Bitcoin Forum
November 10, 2024, 10:37:07 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 [26] 27 »
  Print  
Author Topic: [OFFLINE] SIMPLECOIN.US [PPLNS/SMPPS]  (Read 38060 times)
hmblm1245
Hero Member
*****
Offline Offline

Activity: 628
Merit: 500


View Profile
March 26, 2012, 02:03:25 PM
 #501

Awesome. i thought something was going on. A month or so ago (maybe more) page times and connection were much faster.
bronan
Hero Member
*****
Offline Offline

Activity: 774
Merit: 500


Lazy Lurker Reads Alot


View Profile
March 28, 2012, 07:46:37 AM
 #502

Well i dont know about others but i get lots of pool connection warnings, and constant seeing caching submissions.
But worst of all is silence ..... my fat 7970 often silent is not good Wink
simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
March 28, 2012, 11:59:49 AM
Last edit: March 28, 2012, 12:34:53 PM by simplecoin
 #503

Well i dont know about others but i get lots of pool connection warnings, and constant seeing caching submissions.
But worst of all is silence ..... my fat 7970 often silent is not good Wink

The pool communication issue seems to be MASSIVE spikes in network traffic. Enough to flood the available bandwidth (and we have WAY more than needed for a 2+ TH pool).

Why anyone would syn flood our small pool is beyond me, but the logs and iftop show just that.
Update, it's not just our servers, it's our whole hosing provider that's being attacked. Just got an email from them last night.

They are upgrading their networking now to prevent less downtime.

Sorry, but outside of moving servers (very time consuming) or purchasing additional servers elsewhere (costly and time consuming) there isn't much I can do. Our servers are being DDOS'd, and the hosting provider is working quickly to resolve it.

Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
Bitbird
Full Member
***
Offline Offline

Activity: 234
Merit: 100



View Profile WWW
April 09, 2012, 02:34:23 PM
 #504

@simplecoin What's the estimated time of SMPPS pay out?

My present stats= "BTC Estimate: 0.00000000 BTC /  Unconfirmed: 1.22924257 BTC"

Thanks!

simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
April 09, 2012, 03:41:10 PM
 #505

Restarting psj for new optimizations.

SMPPS will pay out when a block is found on that pool

Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
April 18, 2012, 06:41:36 PM
 #506

We HAVE been hacked. The wallet HAS been drained. I've got all the logs and will be coordinating with the FBI cybercrime division.

The pool will be offline until further notice.

Sorry if I don't respond quickly, I'm a little overwhelmed.

Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
April 18, 2012, 08:13:03 PM
 #507

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
Clipse
Hero Member
*****
Offline Offline

Activity: 504
Merit: 502


View Profile
April 18, 2012, 09:09:34 PM
 #508

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

It seems alot of sites running the simplecoin framework got hacked legitly or claimed to have been hacked.

Im curious do you know of what exploit was used to get in so that it can get patched ?

...In the land of the stale, the man with one share is king... >> Clipse

We pay miners at 130% PPS | Signup here : Bonus PPS Pool (Please read OP to understand the current process)
hmblm1245
Hero Member
*****
Offline Offline

Activity: 628
Merit: 500


View Profile
April 19, 2012, 03:18:01 AM
 #509

What about LTC and NMC? Have those been drained as well?
simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
April 19, 2012, 03:10:51 PM
 #510

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

It seems alot of sites running the simplecoin framework got hacked legitly or claimed to have been hacked.

Im curious do you know of what exploit was used to get in so that it can get patched ?

Working on that now. Most of the simplecoin sites are running very different code and code they've changed. I see several exploit attempts daily, this one just succeeded.

Now the shocking news.... The full wallet value was returned to the address above (and  quickly). So, I'm thankful all the users will get their coins and I don't have to go through another FBI cybercrime matter (the last was over 10 years ago for a client).

That said, I'm leaving the servers offline until I can further lockdown the software. I'll also find a way to make the user funds available as I don't want to tie those up either.


Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
April 19, 2012, 03:14:32 PM
 #511

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

It seems alot of sites running the simplecoin framework got hacked legitly or claimed to have been hacked.

Im curious do you know of what exploit was used to get in so that it can get patched ?
In addition, it is also possible to go through the source to find vulnerabilities, unlike most closed source pools, so if anyone missed something, it could be easier to find and exploit.

Glad to hear that the coins are back.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
deepceleron
Legendary
*
Offline Offline

Activity: 1512
Merit: 1036



View Profile WWW
April 19, 2012, 03:51:02 PM
 #512

A lot of hacks seem to happen after a DDOS. I think it is either tools bruteforcing their way through exploits, or attempts to break php or perl to enable more injection or file drop vectors. DDOS is not just somebody mad at your pool, we should now consider it someone trying to break in, and you should look at what urls are being accessed.

Read http://blog.spiderlabs.com/ to see what kind of stuff hackers have been exploiting to see how to lock things down.
hmblm1245
Hero Member
*****
Offline Offline

Activity: 628
Merit: 500


View Profile
April 19, 2012, 05:10:56 PM
 #513

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

It seems alot of sites running the simplecoin framework got hacked legitly or claimed to have been hacked.

Im curious do you know of what exploit was used to get in so that it can get patched ?

Working on that now. Most of the simplecoin sites are running very different code and code they've changed. I see several exploit attempts daily, this one just succeeded.

Now the shocking news.... The full wallet value was returned to the address above (and  quickly). So, I'm thankful all the users will get their coins and I don't have to go through another FBI cybercrime matter (the last was over 10 years ago for a client).

That said, I'm leaving the servers offline until I can further lockdown the software. I'll also find a way to make the user funds available as I don't want to tie those up either.


That is shocking news. Leads to the question why the hacker(s) returned the coins?
Clipse
Hero Member
*****
Offline Offline

Activity: 504
Merit: 502


View Profile
April 19, 2012, 05:11:57 PM
 #514

If all of the coins are returned to 12433rWhhxBajfyishqomz44K657GqKxCr before the investigator returns my call, I'll be swayed to end the matter.

It seems alot of sites running the simplecoin framework got hacked legitly or claimed to have been hacked.

Im curious do you know of what exploit was used to get in so that it can get patched ?

Working on that now. Most of the simplecoin sites are running very different code and code they've changed. I see several exploit attempts daily, this one just succeeded.

Now the shocking news.... The full wallet value was returned to the address above (and  quickly). So, I'm thankful all the users will get their coins and I don't have to go through another FBI cybercrime matter (the last was over 10 years ago for a client).

That said, I'm leaving the servers offline until I can further lockdown the software. I'll also find a way to make the user funds available as I don't want to tie those up either.



This is some news worthy stuff wow.

Maybe its the same guy who ran the worm to steal coins and then also returned those Tongue

Glad you got those coins back and whoever initially stole it must have turned Robinhood in the meantime.

...In the land of the stale, the man with one share is king... >> Clipse

We pay miners at 130% PPS | Signup here : Bonus PPS Pool (Please read OP to understand the current process)
rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
April 19, 2012, 05:41:52 PM
 #515

Glad you got those coins back and whoever initially stole it must have turned Robinhood in the meantime.
Probably just scared shitless of the FBI getting involved.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
wachtwoord
Legendary
*
Offline Offline

Activity: 2338
Merit: 1136


View Profile
April 19, 2012, 06:23:34 PM
 #516

Glad you got those coins back and whoever initially stole it must have turned Robinhood in the meantime.
Probably just scared shitless of the FBI getting involved.

Yeah, likely just some kid. Ah still better to come your senses late than never.
mc_lovin
Legendary
*
Offline Offline

Activity: 1190
Merit: 1000


www.bitcointrading.com


View Profile WWW
April 19, 2012, 08:40:28 PM
 #517

how many BTC were stolen/returned?

+ 200 karma points to the hacker for returning the coins!
wyager
Member
**
Offline Offline

Activity: 98
Merit: 10



View Profile
April 20, 2012, 03:15:59 AM
 #518

Seriously, whoever returned the coins is either a really nice guy who just wanted to prove a point or they're scared shitless! They must have either done a poor job or have no idea what they're doing if the threat of involving the FBI actually swayed them.

OTC-WoT: 1BWF66DuVqBCSFksUgkLtdYmHucpBgPmVm
simplecoin (OP)
Sr. Member
****
Offline Offline

Activity: 406
Merit: 250



View Profile WWW
April 20, 2012, 05:49:08 PM
 #519

I'm not speculating as to why it was done, or by what type of individual. It happened, the coins were returned, and I now have a chance to focus on the new unified pool framework. No client->poolserver->proxy->frontend anymore. I'm rewriting this in my primary language this time, not just what was initially requested for the bounty I didn't receive any of.

The new system is a ground-up approach, possibly even a new public client.....

Donations: 1VjGJHPtLodwCFBDWsHJMdEhqRcRKdBQk
hmblm1245
Hero Member
*****
Offline Offline

Activity: 628
Merit: 500


View Profile
April 22, 2012, 02:41:36 AM
 #520

Hey guys, some hardware changes here and I'm making another stab at getting cgminer going in windows

I have been following the windows-build.txt instructions and everything seems to be happening so far, but the current step is

"Copy CGMiner source code directory into: \MinGW\msys\1.0\home\9folder with your user name)"

so far the instructions have been clear...but ?what? CGMiner source code directory?  where do I find it?

I know I am retarded and this is facepalmingly obvious...but please help
Are you trying to use CGminer as a miner or are you attempting to play with the source?

If you are using just the miner to mine, download the ZIP, Extract it any ware (Desktop, c:\,...) and launch cgminer.exe. create a cgminer.conf file that looks like this. (see the example.conf for help)

{
"pools" : [
   {
      "url" : "http://url1:8332",
      "user" : "user1",
      "pass" : "pass1"
   },
   {
      "url" : "http://url2:8344",
      "user" : "user2",
      "pass" : "pass2"
   },
   {
      "url" : "http://url3:8332",
      "user" : "user3",
      "pass" : "pass3"
   }
],

"intensity" : "d,9,9,9",
"gpu-engine" : "0-985,0-950,0-960,0-1000",
"gpu-fan" : "0-85,0-85,0-85,0-85",
"gpu-memclock" : "860,825,835,875",
"gpu-powertune" : "20,20,20,20",
"gpu-vddc" : "0.000,0.000,0.000,0.000",
"temp-cutoff" : "95,95,95,95",
"temp-overheat" : "85,85,85,85",
"temp-target" : "75,75,75,75",

"auto-fan" : true,
"auto-gpu" : true,
"expiry" : "120",
"failover-only" : true,
"gpu-threads" : "2",
"log" : "5",
"queue" : "1",
"retry-pause" : "5",
"scan-time" : "60",
"temp-hysteresis" : "3",
"worksize" : "0",

"shares" : "0",
"kernel-path" : "/usr/local/bin"
}
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 [26] 27 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!