Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 11:51:12 AM Last edit: June 13, 2014, 06:43:26 PM by Brucexie |
|
I'm the owner of 17JkL94B2ngJg4QQZuiozDQjnxXB6B7yTc and 1Gu8zxRi8cyENV8CQe52D7QEsiZ7ruT73u. http://eligius.st/~wizkid057/newstats/userstats.php/17JkL94B2ngJg4QQZuiozDQjnxXB6B7yTchttp://eligius.st/~wizkid057/newstats/userstats.php/1Gu8zxRi8cyENV8CQe52D7QEsiZ7ruT73uYou haven't make any payment to me after May 3. And your customer ticket service said that I'm scamming. Please explain something with evidence. FYI, I mined 5 blocks after 0503, but get no paid, please look for it on your own block list. Update 1: For anyone who trust eligius's annonce to believe that I mine 0 block and want to raise his calculater to caclulate how rare this could be happened, I'd like to remind them, do not forget, eligius can efface my block from his own block list and annonced that I mine nothing. Then you say "I trust eligius since it is the 2nd oldest pool in the world"? Oh, We used to be as you until this incident. Update 2: According to the Eligius block list, 1Gu8xxxx mined 2 blocks after 05-03, it should be 50 BTC, and the account now has 103.3 BTC unpaid, it means that I got about 50% lucky, yes, it is not high, but it is reasonable, I think. 17jkxxx got 3 block mined after 05-03, which got an 122.2 BTC left, which have a 61.4% lucky, still reasonable. Comparaed with people with several THash on eligius and never mined any block, we are much more lucky.
|
|
|
|
VinceSamios
|
|
June 13, 2014, 12:33:14 PM |
|
Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well. A block withholding attack is where a miner submits low difficulty shares but does not submit block solutions— so they appear to be working for the pool and continue to get paid while not actually doing useful work for the pool.
It is unknown how many other pools they’ve executed this attack against. While withholding attacks are detectable, they are not possible to prevent: the risk of block withholding is inherent in how Bitcoin pooling works. Since the attacker does not gain any direct benefit by performing the attack it is usually assumed to not be a serious risk. A withholding attacker can’t profit, except through indirect effects like making a pool look less “lucky” and driving miners to other pools.
My guess is that they never expected to get caught and suffer income loss as a result of their attack. But, once they were caught, I put a filter in place to block them from the payout queue (similar to the block on known MtGox addresses). Eligius’s offline wallet now has roughly 200 BTC work credits held from the payout queue under the attacker's addresses, that we have stopped them from stealing.
When they noticed, weeks later, they contacted us complaining. We asked them to sign messages to verify they were in fact in control of the addresses in question including asking them to include a real name and location in the signed message, refusing to discuss it until they had done so. They eventually responded around the Memorial Day US holiday weekend. Before we were able to respond (everyone has been extra busy as you all know), they threatened putting a 200 BTC bounty on hacking Eligius. More recently, their behaviours have extended to additional ultimatums, arbitrary deadlines, demanding 1164%-APY interest on the payout, etc.
Suffice it to say, communications with the attacker have been less than productive.
My original plan was to return the coins we have held in offline storage to the rightful owners— the miners who were submitting real work and were affected by the withholding attack— by paying towards shelved shares accrued during that time period (doing this is non-trivial due to security measures in place). This is still my intention, as I have no real inclination to yield to the demands and threats made by this attacker who has cost all of us quite a bit. It has unofficially been decided that if it came down to it, Eligius would shut down before being forced to pay any attacker of any kind any amount whatsoever.
In any case, I wanted to make sure I posted the details of this before the attacker attempts to take the public FUD route, and possibly get some constructive opinions on how to actually proceed with this.
I will be posting all details we have about this soon. For now, the two addresses I have filtered from the payout queue are 17JkL94B2ngJg4QQZuiozDQjnxXB6B7yTc and 1Gu8zxRi8cyENV8CQe52D7QEsiZ7ruT73u.
Rest assured that there is no need to be concerned about their threats. Eligius is the second oldest mining pool and is also one of the few remaining pools which has never had any loss of bitcoin from any type of hack. The reason there have been no successful hacks is because we take security very seriously. There really are no possible methods for such an attack with Eligius. While I won't reveal any of the specific security measures in place, even if an attacker were to somehow compromise any or even every single Eligius server, keep in mind that there are no funds stored on any online machine for them to steal anyway. Other data is protected and verified by remote machines as well. The pool will simply be cut off from the world pending my personal review if anything important were actually manipulated. As previously noted, the offline wallet requires coordination between both myself and Luke-Jr, and also very shortly, after completing some testing, a confidential third party.
I am taking this very seriously, and I'll be monitoring the pool as closely as possible. Measures are also being taken to further harden our already very good existing security as well. If My assumption is that the attacker is not going to take kindly to being publicly outed.
Thanks,
-wk
P.S. - This is unrelated to any of the stats issues that have occurred. (Server migration for the new web server is still under way…)
Please return the 429.19371155 BTC you received whilst contributing nothing. The mathematical probability of you not finding a block with the amount of work required to find 24 blocks is: One in 81,000,000 ie. pretty fucking unlikely.
|
|
|
|
greenlion
|
|
June 13, 2014, 12:40:39 PM |
|
How about you first explain what the purpose of withholding blocks was?
|
|
|
|
YipYip
|
|
June 13, 2014, 01:09:39 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ??
|
OBJECT NOT FOUND
|
|
|
fryarminer
|
|
June 13, 2014, 01:33:34 PM |
|
Hi, I'd really be interested in knowing who you are!
|
|
|
|
S4VV4S
|
|
June 13, 2014, 01:36:50 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ?? Is it possible that he/she could have programmed their miners to submit the valid blocks for their self while continuing to get shares from Eligius?
|
|
|
|
onemorebtc
|
|
June 13, 2014, 01:38:07 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ?? Is it possible that he/she could have programmed their miners to submit the valid blocks for their self while continuing to get shares from Eligius? no
|
transfer 3 onemorebtc.k1024.de 1
|
|
|
bitgold
|
|
June 13, 2014, 01:40:25 PM |
|
what happened? curious.
|
|
|
|
S4VV4S
|
|
June 13, 2014, 01:48:15 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ?? Is it possible that he/she could have programmed their miners to submit the valid blocks for their self while continuing to get shares from Eligius? no Can I ask why not?
|
|
|
|
capa
|
|
June 13, 2014, 01:49:07 PM |
|
If you are innocent, let a trusted 3rd party audit your code and systems.
|
|
|
|
greenlion
|
|
June 13, 2014, 01:50:34 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ?? Is it possible that he/she could have programmed their miners to submit the valid blocks for their self while continuing to get shares from Eligius? no Can I ask why not? The hash that was valid versus the target would have been of a block header that reflects paying the pool's coinbase tx. Changing the coinbase would hash to something completely random and different.
|
|
|
|
S4VV4S
|
|
June 13, 2014, 01:54:26 PM |
|
Did you with withhold blocks either by purpose or mistaken bad code is the simple answer that we want to know ?? Is it possible that he/she could have programmed their miners to submit the valid blocks for their self while continuing to get shares from Eligius? no Can I ask why not? The hash that was valid versus the target would have been of a block header that reflects paying the pool's coinbase tx. Changing the coinbase would hash to something completely random and different. Cool, got it. Thanks
|
|
|
|
|
murdof
|
|
June 13, 2014, 02:18:14 PM |
|
So I don't have the technical knowledge to say if you tried to cheat or not.
I just have the following questions:
You say you got no payout after 5/3 (Is that 3-May or 5-March).
If it is 3-May it means that you have more than 100TH/s to produce 200 BTC. If I was running a farm with 100 TH/s I wouldn't trust Eligius, BTC Guild or any other 100% trustworthy pools. I would just run my own pool or would even pay somebody 5 BTC to set it up privately for me so that I will not have any risk. 4 BTC per day, no payout and you don't jump to another pool?
If it is 5-March then it means that that you have less TH/s. But again why mine for 3 more months at a pool that doesn't give payouts? I would open ticket and jump to another one.
|
|
|
|
BTC_Toronto
Newbie
Offline
Activity: 17
Merit: 0
|
|
June 13, 2014, 02:42:04 PM |
|
5 of the 7 blocks you mentioned were discovered after the potential scam or custom mining software mistake was discovered and the miner notified (May 3rd). It might have been that he fixed or change the mining software or that he stop the scam once he was discovered. The problem is with all the time he spent mining before that time without submitting any shares that were found. BTC TO
|
|
|
|
Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 02:48:40 PM |
|
Greetings Eligius miners,
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well. A block withholding attack is where a miner submits low difficulty shares but does not submit block solutions— so they appear to be working for the pool and continue to get paid while not actually doing useful work for the pool.
It is unknown how many other pools they’ve executed this attack against. While withholding attacks are detectable, they are not possible to prevent: the risk of block withholding is inherent in how Bitcoin pooling works. Since the attacker does not gain any direct benefit by performing the attack it is usually assumed to not be a serious risk. A withholding attacker can’t profit, except through indirect effects like making a pool look less “lucky” and driving miners to other pools.
My guess is that they never expected to get caught and suffer income loss as a result of their attack. But, once they were caught, I put a filter in place to block them from the payout queue (similar to the block on known MtGox addresses). Eligius’s offline wallet now has roughly 200 BTC work credits held from the payout queue under the attacker's addresses, that we have stopped them from stealing.
When they noticed, weeks later, they contacted us complaining. We asked them to sign messages to verify they were in fact in control of the addresses in question including asking them to include a real name and location in the signed message, refusing to discuss it until they had done so. They eventually responded around the Memorial Day US holiday weekend. Before we were able to respond (everyone has been extra busy as you all know), they threatened putting a 200 BTC bounty on hacking Eligius. More recently, their behaviours have extended to additional ultimatums, arbitrary deadlines, demanding 1164%-APY interest on the payout, etc.
Suffice it to say, communications with the attacker have been less than productive.
My original plan was to return the coins we have held in offline storage to the rightful owners— the miners who were submitting real work and were affected by the withholding attack— by paying towards shelved shares accrued during that time period (doing this is non-trivial due to security measures in place). This is still my intention, as I have no real inclination to yield to the demands and threats made by this attacker who has cost all of us quite a bit. It has unofficially been decided that if it came down to it, Eligius would shut down before being forced to pay any attacker of any kind any amount whatsoever.
In any case, I wanted to make sure I posted the details of this before the attacker attempts to take the public FUD route, and possibly get some constructive opinions on how to actually proceed with this.
I will be posting all details we have about this soon. For now, the two addresses I have filtered from the payout queue are 17JkL94B2ngJg4QQZuiozDQjnxXB6B7yTc and 1Gu8zxRi8cyENV8CQe52D7QEsiZ7ruT73u.
Rest assured that there is no need to be concerned about their threats. Eligius is the second oldest mining pool and is also one of the few remaining pools which has never had any loss of bitcoin from any type of hack. The reason there have been no successful hacks is because we take security very seriously. There really are no possible methods for such an attack with Eligius. While I won't reveal any of the specific security measures in place, even if an attacker were to somehow compromise any or even every single Eligius server, keep in mind that there are no funds stored on any online machine for them to steal anyway. Other data is protected and verified by remote machines as well. The pool will simply be cut off from the world pending my personal review if anything important were actually manipulated. As previously noted, the offline wallet requires coordination between both myself and Luke-Jr, and also very shortly, after completing some testing, a confidential third party.
I am taking this very seriously, and I'll be monitoring the pool as closely as possible. Measures are also being taken to further harden our already very good existing security as well. If My assumption is that the attacker is not going to take kindly to being publicly outed.
Thanks,
-wk
P.S. - This is unrelated to any of the stats issues that have occurred. (Server migration for the new web server is still under way…)
Please return the 429.19371155 BTC you received whilst contributing nothing. The mathematical probability of you not finding a block with the amount of work required to find 24 blocks is: One in 81,000,000 ie. pretty fucking unlikely. Is there any possible that eligius efface my block record at the block list?
|
|
|
|
Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 02:55:02 PM |
|
Can anyone prove that I submit the same source code as the one I use in 5/2? If not, the result will become useless, whatever it will be. If you are innocent, let a trusted 3rd party audit your code and systems.
|
|
|
|
Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 02:57:54 PM |
|
Am I a fool? How about you first explain what the purpose of withholding blocks was?
|
|
|
|
Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 03:08:57 PM |
|
Hi, I'd really be interested in knowing who you are!
In bitcoin world, "who" is not important, the public key and signed messages are all needed for all purpose, aren't they?
|
|
|
|
Brucexie (OP)
Member
Offline
Activity: 116
Merit: 10
|
|
June 13, 2014, 03:12:00 PM |
|
So I don't have the technical knowledge to say if you tried to cheat or not.
I just have the following questions:
You say you got no payout after 5/3 (Is that 3-May or 5-March).
If it is 3-May it means that you have more than 100TH/s to produce 200 BTC. If I was running a farm with 100 TH/s I wouldn't trust Eligius, BTC Guild or any other 100% trustworthy pools. I would just run my own pool or would even pay somebody 5 BTC to set it up privately for me so that I will not have any risk. 4 BTC per day, no payout and you don't jump to another pool?
If it is 5-March then it means that that you have less TH/s. But again why mine for 3 more months at a pool that doesn't give payouts? I would open ticket and jump to another one.
sorry, it is May the third. And we believed this 2nd oldest pool before that day.
|
|
|
|
|