Bitcoin Forum
May 08, 2024, 10:09:55 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 ... 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 [1619] 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 ... 2248 »
  Print  
Author Topic: KanoPool since 2014 🐈 - PPLNS and Solo 0.5% fee - Worldwide - 2436 blocks  (Read 5350299 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic. (50 posts by 3+ users deleted.)
Waztim
Member
**
Offline Offline

Activity: 210
Merit: 15


View Profile
December 26, 2017, 03:12:18 AM
 #32361

31.76% of Diff achieved,  can we get a super lucky, 50/50, flip flop coin toss block for Christmas? I just talked again with my four Antpoo's and they have assured "The Boss" they are working as hard as they can to Get 'R done. Come On Block and Mine On with Kano-San, the best BTC mining pool on earth. 
1715162995
Hero Member
*
Offline Offline

Posts: 1715162995

View Profile Personal Message (Offline)

Ignore
1715162995
Reply with quote  #2

1715162995
Report to moderator
TalkImg was created especially for hosting images on bitcointalk.org: try it next time you want to post an image
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715162995
Hero Member
*
Offline Offline

Posts: 1715162995

View Profile Personal Message (Offline)

Ignore
1715162995
Reply with quote  #2

1715162995
Report to moderator
brad2388
Member
**
Offline Offline

Activity: 73
Merit: 10


View Profile
December 26, 2017, 05:20:29 AM
 #32362

How low does everyone think bitcoin will go?
Was reading a post about it dropping back to 3500.00?
kano (OP)
Legendary
*
Offline Offline

Activity: 4494
Merit: 1808


Linux since 1997 RedHat 4


View Profile
December 26, 2017, 05:24:29 AM
 #32363

How low does everyone think bitcoin will go?
Was reading a post about it dropping back to 3500.00?
I guess they didn't see it go back up in the last hour Tongue

Pool: https://kano.is - low 0.5% fee PPLNS 3 Days - Most reliable Solo with ONLY 0.5% fee   Bitcointalk thread: Forum
Discord support invite at https://kano.is/ Majority developer of the ckpool code - k for kano
The ONLY active original developer of cgminer. Original master git: https://github.com/kanoi/cgminer
brad2388
Member
**
Offline Offline

Activity: 73
Merit: 10


View Profile
December 26, 2017, 05:26:31 AM
 #32364

I hope they are wrong. Said by dec 29th it would be 11k.
dracora
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
December 26, 2017, 05:27:32 AM
 #32365

Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
Actually - it's exactly that Cheesy

I coded in the event/ovent ban code to KanoDB long ago, but every so often some new bot comes along and I have to think of how I can change the settings in the ban code (i.e. modify the limits via the KanoDB API) to best match the bot.
I've ended up mainly relying on the "no logins" switch, but that's a problem when it goes on for a long time and no one can login normally.

I think from now on I'll rely on switching on/off the "zero tolerance" ban, since it doesn't affect anyone logging in normally unless they forget their password or can't type their own username Smiley
Most people don't have the problem, and the few that do can always contact me to check why they were banned and clear their ban if they weren't part of the bot attack Smiley

check out fail2ban - you're able to create custom filters
Veladrin
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
December 26, 2017, 05:34:50 AM
 #32366

Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
Actually - it's exactly that Cheesy

I coded in the event/ovent ban code to KanoDB long ago, but every so often some new bot comes along and I have to think of how I can change the settings in the ban code (i.e. modify the limits via the KanoDB API) to best match the bot.
I've ended up mainly relying on the "no logins" switch, but that's a problem when it goes on for a long time and no one can login normally.

I think from now on I'll rely on switching on/off the "zero tolerance" ban, since it doesn't affect anyone logging in normally unless they forget their password or can't type their own username Smiley
Most people don't have the problem, and the few that do can always contact me to check why they were banned and clear their ban if they weren't part of the bot attack Smiley

Maybe obvious, but exponential backoff in addition to whatever screening you do could probably weed out bots vs humans actually fat-fingering as efficiently without requiring manual switching or locking the fathands out.  There's also an nginx module to rate limit by filter if you want to avoid putting it on your backend. People should be using password management systems these days though...

edit: ah yea as @dracora suggested, fail2ban++
dzimmerm56
Member
**
Offline Offline

Activity: 118
Merit: 14


View Profile
December 26, 2017, 05:42:37 AM
 #32367

I use 2FA to login in, the only drawback is having to remember to bring my smart phone downstairs with me where my man cave is. I can manage the 2FA on the phone itself, it is just a little trickier due to the short time a number is valid. If everyone used 2FA you could disable non 2FA logins and probably eliminate most of the evil bot nuisance traffic.

 Bitcoin price is floating above 15k at the moment.

1 S9, 2  A741s, 1 A821, 3 A841s, and full bitcoin node
About 80THash/sec
dzimmerm56
Member
**
Offline Offline

Activity: 118
Merit: 14


View Profile
December 26, 2017, 05:54:59 AM
 #32368

Featuring Yama-No-Shinbo the goddess of  luck, wealth, prosperity, protection and joy.
Lets have a nice block for after Holiday festivities.

1 S9, 2  A741s, 1 A821, 3 A841s, and full bitcoin node
About 80THash/sec
kano (OP)
Legendary
*
Offline Offline

Activity: 4494
Merit: 1808


Linux since 1997 RedHat 4


View Profile
December 26, 2017, 06:04:52 AM
 #32369

...

Maybe obvious, but exponential backoff in addition to whatever screening you do could probably weed out bots vs humans actually fat-fingering as efficiently without requiring manual switching or locking the fathands out.  There's also an nginx module to rate limit by filter if you want to avoid putting it on your backend. People should be using password management systems these days though...

edit: ah yea as @dracora suggested, fail2ban++
Well I only switch the "zero tolerance" on when needed (though it's still on coz there's still a couple of new IP addresses added every minute that get banned immediately Smiley

The web server is simply a web server.
My KanoDB/Code decides all the rules.

There are no known/expected exploits in the web site, it's all to do with logins.
People try "known exploits" regularly and none have ever succeeded, due to the fact that all the code is my own code, not some humongous dump of code written by dozens of  people, each trying to outperform every other dump of common code that people use and thus adding all sorts of risks and problems into the mix.
There's no offsite scripts to open up all the easy to exploit problems they cause, there's not even any CSS from offsite - it's also actually inline to reduce I/O.

The event/ovent code is all in that public git run by that god-complex guy, if you are curious about it's design - but it's controlled by settings that are more lenient than the default in code settings that would shut down the web site all the time Smiley

Pool: https://kano.is - low 0.5% fee PPLNS 3 Days - Most reliable Solo with ONLY 0.5% fee   Bitcointalk thread: Forum
Discord support invite at https://kano.is/ Majority developer of the ckpool code - k for kano
The ONLY active original developer of cgminer. Original master git: https://github.com/kanoi/cgminer
subie
Newbie
*
Offline Offline

Activity: 61
Merit: 0


View Profile
December 26, 2017, 07:08:44 AM
 #32370

happy holidays everyone! Grin

@kano
what does luck 5, luck 10, luck 25, luck 50 means?
MattMell
Newbie
*
Offline Offline

Activity: 42
Merit: 0


View Profile
December 26, 2017, 07:15:09 AM
 #32371

My estimate for next BTC mining difficulty:  drop between -1% to 0% around 2018/01/01 14:00

1 869 539 787 755    -0.19% .     18/01/01 14:33

Any other estimates ? Smiley
kano (OP)
Legendary
*
Offline Offline

Activity: 4494
Merit: 1808


Linux since 1997 RedHat 4


View Profile
December 26, 2017, 07:37:57 AM
 #32372

happy holidays everyone! Grin

@kano
what does luck 5, luck 10, luck 25, luck 50 means?
If you mean the "Luck%" column in the "Block Statistics" table:
It's just the "Luck%" over the Last "than many" Blocks.

Of course the 5,10,25 and probably also the 50 numbers are pretty much meaningless in the realm of useful statistical samples (and I have considered removing them in the past) but they are still there none-the-less Smiley

Pool: https://kano.is - low 0.5% fee PPLNS 3 Days - Most reliable Solo with ONLY 0.5% fee   Bitcointalk thread: Forum
Discord support invite at https://kano.is/ Majority developer of the ckpool code - k for kano
The ONLY active original developer of cgminer. Original master git: https://github.com/kanoi/cgminer
AerialGopher
Jr. Member
*
Offline Offline

Activity: 196
Merit: 4


View Profile
December 26, 2017, 07:56:05 AM
 #32373

Is there a way to create a white list of Ip addresses of people that are actually mining to the pool, and can make the assumption that they are using the same IP address for their web login since it would be on the same connection.  If the IP address exists in that DB, then you can have multiple wrong password attempts, if you are not on that list you have 0 tolerance.

Or to have even more fun, when there is a bad set of credentials sent, it sends the user to a completely different server just to make the bots stop attempting to login.  Or just allow the bots on the IP addresses that you have collected log in ( By redirecting to another site ) and so they will stop hopefully.    They are probably coded to just hammer the site, but not coded on what to do after a "successful" login to the fake site.


kano (OP)
Legendary
*
Offline Offline

Activity: 4494
Merit: 1808


Linux since 1997 RedHat 4


View Profile
December 26, 2017, 08:14:58 AM
 #32374

Is there a way to create a white list of Ip addresses of people that are actually mining to the pool, and can make the assumption that they are using the same IP address for their web login since it would be on the same connection.  If the IP address exists in that DB, then you can have multiple wrong password attempts, if you are not on that list you have 0 tolerance.

Or to have even more fun, when there is a bad set of credentials sent, it sends the user to a completely different server just to make the bots stop attempting to login.  Or just allow the bots on the IP addresses that you have collected log in ( By redirecting to another site ) and so they will stop hopefully.    They are probably coded to just hammer the site, but not coded on what to do after a "successful" login to the fake site.

Firstly, the banning is working fine, and this is the first time I've enabled this extra blocking, that already existed in the code when I first wrote it all, and it's working fine also.

This banning might ban someone, while it's active, who makes a mistake, but I think that's way better than stopping everyone logging in.
... and anyone who gets on by mistake, can always contact me to get off the ban list very quickly.
There's only been about 700 banned IPs, but I did completely block a bunch of large subnets before hand that were all bots.

Most of the previous banning has been either IP subnets that had very large numbers of bots, or simply disabling logins for a short while until they got bored having no effect on anything.
This one has sorta gone on all day, so this solution is the best in this case, in my opinion.

Lastly, most people with more than a few miners, have a different place/places for their miners.

Pool: https://kano.is - low 0.5% fee PPLNS 3 Days - Most reliable Solo with ONLY 0.5% fee   Bitcointalk thread: Forum
Discord support invite at https://kano.is/ Majority developer of the ckpool code - k for kano
The ONLY active original developer of cgminer. Original master git: https://github.com/kanoi/cgminer
minergain.com
Member
**
Offline Offline

Activity: 285
Merit: 10

Free mining equipment tracking and reporting


View Profile WWW
December 26, 2017, 01:09:07 PM
Last edit: December 26, 2017, 01:19:45 PM by minergain.com
 #32375

Firstly, the banning is working fine, and this is the first time I've enabled this extra blocking, that already existed in the code when I first wrote it all, and it's working fine also.

This banning might ban someone, while it's active, who makes a mistake, but I think that's way better than stopping everyone logging in.
... and anyone who gets on by mistake, can always contact me to get off the ban list very quickly.
There's only been about 700 banned IPs, but I did completely block a bunch of large subnets before hand that were all bots.

Most of the previous banning has been either IP subnets that had very large numbers of bots, or simply disabling logins for a short while until they got bored having no effect on anything.
This one has sorta gone on all day, so this solution is the best in this case, in my opinion.

Lastly, most people with more than a few miners, have a different place/places for their miners.

If the banning is happening in your apache script, perhaps you could just ban for a day.  If the blocks are happening in your firewall, that also can be done but not as easily since you would have to allow the apache server to have access to the ban list and manually parse through the logs to get the time.  Ok, I just read all the previous and see it is in your code and it sounds like you are doing a day.  
Personally in my code, I allow 3 attempts, then lock for 5 minutes then 15 on the next, then 60 on the next and a day one the next.  I have detection for all kinds of hacker things (injection, arrays, etc) and if the server detects those, then the ip is blocked for a day.  As with yours, I do most in my code although my servers also have a firewall that blocks on ssh attempts, etc.  It seems that it would be good if you had something in place all the time rather than manually turning on and off your systems when threats are detected.  I suspect that even you need to sleep once in a while.

www.minergain.com - Free miner equipment tracking and reporting
Mike is a tiny miner: 8 S9, 1 D3, 6 RX470
I mine at Kano Pool, for better BTC Profits!
rifleman74
Member
**
Offline Offline

Activity: 658
Merit: 21

4 s9's 2 821's


View Profile
December 26, 2017, 02:50:46 PM
 #32376

MINE ON!!!
VRobb
Hero Member
*****
Offline Offline

Activity: 1610
Merit: 538

I'm in BTC XTC


View Profile
December 26, 2017, 03:24:16 PM
 #32377

Time for that Boxing Day block and subsequent BitGeld!  Cheesy

I don't believe in superstition because it's bad luck: 13thF1oor6CAwyzyxXPNnRvu3nhhYeqZdc
These aren't the Droids you're looking for: S5 & S7 (Sold), R4B2, R4B4 (RIP), 2x S9 obsolete, 2xS15-28, S17-56, S17-70
Pushing a whopping 1/5 PH!  Oh The SPEED!!!
AerialGopher
Jr. Member
*
Offline Offline

Activity: 196
Merit: 4


View Profile
December 26, 2017, 03:36:59 PM
Last edit: December 26, 2017, 04:31:52 PM by AerialGopher
 #32378

YAAAAAAAAAAAYYYYYYYYYYY!!!!!!!!!!!!!!!!!

I got the Rude awkening from DHL auto call for owing money...  I was like WTF!...  Not yet...

I owed them money so I paid then went, lets see - only bitmain supposed to send me stuff...  Could it be.....
Log into bitmain thinking they just sent the power supply only, you know, a funny joke maybe?


NOPE!!!!  They Sent ALL 4 of my S9's and power supplies!   I actually got another DHL Duties and taxes call while writing this!

SOOOOO Excited!!!


EDIT:  I have a voip system that can handle 25 calls to one phone - They made 3 calls at the same time, two of which went to voicemail for the duties and taxes for the other packages!  

Its like CHRISTMAS on the 26th!  and the 27th when they are to be delivered!

This was the Jan 21-30 Batch of S9's that I ordered!  I started the orders in Nov around the 25th until first week in dec, all on different days over 2 weeks or so.
wavelengthsf
Full Member
***
Offline Offline

Activity: 658
Merit: 118


View Profile
December 26, 2017, 04:07:50 PM
 #32379

Time to get a few blocks in before the new year!
Veladrin
Newbie
*
Offline Offline

Activity: 5
Merit: 0


View Profile
December 26, 2017, 05:20:49 PM
 #32380

Firstly, the banning is working fine, and this is the first time I've enabled this extra blocking, that already existed in the code when I first wrote it all, and it's working fine also.

This banning might ban someone, while it's active, who makes a mistake, but I think that's way better than stopping everyone logging in.
... and anyone who gets on by mistake, can always contact me to get off the ban list very quickly.
There's only been about 700 banned IPs, but I did completely block a bunch of large subnets before hand that were all bots.

Most of the previous banning has been either IP subnets that had very large numbers of bots, or simply disabling logins for a short while until they got bored having no effect on anything.
This one has sorta gone on all day, so this solution is the best in this case, in my opinion.

Lastly, most people with more than a few miners, have a different place/places for their miners.

If the banning is happening in your apache script, perhaps you could just ban for a day.  If the blocks are happening in your firewall, that also can be done but not as easily since you would have to allow the apache server to have access to the ban list and manually parse through the logs to get the time.  Ok, I just read all the previous and see it is in your code and it sounds like you are doing a day.  
Personally in my code, I allow 3 attempts, then lock for 5 minutes then 15 on the next, then 60 on the next and a day one the next.  I have detection for all kinds of hacker things (injection, arrays, etc) and if the server detects those, then the ip is blocked for a day.  As with yours, I do most in my code although my servers also have a firewall that blocks on ssh attempts, etc.  It seems that it would be good if you had something in place all the time rather than manually turning on and off your systems when threats are detected.  I suspect that even you need to sleep once in a while.

This is precisely the kind of solution and motivation I meant earlier. It's up to you (Kano) how you want to manage your system as it's your time and property, but the point is not about the code quality but rather the process: As noted you can get careless humans as well as bots. Newbies may also think that UX is a bug. The manual aspect of enabling/disabling plus dealing with individuals is a side effect of that process.  Automating this process is an added efficiency that should solve both UX and operational concerns. Of course that means changes to working code, and depending on the code it may not be so straightforward, I get that. Not trying to pile on or argue, but merely suggest - small manual processes add up over time, enough of those compounding take away time from getting real work (or sleep) done.
Pages: « 1 ... 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 [1619] 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 ... 2248 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!