from the payout queue under the attacker's addresses, that we have stopped them from stealing.
When they noticed, weeks later, they contacted us complaining. We asked them to sign messages to verify they were in fact in control of the addresses in question including asking them to include a real name and location in the signed message, refusing to discuss it until they had done so. They eventually responded around the Memorial Day US holiday weekend. Before we were able to respond (everyone has been extra busy as you all know), they threatened putting a 200 BTC bounty on hacking Eligius. More recently, their behaviours have extended to additional ultimatums, arbitrary deadlines, demanding 1164%-APY interest on the payout, etc.
Suffice it to say, communications with the attacker have been less than productive.
My original plan was to return the coins we have held in offline storage to the rightful owners— the miners who were submitting real work and were affected by the withholding attack— by paying towards shelved shares accrued during that time period (doing this is non-trivial due to security measures in place). This is still my intention, as I have no real inclination to yield to the demands and threats made by this attacker who has cost all of us quite a bit. It has unofficially been decided that if it came down to it, Eligius would shut down before being forced to pay any attacker of any kind any amount whatsoever.
In any case, I wanted to make sure I posted the details of this before the attacker attempts to take the public FUD route, and possibly get some constructive opinions on how to actually proceed with this.
I will be posting all details we have about this soon. For now, the two addresses I have filtered from the payout queue are 17JkL94B2ngJg4QQZuiozDQjnxXB6B7yTc and 1Gu8zxRi8cyENV8CQe52D7QEsiZ7ruT73u.
Rest assured that there is no need to be concerned about their threats. Eligius is the second oldest mining pool and is also one of the few remaining pools which has never had any loss of bitcoin from any type of hack. The reason there have been no successful hacks is because we take security very seriously. There really are no possible methods for such an attack with Eligius. While I won't reveal any of the specific security measures in place, even if an attacker were to somehow compromise any or even every single Eligius server, keep in mind that there are no funds stored on any online machine for them to steal anyway. Other data is protected and verified by remote machines as well. The pool will simply be cut off from the world pending my personal review if anything important were actually manipulated. As previously noted, the offline wallet requires coordination between both myself and Luke-Jr, and also very shortly, after completing some testing, a confidential third party.
I am taking this very seriously, and I'll be monitoring the pool as closely as possible. Measures are also being taken to further harden our already very good existing security as well. If My assumption is that the attacker is not going to take kindly to being publicly outed.
Thanks,
-wk
P.S. - This is unrelated to any of the stats issues that have occurred. (Server migration for the new web server is still under way…)
|
|
|
|
kp5995
Newbie
Offline
Activity: 36
Merit: 0
|
|
June 13, 2014, 02:27:29 AM |
|
Nothing broken.
yeah, my problem doesn't look like eligius.
|
|
|
|
crashoveride54902
|
|
June 13, 2014, 02:40:13 AM |
|
WOOT WTG WK!!! you teach them that messing with our pool isn't an option Great job on catching them and stopping them from getting their reward for doing nothing Finally some scammers didn't get to scam...oh how good that makes me feel...lost 21 coins to some lying cheating bastards already one was the btcrow or some website email scam..thought i was using escrow but was really sending them the coins oh well...Great job on running the pool WK!! couldn't ask for a better pool op
|
Dreams of cyprto solving everything is slowly slipping away...Replaced by scams/hacks
|
|
|
GrapeApe
|
|
June 13, 2014, 02:49:55 AM |
|
It is unknown how many other pools they’ve executed this attack against. While withholding attacks are detectable, they are not possible to prevent: the risk of block withholding is inherent in how Bitcoin pooling works. Since the attacker does not gain any direct benefit by performing the attack it is usually assumed to not be a serious risk. A withholding attacker can’t profit, except through indirect effects like making a pool look less “lucky” and driving miners to other pools.
My guess is that they never expected to get caught and suffer income loss as a result of their attack. But, once they were caught, I put a filter in place to block them from the payout queue (similar to the block on known MtGox addresses). Eligius’s offline wallet now has roughly 200 BTC work credits held from the payout queue under the attacker's addresses, that we have stopped them from stealing.
Nice catch first of all. I appreciate the due diligence. I have what may be a stupid question(who knows). You say there is no way the attacker can profit, but I was wondering by withholding are they possibly withholding shares of a certain difficulty range and mining at several pools with difficulty ranges for each to look like they are mining at each pool to get credit for their hash rate at each pool? I don't even know if this is possible and I've been drinking a little, but it came to me while reading your post.... Anyway again nice catch.....
|
|
|
|
organofcorti
Donator
Legendary
Offline
Activity: 2058
Merit: 1007
Poor impulse control.
|
|
June 13, 2014, 03:08:59 AM |
|
Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well.
Was this done intentionally, or was it due to the same bug that was seen at BTC Guild (where valid shares > 2^31 were not submitted by a particular device)? Or is there some news that I'm not aware of?
|
|
|
|
taipo
Full Member
Offline
Activity: 238
Merit: 100
Kia ora!
|
|
June 13, 2014, 03:10:46 AM |
|
including asking them to include a real name and location in the signed message, refusing to discuss it until they had done so. They eventually responded around the Memorial Day US holiday weekend So who are they?
|
|
|
|
eleuthria
Legendary
Offline
Activity: 1750
Merit: 1007
|
|
June 13, 2014, 03:11:08 AM |
|
Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well.
Was this done intentionally, or was it due to the same bug that was seen at BTC Guild (where validshares > 2^31 were not submitted by a particular device)? Or is there some news that I'm not aware of? Same users. Before the full scope of what was happening to BTC Guild was made clear, I informed many other pool operators of the addresses for accounts I was freezing in relation to the block withholding. We were in discussion about withholding vectors already from the abnormally low luck that Eligius and BTC Guild both had in March and April respectively.
|
RIP BTC Guild, April 2011 - June 2015
|
|
|
ManeBjorn
Legendary
Offline
Activity: 1288
Merit: 1004
|
|
June 13, 2014, 03:28:33 AM |
|
It's getting abnormally low again. Do you think they are just moving around now? I wish they would just go to ghash and screw them up and leave us alone at the legit pools. Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well.
Was this done intentionally, or was it due to the same bug that was seen at BTC Guild (where validshares > 2^31 were not submitted by a particular device)? Or is there some news that I'm not aware of? Same users. Before the full scope of what was happening to BTC Guild was made clear, I informed many other pool operators of the addresses for accounts I was freezing in relation to the block withholding. We were in discussion about withholding vectors already from the abnormally low luck that Eligius and BTC Guild both had in March and April respectively.
|
|
|
|
Hektur
Member
Offline
Activity: 271
Merit: 10
|
|
June 13, 2014, 03:31:04 AM |
|
Good catch guys.
I'm with Wizkid, No negotiating with terrorists or extortionists. Too bad there is no registration on Eligius or we could all call out for a name and shame.
They want a higher percentage rate than those payday loan locations.
|
|
|
|
Luke-Jr
Legendary
Offline
Activity: 2576
Merit: 1186
|
|
June 13, 2014, 03:42:59 AM |
|
they threatened putting a 200 BTC bounty on hacking Eligius. LOL, if someone could hack Eligius to get 200 BTC, why would they be waiting for a bounty?
|
|
|
|
AussieHash
|
|
June 13, 2014, 03:48:37 AM |
|
We're missing something. To block withold attack of this magnitude (given the luck change) would have to be 2,000TH per pool. To do this to eligius and BTC guild for 2 months would not make sense unless they could profit elsewhere.
|
|
|
|
jamesg
VIP
Legendary
Offline
Activity: 1358
Merit: 1000
AKA: gigavps
|
|
June 13, 2014, 04:04:37 AM |
|
We're missing something. To block withold attack of this magnitude (given the luck change) would have to be 2,000TH per pool. To do this to eligius and BTC guild for 2 months would not make sense unless they could profit elsewhere.
Not true. By going unnoticed and getting paid they only suffered a small percentage of the total payout as a loss. If they haven't fixed the bug by now, it is probably something wrong with the hardware and would be a total loss if they didn't scam unsuspecting pools. This is not a defense of their actions, only my attempt to find a root cause for the attacker to continue to block withhold. The only people making hardware, writing their own software and mining at the ~2Ph/s scale that I am aware of is ______.
|
|
|
|
warhawk187
|
|
June 13, 2014, 04:07:08 AM |
|
We're missing something. To block withold attack of this magnitude (given the luck change) would have to be 2,000TH per pool. To do this to eligius and BTC guild for 2 months would not make sense unless they could profit elsewhere.
ghash.io?
|
|
|
|
|