Bitcoin Forum
November 17, 2024, 07:59:34 AM *
News: Check out the artwork 1Dq created to commemorate this forum's 15th anniversary
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they strongly believe that the creator of this topic is a scammer. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 [132] 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 280 »
  Print  
Author Topic: Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB  (Read 1061454 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
jcumins
Full Member
***
Offline Offline

Activity: 312
Merit: 100


Bcnex - The Ultimate Blockchain Trading Platform


View Profile
June 23, 2014, 11:41:25 PM
 #2621

So Luke

Whats your thoughts on this mess that's going on.  It has to be hard on the Pool that's for sure.

mdude77
Legendary
*
Offline Offline

Activity: 1540
Merit: 1001



View Profile
June 24, 2014, 12:23:09 AM
 #2622

My worker just went idle again. Sad

M

EDIT: Just saw my proxy was showing every hash submission as rejected again.


I mine at Kano's Pool because it pays the best and is completely transparent!  Come join me!
LAMarcellus
Full Member
***
Offline Offline

Activity: 180
Merit: 100


View Profile
June 24, 2014, 12:45:30 AM
Last edit: June 26, 2014, 04:56:25 PM by LAMarcellus
 #2623

About 4 days ago my reported hashrate at eligius.st dropped from the usual ~600gh to ~200gh.

What causes this??

The only way to deal with an unfree world is to become so absolutely free that your very existence is an act of rebellion. – Albert Camus
Hektur
Member
**
Offline Offline

Activity: 271
Merit: 10


View Profile
June 24, 2014, 12:49:12 AM
 #2624

About 4 days ago my reported hashrate at eligius.st dropped from the usual ~600gh to ~200gh.

I was about to check the miners then noticed my hashrate graph mirrors the pool hashrate graph.

This isn't the first time I've seen this which is why I didn't even bother to check my miners.

They're fine. Something is happening to the pool.

Whatever it is, it seems to have been on going for ~4 days now.

Of course it sucks as I'm receiving a significantly reduced pay out.

What causes this??


Probably a DDOS attack since some of us are all experiencing it at the same time.

Luke-Jr
Legendary
*
Offline Offline

Activity: 2576
Merit: 1186



View Profile
June 24, 2014, 01:17:54 AM
 #2625

Eligius is working just fine for me FWIW.
Even to the extent that I can cleanly use the stats for testing.

Hektur
Member
**
Offline Offline

Activity: 271
Merit: 10


View Profile
June 24, 2014, 01:38:40 AM
 #2626

Eligius is working just fine for me FWIW.
Even to the extent that I can cleanly use the stats for testing.

I'm not having an issue yet but the clock is still ticking down

mdude77
Legendary
*
Offline Offline

Activity: 1540
Merit: 1001



View Profile
June 24, 2014, 01:42:33 AM
 #2627

Eligius is working just fine for me FWIW.
Even to the extent that I can cleanly use the stats for testing.

Maybe it's hardware specific?

I'm using Ants... two S2s and one S1s, going through a stratum proxy.

M

I mine at Kano's Pool because it pays the best and is completely transparent!  Come join me!
jcumins
Full Member
***
Offline Offline

Activity: 312
Merit: 100


Bcnex - The Ultimate Blockchain Trading Platform


View Profile
June 24, 2014, 02:15:10 AM
 #2628

I am using S1 and S2 ant miners and they have fallen off line every once and a while but come back pretty quick. Smiley

willphase
Hero Member
*****
Offline Offline

Activity: 767
Merit: 500


View Profile
June 24, 2014, 03:11:10 AM
 #2629

I am not sure what the benefits would be for viewing your balance/profile page over SSL when the page is publicly accessible.

For protecting my mining address from passive observers.

Luke/wk I would be happy to pay for a semi-private TLS endpoint for those more conscious of their privacy needs.

Will

taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
June 24, 2014, 07:14:43 AM
 #2630

SSL will not protect your mining address from casual observers. The mining address is in the URL you request which is visible to the network even when SSL/TLS is implemented.

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
Bitskint
Member
**
Offline Offline

Activity: 79
Merit: 10


View Profile
June 24, 2014, 08:52:37 AM
 #2631


Whatever it is, it seems to have been on going for ~4 days now.

Of course it sucks as I'm receiving a significantly reduced pay out.


If it gets any worse, it will be quicker picking up micro payments from the "Free Bitcoin sites"

Ha Ha Ha  Grin

On a more serious note, could we see a reduction in diff for the first time if all pools seem to be down on luck ?

1M68XehjYww77DLgwW9rk2zRid8Z8B7uw7 <-- my new BTC addy since Cryptsy took everything
vulgartrendkill
Hero Member
*****
Offline Offline

Activity: 518
Merit: 500



View Profile WWW
June 24, 2014, 08:57:13 AM
 #2632

it only seems to be happening to 1th of my 3.5 th. drops to 2.5th for about 20 mins or so and then back up. but then maybe thats a miner issue? (geddit? lol)
fryarminer
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


View Profile
June 24, 2014, 09:28:09 AM
 #2633

Pool's working fine for me. I haven't noticed anything different.
robix
Sr. Member
****
Offline Offline

Activity: 360
Merit: 250


View Profile
June 24, 2014, 10:09:33 AM
 #2634

SSL will not protect your mining address from casual observers. The mining address is in the URL you request which is visible to the network even when SSL/TLS is implemented.
Don't think so. AFAIK the transfer of the complete URL is already encrypted.
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
June 24, 2014, 12:21:35 PM
 #2635

Don't think so. AFAIK the transfer of the complete URL is already encrypted.

Now that I think about it, only the host name part of the URL would be visible to an eavesdropper on a network.

https://eligius.st/~wizkid057/newstats/userstats.php/1zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

So my bad on that one :-/.

The other way someone could take a guess at which address was yours was if they knew what hashrate you were hashing at. If that were the case then they could merely visit http://eligius.st/~wizkid057/newstats/topcontributors.php and work out which one was yours.

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
mdude77
Legendary
*
Offline Offline

Activity: 1540
Merit: 1001



View Profile
June 24, 2014, 12:27:00 PM
 #2636

Don't think so. AFAIK the transfer of the complete URL is already encrypted.
The other way someone could take a guess at which address was yours was if they knew what hashrate you were hashing at. If that were the case then they could merely visit http://eligius.st/~wizkid057/newstats/topcontributors.php and work out which one was yours.

That's easy to defeat.  Use more than one address! Smiley

M


I mine at Kano's Pool because it pays the best and is completely transparent!  Come join me!
frisco
Full Member
***
Offline Offline

Activity: 176
Merit: 100


View Profile
June 24, 2014, 01:31:58 PM
 #2637

Don't think so. AFAIK the transfer of the complete URL is already encrypted.

Now that I think about it, only the host name part of the URL would be visible to an eavesdropper on a network.

https://eligius.st/~wizkid057/newstats/userstats.php/1zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz

So my bad on that one :-/.


Standard SSL ciphers all the communication in a way that the url is only known after the handshake is done and the server certificate is provided, this indeed is a problem for sites as it forces to have only site per IP.
Currently most browsers support an protocol extension to provide with the url in clear text but it is on the user side so you can disable it if you wish.

So no, SSL ciphers all the stream, not even the hostname is known for an eavesdropper, only the IP and port is known.
ProfMac
Legendary
*
Offline Offline

Activity: 1246
Merit: 1002



View Profile
June 24, 2014, 03:15:13 PM
 #2638

Don't think so. AFAIK the transfer of the complete URL is already encrypted.
The other way someone could take a guess at which address was yours was if they knew what hashrate you were hashing at. If that were the case then they could merely visit http://eligius.st/~wizkid057/newstats/topcontributors.php and work out which one was yours.

That's easy to defeat.  Use more than one address! Smiley

M



Back pay rises as sqrt(n) / n, so for 2 addresses it rises twice as fast.

I try to be respectful and informed.
RealMalatesta
Legendary
*
Offline Offline

Activity: 2380
Merit: 1148



View Profile
June 24, 2014, 06:54:39 PM
 #2639

What puzzles me a bit is the following: I have two clusters of miners pointing at different adresses. Both of these clusters have all 17 to 19 hours difficulties to connect. But often not at the same time, there is sometimes a difference between the two clusters, sometimes at the same time. They are on different networks, in different buildings. So something IS going on, although I don't know yet what it is.
taipo
Full Member
***
Offline Offline

Activity: 238
Merit: 100

Kia ora!


View Profile WWW
June 24, 2014, 07:47:17 PM
 #2640

So no, SSL ciphers all the stream, not even the hostname is known for an eavesdropper, only the IP and port is known.

1/ See http://tools.ietf.org/html/rfc6066#page-6 ( Server Name Indication Extention )
2/ The DNS request is still made in the clear unless you are using DNSCrypt

Support the two platforms essential to protecting the identities of whistleblowers. Both accept bitcoin donations.
https://globaleaks.org - GlobalLeaks ( btc: see http://goo.gl/D5wM0L )
http://goo.gl/sZg2RN  - SecureDrop: whistleblower submission system
Pages: « 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 [132] 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 280 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!