Bitcoin Forum
May 24, 2024, 05:51:58 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 »
  Print  
Author Topic: Innosilicon releases A9 Zmaster 50ksol/s Equihash miner at 620W  (Read 45450 times)
panningforcoin
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile WWW
July 17, 2018, 11:30:20 PM
 #301

firmware update will help show correct hash rate on the innosilicon admin page

Thank you!

I just switched to Nichhash. Showing $80 bucks a day profit. Slush had me at .065 zec for the current round then dropped me to .042..
I may give flypool a shot, just need some ROI. Maybe a mistake but it wasn't looking like I was going to make nearly as much on Slush as Nicehash. I'm wanting to hold zec but I can always just buy it. What pool are you guys using?



Wait wait, this works fine on Nicehash? How long did you run it? Usually it throws invalid shares after some time.

Yes worked perfectly for me. I ran it for a couple hours or so.
I used: stratum+tcp://equihash.usa.nicehash.com:3357
with my nicehash wallet as user and x as pass.

wKiV7378U
Newbie
*
Offline Offline

Activity: 62
Merit: 0


View Profile
July 17, 2018, 11:52:39 PM
 #302

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....
Andartis
Jr. Member
*
Offline Offline

Activity: 306
Merit: 7


View Profile
July 18, 2018, 12:31:47 AM
 #303

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Maybe someone can have a look at the firmware?
xpulse
Newbie
*
Offline Offline

Activity: 141
Merit: 0


View Profile
July 18, 2018, 01:38:18 AM
 #304

If someone can figured out on how to get storage out from a9, it is simple to edit "passwd" file to delete current password for root from current to "nothing" and start miner again with blank password for root.

The problem is, storage needs to be connected to external terminal. I don't know which storage - flash/sdcard/etc Innosilicon using as a boot device on A9. Flash - could be an issue as it will be soldered to control board.
Andartis
Jr. Member
*
Offline Offline

Activity: 306
Merit: 7


View Profile
July 18, 2018, 08:14:37 AM
 #305

Maybe you could also try halong mining passwords.
basilp
Jr. Member
*
Offline Offline

Activity: 36
Merit: 8


View Profile
July 18, 2018, 08:44:53 AM
 #306

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley
bitliteethdashneo
Newbie
*
Offline Offline

Activity: 20
Merit: 0


View Profile
July 18, 2018, 10:50:16 AM
Last edit: July 18, 2018, 03:49:13 PM by bitliteethdashneo
 #307

The miner is lying at customs after reaching destination ( by DHL tracking ) for more than 11 days now. Have mailed the customs appellate, who has directed a reply but still nothing has moved. The miner was bought by crypto. Even after producing invoice of $300 (for shipping an handling ) the guy now wants bank records to be shown and not ready to accept crypto payment have started happening and there is no bank for that.  (This type of import have been discussed on this forum too and US/EU citizens have imported without much hassles).As an option I told him to return the miner to seller (which is what happens when they are not delivered) by charging whatever fee , which is also not being done. It is hoarded at the airport for 11 days now - calculate total loss from July 3rd when it got shipped !

This is what happens when a village idiot runs a country.
India brought ICEGATE ( hurriedly copied from ICE of US with shabby website ) and taxed everything flat at 30% GST (I dont know if IGST is also charged in addition) without doing an iota of work or insurance or whatever ( which probably other countries do ) . From cellphones to sims to TVs to cars to bikes to aircrafts to trains every high end electronic is imported to India - the main motive being to keep engineering / intellegentsia away from government and making a loot out of commissions from import deals. Since its colonial commonwealth genes is still rooted strong anything coming not from US/UK is going to be met with severe suspicion, hatred and food for bribe. Now since my miner was from HK and I not being a diplomat  / connected to govt in anyway they will make it more tougher.And a few people like me who don't join US outsourcing brigade which itself is a heavily brahminical (yes its a indian jewish(may not be all) problem) H1B VISA arbitrage out of cheap labor, its a nightmare.

Indian govt looks like a kid looking for the shiniest and bulky equipment , crying for it's share. This is microcosm of trade barriers, greedy and idiotic governments can harass citizens with when they feel their existence is at stake.

Don't think many are running this miner in India. The seller sent one example routed through same customs but don't know how he did receive it after 2 weeks!
panningforcoin
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile WWW
July 18, 2018, 03:48:19 PM
 #308

For anyone using a standard ATX power supply please respond if my plan is correct/incorrect.

I plan on changing from the noisy power supply to a:
EVGA SuperNOVA 1000 P2 80+ PLATINUM
https://www.amazon.com/gp/product/B00EKJQM5E/ref=ox_sc_act_title_3?smid=A2Q1LRYTXHYQ2K&psc=1

If I am correct the EVGA is a single rail so it shouldn't matter which of the six vga outs I use to connect to the 3 hashboards?
I plan to use all six vga outs to connect to the hash boards.

I then plan to use a molex to pcie six pin to connect to the controller board:
https://www.amazon.com/gp/product/B01DV1Z22K/ref=ox_sc_act_title_1?smid=A1AMUYYA3CT6HJ&psc=1

I'm also getting a switch to turn the EVGA on/off. I know I could just jump it but... This is nicer...
https://www.amazon.com/gp/product/B01MSY4966/ref=ox_sc_act_title_2?smid=AQ8OIL3FGVKZE&psc=1

Will this work correctly or is there a better way? I don't want to fry the miner but this PSU is driving me to distraction!

Thanks
Andartis
Jr. Member
*
Offline Offline

Activity: 306
Merit: 7


View Profile
July 18, 2018, 06:10:50 PM
 #309

For anyone using a standard ATX power supply please respond if my plan is correct/incorrect.

I plan on changing from the noisy power supply to a:
EVGA SuperNOVA 1000 P2 80+ PLATINUM
https://www.amazon.com/gp/product/B00EKJQM5E/ref=ox_sc_act_title_3?smid=A2Q1LRYTXHYQ2K&psc=1

If I am correct the EVGA is a single rail so it shouldn't matter which of the six vga outs I use to connect to the 3 hashboards?
I plan to use all six vga outs to connect to the hash boards.

I then plan to use a molex to pcie six pin to connect to the controller board:
https://www.amazon.com/gp/product/B01DV1Z22K/ref=ox_sc_act_title_1?smid=A1AMUYYA3CT6HJ&psc=1

I'm also getting a switch to turn the EVGA on/off. I know I could just jump it but... This is nicer...
https://www.amazon.com/gp/product/B01MSY4966/ref=ox_sc_act_title_2?smid=AQ8OIL3FGVKZE&psc=1

Will this work correctly or is there a better way? I don't want to fry the miner but this PSU is driving me to distraction!

Thanks


You might not need the molex adapter since the PSU shoud have enough connectors. Check at the EVGA page.
panningforcoin
Newbie
*
Offline Offline

Activity: 51
Merit: 0


View Profile WWW
July 18, 2018, 06:26:33 PM
Last edit: July 18, 2018, 08:06:59 PM by panningforcoin
 #310

For anyone using a standard ATX power supply please respond if my plan is correct/incorrect.

I plan on changing from the noisy power supply to a:
EVGA SuperNOVA 1000 P2 80+ PLATINUM
https://www.amazon.com/gp/product/B00EKJQM5E/ref=ox_sc_act_title_3?smid=A2Q1LRYTXHYQ2K&psc=1

If I am correct the EVGA is a single rail so it shouldn't matter which of the six vga outs I use to connect to the 3 hashboards?
I plan to use all six vga outs to connect to the hash boards.

I then plan to use a molex to pcie six pin to connect to the controller board:
https://www.amazon.com/gp/product/B01DV1Z22K/ref=ox_sc_act_title_1?smid=A1AMUYYA3CT6HJ&psc=1

I'm also getting a switch to turn the EVGA on/off. I know I could just jump it but... This is nicer...
https://www.amazon.com/gp/product/B01MSY4966/ref=ox_sc_act_title_2?smid=AQ8OIL3FGVKZE&psc=1

Will this work correctly or is there a better way? I don't want to fry the miner but this PSU is driving me to distraction!

Thanks


You might not need the molex adapter since the PSU shoud have enough connectors. Check at the EVGA page.

Thanks, your right, it has 8 six pin vga connections.

wKiV7378U
Newbie
*
Offline Offline

Activity: 62
Merit: 0


View Profile
July 18, 2018, 08:11:54 PM
 #311

the innosilicon manual states 1000W+ PSU is needed for the A9. 

i dont understand why, because it only draws 630W.  Most PSUs are like 88-95% efficient, so a 850*88%=748W > 630W. 

performance mode doesnt do anything sooo i dont see why you really need a 1000W psu.

i bought an 850W psu for 20 bucks with a gift card to replace the high pitched whine on my bitmain psu.  i dont see why it wont work until and unless innosilicon releases new firmware to make the a9 actually perform better in performance mode.

i dont want to spend another 200$ on this miner, every $ counts for capital recovery and roi, but that high pitched whine is pretty annoying and worth 20$ to fix in my book.
EK701
Newbie
*
Offline Offline

Activity: 25
Merit: 0


View Profile
July 18, 2018, 09:32:43 PM
 #312

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley

Yes, it's possible!  Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it:

root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

Please share any results here!
sweeperAA
Jr. Member
*
Offline Offline

Activity: 55
Merit: 5


View Profile
July 18, 2018, 10:24:51 PM
 #313

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley

Yes, it's possible!  Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it:

root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

Please share any results here!


I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here.
basilp
Jr. Member
*
Offline Offline

Activity: 36
Merit: 8


View Profile
July 19, 2018, 12:24:08 AM
 #314

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley

Yes, it's possible!  Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it:

root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

Please share any results here!


I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here.

I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc.  Do we know which hashing algorithm that password is? MD5 or SHA512

Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

are we trying to force?  I guess if there's a salt as well there's little chance of figuring it out.
sweeperAA
Jr. Member
*
Offline Offline

Activity: 55
Merit: 5


View Profile
July 19, 2018, 12:58:40 AM
 #315

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley

Yes, it's possible!  Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it:

root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

Please share any results here!


I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here.

I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc.  Do we know which hashing algorithm that password is? MD5 or SHA512

Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

are we trying to force?  I guess if there's a salt as well there's little chance of figuring it out.

The SWU file is several files in one, each with a section and hash of the data of that file. If you search for "$6$", you'll find that contents of the shadow file which has that root:$6$... structure. The $6$ indicates it's a SHA512. The salt is the characters in between the second and third "$" signs. The hashed portion of the password is after the third "$" sign. Note that these are put into a different format due to linux's "crypt" routine. Read here:  http://manpages.ubuntu.com/manpages/trusty/man3/crypt.3.html

This is why brute-force cracking this is not reasonable (in my mind). I think it's more probable that the SWU image gets updated to a known hashed password.
basilp
Jr. Member
*
Offline Offline

Activity: 36
Merit: 8


View Profile
July 19, 2018, 01:29:59 AM
 #316

Looks like there's a new firmware on their download page. 0718  Perhaps it will have performance improvements Smiley

http://www.innosilicon.com/html/support_en/download.html
EK701
Newbie
*
Offline Offline

Activity: 25
Merit: 0


View Profile
July 19, 2018, 01:36:40 AM
 #317

Looks like there's a new firmware on their download page. 0718  Perhaps it will have performance improvements Smiley

http://www.innosilicon.com/html/support_en/download.html

I tried it earlier today for about 6 hours.  No obvious improvements and in fact, the hash rate was very slow to ramp up - taking over an hour to plateau.  I went back to the 7/6 firmware.
xpulse
Newbie
*
Offline Offline

Activity: 141
Merit: 0


View Profile
July 19, 2018, 02:23:08 AM
 #318

Looks like there's a new firmware on their download page. 0718  Perhaps it will have performance improvements Smiley

http://www.innosilicon.com/html/support_en/download.html

I tried it earlier today for about 6 hours.  No obvious improvements and in fact, the hash rate was very slow to ramp up - taking over an hour to plateau.  I went back to the 7/6 firmware.


Running a test for new firmware on Nicehash and Flypool. At this moment looks better than 6/30 and 7/6... will provide updates in 12 hours.
EK701
Newbie
*
Offline Offline

Activity: 25
Merit: 0


View Profile
July 19, 2018, 03:02:41 AM
 #319

they provided no explanation...pretty much just said no, sorry, wont give it to you, neener neener neener.

ive started looking at brute forcing the ssh password knowing that some keywords will probably be "inno" "t1t2t3" "a9" based on previous innosilicon passwords but probably wont have much luck....

Is it possible to mount the firmware on a linux box or something, so could try and brute force it a little more firmly Smiley

Yes, it's possible!  Here is the /etc/shadow entry from the firmware file if anyone wants to take a go at it:

root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

Please share any results here!


I'm trying to figure out the ssh password to my Inno D9 and it looks like you guys are going down the same paths as I have (without success). I don't think it's reasonable to brute force this. I tried it with hashcat for about a week and didn't find anything. My latest theory is to modify the SWU file as it contains the rootfs.ubi file. Change the hashed password in the binary that's in the shadow file to a known hash value (with the particular salt), then update the hash of the rootfs.ubi section. Unfortunately, I'm stuck at being able to reproduce the hash of the original .ubi file section. Then, flash the modified SWU file. However, I'm really trying not to brick my miner. I just haven't dealt with SWU files before so I'm a little cautious here.

I'm interested in learning a bit more about this. How did you get the /etc/passwd? I've extracted the .swu but just see BOOT.bin and rootfs.ubi etc.  Do we know which hashing algorithm that password is? MD5 or SHA512

Which part of the root:$6$AFqSg1Lk$PcjGWzIPX1ghz7GqGzXoFq0WsYTAwz5VsbG/DiKBQmxYno4igKlPLhqwTkdenTevxS9K9bFqzUMGiB1KdIX3G.:10933:0:99999:7:::

are we trying to force?  I guess if there's a salt as well there's little chance of figuring it out.

The SWU file is several files in one, each with a section and hash of the data of that file. If you search for "$6$", you'll find that contents of the shadow file which has that root:$6$... structure. The $6$ indicates it's a SHA512. The salt is the characters in between the second and third "$" signs. The hashed portion of the password is after the third "$" sign. Note that these are put into a different format due to linux's "crypt" routine. Read here:  http://manpages.ubuntu.com/manpages/trusty/man3/crypt.3.html

This is why brute-force cracking this is not reasonable (in my mind). I think it's more probable that the SWU image gets updated to a known hashed password.

I'm going to throw 8 1080Ti at it for a while trying to brute force crack it.
chinguyensg
Newbie
*
Offline Offline

Activity: 46
Merit: 0


View Profile
July 19, 2018, 05:59:07 AM
 #320

My one GPU module on A9 stopped working. Any troubleshoot ideas? Support is not responding.
Now mining on 2 GPU modules at average 30 Ks on nicehash.
Sad to loose 1/3 of capacity.

It's the same problem with my second A9. I am mining at 25 - 30 ks with that one, it cannot be changed to another A9 because the local seller told me that A9 now is not available in his stock. Sad to you and me.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!