Bitcoin Forum
April 24, 2026, 07:49:14 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 [310] 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 ... 515 »
  Print  
Author Topic: ANTMINER S3+ Discussion and Support Thread  (Read 710854 times)
PatMan
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


Watch out for the "Neg-Rep-Dogie-Police".....


View Profile WWW
September 06, 2014, 11:38:05 AM
 #6181


All of my 15 Antminer S3   (Batch 4-6) work great with this new firmware.

I'll wait until they sort out the MD5 problem. Can you tell me what version cgminer is in there? Cheers.

"When one person is deluded it is called insanity - when many people are deluded it is called religion" - Robert M. Pirsig.  I don't want your coins, I want change.
Amazon UK BTC payment service - https://bitcointalk.org/index.php?topic=301229.0 - with FREE delivery!
http://www.ae911truth.org/ - http://rethink911.org/ - http://rememberbuilding7.org/
maxood
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
September 06, 2014, 11:45:33 AM
 #6182


All of my 15 Antminer S3   (Batch 4-6) work great with this new firmware.

I'll wait until they sort out the MD5 problem. Can you tell me what version cgminer is in there? Cheers.

the same, 3.12.0
PatMan
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


Watch out for the "Neg-Rep-Dogie-Police".....


View Profile WWW
September 06, 2014, 11:51:58 AM
 #6183

So, new firmware with old security vulnerabilities and code........hmmmmmm

Why Bitmain?

"When one person is deluded it is called insanity - when many people are deluded it is called religion" - Robert M. Pirsig.  I don't want your coins, I want change.
Amazon UK BTC payment service - https://bitcointalk.org/index.php?topic=301229.0 - with FREE delivery!
http://www.ae911truth.org/ - http://rethink911.org/ - http://rememberbuilding7.org/
Tigggger
Legendary
*
Offline Offline

Activity: 1098
Merit: 1000



View Profile
September 06, 2014, 11:54:57 AM
 #6184


What am I doing wrong here?

You have the default gateway set as 192.168.1.99 that's not right, it needs to be set to your router IP (probably 192.168.1.1 or 192.168.1.254)

Your router *might* be 192.168.1.1 so I would change that as well

So maybe
192.168.1.10
255.255.255.0
192.168.1.254 <- Router IP, whatever it is

DNS Server Auto

IYFTech
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


WANTED: Active dev to fix & re-write p2pool in C


View Profile
September 06, 2014, 12:24:18 PM
Last edit: September 06, 2014, 12:41:00 PM by IYFTech
 #6185


All of my 15 Antminer S3   (Batch 4-6) work great with this new firmware.

I'll wait until they sort out the MD5 problem. Can you tell me what version cgminer is in there? Cheers.

the same, 3.12.0


What? Why on earth are Bitmain still using this old, outdated, inefficient & security flawed cgminer version in a new firmware release? It makes absolutely no sense whatsoever.....

@ Bitmain:  You promised the community that you would update to the latest cgminer version that fixes the security vulnerabilities and includes many improvements weeks ago - yet you are still using it in a brand new firmware release? Cgminer version 3.12 is not safe to use & is inefficient - please use the latest version as you promised us you would.

Edit:  This firmware adds support for the S3+ - does that mean that you will be shipping all S3+'s with known security issues & outdated cgminer software?

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
rsclark3
Newbie
*
Offline Offline

Activity: 9
Merit: 0


View Profile
September 06, 2014, 04:04:57 PM
 #6186

I concur with #IYFTech. Bitmain stated that they would release the firmware and update cgminer. The new firmware contains the same insecure and inefficient cgminer version. We should all demand that they install a version 4.x instead of this very early version.
IYFTech
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


WANTED: Active dev to fix & re-write p2pool in C


View Profile
September 06, 2014, 04:44:19 PM
 #6187

I concur with #IYFTech. Bitmain stated that they would release the firmware and update cgminer. The new firmware contains the same insecure and inefficient cgminer version. We should all demand that they install a version 4.x instead of this very early version.

Thanks  Wink

A quote from August 17th - three weeks ago:


The cgminer software that you are deploying.......with your software has SEVERE security flaws, including the stratum redirect issue - why are you NOT implementing the latest version to eliminate these issues?

Thank you.

+1 I support this sentiment completely  Smiley

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
Stratobitz
Legendary
*
Offline Offline

Activity: 1022
Merit: 1010



View Profile
September 06, 2014, 08:54:18 PM
 #6188


All of my 15 Antminer S3   (Batch 4-6) work great with this new firmware.

I'll wait until they sort out the MD5 problem. Can you tell me what version cgminer is in there? Cheers.

the same, 3.12.0


What? Why on earth are Bitmain still using this old, outdated, inefficient & security flawed cgminer version in a new firmware release? It makes absolutely no sense whatsoever.....

@ Bitmain:  You promised the community that you would update to the latest cgminer version that fixes the security vulnerabilities and includes many improvements weeks ago - yet you are still using it in a brand new firmware release? Cgminer version 3.12 is not safe to use & is inefficient - please use the latest version as you promised us you would.

Edit:  This firmware adds support for the S3+ - does that mean that you will be shipping all S3+'s with known security issues & outdated cgminer software?

Could you elaborate on what the security issues are, and what you mean by ineffecient?

I don't mean to be lazy, but if I read through the boards on these issues I'll likely find lots of conflicting information. 

Security issues... What if I'm behind a Barracuda Firewall?

Inefficiency... Meaning a more current version of Cgminer would hash faster?

Many thanks,

Strato
PatMan
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


Watch out for the "Neg-Rep-Dogie-Police".....


View Profile WWW
September 06, 2014, 09:03:52 PM
 #6189

The most dangerous security vulnerability in that version of cgminer is called the "stratum redirect" issue. It allows a third party to redirect your hashing to a different pool of their choice & claim the BTC mined with your miner. This was fixed in a later version, as well as other fixes & improvements to drivers etc - increasing performance & using less cpu/resources.

Edit: No matter what firewall you use.

Edit1: I believe it affected all miners that used the stratum protocol - not just cgminer.

"When one person is deluded it is called insanity - when many people are deluded it is called religion" - Robert M. Pirsig.  I don't want your coins, I want change.
Amazon UK BTC payment service - https://bitcointalk.org/index.php?topic=301229.0 - with FREE delivery!
http://www.ae911truth.org/ - http://rethink911.org/ - http://rememberbuilding7.org/
IYFTech
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


WANTED: Active dev to fix & re-write p2pool in C


View Profile
September 06, 2014, 09:18:25 PM
 #6190

Exactly. Meaning everyone using Bitmain hardware is at risk having their hashing power redirected to a different pool without their knowing, losing valuable BTC to a third, unscrupulous party/person.

Not good.

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
Stratobitz
Legendary
*
Offline Offline

Activity: 1022
Merit: 1010



View Profile
September 06, 2014, 10:09:30 PM
 #6191

Exactly. Meaning everyone using Bitmain hardware is at risk having their hashing power redirected to a different pool without their knowing, losing valuable BTC to a third, unscrupulous party/person.

Not good.

But wouldn't the attacker have to know or have some information about your miner? Such as IP, etc?
MoreBloodWine
Legendary
*
Offline Offline

Activity: 1064
Merit: 1001


View Profile
September 06, 2014, 10:09:50 PM
 #6192

As long as someone doesnt know the IP of the given miner you should be "safe" right ?

To be decided...
-ck
Legendary
*
Offline Offline

Activity: 4732
Merit: 1711


Ruu \o/


View Profile WWW
September 06, 2014, 10:15:13 PM
 #6193

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.

Developer/maintainer for cgminer, ckpool/ckproxy, and the -ck kernel
2% Fee Solo mining at solo.ckpool.org
-ck
IYFTech
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500


WANTED: Active dev to fix & re-write p2pool in C


View Profile
September 06, 2014, 10:32:42 PM
 #6194

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.

Thanks for confirming ckolivas  Smiley

This is why I & others have been making so much noise about this - it's annoying for everyone - but it's for everyones good that it gets fixed ASAP.

Are you listening, Bitmain?

Edit: It is also why miners should only buy hardware that uses Open Source software provided by ckolivas - so that it can be checked for any security issues or "strange goings on" by the cgminer devs or anyone else who wishes to do so. Never buy hardware that uses Closed Source software - there's no way of knowing what it is doing.

-- Smiley  Thank you for smoking  Smiley --  If you paid VAT to dogie for items you should read this thread:  https://bitcointalk.org/index.php?topic=1018906.0
mdude77
Legendary
*
Offline Offline

Activity: 1540
Merit: 1001



View Profile
September 06, 2014, 11:12:12 PM
 #6195

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.

I assume a properly written proxy could use SSL to secure the connection?

M

I mine at Kano's Pool because it pays the best and is completely transparent!  Come join me!
Soros Shorts
Donator
Legendary
*
Offline Offline

Activity: 1618
Merit: 1012



View Profile
September 07, 2014, 12:01:06 PM
 #6196

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.
Would a firewall configuration that only allows tcp/3333 connections to known/whitelisted pool servers help?
mdude77
Legendary
*
Offline Offline

Activity: 1540
Merit: 1001



View Profile
September 07, 2014, 12:20:52 PM
 #6197

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.
Would a firewall configuration that only allows tcp/3333 connections to known/whitelisted pool servers help?

No.  The stratum protocol allows redirection.  Unless it's a secure connection, it could be intercepted upstream from you and redirected, and you'd never know the wiser.  That's what the newer cgminer allows (for pools that support it), is using SSL.

M

I mine at Kano's Pool because it pays the best and is completely transparent!  Come join me!
-ck
Legendary
*
Offline Offline

Activity: 4732
Merit: 1711


Ruu \o/


View Profile WWW
September 07, 2014, 12:36:52 PM
 #6198

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.
Would a firewall configuration that only allows tcp/3333 connections to known/whitelisted pool servers help?

No.  The stratum protocol allows redirection.  Unless it's a secure connection, it could be intercepted upstream from you and redirected, and you'd never know the wiser.  That's what the newer cgminer allows (for pools that support it), is using SSL.
Actually we don't use ssl in cgminer stratum since it's overkill for the actual problem. The problem is a packet is intercepted between you and the pool and it sends back a redirect message to cgminer which consciously moves to the other pool. People who were mining elsewhere unintentionally could actually see their rig had switched. Redirect rules were made strict according to domain name to prevent redirection from happening unless it was to a server with the same domain meaning they'd have to spoof the domain as well. Blocking outgoing connections from cgminer to only selected upstream pools would actually work to prevent you mining elsewhere but you may end up just failing to connect to anything without the redirect protection in later versions.

Developer/maintainer for cgminer, ckpool/ckproxy, and the -ck kernel
2% Fee Solo mining at solo.ckpool.org
-ck
edonkey
Legendary
*
Offline Offline

Activity: 1150
Merit: 1004



View Profile
September 07, 2014, 02:35:24 PM
 #6199

As long as someone doesnt know the IP of the given miner you should be "safe" right ?
No. The attack occurred upstream, between the miner and the pool.
Would a firewall configuration that only allows tcp/3333 connections to known/whitelisted pool servers help?

No.  The stratum protocol allows redirection.  Unless it's a secure connection, it could be intercepted upstream from you and redirected, and you'd never know the wiser.  That's what the newer cgminer allows (for pools that support it), is using SSL.
Actually we don't use ssl in cgminer stratum since it's overkill for the actual problem. The problem is a packet is intercepted between you and the pool and it sends back a redirect message to cgminer which consciously moves to the other pool. People who were mining elsewhere unintentionally could actually see their rig had switched. Redirect rules were made strict according to domain name to prevent redirection from happening unless it was to a server with the same domain meaning they'd have to spoof the domain as well. Blocking outgoing connections from cgminer to only selected upstream pools would actually work to prevent you mining elsewhere but you may end up just failing to connect to anything without the redirect protection in later versions.

You say that SSL is overkill for the problem, and it probably is from a general perspective. But overreaching as it may be it also sounds like SSL would in fact solve this problem, making it impossible for an attacker who does not have access to the SSL keys to send the redirect message in the first place.

Sorry for the off topic post. Maybe there's a better place to discuss this.

Was I helpful?   BTC: 3G1Ubof5u8K9iJkM8We2f3amYZgGVdvpHr
PatMan
Hero Member
*****
Offline Offline

Activity: 924
Merit: 1000


Watch out for the "Neg-Rep-Dogie-Police".....


View Profile WWW
September 07, 2014, 02:36:15 PM
 #6200

It seems to me that the obvious & right thing for Bitmain to do is what they promised the community they would do. Take down the S3+ firmware update (which does not match the MD5 checksum anyway) and replace it with one that contains the latest cgminer code that fixes the redirect issue. As has been mentioned before - why wouldn't they want to do this? Why would such a large miner manufacturer insist on keeping this security flaw in place?

Food for thought indeed......

"When one person is deluded it is called insanity - when many people are deluded it is called religion" - Robert M. Pirsig.  I don't want your coins, I want change.
Amazon UK BTC payment service - https://bitcointalk.org/index.php?topic=301229.0 - with FREE delivery!
http://www.ae911truth.org/ - http://rethink911.org/ - http://rememberbuilding7.org/
Pages: « 1 ... 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 [310] 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 ... 515 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!