Pages:
Author

Topic: [~1000 GH/sec] BTC Guild - 0% Fee Pool, LP, SSL, Full Precision, and More - page 67. (Read 379078 times)

member
Activity: 72
Merit: 10
-hug- keep the good work, isn't your fault...

btw the 8 decimals withdraw idea was greathope you could implement that in the future..
newbie
Activity: 27
Merit: 0
For all the people about to say or who have already said: "I havn't read this whole thread but..."

First: if you go to #btcguild on freenode, typically the topic line will answer what you're about to ask/suggest

Second:  here is the current topic line: The official channel of BTC Guild (www.btcguild.com). We have been/are being DDoS'd.  There is no ETA yet for the pools coming back, but they will.  No, CloudFlare would not solve this.  No, we're not using EC2 unless you feel like paying for it.  Round Robin DNS is a sin against humanity.  No, your IPtables script will not help.  A VPS cannot host a pool.  I need a hug =(

Third:  The DDoS  started within an hour of a botnet being banned from the pool, it is overwhelmingly likely that it is out of spite, rather than profit motive from [insert the person you think might profit here].  Especially seeing as how [Tycho, Slush, dbitcoin, etc]  All have much more to gain by having a good reputation in the community than by DDoSing another pool.

Fourth:  Why do I even still read this thread?
newbie
Activity: 11
Merit: 0
Perhaps to deal with this in the future, you can go down this dark and shady road...

Put a notice on the site that only miners pulling in at least 10MH/sec are welcome. 

This will not keep out the cpumining botnet, but it will establish the terms of your pool and the botnet would be violating those terms.  Then, once you identify a future botnet, invalidate 2/3 of all shares submitted by miners running less than 10MH/sec and just pretend like they didn't happen.  Net result, the rest of us benefit from the work of the botnet and the impact to the botnet's profitability might be low enough that they don't even notice.

full member
Activity: 148
Merit: 100
Just want to thank you for your hard work and I'll be back with a high donate percentage when things settle down.  After trying all the pools, BTCguild has won me over with the user interface and stats.
newbie
Activity: 22
Merit: 0
I don't know if this has already been brought up or not (this thread is friggin huge), but it seems to me like the logical culprit is someone who either has a lot of mining capacity in another pool or actually runs a pool.  That would be the two types of people with the most to gain right?
full member
Activity: 216
Merit: 100
What's next, 1Gbp/s pipe?
newbie
Activity: 38
Merit: 0
I definitely support the idea of pointing the traffic at M$. Let their legal boys handle it.
legendary
Activity: 1750
Merit: 1007
Any chance the DDOS is really just the unhandled mining traffic?

I'm wondering if maybe you published new DNS names for people to connect to, this would maybe ease up?


It is not mining traffic.  If you look at the imgur link in the previous page, you'll see what i mean.

The DDoS is hitting all of our pools and the webserver.  The 100 mbps port on all of our servers was being capped.  A botnet of CPU miners does not generate 300k packets/sec.
member
Activity: 63
Merit: 10
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Love it!!!  Grin
newbie
Activity: 45
Merit: 0
Any chance the DDOS is really just the unhandled mining traffic?

I'm wondering if maybe you published new DNS names for people to connect to, this would maybe ease up?
newbie
Activity: 38
Merit: 0
To the botnet owner: Please stop, you're wasting BTC generation time.  Either move to a different pool with the CPU miners or setup your own private pool.

I'm not saying your pax0ring power isn't impressive, I'm saying the bot's computer owners are going to wonder why their internet is crawling, and the ones that call their ISP will find out they need to disinfect their computer and you'll lose it.  You're less likely to lose it by running the CPU miner on low priority since they can still browse foxnews.com and forward chain-letter-emails to their kids without slowdown.

$ We just want to make some money like you $

The hacker running the botnet is probably some asshole script kiddie. When I was studying computer hacking and security, we used to set up wargames servers and hack for fun and educational value. Hell, I'll even support the guys over at Anonymous and Lulzsec- at least they have principles. This script kiddie is just an antisocial douche.
sr. member
Activity: 714
Merit: 250
Maybe the botnets mining on the pool were causing my gpu usage to hover around 96-98%? Hopefully once this resolves I can point my systems to btc guild and they can stay at 99% usage.
I'd love to come back, but it's not worth it unless I can stay at 99% usage like I do at other pools  Sad
member
Activity: 133
Merit: 10
id say point it to microsoft as well, but after thinking about it id forward it to cisco lol. had a crappy linksys router, then a crapy cisco/linksys router, they deserve it for putting out crap products, they combined ciscos crap UI and with linksys crap hardware. but just kidding here, doing something like that could probably get ya in *loads* of trouble.

cisco isnt really known for their hardware. talk to any networking guru and they'll tell you. cisco owns because IOS is amazing.
(also, combining cisco gui with linksys hardware? new one to me. maybe i just havent paid much attention, but the linksys config assistant doesnt resemble the cisco CME to me. but if you're using the cisco CME, you must be
when it comes to linksys, i will say this. i have not had any trouble with linksys routers, but bad hardware comes random from any vendor. you know how much my aironet 1200 802.11B AP cost when it bought it? it wasnt 60$... and it still works to this day. theres no reason to complain when your 60$ router/wifi AP dies after a month. one of the biggest mistake the world ever made was to make routers cheap. if you want quality buy quality. lots of good EOL cisco stuff can be had cheaply.

yes, i run 802.11B, i dont do much internal file transfers, and i only have about 3 nodes on the wifi. considering upgrading to 802.11G since alot of that cisco gear is getting EOL.
member
Activity: 133
Merit: 10
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.

i work in networking and think its effing hilarious. a rather resourceful way to deal with a DDoS. lol! now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong.

Would you be saying the same thing if someone dumped a metric crap ton of DDoS traffic on YOUR network? Would you be so chipper about the situation with your Boss's Boss, and the CIO, and everyone else screaming at you about why they cant they get their webmail, or why the customers cant enter their orders on your website, especially if your job was on the line?

like i said "now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong." microsofts network has lots of pipe, and good management. in my case, if we were to get ddos'd it would be our ISP's job to fix this, as they are the ones that manage the outside hops. for me it would be "hey boss, were getting ddos'd, i called (isp) and they're on it." thats the call anyone would make. changing something on your "internal" network would only resolve an internal based DDoS.
Eri
sr. member
Activity: 264
Merit: 250
id say point it to microsoft as well, but after thinking about it id forward it to cisco lol. had a crappy linksys router, then a crapy cisco/linksys router, they deserve it for putting out crap products, they combined ciscos crap UI and with linksys crap hardware. but just kidding here, doing something like that could probably get ya in *loads* of trouble.
sr. member
Activity: 291
Merit: 250
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.

i work in networking and think its effing hilarious. a rather resourceful way to deal with a DDoS. lol! now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong.

Would you be saying the same thing if someone dumped a metric crap ton of DDoS traffic on YOUR network? Would you be so chipper about the situation with your Boss's Boss, and the CIO, and everyone else screaming at you about why they cant they get their webmail, or why the customers cant enter their orders on your website, especially if your job was on the line?
sr. member
Activity: 418
Merit: 250
To the botnet owner: Please stop, you're wasting BTC generation time.  Either move to a different pool with the CPU miners or setup your own private pool.

I'm not saying your pax0ring power isn't impressive, I'm saying the bot's computer owners are going to wonder why their internet is crawling, and the ones that call their ISP will find out they need to disinfect their computer and you'll lose it.  You're less likely to lose it by running the CPU miner on low priority since they can still browse foxnews.com and forward chain-letter-emails to their kids without slowdown.

$ We just want to make some money like you $
member
Activity: 133
Merit: 10
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.

i work in networking and think its effing hilarious. a rather resourceful way to deal with a DDoS. lol! now, pointing it to some server without a shitton of bandwidth and poor management, would however, be wrong.
sr. member
Activity: 291
Merit: 250
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.

+1 for this comment. Sending your negative traffic to someone else is not the way to do things.  That was a very dick move, and would have been highly frowned upon in most of the professional circles.
full member
Activity: 134
Merit: 100
Really starting to miss BTC. Not much you can really do to stop a dos, What I did 4 years back when one of my servers was getting dos was change the IP address and point the domain name to Microsoft for a day. They will see the attack then get there team on to it and hopefully it will go to there legal team and the attacker gets busted.

Lol what? I would have went after the dick sys admin who sent all the traffic my way and disrupted my website because he couldn't handle his own.
Pages:
Jump to: