Author

Topic: [DEAD] DeepBit.net PPS+Prop,instant payouts, we pay for INVALID BLOCKS too - page 229. (Read 1601343 times)

legendary
Activity: 2198
Merit: 1311
w00t, generating again.  Thanks for your hard work sir!

My phoenix miners reconnected.  I guess it's back up.  Though, when I check my account online it still indicates that those miners are not active and it reports 0 MH/s.  

Edit:  Connection just went out.  Guess it's still not ready.  I'm not in a hurry.  My 6990 needs a rest anyway.
newbie
Activity: 11
Merit: 0
w00t, generating again.  Thanks for your hard work sir!
hero member
Activity: 742
Merit: 500
Problem is located, pool will be up soon.
I'll make additional notice about this.
newbie
Activity: 41
Merit: 0
I don't think it's fair to bash [Tycho].

I agree. Shit happens, and a DDoS is out of his control. He has stated he is doing his best to mitigate the issues, and everyone's free to change miners to another pool. I don't see the issue, tbh - it's not like there are database problems or anything, so worst case scenario you can only withdraw your money in a day or two.
member
Activity: 82
Merit: 10
I don't think it's fair to bash [Tycho].

My account in here and in Deepbit has not been long, but everytime there is something to ask or some "problem", [Tycho] has been answering or fixing that "prob" really fast.

Just my thoughts on what i've been reading in these few pages.
legendary
Activity: 1428
Merit: 1001
Okey Dokey Lokey
nouuuuuu! deepbit is down!
member
Activity: 98
Merit: 10
Testing
Can you force a payout of my balance to saved address? or is that not possible? I had probably 20-30 btc in there still
member
Activity: 98
Merit: 10
Testing
Whats the ETA on downtime? I'm looking at moving all of my miners already, this is too much...
You can switch your miners to/from any pool instantly, there is no need to stop mining for hours.
I can't provide an exact ETA since it doesn't depends only on me, but i'm trying to get things done ASAP.

Sounds good, I'll switch back once you're stabilized
hero member
Activity: 742
Merit: 500
Whats the ETA on downtime? I'm looking at moving all of my miners already, this is too much...
You can switch your miners to/from any pool instantly, there is no need to stop mining for hours.
I can't provide an exact ETA since it doesn't depends only on me, but i'm trying to get things done ASAP.
member
Activity: 98
Merit: 10
Testing
Whats the ETA on downtime? I'm looking at moving all of my miners already, this is too much...
hero member
Activity: 742
Merit: 500
Tired of waiting Just joined BitClockers.com more secure pool.
How do you know if it's more secure or not ?
Just asking, no offence.
full member
Activity: 227
Merit: 100
Tired of waiting Just joined BitClockers.com more secure pool.
full member
Activity: 373
Merit: 100
but the fact of the matter is like someone else already pointed out - there are *nix boxes all over the place that have some god forsaken version of irix or red hat linux 6.2
or some other dumb stuff that is just ripe for the picking
I don't have anything resembling your experience, and have seen some rather strange things - I don't doubt these exist, in fact I know they do. It just wouldn't be enough to selectively knock out deepbit as there are two servers on either side of the pond and, judging by the response times I get even with the huge amount of users deepbit has, they must both have respectable bandwidth resources themselves. IOW, you aren't just going to knock them off using TCP/UDP floods without causing serious problems for a whole lot of businesses, and that wouldn't be smart as there'd be a bigger outcry and the attacker would likely be found out.

windows has infinite security holes without a doubt but the fact is there are a lot more *nix boxes out there packing bandwidth than windows
Here's the point: a lot of bandwidth wouldn't do squat against a biggish target like deepbit. All you'd have to do to avoid the more pointed attacks is block some addresses and all the serious flooding attacks would draw too much attention.
You need something distributed that doesn't so much draw bandwidth as cause the server(s) to overload, and that is why you need the botnet. That way, Tycho can't distinguish the attack from friendly traffic before it gets processed by the server.

Frankly, I'm not even so worried about the DDOS itself as much as I worry that it might be the cover for a cracker who's trying to infiltrate the system. There's a lot of money in deepbit, so it's pretty attractive. Let's hope Tycho's countermeasures are successful...
hero member
Activity: 896
Merit: 1000
Buy this account on March-2019. New Owner here!!
don't get me wrong I am a huge linux fan, I am running ubuntu right now

but the fact of the matter is like someone else already pointed out - there are *nix boxes all over the place that have some god forsaken version of irix or red hat linux 6.2
or some other dumb stuff that is just ripe for the picking

windows has infinite security holes without a doubt but the fact is there are a lot more *nix boxes out there packing bandwidth than windows

I am a network administrator of 20+ years and I have also been retired from hacking for about that long, so your probably right about the botnets
back in my day they did not have d.o.s. bot nets or even any effective way to d.o.s. from windows at all
I actually coded in c a nice little proggie in about 1995 that was a modification of smurf.c if anyone remembers that? (or am I too old?)
hehehe

ping floods do not do anything with these modern firewalls we have these days

but unfortunately even modern networks are vulnerable to tcp/udp flooding of certain types if originated from an efficient and wideband source.

anyways good luck to you tycho this kind of attack is coming from some big guns
legendary
Activity: 1162
Merit: 1000
DiabloMiner author
tycho, just perma-block any ip's coming from russia or china and be done with it. that will stop a DDOS.
Many of my users are from Russia. And no, that won't stop a DDoS - it's distributed.
There are better ways of protection against DDoS, but it takes some time to set up initially. I'm doing this now.

Or just move to Rapidxen.
hero member
Activity: 742
Merit: 500
tycho, just perma-block any ip's coming from russia or china and be done with it. that will stop a DDOS.
Many of my users are from Russia. And no, that won't stop a DDoS - it's distributed.
There are better ways of protection against DDoS, but it takes some time to set up initially. I'm doing this now.
sr. member
Activity: 336
Merit: 250
yung lean
tycho, just perma-block any ip's coming from russia or china and be done with it. that will stop a DDOS.
full member
Activity: 373
Merit: 100
most denial of service attacks come from hacked linux boxes in multiple countries. It is doubtful these attacks are coming from any kind of dsl or cable connection
these are rooted servers sitting on t1s or t3s, a lot of them small companies or universities. If the hacker is worth anything they of course have hacked log files and are probably connecting through multiple proxy servers anyway.
That's nonsense, you can't do a proper DDOS with just a couple of hacked servers. Those are way too easily handled by blocking a few IP address ranges.
You need a highly distributed network of attackers, which can pretty much only be done using (windows) botnets (or a large community like that Anonymous group thingie).
hero member
Activity: 742
Merit: 500
There do seem to be some regular periods when I look at my stats page and see several instances of "rewards = none." I very highly doubt its a connection problem as internet connectivity is 100% working during these periods.
Your mining speed may be too low to submit a share for each block, especially the short ones.
sr. member
Activity: 294
Merit: 250
The demographic of the hacked/infected boxes varies from attack to attack, but when *nix boxes are involved, in my experience it was a security flaw in the program or OS that was patched a /long time ago/. Windows boxes are much more easy to infect if the user is naive and does not take preemptive measures against attacks.

Boxes that are used in attacks don't have to be on T1/T3 connections, a botnet of thousands of dial-up computers will do just fine.

In short? Good luck finding the person "in charge", all you can really do is defend.
Jump to: