Author

Topic: KanoPool kano.is lowest 0.9% fee 🐈 since 2014 - Worldwide - 2432 blocks - page 632. (Read 5352367 times)

legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
...

Maybe obvious, but exponential backoff in addition to whatever screening you do could probably weed out bots vs humans actually fat-fingering as efficiently without requiring manual switching or locking the fathands out.  There's also an nginx module to rate limit by filter if you want to avoid putting it on your backend. People should be using password management systems these days though...

edit: ah yea as @dracora suggested, fail2ban++
Well I only switch the "zero tolerance" on when needed (though it's still on coz there's still a couple of new IP addresses added every minute that get banned immediately Smiley

The web server is simply a web server.
My KanoDB/Code decides all the rules.

There are no known/expected exploits in the web site, it's all to do with logins.
People try "known exploits" regularly and none have ever succeeded, due to the fact that all the code is my own code, not some humongous dump of code written by dozens of  people, each trying to outperform every other dump of common code that people use and thus adding all sorts of risks and problems into the mix.
There's no offsite scripts to open up all the easy to exploit problems they cause, there's not even any CSS from offsite - it's also actually inline to reduce I/O.

The event/ovent code is all in that public git run by that god-complex guy, if you are curious about it's design - but it's controlled by settings that are more lenient than the default in code settings that would shut down the web site all the time Smiley
member
Activity: 118
Merit: 14
Featuring Yama-No-Shinbo the goddess of  luck, wealth, prosperity, protection and joy.
Lets have a nice block for after Holiday festivities.
member
Activity: 118
Merit: 14
I use 2FA to login in, the only drawback is having to remember to bring my smart phone downstairs with me where my man cave is. I can manage the 2FA on the phone itself, it is just a little trickier due to the short time a number is valid. If everyone used 2FA you could disable non 2FA logins and probably eliminate most of the evil bot nuisance traffic.

 Bitcoin price is floating above 15k at the moment.
newbie
Activity: 5
Merit: 0
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
Actually - it's exactly that Cheesy

I coded in the event/ovent ban code to KanoDB long ago, but every so often some new bot comes along and I have to think of how I can change the settings in the ban code (i.e. modify the limits via the KanoDB API) to best match the bot.
I've ended up mainly relying on the "no logins" switch, but that's a problem when it goes on for a long time and no one can login normally.

I think from now on I'll rely on switching on/off the "zero tolerance" ban, since it doesn't affect anyone logging in normally unless they forget their password or can't type their own username Smiley
Most people don't have the problem, and the few that do can always contact me to check why they were banned and clear their ban if they weren't part of the bot attack Smiley

Maybe obvious, but exponential backoff in addition to whatever screening you do could probably weed out bots vs humans actually fat-fingering as efficiently without requiring manual switching or locking the fathands out.  There's also an nginx module to rate limit by filter if you want to avoid putting it on your backend. People should be using password management systems these days though...

edit: ah yea as @dracora suggested, fail2ban++
newbie
Activity: 1
Merit: 0
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
Actually - it's exactly that Cheesy

I coded in the event/ovent ban code to KanoDB long ago, but every so often some new bot comes along and I have to think of how I can change the settings in the ban code (i.e. modify the limits via the KanoDB API) to best match the bot.
I've ended up mainly relying on the "no logins" switch, but that's a problem when it goes on for a long time and no one can login normally.

I think from now on I'll rely on switching on/off the "zero tolerance" ban, since it doesn't affect anyone logging in normally unless they forget their password or can't type their own username Smiley
Most people don't have the problem, and the few that do can always contact me to check why they were banned and clear their ban if they weren't part of the bot attack Smiley

check out fail2ban - you're able to create custom filters
member
Activity: 73
Merit: 10
I hope they are wrong. Said by dec 29th it would be 11k.
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
How low does everyone think bitcoin will go?
Was reading a post about it dropping back to 3500.00?
I guess they didn't see it go back up in the last hour Tongue
member
Activity: 73
Merit: 10
How low does everyone think bitcoin will go?
Was reading a post about it dropping back to 3500.00?
member
Activity: 210
Merit: 15
31.76% of Diff achieved,  can we get a super lucky, 50/50, flip flop coin toss block for Christmas? I just talked again with my four Antpoo's and they have assured "The Boss" they are working as hard as they can to Get 'R done. Come On Block and Mine On with Kano-San, the best BTC mining pool on earth. 
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
My worker is still showed in the stats page with the current hashrate, but in the Workers - workers tab and at the top right near my username it shows 0GHs or ?GHs. Is that normal Kano?
The pool generated stats take a while to change. That can take hours to match your miner.
Though, if you don't wait at least a minute before you started mining, your top right numbers may well show as zero.

The KanoDB stats lines for your workers are immediate values, but not accurate in measuring your hash rate vs your miner.
They're there so you can see immediately what's happening when you first connect a miner.

newbie
Activity: 14
Merit: 0
My worker is still showed in the stats page with the current hashrate, but in the Workers - workers tab and at the top right near my username it shows 0GHs or ?GHs. Is that normal Kano?
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
Actually - it's exactly that Cheesy

I coded in the event/ovent ban code to KanoDB long ago, but every so often some new bot comes along and I have to think of how I can change the settings in the ban code (i.e. modify the limits via the KanoDB API) to best match the bot.
I've ended up mainly relying on the "no logins" switch, but that's a problem when it goes on for a long time and no one can login normally.

I think from now on I'll rely on switching on/off the "zero tolerance" ban, since it doesn't affect anyone logging in normally unless they forget their password or can't type their own username Smiley
Most people don't have the problem, and the few that do can always contact me to check why they were banned and clear their ban if they weren't part of the bot attack Smiley
member
Activity: 126
Merit: 10
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley

Awesome. It's like an advanced game of whack-a-mole.
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
Heh - no - probably need to redirect them to microsoft defender web page ...
They already have a virus Tongue

Edit: seems to have trickled down to only one or two bans every minute or so, (instead of every second) so that always-ban change seems to work ok.
Of course I wont post when I've set the setting back to normal, but no doubt that will be soon Smiley
member
Activity: 126
Merit: 10
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley

Better yet can you redirect them to an infected site with malware or something?  Grin
legendary
Activity: 4634
Merit: 1851
Linux since 1997 RedHat 4
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
This one today has gone on for well over 2 hours so far ... I don't want to be giving them any hints about "best bot practices" Smiley
member
Activity: 85
Merit: 16
Good plan but I do have one suggestion... maybe show a message when you ban them that tells them how to get unbanned - something like wait 24 hours or contact you or something.
sr. member
Activity: 393
Merit: 250
911 IT Admin. I keep 911 up so you get help ASAP!
As long as you can unban me when I mess up!
legendary
Activity: 1736
Merit: 1032
Carl, aka Sonny :)
Got another of those 'bazillion web logins' going on on the web site again.
You'll find logins disabled for a while.

Silly bots. Can you pick up any pattern ?
No it's just the usual bazillions of windows computers with viruses that people control.
Since a large part of the world likes windows, blocking all windows computer connections isn't ideal Smiley
So I've had a think about yet another way to stop the bots when someone does this, since it's been happening a lot lately.

At the moment I simply disable logins until some (short or long) time after they stop doing it.
From now on, I'll do something a little more drastic, but it will allow people to normally login.

Basically, after a bot login attempt starts, it will switch to ban anyone who fails a single password attempt.
Under normal circumstance, it takes a few login failures to get banned, but I can (of course) change that setting at any time.
So when the bots attack it will ban the IP of anyone who fails even a single login attempt.
This way it will affect all the bots, but only rarely affect any users who can't remember their password, and only during the bot attacks Smiley

Edit: and the bot's started again - let's see if they all get banned - seems to be working Smiley

Good job Kano-san!  Give 'em hell! Cheesy
member
Activity: 126
Merit: 10
Got another of those 'bazillion web logins' going on on the web site again.
You'll find logins disabled for a while.

Silly bots. Can you pick up any pattern ?
No it's just the usual bazillions of windows computers with viruses that people control.
Since a large part of the world likes windows, blocking all windows computer connections isn't ideal Smiley
So I've had a think about yet another way to stop the bots when someone does this, since it's been happening a lot lately.

At the moment I simply disable logins until some (short or long) time after they stop doing it.
From now on, I'll do something a little more drastic, but it will allow people to normally login.

Basically, after a bot login attempt starts, it will switch to ban anyone who fails a single password attempt.
Under normal circumstance, it takes a few login failures to get banned, but I can (of course) change that setting at any time.
So when the bots attack it will ban the IP of anyone who fails even a single login attempt.
This way it will affect all the bots, but only rarely affect any users who can't remember their password, and only during the bot attacks Smiley

Edit: and the bot's started again - let's see if they all get banned - seems to be working Smiley

I like the sound of that...  Grin
Jump to: