panningforcoin
Newbie
Offline
Activity: 51
Merit: 0
|
|
July 17, 2018, 11:30:20 PM |
|
firmware update will help show correct hash rate on the innosilicon admin page
Thank you! I just switched to Nichhash. Showing $80 bucks a day profit. Slush had me at .065 zec for the current round then dropped me to .042.. I may give flypool a shot, just need some ROI. Maybe a mistake but it wasn't looking like I was going to make nearly as much on Slush as Nicehash. I'm wanting to hold zec but I can always just buy it. What pool are you guys using? Wait wait, this works fine on Nicehash? How long did you run it? Usually it throws invalid shares after some time. Yes worked perfectly for me. I ran it for a couple hours or so. I used: stratum+tcp://equihash.usa.nicehash.com:3357 with my nicehash wallet as user and x as pass.
|
|
|
|
wKiV7378U
Newbie
Offline
Activity: 62
Merit: 0
|
|
July 17, 2018, 11:52:39 PM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
|
|
|
|
Andartis
Jr. Member
Offline
Activity: 306
Merit: 7
|
|
July 18, 2018, 12:31:47 AM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Maybe someone can have a look at the firmware?
|
|
|
|
xpulse
Newbie
Offline
Activity: 141
Merit: 0
|
|
July 18, 2018, 01:38:18 AM |
|
If someone can figured out on how to get storage out from a9, it is simple to edit "passwd" file to delete current password for root from current to "nothing" and start miner again with blank password for root.
The problem is, storage needs to be connected to external terminal. I don't know which storage - flash/sdcard/etc Innosilicon using as a boot device on A9. Flash - could be an issue as it will be soldered to control board.
|
|
|
|
Andartis
Jr. Member
Offline
Activity: 306
Merit: 7
|
|
July 18, 2018, 08:14:37 AM |
|
Maybe you could also try halong mining passwords.
|
|
|
|
basilp
Jr. Member
Offline
Activity: 36
Merit: 8
|
|
July 18, 2018, 08:44:53 AM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly
|
|
|
|
bitliteethdashneo
Newbie
Offline
Activity: 20
Merit: 0
|
|
July 18, 2018, 10:50:16 AM Last edit: July 18, 2018, 03:49:13 PM by bitliteethdashneo |
|
The miner is lying at customs after reaching destination ( by DHL tracking ) for more than 11 days now. Have mailed the customs appellate, who has directed a reply but still nothing has moved. The miner was bought by crypto. Even after producing invoice of $300 (for shipping an handling ) the guy now wants bank records to be shown and not ready to accept crypto payment have started happening and there is no bank for that. (This type of import have been discussed on this forum too and US/EU citizens have imported without much hassles).As an option I told him to return the miner to seller (which is what happens when they are not delivered) by charging whatever fee , which is also not being done. It is hoarded at the airport for 11 days now - calculate total loss from July 3rd when it got shipped !
This is what happens when a village idiot runs a country. India brought ICEGATE ( hurriedly copied from ICE of US with shabby website ) and taxed everything flat at 30% GST (I dont know if IGST is also charged in addition) without doing an iota of work or insurance or whatever ( which probably other countries do ) . From cellphones to sims to TVs to cars to bikes to aircrafts to trains every high end electronic is imported to India - the main motive being to keep engineering / intellegentsia away from government and making a loot out of commissions from import deals. Since its colonial commonwealth genes is still rooted strong anything coming not from US/UK is going to be met with severe suspicion, hatred and food for bribe. Now since my miner was from HK and I not being a diplomat / connected to govt in anyway they will make it more tougher.And a few people like me who don't join US outsourcing brigade which itself is a heavily brahminical (yes its a indian jewish(may not be all) problem) H1B VISA arbitrage out of cheap labor, its a nightmare.
Indian govt looks like a kid looking for the shiniest and bulky equipment , crying for it's share. This is microcosm of trade barriers, greedy and idiotic governments can harass citizens with when they feel their existence is at stake.
Don't think many are running this miner in India. The seller sent one example routed through same customs but don't know how he did receive it after 2 weeks!
|
|
|
|
|
Andartis
Jr. Member
Offline
Activity: 306
Merit: 7
|
|
July 18, 2018, 06:10:50 PM |
|
You might not need the molex adapter since the PSU shoud have enough connectors. Check at the EVGA page.
|
|
|
|
panningforcoin
Newbie
Offline
Activity: 51
Merit: 0
|
|
July 18, 2018, 06:26:33 PM Last edit: July 18, 2018, 08:06:59 PM by panningforcoin |
|
You might not need the molex adapter since the PSU shoud have enough connectors. Check at the EVGA page. Thanks, your right, it has 8 six pin vga connections.
|
|
|
|
wKiV7378U
Newbie
Offline
Activity: 62
Merit: 0
|
|
July 18, 2018, 08:11:54 PM |
|
the innosilicon manual states 1000W+ PSU is needed for the A9.
i dont understand why, because it only draws 630W. Most PSUs are like 88-95% efficient, so a 850*88%=748W > 630W.
performance mode doesnt do anything sooo i dont see why you really need a 1000W psu.
i bought an 850W psu for 20 bucks with a gift card to replace the high pitched whine on my bitmain psu. i dont see why it wont work until and unless innosilicon releases new firmware to make the a9 actually perform better in performance mode.
i dont want to spend another 200$ on this miner, every $ counts for capital recovery and roi, but that high pitched whine is pretty annoying and worth 20$ to fix in my book.
|
|
|
|
EK701
Newbie
Offline
Activity: 25
Merit: 0
|
|
July 18, 2018, 09:32:43 PM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Yes, it's possible! Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it: root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: Please share any results here!
|
|
|
|
sweeperAA
Jr. Member
Offline
Activity: 55
Merit: 5
|
|
July 18, 2018, 10:24:51 PM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Yes, it's possible! Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it: root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: Please share any results here! I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here.
|
|
|
|
basilp
Jr. Member
Offline
Activity: 36
Merit: 8
|
|
July 19, 2018, 12:24:08 AM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Yes, it's possible! Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it: root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: Please share any results here! I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here. I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc. Do we know which hashing algorithm that password is? MD5 or SHA512 Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: are we trying to force? I guess if there's a salt as well there's little chance of figuring it out.
|
|
|
|
sweeperAA
Jr. Member
Offline
Activity: 55
Merit: 5
|
|
July 19, 2018, 12:58:40 AM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Yes, it's possible! Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it: root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: Please share any results here! I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here. I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc. Do we know which hashing algorithm that password is? MD5 or SHA512 Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: are we trying to force? I guess if there's a salt as well there's little chance of figuring it out. The SWU file is several files in one, each with a section and hash of the data of that file. If you search for "$6$", you'll find that contents of the shadow file which has that root:$6$... structure. The $6$ indicates it's a SHA512. The salt is the characters in between the second and third "$" signs. The hashed portion of the password is after the third "$" sign. Note that these are put into a different format due to linux's "crypt" routine. Read here: http://manpages.ubuntu.com/manpages/trusty/man3/crypt.3.htmlThis is why brute-force cracking this is not reasonable (in my mind). I think it's more probable that the SWU image gets updated to a known hashed password.
|
|
|
|
|
EK701
Newbie
Offline
Activity: 25
Merit: 0
|
|
July 19, 2018, 01:36:40 AM |
|
I tried it earlier today for about 6 hours. No obvious improvements and in fact, the hash rate was very slow to ramp up - taking over an hour to plateau. I went back to the 7/6 firmware.
|
|
|
|
xpulse
Newbie
Offline
Activity: 141
Merit: 0
|
|
July 19, 2018, 02:23:08 AM |
|
I tried it earlier today for about 6 hours. No obvious improvements and in fact, the hash rate was very slow to ramp up - taking over an hour to plateau. I went back to the 7/6 firmware. Running a test for new firmware on Nicehash and Flypool. At this moment looks better than 6/30 and 7/6... will provide updates in 12 hours.
|
|
|
|
EK701
Newbie
Offline
Activity: 25
Merit: 0
|
|
July 19, 2018, 03:02:41 AM |
|
they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.
ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Yes, it's possible! Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it: root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: Please share any results here! I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here. I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc. Do we know which hashing algorithm that password is? MD5 or SHA512 Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7::: are we trying to force? I guess if there's a salt as well there's little chance of figuring it out. The SWU file is several files in one, each with a section and hash of the data of that file. If you search for "$6$", you'll find that contents of the shadow file which has that root:$6$... structure. The $6$ indicates it's a SHA512. The salt is the characters in between the second and third "$" signs. The hashed portion of the password is after the third "$" sign. Note that these are put into a different format due to linux's "crypt" routine. Read here: http://manpages.ubuntu.com/manpages/trusty/man3/crypt.3.htmlThis is why brute-force cracking this is not reasonable (in my mind). I think it's more probable that the SWU image gets updated to a known hashed password. I'm going to throw 8 1080Ti at it for a while trying to brute force crack it.
|
|
|
|
chinguyensg
Newbie
Offline
Activity: 46
Merit: 0
|
|
July 19, 2018, 05:59:07 AM |
|
My one GPU module on A9 stopped working. Any troubleshoot ideas? Support is not responding. Now mining on 2 GPU modules at average 30 Ks on nicehash. Sad to loose 1/3 of capacity.
It's the same problem with my second A9. I am mining at 25 - 30 ks with that one, it cannot be changed to another A9 because the local seller told me that A9 now is not available in his stock. Sad to you and me.
|
|
|
|
|