Pages:
Author

Topic: KanoPool kano.is lowest 0.9% fee 🐈 since 2014 - Worldwide - 2432 blocks - page 25. (Read 5352067 times)

legendary
Activity: 3234
Merit: 1220
@Nomadgroup maybe we should take this converstation to the discord chat
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.

Well you see, I have an optical Huawei Modem and it is a Router all in one.  So you think if I connect this device between my modem and the miners I will be safer?

Thanks!

Because I cannot replace the modem which the ISP provided me.  All I can do is to bash this one against the wall and tell them ip that it broke by accident and they will bring me a new one for free, that way I will have a new MAC address on i it if that would help.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.

Well you see, I have an optical Huawei Modem and it is a Router all in one.  So you think if I connect this device between my modem and the miners I will be safer?

Thanks!
sr. member
Activity: 508
Merit: 250

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


These IP addresses are internal to your network. The 102 address is a machine on your network, the 255 address is the broadcast address of your internal network (the address that something scanning your network for vulnerable hosts would use)

What machine on your internal network has the IP address 192.168.1.102

Biffa, since the whole network has been reseted I’m not sure which device it was on 102 but I have some screenshots from the network analyzer by technet app and it had the following letters beside it, green W, red B, purple 6 and a green P.  4 in total.  To tell you the truth I’m clueless to what is the meaning of them but even my modem only has 3 at this moment as well as my ipad from which I control everything on the network.

And I just use this paid App Network Analyzer to find the miners on my network which have only 2 green letters beside them which is a lightened green color W and a darker color P.
legendary
Activity: 3234
Merit: 1220
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!

You would need to replace your existing router with that for it to help.
legendary
Activity: 3234
Merit: 1220
Just to confirm, Are native segwit bech32 addresses still invalid on KanoPool?
Never got an answer, but i tried setting up one recently and it apparently works now. Can anybody else confirm using bech32 (bc1q+) addresses with this pool are working correctly and receiving payments?

From Discord: "Anyone who wants to use a bech32 on their account as their payout address, that's now enabled i.e. a bc1 address. It follows the standard rules that it must be all UPPER or all lower case, but I store it in the DB in lowercase. However, you can't mine directly to a bc1 address."

And from here:

For those wanting this, you can now set a bech32/bc1 'address' as your account payout address.
It has the usual rules on input of all UPPER or all lower case, but is stored internally and displayed as all lower case.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.

Thanks for the information Sam!  I will check all of the software that you’ve recommended to me although i barely ever use my laptop and am always on my ipad so Is there any easier way to protect the network like some of those $200 plug and play devices on Amazon such as this one:

  https://www.amazon.com/GRYPHON-Security-Protection-AI-Intrusion-Detection/dp/B078Z3PTJP/ref=sr_1_7?keywords=secure+network+device&qid=1581610085&sr=8-7

Would it do any good to help me get more secured?

Thanks!
legendary
Activity: 2030
Merit: 1569
CLEAN non GPL infringing code made in Rust lang
The wording is VERY clear:

"Only use firmware provided by the miner manufacturer."
With that cleared out lets move into something else:

Just to confirm, Are native segwit bech32 addresses still invalid on KanoPool?
Never got an answer, but i tried setting up one recently and it apparently works now. Can anybody else confirm using bech32 (bc1q+) addresses with this pool are working correctly and receiving payments?
legendary
Activity: 3234
Merit: 1220

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


These IP addresses are internal to your network. The 102 address is a machine on your network, the 255 address is the broadcast address of your internal network (the address that something scanning your network for vulnerable hosts would use)

What machine on your internal network has the IP address 192.168.1.102
legendary
Activity: 3583
Merit: 1094
Think for yourself
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!

You can download wireshark to scan your network traffic.  WPA/2/3 with, a good, high entropy key is important for wifi.  uPNP and Bonjour allow apps in your network to open ports in your router, whether its wired or wifi, and gives you NO notification that that was done.

Also you can check TCP hardness of your router by using ShieldsUp at grc.com and scanning "All Service Ports" and verifying that all ports are at least closed at best stealthed.
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

Os2Sam,  I wanted to ask you.  How can I check my network for the level of security?  What type of software do I need to load up to be able to try to hack my own network even when the SSID is hidden?  I thought that it makes it pretty safe when I hide the SSID Huh

What other modern safety measures people take these days to protect their network?  Thanks!
sr. member
Activity: 508
Merit: 250
...

is this the problem you were having? if so, I think they detail how to fix it - https://bitcointalksearch.org/topic/antbleed-virus-clone-5224777

I’m not sure if it’s the same problem I was having because I could not find the IP address that he mentioned in his post but sounded like a simular problem.

Thanks for the information!
sr. member
Activity: 508
Merit: 250
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.

By the time frame that these attacks were done I’m pretty sure that It was done in another time zone.  Is there any other way how they could have hacked my modem, by not actually physically being in the radius of its reach?

Or that is the only way someone could have hacked it?  Because if that’s the case then I even have a local, love to hack people’s wifi suspect around here!

And ok, I will try to find and disable what you have told me.  After the reset so far no intrusions have been made this night and the log is clean.

Also Bitmain have answered to me and send me instructions on how to flash the controllers with their newest firmware by the means of an SD card and then they told me to upload some antivirus which they have send me as well.

I’m praying that this will work for me, will start to work on all of the hacked miners today!

Thanks for the output!
legendary
Activity: 2254
Merit: 2419
EIN: 82-3893490
legendary
Activity: 3583
Merit: 1094
Think for yourself
So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden. 

Hiding an SSID is NOT a security feature.  It just keeps the casual person from seeing your network easily.  Clients still need to know the SSID and that information is passed in the clear over the air.  So anyone sniffing for WiFi can easily see your SSID even though it is hidden.

I seriously doubt that a hacker in China was connecting via your WiFi.

Make sure your using, at least, WPA2 with a very good and complex key.  Disable uPNP and Bonjour and reboot it.  If your using a Ubiquity router make sure you disable Ubi Discovery.
sr. member
Activity: 508
Merit: 250
Biffa and Artemis3 and all of you guys, thank you again for taking your time trying to help me this problem!!! Just want you to know that I really appreciate it! 

I’m sure anyone can become an easy target like me and this is just wrong to do that to people!  Especially if they ruin the hardware!

If I won’t be able to fix these machines in the next few days, I will go ahead and buy at least 10 of the 17TH machines that bitmain has in stock so I can partly compensate for the damage done by this hacker, and have my TH somewhat higher than now.

All I can say for sure is that he isn’t getting anything from the miners that he has hacked anymore and that makes me feel a little better!

Mine on Comrades!
sr. member
Activity: 508
Merit: 250
Its more likely that the attack is coming from one of the computers on your internal network rather than from outside.

Unless you have forwarded ports to access your miners from outside your network, or worse, your miners have public IP addresses, the most likely cause of the hack is a compromised windows computer on your network.

I was thinking about that bro and it probably was the case because I have the whole family connected to the same network and everyone is browsing different sites and places which are probably aren’t safe, and I can’t control all of them.  I have my modem setup pretty safe and the WiFi isn’t even visible and it doesn’t have any ports open as far as I know and isn’t controlled from the outside but I did have a not very secured 5G Netgear router hooked up to it which I disconnected and hopefully now I’ll be safe.  So far no more machines have been hacked.

And gladly it is just my home network where I just got several miners working and not my actual farm!!!

And no, nobody uses windows in my house, it’s all phones and tablets.

Thanks.

Mine on!  I can smell that block already!!! Wink

Your network is definitely compromised. What about the miners? Did you set up (different) passwords on each? With 2018 or earlier firmware you had to set up both web and ssh passwords, not too sure about 2019 where you are not supposed to log in with ssh, but an earlier version (May?) has an exploit in the web server that re enables ssh access...

Also, rather than losing controllers, try the recovery procedure from (micro)SD, and if that doesn't cure it try booting BraiinsOS from the sd card and see if they work that way its better to sacrifice a cheap (small) sd card than a controller (if S9s until the i model).

Perhaps you could isolate your miners from your family network, you could have them on different network segments (both physically or logically). Ideally the miners would have their own router firewall, i would setup a white list that only lets them connect to the intended pool (and maybe Bitmain, i think the things phone home iirc before they start hashing), and having a local caching dns server is wise (dnscrypt-proxy does wonders).

A proper firewall is generally choosing what is allowed and what is not, ports and sites. Usually something like single button "medium" setting is nearly useless, especially for things whoever designed the firewall didn't think of (such as Bitmain asic miners getting malware).

While i commend you for not using Windows, be aware that both Android and iOS/OSX are not perfectly safe, Apple may be a little better but don't blind trust them, especially when your device gets too old and is put out of support. You are essentially doing a sysadmin work in your home like you would in a company...

Thanks a lot for the information you provided!  I really appreciate it!  And yes I’ve had one of the worst days in BTC mining this morning when I woke up I found out that the hacker was able to ruin 14 more S9’s!!!!!  14 machines gone in a minute!  Apparently he works somewhere in China in the day time when it is night here and I wake up to a surprise!  Today’s surprise was SHOCKING!

I have already contacted Bitmain for an advice on what to do and if there is a way that I can repair the controllers by uploading a newer firmware because these machines were from 2017-2018.  So I will be waiting for their reply as soon as they start their workday.

At first he hacked 3 so I just disconnected the router connected to my modem thinking that it was causing the problem, since the SSID wasn’t hidden unlike my modem SSID.  But when I realized that 14 more are mining for him this morning I started to dig in the log of the modem itself and found about 22 of these Dos Smurf attacks!!! From February second to today’s morning!

2020-02-04 09:00:49 [Error][Alarm-Log] AlarmID:303500,AlarmLevel:Error,DoS attack. Type: smurf. Source IP address: 192.168.1.102. Destination IP address: 192.168.1.255. Source MAC address:


So I contacted the the ISP provider and they confirmed me that I was hacked by WiFi although I’m not sure how since the SSID was hidden.  Remotely they have reset everything and I’ve changed all of the passwords.  Even on the miners themselves!  But I did that yesterday and apparently that didn’t help.  Also the modem  had a specific check box for preventing these Dos smurf attacks but apparently that didn’t work.

I’m closely monitoring the network tonight to see if there will be any more attacks on my modem, because now I just have a few miners running  Embarrassed

Maybe someone had clicked a wrong link from one of the devices who knows.

And I did noticed that the only ones that he wasn’t able to hack (so far) are the last ones that I got so they must have had a newer firmware protecting them from being hacked like that.

All my hope is on Bitmain now and that they answer soon and maybe be able to find a solution for me.  Start them with a preloaded firmware on a sd card or just try to upload it through my network on them, I really don’t know but I am afraid to even turn the power on the ones that have been compromised now, thinking that if it was hacked then maybe he can hack my whole new reseted network again and I will loose the rest of the miners?  Do you think it is safe to connect one of them to my fresh network or I shouldn’t even try?  Or what do you think?

If the Bitmain won’t be able to help me with a firmware upgrade then I really don’t care what I have to load on a Sd card and where it will mine as long as they just don’t sit around like furniture.  Now 17-18 have been ruined!  Undecided Cry Cry Cry Cry

Please let me know your thoughts guys I’d really appreciate if someone with the knowledge be able to give an advice  Undecided  Cry Cry Cry Cry
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
The wording is VERY clear:

"Only use firmware provided by the miner manufacturer."
legendary
Activity: 3822
Merit: 2703
Evil beware: We have waffles!
^^ Posted to Discord for him to pop in on it. He has talked about this several times there.

No matter what given that all claim to have many many users, why is it so hard for someone - anyone - that uses 3rd party firmware to post proof it has found a BTC block? Most GUI's have a spot for it and a record of blocks found since last reboot  is part of the API so can be checked even outside of the miner GUI.

On the pool side of things, when shares are sent/received information about the miner is provided as well to let the pool/miner work together. Plus when a block is found the block header generated includes information about the actual individual miner that found it. That info is more than just 'running cgminer vxxx'' and is easily logged by a pool if they care to keep detailed logs, for a start
Quote
[2019-12-17 09:55:22.719+11] _bloks_add(): BLOCK! Status: 1-Confirm, Block: 608428/...000012e6e6870bff Diff 14.9T Reward: 12.557647, Worker: Fuzzy.Avalon841_2, ShareEst: 21049113647971.0 21T 163.46% UTC:2019-12-16 22:55:22.618675+00
is part of the header from the block I found on Dec 16. From what Kano has said, a pool operator can extract more information as well if they care to. It should be common sense to link together miner data with block header info to track performance metrics.

Since Slush is behind the bOS projects, why not provide simple, verifiable proof the stuff finds blocks? They certainly have a large enough data set to see what miners (or, ahem, large proxy) find blocks and compare that against expected finds vs hashrate. So, if responsible pool operators want verifiable proof firmware works - give it to them.

Oh, their Stratum redeux freely gives a pool, sorry - they call it 'Service' -that info and knowing in-depth what a miner is running and can do is a large part of what it relies on to do the voodoo they plan on it doing.

Then there is #xnsub being part of it... While not an issue per se #xnsub opens up a rather large security hole and exists (so far) only for the benefit of Nicehash and DevFee firmware. It is how NH is able to change work done w/o having to restart a miner. It is also used by DevFee firmware to mine at their payment pools in the background without the miner needing to change pools & restart. Yes a lot of miners support #xnsub and yes BM had to reinstate support for it again after folks bitched about not being able to use their newest miners on NH. That still does not make it a good thing...
legendary
Activity: 2030
Merit: 1569
CLEAN non GPL infringing code made in Rust lang
Um, look at the Kanopool home page. The ban on 3rd party is in big bold red letters and has been a long standing policy for a few years.
A couple reasons for it:
Most violate the CGminers' Open Source license
Despite many requests for it - NO 3rd parts firmware provider has ever given*any* proof that the firmware finds BTC blocks nor given any proof of testing for more than it does not crash but does what they claim (control of clocking, voltage adj, fans etc)


Then it wouldn't apply to bOS since the source is available and you could test it yourself. For this reason i don't believe it unless Kano himself says so.
Pages:
Jump to: