Author

Topic: Eligius: 0% Fee BTC, 105% PPS NMC, No registration, CPPSRB - page 205. (Read 1061449 times)

legendary
Activity: 1540
Merit: 1001
Grate so my private key is compromised and I'm in line for payment in this block. I increased my payment threshold but it has no effect...

So another 0,1BTC that might be gone...

Maybe generate a new address and start mining on that one ASAP?

M
hero member
Activity: 826
Merit: 1000
Grate so my private key is compromised and I'm in line for payment in this block. I increased my payment threshold but it has no effect...

So another 0,1BTC that might be gone...
legendary
Activity: 1726
Merit: 1018
whatever they are doing it's now directly affecting my 1.4 TH farm as some of my miners have been auto switching to my 2nd pool backups. My power and network are solid.

Yes I am also seeing a little bit of failover as well.  Not much, a minute or two every 30 minutes or so.
legendary
Activity: 1540
Merit: 1001
OK this might be a stupid question. I just notice that 1,6 BTC was send out of my wallet.

https://blockchain.info/tx/06bf4003e2fc2a25324baef92893a19f24d419fcbe7d04f25f96c2d90717a503

Could this be another attack on miners hire or was I just hacked? See conformation warnings and it is still not confirmed...

EDIT: Forget it... It was confirmed... So I guess I was hacked... Problem is that I have no idea how...

Get 0.9.1 immediately!!  See the alert on the top:

News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0.

!!!!!

https://bitcoin.org/bin/0.9.1/

M
Yes this is what I'm using... How old is this news? And if this is how I got hacked is my key compromised?

I just turn it on to get coins to my cold storage. When I got back they were gone. I was waiting for it to sync...

I just got the US-CERT notification today:

https://www.us-cert.gov/ncas/alerts/TA14-098A

Apparently it was very quickly repackaged into bitcoin-qt/core.

M
sr. member
Activity: 543
Merit: 250
Orjinal üyelik ToRiKaN banlanalı asır ol

Lastly.. anyone notice how network hashrate overall stabilized?  According to my math we're looking at a 1% increase next change.  The number of minutes between blocks (supposed to be 10):

((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins

Divide 10 by that value to get the ratio..

Multiply that ratio times current difficulty to get projected next difficulty.  

Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty.

M

According to bitcoinwisdom, that hasrate does appear to be stabilizing a bit...That'd be really nice.

https://bitcoinwisdom.com/bitcoin/difficulty
hero member
Activity: 826
Merit: 1000
OK this might be a stupid question. I just notice that 1,6 BTC was send out of my wallet.

https://blockchain.info/tx/06bf4003e2fc2a25324baef92893a19f24d419fcbe7d04f25f96c2d90717a503

Could this be another attack on miners hire or was I just hacked? See conformation warnings and it is still not confirmed...

EDIT: Forget it... It was confirmed... So I guess I was hacked... Problem is that I have no idea how...

Get 0.9.1 immediately!!  See the alert on the top:

News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0.

!!!!!

https://bitcoin.org/bin/0.9.1/

M
Yes this is what I'm using... How old is this news? And if this is how I got hacked is my key compromised?

I just turn it on to get coins to my cold storage. When I got back they were gone. I was waiting for it to sync...
legendary
Activity: 1540
Merit: 1001
OK this might be a stupid question. I just notice that 1,6 BTC was send out of my wallet.

https://blockchain.info/tx/06bf4003e2fc2a25324baef92893a19f24d419fcbe7d04f25f96c2d90717a503

Could this be another attack on miners hire or was I just hacked? See conformation warnings and it is still not confirmed...

EDIT: Forget it... It was confirmed... So I guess I was hacked... Problem is that I have no idea how...

Get 0.9.1 immediately!!  See the alert on the top:

News: ♦♦ A bug in OpenSSL, used by Bitcoin-Qt/Bitcoin Core, could allow your bitcoins to be stolen. Immediately updating Bitcoin Core to 0.9.1 is required in some cases, especially if you're using 0.9.0.

!!!!!

https://bitcoin.org/bin/0.9.1/

M
hero member
Activity: 700
Merit: 500
Lastly.. anyone notice how network hashrate overall stabilized?  According to my math we're looking at a 1% increase next change.  The number of minutes between blocks (supposed to be 10):

((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins

Divide 10 by that value to get the ratio..

Multiply that ratio times current difficulty to get projected next difficulty.  

Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty.

M

Looks like somebody took a big chunk of hash (8-10 Petahash) off of the network.  Probably an ASIC manufacturer spooling them up for testing, then turning them off and shipping them out to customers... or simply moving them to a permanent location.  I'm sure that all or most of that hash will re-appear before the next diff change.



https://bitcoinwisdom.com/bitcoin/difficulty
legendary
Activity: 1540
Merit: 1001
Maybe it's not malicious activity?  Maybe there's something wrong with some piece of software being used?

For example, I have a number of S1s running through a Stratum proxy.  How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?

M


Would you mind sharing what stratum proxy you are using?  Version?

I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors.   I've seen other folks with the same issue
I would like to know which stratum proxy you are using and how you set it up.

I have tried using bfgminer, cgminer, and mining_proxy.exe to proxy the S1's without luck.  

Thanks.

I'm using Slush's stratum proxy.  I don't like executables when I can run code, so I'm using the latest git through python on my windows machine.

\python27\python mining_proxy.py -o stratum.mining.eligius.st -p 3334 -sp 3333 -gp 8330 -cu -rt -nm

then I point my S1s to port 3333 on that machine with whatever username/pw I want.  everything shows up on Eligius under the payout address.  I watch the output from the proxy to see it actively hashing and the pool stepping up the vardiff.


On the subject of luck ... it's awful right now.  47% over 24 hours?  is everyone 100% sure there isn't some exploit going on here?


Lastly.. anyone notice how network hashrate overall stabilized?  According to my math we're looking at a 1% increase next change.  The number of minutes between blocks (supposed to be 10):

((timestamp of last block) - (timestamp of last block before diff change)) / 60 / (number of blocks since last change) = 9.79 mins

Divide 10 by that value to get the ratio..

Multiply that ratio times current difficulty to get projected next difficulty.  

Now that could mean people stopped adding hash power, or it could mean the network globally is experiencing a really hard time solving blocks at 100% luck since the last difficulty.

M
newbie
Activity: 38
Merit: 0
I know one thing for sure. I'm happy here at Eligius and here is where I'm going to stay. Wizzy.. U are doin a great job keeping things together. I think I'm going to up my donation a bit though I'm such a small hasher I'll notice it for sure but.. I will be here for the long haul. So.. on another subject.. How bout that merged mining thing?. I would love to be doin namecoins as well as btc.
newbie
Activity: 6
Merit: 0
Is it possible that a "hacker" infected a bunch of PC's with mining software and pointed it to the Eligius pool, but mis-configured it so that it is causing a lot of problems for the pool.

This would not be an attack directly against the pool, but is causing a big problem none the less.

If this were the case the only way to get out of the way would be to change the DNS names and/or IP's so that the configuration of the infecting software would no longer point to a real server.
sr. member
Activity: 462
Merit: 250
Lux e tenebris
Someone (Buffett?) wants to buy the pool cheap?
sr. member
Activity: 406
Merit: 250
whatever they are doing it's now directly affecting my 1.4 TH farm as some of my miners have been auto switching to my 2nd pool backups. My power and network are solid.
hero member
Activity: 826
Merit: 1000
OK this might be a stupid question. I just notice that 1,6 BTC was send out of my wallet.

https://blockchain.info/tx/06bf4003e2fc2a25324baef92893a19f24d419fcbe7d04f25f96c2d90717a503

Could this be another attack on miners hire or was I just hacked? See conformation warnings and it is still not confirmed...

EDIT: Forget it... It was confirmed... So I guess I was hacked... Problem is that I have no idea how...
full member
Activity: 196
Merit: 100
I really would love to know who the culprit is.

Maybe start by finding out if there's a particular account or group of accounts which are having bad luck, or if the bad luck is spread out among all the accounts?  Even if it's coming from an unknown group of small-hash accounts that's a start.

I'm tempted to do this myself, but I should probably work on something more important to me personally. Smiley
sr. member
Activity: 462
Merit: 250

tl;dr  - There are are 3 likely suspects...



KNC, ghash or BTCGuild

I doubt it's Discus Fish since many of the people who would leave Eligius for calmer waters would not pick a Chinese centric pool


If it is not the above three, then it is something personal and/or jealously as the driving factor

KNC does not make sense to me - disrupting other pools does not improve their own since it is private. And there are more chinese miners than you think - its entirely likely some eligius users would be able to speak or translate it (but I agree it *may* not be enough to warrant the attack by discus fish)


perhaps, but there are probably more than a few hosted miners in KNC that point to Eligius.. those would be in play


my gut feels something is bigger going on than just DDoS attacks.   I keep thinking the HFT jockeys have analyzed pool mining nuts and bolts and are figuring out some minute disrupting tactics that provide advantages


if I ran a pool I could look at some things but as an outsider I can only speculate.  we all have heard of the selfish mining tactics and that may be going on but what if there is a way to mess with the work distribution in a way that you are boxing out large areas of the nonce for yourself through disruption

people say, well the nonce is unique since it is attached to your address... well Eliguis posts everyone's address so couldn't that be taken and messed with by some script jockey if they knew what they were doing?


all I am saying is think about something that isn't known yet as attacks since there are attacks ongoing and the 'luck' in Eligius and BTCGuild is more than just luck

sr. member
Activity: 447
Merit: 250
Maybe it's not malicious activity?  Maybe there's something wrong with some piece of software being used?

For example, I have a number of S1s running through a Stratum proxy.  How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?

M


Would you mind sharing what stratum proxy you are using?  Version?

I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors.   I've seen other folks with the same issue
I would like to know which stratum proxy you are using and how you set it up.

I have tried using bfgminer, cgminer, and mining_proxy.exe to proxy the S1's without luck.  

Thanks.
newbie
Activity: 26
Merit: 0
Maybe it's not malicious activity?  Maybe there's something wrong with some piece of software being used?

For example, I have a number of S1s running through a Stratum proxy.  How can I verify it's properly feeding random work to all the ants, and half of them aren't working on the same thing the other half are working on?

M


Would you mind sharing what stratum proxy you are using?  Version?

I've tried running my S1's through BFGMiner 3.10 and I receive 100% errors.   I've seen other folks with the same issue
legendary
Activity: 1223
Merit: 1006
I really would love to know who the culprit is.
legendary
Activity: 2128
Merit: 1005
ASIC Wannabe

tl;dr  - There are are 3 likely suspects...



KNC, ghash or BTCGuild

I doubt it's Discus Fish since many of the people who would leave Eligius for calmer waters would not pick a Chinese centric pool


If it is not the above three, then it is something personal and/or jealously as the driving factor

KNC does not make sense to me - disrupting other pools does not improve their own since it is private. And there are more chinese miners than you think - its entirely likely some eligius users would be able to speak or translate it (but I agree it *may* not be enough to warrant the attack by discus fish)
Jump to: