Pages:
Author

Topic: Next level Bitcoin stress test -- June 29-30 13:00 GMT 2015 - page 6. (Read 16077 times)

legendary
Activity: 1456
Merit: 1081
I may write code in exchange for bitcoins.
I don't think we should be so quick to give credit for today's test to the OP, he has made zero announcements anywhere about it, which is out of character for him. Could have easily been someone else or multiple different people, especially since the majority of transactions had no fee and the bursts of spam came at random times.

In any case it's over, mempool clearing out. I've had no problems sending and receiving Bitcoin even when the mempool was at peak levels. Paid 3 cents per transaction and it was not delayed at all.

There certainly were delays for many.  I had a payment to me delayed by several hours---but this wasn't as bad as when I got caught in the "test" last week and had a delay of 11 hours.  But if we shouldn't give credit to the OP, the who should we give it to?  Something was clearly going on.  11K unconfirmed transactions (which I witnessed earlier today) isn't the norm.
legendary
Activity: 910
Merit: 1000
Record transactions past 24 hours.  162k.
legendary
Activity: 1120
Merit: 1003
twet.ch/inv/62d7ae96
Is the test over?
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
legendary
Activity: 1512
Merit: 1012
No problem to send bitcoins to kraken ... with 0,00001 BTC fees.
Stop using low fees ...  Roll Eyes
legendary
Activity: 1246
Merit: 1024
My own transaction to send money to someone is stuck thanks to your stress test. Over eight hours waiting now and my tx fee higher than your 10,000 satoshis. How long will this take until this ridiculous test concludes? All my btc is stuck in a change address in this transaction.
hero member
Activity: 560
Merit: 500
why to set a stress test? really you wont never get an acurance results as bitcoins is sended all the time and all days ,soo why to make a test ,not worthing your free time to check the time of them .The time it needs to get confirmation is just a security question.
legendary
Activity: 1456
Merit: 1081
I may write code in exchange for bitcoins.
sr. member
Activity: 350
Merit: 250
I call bullshit on this entire 'stress test' idea .. the idea that one group of spam scammers could flood the network is absurd
full member
Activity: 131
Merit: 101
We are back at 1tx/s. So if the test has now ended they have achieved only a 10th of their goal of 200Mb
legendary
Activity: 1456
Merit: 1081
I may write code in exchange for bitcoins.
I've been keeping an eye on Eligius's memory pool (which doesn't contain the attacker's transactions) as other pools find blocks and for the most part it is cleared each time, which means that most legitimate transactions are being mined regardless of this DoS attack.  Good for bitcoin. Smiley

It appears BTC China is filtering the spam, also, as it doesn't appear to be showing up in their recent few blocks.  Good for them. Smiley

As for Eligius, I feel the need to point out that Eligius's normal spam filtering is public for the most part, with the exception of the portions added recently that combat this specific attack (which would be silly to release during the attack and let the attackers work around it).  Suffice it to say, as I mentioned before, the attacker's transactions are very easy to spot and thus very easy to filter.  Admittedly, I'm kind of surprised that the attack is so simple to filter out.  Leads to questions about the attacker's actual knowledge about bitcoin, or more specifically the lack thereof...


I wouldn't be so sure abou that. There are plenty of legit transactions still waiting to be confirmed. For example, we have few here: https://www.nicehash.com/?p=miners&payments

If your mempool empties out with each block, then perhaps these legit transactions are never broadcasted to you?
It looks like that eligius just found two blocks (https://blockchain.info/block/00000000000000000638218146b8c0ac807315174c0104f390481853188df124 and https://blockchain.info/block/0000000000000000071359c423077912ed499e7351de61b9462d4178f2b45e94), both of which were under 52 kb and 82b43c7617e9bf1afcfbda94152da4fa9ccd2f477a6b5ed203326789d510847a and 5db4631aea702ee3ac6e0895f019e06d7c24b896e76f8cf1f1ba1e51e66d6acf are still showing as unconfirmed and are on the above link with recent mining payments from NiceHash. They do each have 8+ inputs and a large number of outputs. Roll Eyes

So hard to figure out what people mean by that damn eye-rolly smiley face.  You do understand that mining is a stochastic procedure right?   Finding a block isn't going to be predetermined in size or number of inputs.  I'll try it too: Roll Eyes
legendary
Activity: 4592
Merit: 1851
Linux since 1997 RedHat 4
Are you saying that all miners are blacklisting addresses? That's news to me and I'm sure other bitcoiners as well.
Blacklisting is by definition about people, and no miner has ever attempted that to my knowledge.
Addresses are not people, and do not even exist in the Bitcoin protocol. Instead, they are converted into scripts.
Bitcoin Core has filtered what scripts it will relay or mine since Satoshi Nakamoto himself added filtering in 0.3.18 (2010 Dec 8th).
To disable this, you must use (or rewrite) patches that I have maintained almost as long as I have been involved in Bitcoin.
As far as I know, however, not a single miner is currently mining without any script filtering whatsoever.

Eligius is treating certain inputs differently then other inputs. Plain and simple. They are saying that Bitcoin owned by one entity is not allowed to have their transactions confirmed by their found blocks.

This is not the first time that eligius (via Luke-jr) has done something similar to harm Bitcoin. Gambling sites were previously blacklisted by default by mining software when this was pretty clearly not a wanted "feature" of such software. In other words the software did things that its users did not want. This is how a lot of people describe malware.
This is 100% false/FUD/lies.
Luke - it's important to remember when any of your regular lies, can be easily shown to be lies, and thus it's a bad idea to post those lies publicly.
If you can't even remember what you said 5 minutes ago, you need check your facts about yourself before you post about something in the past Tongue

When you write code to Blacklist something and even in the code, you call it a Blacklist, it's rather bazaar that you'd then go and say it isn't a Blacklist. Even worse, you added this code on by default in gentoo bitcoin so that anyone who didn't disable your Blacklist, got it.

Current code:
https://github.com/luke-jr/bitcoin/blob/0.10.x-ljrP/src/main.cpp#L943

Note that the name was originally BlacklistedPrefixes:
https://github.com/luke-jr/bitcoin/blob/19cc5c03a0448f8c88cc81538bf3e54594867e5e/src/script.cpp#L1834
Code:
static struct BlacklistEntry BlacklistedPrefixes[] = {
    {0x06f1b600, 0x06f1b6ff, "SatoshiDice"},
    {0x74db3700, 0x74db59ff, "BetCoin Dice"},
    {0xc4c5d791, 0xc4c5d791, "CHBS"},  // 1JwSSubhmg6iPtRjtyqhUYYH7bZg3Lfy1T
    {0x434e5452, 0x434e5452, "Counterparty"},
    {0x069532d8, 0x069532da, "SatoshiBones"},
    {0xda5dde84, 0xda5dde94, "Lucky Bit"},
};

Of course you can (yet again) say that dictionaries are wrong and you are right, but even the Oxford dictionary says your definition is wrong:
http://www.oxforddictionaries.com/definition/american_english/blacklist
"Person" or "Product"

( By "Yet again" I am referring to: https://bitcointalksearch.org/topic/m.1369274 )

While you are at it, don't forget to tell the real bitcoin devs that their use of the term Blacklist in the code is wrong Tongue
https://github.com/bitcoin/bitcoin/blob/master/src/qt/paymentserver.cpp#L163
Code:
// Blacklisted certificate
if (cert.isBlacklisted()) {
   ReportInvalidCertificate(cert);
   continue;
}
So I take it since a "certificate" isn't a "person" then that code is wrong in main bitcoin Tongue

You like playing word games to pretend you aren't doing what people say you are doing, due to some technicality (that is also false)
Here's an example of how I'd expect you'd get out of murdering someone:
Luke:
"Your honour, I didn't shoot him to death, which is the charge levelled against me, thus I am not guilty of murder.
You see, what happened was, a bullet from the gun I had in my possessions left the barrel of the gun and pierced his body, but he was still alive.
When I pushed him, staggering, off the cliff, the entire fall to the ground far below, he was still alive, thus the bullet didn't kill him, it was the rocks below that killed him.
Thus I am not guilty of murder."

It's funny to see wizkid play these same games of yours also ...
Palpatine, you are training your padawan well ...
sr. member
Activity: 244
Merit: 250
Over 8 hours to get todays payment from Westhash.
hero member
Activity: 588
Merit: 501
I've been keeping an eye on Eligius's memory pool (which doesn't contain the attacker's transactions) as other pools find blocks and for the most part it is cleared each time, which means that most legitimate transactions are being mined regardless of this DoS attack.  Good for bitcoin. Smiley

It appears BTC China is filtering the spam, also, as it doesn't appear to be showing up in their recent few blocks.  Good for them. Smiley

As for Eligius, I feel the need to point out that Eligius's normal spam filtering is public for the most part, with the exception of the portions added recently that combat this specific attack (which would be silly to release during the attack and let the attackers work around it).  Suffice it to say, as I mentioned before, the attacker's transactions are very easy to spot and thus very easy to filter.  Admittedly, I'm kind of surprised that the attack is so simple to filter out.  Leads to questions about the attacker's actual knowledge about bitcoin, or more specifically the lack thereof...


I wouldn't be so sure abou that. There are plenty of legit transactions still waiting to be confirmed. For example, we have few here: https://www.nicehash.com/?p=miners&payments

If your mempool empties out with each block, then perhaps these legit transactions are never broadcasted to you?
It looks like that eligius just found two blocks (https://blockchain.info/block/00000000000000000638218146b8c0ac807315174c0104f390481853188df124 and https://blockchain.info/block/0000000000000000071359c423077912ed499e7351de61b9462d4178f2b45e94), both of which were under 52 kb and 82b43c7617e9bf1afcfbda94152da4fa9ccd2f477a6b5ed203326789d510847a and 5db4631aea702ee3ac6e0895f019e06d7c24b896e76f8cf1f1ba1e51e66d6acf are still showing as unconfirmed and are on the above link with recent mining payments from NiceHash. They do each have 8+ inputs and a large number of outputs. Roll Eyes

Yea, what kind of filters you are using are most likely filtering out most of legit transactions or your pool does not have good connectivity with other nodes. If it is the second, then you should really establish connections with big bitcoin service providers (like BitGo for example).
newbie
Activity: 20
Merit: 0
I started a transaction today around 12pm noon EST and it has yet to have 1 confirm. BTC mining price is .0003.. amount of 1.7774


Is there anything I can do to make it go any faster??
copper member
Activity: 2996
Merit: 2374
I've been keeping an eye on Eligius's memory pool (which doesn't contain the attacker's transactions) as other pools find blocks and for the most part it is cleared each time, which means that most legitimate transactions are being mined regardless of this DoS attack.  Good for bitcoin. Smiley

It appears BTC China is filtering the spam, also, as it doesn't appear to be showing up in their recent few blocks.  Good for them. Smiley

As for Eligius, I feel the need to point out that Eligius's normal spam filtering is public for the most part, with the exception of the portions added recently that combat this specific attack (which would be silly to release during the attack and let the attackers work around it).  Suffice it to say, as I mentioned before, the attacker's transactions are very easy to spot and thus very easy to filter.  Admittedly, I'm kind of surprised that the attack is so simple to filter out.  Leads to questions about the attacker's actual knowledge about bitcoin, or more specifically the lack thereof...


I wouldn't be so sure abou that. There are plenty of legit transactions still waiting to be confirmed. For example, we have few here: https://www.nicehash.com/?p=miners&payments

If your mempool empties out with each block, then perhaps these legit transactions are never broadcasted to you?
It looks like that eligius just found two blocks (https://blockchain.info/block/00000000000000000638218146b8c0ac807315174c0104f390481853188df124 and https://blockchain.info/block/0000000000000000071359c423077912ed499e7351de61b9462d4178f2b45e94), both of which were under 52 kb and 82b43c7617e9bf1afcfbda94152da4fa9ccd2f477a6b5ed203326789d510847a and 5db4631aea702ee3ac6e0895f019e06d7c24b896e76f8cf1f1ba1e51e66d6acf are still showing as unconfirmed and are on the above link with recent mining payments from NiceHash. They do each have 8+ inputs and a large number of outputs. Roll Eyes
hero member
Activity: 854
Merit: 1000
Is test stress happening right now?

I don't see the network is being really busy
hero member
Activity: 588
Merit: 501
I've been keeping an eye on Eligius's memory pool (which doesn't contain the attacker's transactions) as other pools find blocks and for the most part it is cleared each time, which means that most legitimate transactions are being mined regardless of this DoS attack.  Good for bitcoin. Smiley

It appears BTC China is filtering the spam, also, as it doesn't appear to be showing up in their recent few blocks.  Good for them. Smiley

As for Eligius, I feel the need to point out that Eligius's normal spam filtering is public for the most part, with the exception of the portions added recently that combat this specific attack (which would be silly to release during the attack and let the attackers work around it).  Suffice it to say, as I mentioned before, the attacker's transactions are very easy to spot and thus very easy to filter.  Admittedly, I'm kind of surprised that the attack is so simple to filter out.  Leads to questions about the attacker's actual knowledge about bitcoin, or more specifically the lack thereof...


I wouldn't be so sure abou that. There are plenty of legit transactions still waiting to be confirmed. For example, we have few here: https://www.nicehash.com/?p=miners&payments

If your mempool empties out with each block, then perhaps these legit transactions are never broadcasted to you?
legendary
Activity: 1470
Merit: 1002
Few people are having issue about blockchain tx. confirming, how long will this take?

I've got 0.18 & 0.095 BTC incoming transactions lost in the wilderness somewhere. They're both coming to the same address. Blockchain.info explorer shows them in said address but my Bitcoin Core client (wallet) shows nothing, not even pending.
They're both unconfirmed transactions after several hours, both the medium, recommended fee. They're payment for a signature & avatar campaign I participate in.

I understand they're not confirmed transactions but a little worried they're not even in my core wallet as pending.

I hope this will be finished asap, it's getting people in trouble. Any one have information how long must we wait?
legendary
Activity: 3556
Merit: 9709
#1 VIP Crypto Casino
Few people are having issue about blockchain tx. confirming, how long will this take?

I've got 0.18 & 0.095 BTC incoming transactions lost in the wilderness somewhere. They're both coming to the same address. Blockchain.info explorer shows them in said address but my Bitcoin Core client (wallet) shows nothing, not even pending.
They're both unconfirmed transactions after several hours, both the medium, recommended fee. They're payment for a signature & avatar campaign I participate in.

I understand they're not confirmed transactions but a little worried they're not even in my core wallet as pending.
Pages:
Jump to: