Pages:
Author

Topic: KanoPool kano.is lowest 0.9% fee 🐈 since 2014 - Worldwide - 2432 blocks - page 25. (Read 5352311 times)

legendary
Activity: 2254
Merit: 2419
EIN: 82-3893490
@Nomadgroup maybe we should take this converstation to the discord chat
Ja or at least continue it here in the existing thread about it.
It has become seriously OT.

agreed - I posted the same link about 10 or so posts back.
legendary
Activity: 3822
Merit: 2703
Evil beware: We have waffles!
@Nomadgroup maybe we should take this converstation to the discord chat
Ja or at least continue it here in the existing thread about it.
It has become seriously OT.
legendary
Activity: 3234
Merit: 1221
@Nomadgroup maybe we should take this converstation to the discord chat
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.

Well you see, I have an optical Huawei Modem and it is a Router all in one.  So you think if I connect this device between my modem and the miners I will be safer?

Thanks!

Because I cannot replace the modem which the ISP provided me.  All I can do is to bash this one against the wall and tell them ip that it broke by accident and they will bring me a new one for free, that way I will have a new MAC address on i it if that would help.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.

Well you see, I have an optical Huawei Modem and it is a Router all in one.  So you think if I connect this device between my modem and the miners I will be safer?

Thanks!
sr. member
Activity: 508
Merit: 250

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


These IP addresses are internal to your network. The 102 address is a machine on your network, the 255 address is the broadcast address of your internal network (the address that something scanning your network for vulnerable hosts would use)

What machine on your internal network has the IP address 192.168.1.102

Biffa, since the whole network has been reseted I’m not sure which device it was on 102 but I have some screenshots from the network analyzer by technet app and it had the following letters beside it, green W, red B, purple 6 and a green P.  4 in total.  To tell you the truth I’m clueless to what is the meaning of them but even my modem only has 3 at this moment as well as my ipad from which I control everything on the network.

And I just use this paid App Network Analyzer to find the miners on my network which have only 2 green letters beside them which is a lightened green color W and a darker color P.
legendary
Activity: 3234
Merit: 1221
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.
legendary
Activity: 3234
Merit: 1221
Just to confirm, Are native segwit bech32 addresses still invalid on KanoPool?
Never got an answer, but i tried setting up one recently and it apparently works now. Can anybody else confirm using bech32 (bc1q+) addresses with this pool are working correctly and receiving payments?

From Discord: "Anyone who wants to use a bech32 on their account as their payout address, that's now enabled i.e. a bc1 address. It follows the standard rules that it must be all UPPER or all lower case, but I store it in the DB in lowercase. However, you can't mine directly to a bc1 address."

And from here:

For those wanting this, you can now set a bech32/bc1 'address' as your account payout address.
It has the usual rules on input of all UPPER or all lower case, but is stored internally and displayed as all lower case.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!
legendary
Activity: 2030
Merit: 1573
CLEAN non GPL infringing code made in Rust lang
The wording is VERY clear:

"Only use firmware provided by the miner manufacturer."
With that cleared out lets move into something else:

Just to confirm, Are native segwit bech32 addresses still invalid on KanoPool?
Never got an answer, but i tried setting up one recently and it apparently works now. Can anybody else confirm using bech32 (bc1q+) addresses with this pool are working correctly and receiving payments?
legendary
Activity: 3234
Merit: 1221

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


These IP addresses are internal to your network. The 102 address is a machine on your network, the 255 address is the broadcast address of your internal network (the address that something scanning your network for vulnerable hosts would use)

What machine on your internal network has the IP address 192.168.1.102
legendary
Activity: 3586
Merit: 1098
Think for yourself
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!
sr. member
Activity: 508
Merit: 250
...

is this the problem you were having? if so, I think they detail how to fix it - https://bitcointalksearch.org/topic/antbleed-virus-clone-5224777

I’m not sure if it’s the same problem I was having because I could not find the IP address that he mentioned in his post but sounded like a simular problem.

Thanks for the information!
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

By the time frame that these attacks were done I’m pretty sure that It was done in another time zone.  Is there any other way how they could have hacked my modem, by not actually physically being in the radius of its reach?

Or that is the only way someone could have hacked it?  Because if that’s the case then I even have a local, love to hack people’s wifi suspect around here!

And ok, I will try to find and disable what you have told me.  After the reset so far no intrusions have been made this night and the log is clean.

Also Bitmain have answered to me and send me instructions on how to flash the controllers with their newest firmware by the means of an SD card and then they told me to upload some antivirus which they have send me as well.

I’m praying that this will work for me, will start to work on all of the hacked miners today!

Thanks for the output!
legendary
Activity: 2254
Merit: 2419
EIN: 82-3893490
legendary
Activity: 3586
Merit: 1098
Think for yourself
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.
sr. member
Activity: 508
Merit: 250
Biffa and Artemis3 and all of you guys, thank you again for taking your time trying to help me this problem!!! Just want you to know that I really appreciate it! 

I’m sure anyone can become an easy target like me and this is just wrong to do that to people!  Especially if they ruin the hardware!

If I won’t be able to fix these machines in the next few days, I will go ahead and buy at least 10 of the 17TH machines that bitmain has in stock so I can partly compensate for the damage done by this hacker, and have my TH somewhat higher than now.

All I can say for sure is that he isn’t getting anything from the miners that he has hacked anymore and that makes me feel a little better!

Mine on Comrades!
sr. member
Activity: 508
Merit: 250
Its more likely that the attack is coming from one of the computers on your internal network rather than from outside.

Unless you have forwarded ports to access your miners from outside your network, or worse, your miners have public IP addresses, the most likely cause of the hack is a compromised windows computer on your network.

I was thinking about that bro and it probably was the case because I have the whole family connected to the same network and everyone is browsing different sites and places which are probably aren’t safe, and I can’t control all of them.  I have my modem setup pretty safe and the WiFi isn’t even visible and it doesn’t have any ports open as far as I know and isn’t controlled from the outside but I did have a not very secured 5G Netgear router hooked up to it which I disconnected and hopefully now I’ll be safe.  So far no more machines have been hacked.

And gladly it is just my home network where I just got several miners working and not my actual farm!!!

And no, nobody uses windows in my house, it’s all phones and tablets.

Thanks.

Mine on!  I can smell that block already!!! Wink

Your network is definitely compromised. What about the miners? Did you set up (different) passwords on each? With 2018 or earlier firmware you had to set up both web and ssh passwords, not too sure about 2019 where you are not supposed to log in with ssh, but an earlier version (May?) has an exploit in the web server that re enables ssh access...

Also, rather than losing controllers, try the recovery procedure from (micro)SD, and if that doesn't cure it try booting BraiinsOS from the sd card and see if they work that way its better to sacrifice a cheap (small) sd card than a controller (if S9s until the i model).

Perhaps you could isolate your miners from your family network, you could have them on different network segments (both physically or logically). Ideally the miners would have their own router firewall, i would setup a white list that only lets them connect to the intended pool (and maybe Bitmain, i think the things phone home iirc before they start hashing), and having a local caching dns server is wise (dnscrypt-proxy does wonders).

A proper firewall is generally choosing what is allowed and what is not, ports and sites. Usually something like single button "medium" setting is nearly useless, especially for things whoever designed the firewall didn't think of (such as Bitmain asic miners getting malware).

While i commend you for not using Windows, be aware that both Android and iOS/OSX are not perfectly safe, Apple may be a little better but don't blind trust them, especially when your device gets too old and is put out of support. You are essentially doing a sysadmin work in your home like you would in a company...

Thanks a lot for the information you provided!  I really appreciate it!  And yes I’ve had one of the worst days in BTC mining this morning when I woke up I found out that the hacker was able to ruin 14 more S9’s!!!!!  14 machines gone in a minute!  Apparently he works somewhere in China in the day time when it is night here and I wake up to a surprise!  Today’s surprise was SHOCKING!

I have already contacted Bitmain for an advice on what to do and if there is a way that I can repair the controllers by uploading a newer firmware because these machines were from 2017-2018.  So I will be waiting for their reply as soon as they start their workday.

At first he hacked 3 so I just disconnected the router connected to my modem thinking that it was causing the problem, since the SSID wasn’t hidden unlike my modem SSID.  But when I realized that 14 more are mining for him this morning I started to dig in the log of the modem itself and found about 22 of these Dos Smurf attacks!!! From February second to today’s morning!

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden.  Remotely they have reset everything and I’ve changed all of the passwords.  Even on the miners themselves!  But I did that yesterday and apparently that didn’t help.  Also the modem  had a specific check box for preventing these Dos smurf attacks but apparently that didn’t work.

I’m closely monitoring the network tonight to see if there will be any more attacks on my modem, because now I just have a few miners running  Embarrassed

Maybe someone had clicked a wrong link from one of the devices who knows.

And I did noticed that the only ones that he wasn’t able to hack (so far) are the last ones that I got so they must have had a newer firmware protecting them from being hacked like that.

All my hope is on Bitmain now and that they answer soon and maybe be able to find a solution for me.  Start them with a preloaded firmware on a sd card or just try to upload it through my network on them, I really don’t know but I am afraid to even turn the power on the ones that have been compromised now, thinking that if it was hacked then maybe he can hack my whole new reseted network again and I will loose the rest of the miners?  Do you think it is safe to connect one of them to my fresh network or I shouldn’t even try?  Or what do you think?

If the Bitmain won’t be able to help me with a firmware upgrade then I really don’t care what I have to load on a Sd card and where it will mine as long as they just don’t sit around like furniture.  Now 17-18 have been ruined!  Undecided Cry Cry Cry Cry

Please let me know your thoughts guys I’d really appreciate if someone with the knowledge be able to give an advice  Undecided  Cry Cry Cry Cry
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
The wording is VERY clear:

"Only use firmware provided by the miner manufacturer."
Pages:
Jump to: