Author

Topic: [POOL][Scrypt][Scrypt-N][X11] Profit switching pool - wafflepool.com - page 126. (Read 465716 times)

hero member
Activity: 630
Merit: 500
Going to try 20140324 kalroth again and see if this is a bug introduced by last patch.

So far so good, not stuck like it did yesterday ... will let it run a couple hours with logging and see.  Maybe it was due to pools being DDOS ...

Seems to be switching fine now Smiley "quota" is working
newbie
Activity: 28
Merit: 0
If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves.  Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.

This is so wrong on so many levels...  Roll Eyes

Without getting into technical details on how exactly would you do that, think about this: who decides that "an address involved in theft, fraud, etc."? What happens to a legitimate merchant who sells a product or a service to one of the addresses "involved"?

It's seems you would like to bring over the clusterfuck that is credit card chargebacks/disputes over to crypto currencies. Thank you, but no (and thank Satoshi this is not really possible).

You say it's not possible, but if you have the complete list of transactions, it is possible to deny exchange to other currencies.  You can't prevent exchange of coins within the currency, but there's no reason anyone has to willingly accept a bitcoin that was originally stolen from a miner in exchange for a traditional currency.  In reality, the value of bitcoins today is only as good as what you are able to exchange them for in terms of real goods and services, or in traditional currencies.  While a thief may steal a bitcoin and pawn it off on someone else, here's no rule that says an exchange has to accept that bitcoin address for exchange with a dollar, or other currency.
hero member
Activity: 630
Merit: 500
Guys I have been reading some comments and I am confused with a couple points and with some that I read, I may be reading them wrong,

1st - I saw something about " My miner being hi-jacked" Using Kalroths may stop this? Whats this about

2nd - What is this issue that i was reading with Cgminer and using quota option? I dont use this, whats the benefits?

3rd - Theft - what theft?

4th - Do we have to restart Cgminer, Seems i'm hashing ok on the stats (I am at work - not near the miner) I have 5 Fail-overs 1st 3 are Wafflepool and the last 2 are Clevermining, Seems I am still accepting shares at the correct Hashrates. It has been automatic since 10 hrs ago... Yes it did switch to clever-mining but then came back to waffle.. Is this the correct way to do this?

Item 2: I am using "quota" in the pools section of .conf file to designate what percentages of hash I want to mine on several pools ... it's in the docs for cgminer.

Example for pools section:
"pools" : [
   {
      "quota" : "10;stratum+tcp://us-west2.multipool.us:7777",
      "user" : "yourworker",
      "pass" : "yourpass"
   },
        {
      "quota" : "30;stratum+tcp://uswest.wafflepool.com:3333",
      "user" : "yourworker",
      "pass" : "yourpass"
   },
   {
      "quota" : "25;stratum+tcp://dmd.cryptotroll.com:3339",
      "user" : "yourworker",
      "pass" : "yourpass"
   },
   {
      "quota" : "15;stratum+tcp://us1.cryptotroll.com:3333",
      "user" : "yourworker",
      "pass" : "yourpass"
   }
]

If you are using "quota" you must also include this line down in lower section of conf:

"load-balance" : true,

From what I have read if you are using failover-only it will also fall back to first alive pool if a pool dies.

Also if a pool dies it's share of quota is redistributed among alive pools Smiley

EDIT: even if you have a pool with quota set to 0 it will be tried as a fallback Smiley
legendary
Activity: 3654
Merit: 8909
https://bpip.org
They can do that as much as they want, but all transactions can be traced back to the blacklisted address because they are all in the blockchain.  Any address that is only 1 or 2 hops away could be considered "tainted" by the blacklisted address...

You do realize that you can generate any number of addresses at will, and create as many "hops" as you want for any amounts and there is nothing whatsoever to tie any of these addresses or transactions to any particular entity? Or just place a bet on satoshi dice and you can probably "taint" half the blockchain. Not to mention there are "shared" wallets out there specifically designed for laundering and probably about a million other ways to do it.
sr. member
Activity: 420
Merit: 250
Guys I have been reading some comments and I am confused with a couple points and with some that I read, I may be reading them wrong,

1st - I saw something about " My miner being hi-jacked" Using Kalroths may stop this? Whats this about

2nd - What is this issue that i was reading with Cgminer and using quota option? I dont use this, whats the benefits?

3rd - Theft - what theft?

4th - Do we have to restart Cgminer, Seems i'm hashing ok on the stats (I am at work - not near the miner) I have 5 Fail-overs 1st 3 are Wafflepool and the last 2 are Clevermining, Seems I am still accepting shares at the correct Hashrates. It has been automatic since 10 hrs ago... Yes it did switch to clever-mining but then came back to waffle.. Is this the correct way to do this?
legendary
Activity: 3654
Merit: 8909
https://bpip.org
If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves.  Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.

This is so wrong on so many levels...  Roll Eyes

Without getting into technical details on how exactly would you do that, think about this: who decides that "an address involved in theft, fraud, etc."? What happens to a legitimate merchant who sells a product or a service to one of the addresses "involved"?

It's seems you would like to bring over the clusterfuck that is credit card chargebacks/disputes over to crypto currencies. Thank you, but no (and thank Satoshi this is not really possible).
hero member
Activity: 630
Merit: 500
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.

EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL

found this on the net for an r9 270x so copied it

"no-submit-stale" : true,
"intensity" : "20",
"vectors" : "1",
"worksize" : "256",
"kernel" : "scrypt",
"auto-fan" : true,
"temp-cutoff" : "85",
"temp-overheat" : "75",
"temp-target" : "70",
"expiry" : "30",
"log" : "5",
"queue" : "1",
"retry-pause" : "5",
"submit-stale" : "false",
"scan-time" : "30",
"scrypt" : true,
"temp-hysteresis" : "3",
"shares" : "0",
"shaders" : "0",
"thread-concurrency" : "11263",
"gpu-thread" : "0",
"gpu-engine" : "1120",
"sharethreads" : "32",
"lookup-gap" : "2",
"gpu-powertune" : "00",
"gpu-memclock" : "1500"
}
with these settings I am pulling in 486 per card n average, gpu4 is a little low at 473

I want to force the fans to run pretty high not auto tune lie this one is but its getting me hash's now


Some changes I would make:

"submit-stale" : "true",
"gpu-fan" : "60-100",
"queue" : "0",


EDIT : http://www.overclock.net/t/1461916/tutorial-ultimate-guide-to-tweaking-amd-cgminer-3-7-2-kalroth-edition-sgminer-instructions-included-aswell-get-the-most-hash-out-of-your-gpu
newbie
Activity: 28
Merit: 0
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining):

Code:
{"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]}

I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one.  If you happen to track one down, please do share what you find here as I will be reading!

It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up.


If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves.  Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.

Whats to stop them from creating a new wallet and transferring to new wallet ...

EDIT: I'll bet the coins have been "tumbled" multiple times and are lost by now ...

They can do that as much as they want, but all transactions can be traced back to the blacklisted address because they are all in the blockchain.  Any address that is only 1 or 2 hops away could be considered "tainted" by the blacklisted address...
newbie
Activity: 21
Merit: 0
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.

EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL

found this on the net for an r9 270x so copied it

"no-submit-stale" : true,
"intensity" : "20",
"vectors" : "1",
"worksize" : "256",
"kernel" : "scrypt",
"auto-fan" : true,
"temp-cutoff" : "85",
"temp-overheat" : "75",
"temp-target" : "70",
"expiry" : "30",
"log" : "5",
"queue" : "1",
"retry-pause" : "5",
"submit-stale" : "false",
"scan-time" : "30",
"scrypt" : true,
"temp-hysteresis" : "3",
"shares" : "0",
"shaders" : "0",
"thread-concurrency" : "11263",
"gpu-thread" : "0",
"gpu-engine" : "1120",
"sharethreads" : "32",
"lookup-gap" : "2",
"gpu-powertune" : "00",
"gpu-memclock" : "1500"
}
with these settings I am pulling in 486 per card n average, gpu4 is a little low at 473

I want to force the fans to run pretty high not auto tune lie this one is but its getting me hash's now
hero member
Activity: 630
Merit: 500
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining):

Code:
{"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]}

I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one.  If you happen to track one down, please do share what you find here as I will be reading!

It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up.


If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves.  Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.

Whats to stop them from creating a new wallet and transferring to new wallet ...

EDIT: I'll bet the coins have been "tumbled" multiple times and are lost by now ...
newbie
Activity: 28
Merit: 0
If anyone has packet captures of work packets sent after their client was hijacked, could you post or send them? I'd be curious to see what they were mining. If it's DOGE, I'm also set up to extract the payout address from the coinbase parameters. A packet should look like this (I think this was an old packet capture from Clevermining):

Code:
{"id":null,"method":"mining.notify","params":["3a61","34d9b767ab5f9e4270ca11e6f823da99af2b6da089d7cb21490c3cce4831ac63","01000000010000000000000000000000000000000000000000000000000000000000000000ffffffff2703780702062f503253482f0436221c5308","0d2f6e6f64655374726174756d2f0000000001241b6d23db1200001976a914312f0edfb1647e2f9ddbc6a0faacf3c3c8d1d21588ac00000000",["e8c40423f1291090ace9ac3a88469cf61561ad9b0f06de877f9309b846264b9b","446dea3005104d328824ae1d93b6b26d6c18c69ed6cf3d5aa8a585eeebea534a","032c4da808bf500177768605095431ee58b2773e6397db02e93eae0db86952a4","d5e6cc3bc5dc96786f97cf42a07dff996ac4b9e572844300a0065c719d9ef186","5d7d235e26d856e1bb70ea2b669fa50b6ecf3256fc26ff0ac52d2ea2de4f5c08","2ab06ed0f757226b38213aeeaca5281d013f38259cc22ae04721ab35534d83fe","f66308601f97700e503e8cea31e8d1b57f34530054a222b4bb6f99015fd462a3"],"00000002","1b33c012","531c2247",true]}

I had set up packet capture on the outside of my firewall, and was dying to get a client.reconnect message and a connection to a rogue server followed by mining.notify messages, but I never received one.  If you happen to track one down, please do share what you find here as I will be reading!

It would be great to find a miner who was keeping share logs AND actually solved a block, as then we could trace it to a wallet address, perhaps seeing how much they were able to siphon and where it might ultimately have ended up.


If you could track to to a bitcoin address, it ought to be possible for the crytpocurrency community to "blacklist" an address used by thieves.  Since the transactions have a complete history in the blockchain, an exchange could reject transactions that are traceable back to an address involved in theft, fraud, etc.
hero member
Activity: 630
Merit: 500
did you delete the old *.bin files ... opencl may need to recompile them ... stop cgminer and del them and restart, it will recompile them automatically based on your config file.

EDIT: post portion of cgminer.conf following the Pools [ ] section ... no need to know your pools or worker info LOL
newbie
Activity: 21
Merit: 0
hi all,

total noob here, been mining on wafflepool for the past two weeks, with decent results but have some questions regarding the stalerate, since i am new to this i have not found a guide that explains all the different things in cgminer i.e. thread concurrency and intensity and all that.  I copied my build from a youtube video i am running 6 r9 270x's with a h81btc motherboard etc...  i have been successfully mining for the past two weeks using an intensity level of 20 and a thread concurrency of 24000 this seemed to have worked great for the first week and a half until the stratum change happened, now i have a stalerate of
15m Hashrate   15m Stalerate
2.21 MH/s              2.74%

is this a good number, the stale rate i see jumping all over clear up to 7%

i tried dropping the intensity level down to 17 and my hash rate stayed the same but my "Bitcoins earned (not yet sent): 0.00370838", stopped increasing as fast as it does with the 20.

the last two days i have gone from earning an average of 0.015 to less than 0.010, my most recent payout as you can see is .0079

2014-03-23 16:28:17   0.00797974
2014-03-22 23:08:36   0.01295763
2014-03-21 18:59:12   0.01042906
2014-03-20 18:55:37   0.01317510
2014-03-19 18:28:28   0.01780143


any suggestions would be greatly appreciated


2.21 sounds a bit low; I've got 5 270s (one of which is a 270x) and they run between 2.7 and 3.2 Mhs depending on how generous the hashing gods are feeling.

Definitely switch to Kalroth's cgminer. I did and using xintensity (actually raw intensity) I was able to tune those cards to give me a solid 95 - 110% WUE. A good thread on these cards with xintensity is https://bitcointalksearch.org/topic/the-perfect-gigabyte-r9-270-cgminer-settings-459419


downloaded kalroths cgminer, set it up let it auto run for a few minutes the wrote the config file.  when editing the config file it showed something other than scrypt in the kernel, so I switched it to scrypt. when doing this I get an error "concurrent_threads" is undefinded.  const uit x=get_global_id(0)%concurrent_threads;  failed to init gpu thread 0 disabling device 0 press enter to continue

hero member
Activity: 630
Merit: 500
Going to try 20140324 kalroth again and see if this is a bug introduced by last patch.

So far so good, not stuck like it did yesterday ... will let it run a couple hours with logging and see.  Maybe it was due to pools being DDOS ...
full member
Activity: 129
Merit: 100
U.S. west is still down   Huh

Just looked and my hashrate dropped to Nil again Sad

Recent Shifts
ID    Ended    Shares (yours / total)    Blocks Found
15643    OPEN    0 / 18895360    1
15642    2014-03-25 00:13:46    0 / 50270208    1
15641    2014-03-25 00:04:21    0 / 50136576    1
15640    2014-03-24 23:55:21    1024 / 50039296    0
15639    2014-03-24 23:46:51    5120 / 50228224    0

DDOS stopped for about 30min, and its back again.  I've got new boxes up in place, should be able to mine right now on new endpoints. Just make sure to bust any DNS cache you have (restart the miner should do it).

Fuxing DDOS attacks...
So what is needed from us miners to get that new endpoints?

Restart the miners?

Hold tight PW! Smiley

LPC
sr. member
Activity: 322
Merit: 254
U.S. west is still down   Huh

Just looked and my hashrate dropped to Nil again Sad

Recent Shifts
ID    Ended    Shares (yours / total)    Blocks Found
15643    OPEN    0 / 18895360    1
15642    2014-03-25 00:13:46    0 / 50270208    1
15641    2014-03-25 00:04:21    0 / 50136576    1
15640    2014-03-24 23:55:21    1024 / 50039296    0
15639    2014-03-24 23:46:51    5120 / 50228224    0

DDOS stopped for about 30min, and its back again.  I've got new boxes up in place, should be able to mine right now on new endpoints. Just make sure to bust any DNS cache you have (restart the miner should do it).
hero member
Activity: 630
Merit: 500
U.S. west is still down   Huh

Just looked and my hashrate dropped to Nil again Sad

Recent Shifts
ID    Ended    Shares (yours / total)    Blocks Found
15643    OPEN    0 / 18895360    1
15642    2014-03-25 00:13:46    0 / 50270208    1
15641    2014-03-25 00:04:21    0 / 50136576    1
15640    2014-03-24 23:55:21    1024 / 50039296    0
15639    2014-03-24 23:46:51    5120 / 50228224    0
hero member
Activity: 966
Merit: 546
U.S. west is still down   Huh
newbie
Activity: 7
Merit: 2
Since it seems to be just mining Worldcoin, I decoded the payout address from the cb2 parameter that was posted on Reddit ("...001976a9146c09db316ad2a67b39aa6b904bc175f5a3aabbb688ac000...")

Decoded, that address is WYXHfU5mGmWrb33QVRq1pRpCrzzMMfZw1P. Which makes frequent deposits to address Wgsk3MDRAUzGkUvWv2M9csVcNbLZpdehze.

EDIT: You should note that the prevHash referenced is not necessarily a block mined by that miner, it's just the hash of whatever the current block was at the time of the packet capture.
newbie
Activity: 21
Merit: 0
Code:
67272dab30992028ef77ee8d027a52a1e95582234e11ea9052a11626181c2ad4  -->  181c2ad452a116264e11ea90e9558223027a52a1ef77ee8d3099202867272dab

Looks like Worldcoin (first hash listed): http://bitinfocharts.com/worldcoin/block/1144085/181c2ad452a116264e11ea90e9558223027a52a1ef77ee8d3099202867272dab

Good find!   And no need to cut-n-paste the others and they're already linked as Previous Block.
Jump to: