Update on the pool downtime

News updates about the Prohashing pool
Forum rules
The News forum is only for updates about the Prohashing pool.

Replies to posts in this forum should be related to the news being announced. If you need support on another issue, please post in the forum related to that topic or seek one of the official support options listed in the top right corner of the forums page or on prohashing.com/about.

For the full list of PROHASHING forums rules, please visit https://prohashing.com/help/prohashing- ... rms-forums.
AvPro
Posts: 66
Joined: Tue May 23, 2017 6:13 am

Re: Update on the pool downtime

Post by AvPro » Sun Jun 18, 2017 3:29 am

Speculating, but perhaps an entirely new set of IP address are needed. As the IP set you owned was public prior to cloudflare being set up, can the attacker bypass CF and go straight to your IP seeing as they know it?
sirslayerjr
Posts: 62
Joined: Fri May 19, 2017 1:38 am

Re: Update on the pool downtime

Post by sirslayerjr » Sun Jun 18, 2017 3:33 am

goto dslreports.com goto forum and verizon.. this site has the best support to get issues resolved quickly
sirslayerjr
Posts: 62
Joined: Fri May 19, 2017 1:38 am

Re: Update on the pool downtime

Post by sirslayerjr » Sun Jun 18, 2017 3:35 am

Chris states

Furthermore, all 5 IP addresses can connect to each other through their public IP addresses, but they can't connect to anything beyond Verizon's first router.

that means they just need to reset the verizon router
sirslayerjr
Posts: 62
Joined: Fri May 19, 2017 1:38 am

Re: Update on the pool downtime

Post by sirslayerjr » Sun Jun 18, 2017 4:53 am

or its the switch/router behind the verizon. from my experience, verizon routers are very picky on whats behind its modem/router . i used and old ass 3com switch and netgear n600 dual band . which worked good behind the verizon
User avatar
Steve Sokolowski
Posts: 4585
Joined: Wed Aug 27, 2014 3:27 pm
Location: State College, PA

Re: Update on the pool downtime

Post by Steve Sokolowski » Sun Jun 18, 2017 7:07 am

sirslayerjr wrote:or its the switch/router behind the verizon. from my experience, verizon routers are very picky on whats behind its modem/router . i used and old ass 3com switch and netgear n600 dual band . which worked good behind the verizon
The problem is back within Verizon's network. We don't have access to those routers.

One temporary solution I suggested to Chris is to obtain an IP address through Verizon Wireless for the trader, which does not need to be dynamic, and to reassign the working IP addresses to the server.

No matter what is done, it will be at least 12 hours until service is restored, but a more likely timeframe for complete stability is 36 hours.

SHA-256 mining has been delayed until July 23 because the attacks took up the time we needed to implement it.
User avatar
FRISKIE
Posts: 117
Joined: Sun Apr 16, 2017 12:51 pm

Re: Update on the pool downtime

Post by FRISKIE » Sun Jun 18, 2017 7:26 am

Hey Steve - improved DDoS protection will be worth the wait.

Quick question though - how will this affect payouts?
User avatar
Steve Sokolowski
Posts: 4585
Joined: Wed Aug 27, 2014 3:27 pm
Location: State College, PA

Re: Update on the pool downtime

Post by Steve Sokolowski » Sun Jun 18, 2017 8:01 am

FRISKIE wrote:Hey Steve - improved DDoS protection will be worth the wait.

Quick question though - how will this affect payouts?
No money was lost, but the servers are inaccessible.

All site operations are offline for an indefinite period of time. If Chris can connect, he will pay all accounts down to zero. If it turns out that the only solution is to physically move the servers, then it could be a few days before he can gain access to the system again.

This issue is likely going to require a dramatic re-architecting of the system. The biggest problem we have right now is that we can't figure out what actually is happening because the customer service representatives at Verizon are saying their system is working. We gave up on Cloudflare because everyone there acted like a robot and couldn't tell us whether they could protect non-HTTP traffic.

I think that the first solution we'll try is simply increasing the connection speed to 1 Gb, and seeing if that is enough to allow us to determine what type of traffic is coming through and filter it. At the very least, we could get the site into a half-working state that doesn't trigger whatever happens with Verizon, and then just let the attacker run out of money.

If that doesn't work, then I think that the next step is to figure out if there is a VPS server that can get more bandwidth and filter connections as a proxy. This method will reduce profitability by about 1% due to increased orphan rates. The third choice is to physically move the servers to a datacenter that has enough bandwidth, but I don't think that any such datacenters that charge a low enough price exist where the pool could remain profitable.
User avatar
VanessaEzekowitz
Posts: 24
Joined: Sun Apr 16, 2017 4:01 pm

Re: Update on the pool downtime

Post by VanessaEzekowitz » Sun Jun 18, 2017 8:14 am

Steve, how big of a machine/how much performance do you actually need? I've been a satisfied customer of OVH for a few years now, and their "So You Start" line of dedicated servers is decently-powered, while still being inexpensive. The downside (might not actually affect you) is that network is capped at 250 Mbps (total bandwidth/traffic is unmetered though).

They have decent DDoS protection. Last time one happened to my server, if I recall correctly, it was about 300 Gbps and lasted for a few hours, but it only caused a minor disruption in services/accessibility (for maybe one minute) before OVH's mitigation systems absorbed it.

Looks like you can forget Cloudflare - if I read their help center right, they do not protect port 3333, let alone dealing with stratum+tcp: https://support.cloudflare.com/hc/en-us ... work-with-
Join Hashflare, make some money, and help a crabby old battle axe earn too, using my referral link:
https://hashflare.io/r/19027B79
User avatar
FRISKIE
Posts: 117
Joined: Sun Apr 16, 2017 12:51 pm

Re: Update on the pool downtime

Post by FRISKIE » Sun Jun 18, 2017 8:38 am

Hey Steve - thanks for addressing the payout issue clearly, it's going to become a top concern as the day goes forward.

You guys do what you have to do, I'll still be here, as will most of the rest of the community. These are the growing pains that plague online businesses that managed to catch attention of these cowards who don't have the balls to resolve grievances through discussion.
User avatar
Steve Sokolowski
Posts: 4585
Joined: Wed Aug 27, 2014 3:27 pm
Location: State College, PA

Re: Update on the pool downtime

Post by Steve Sokolowski » Sun Jun 18, 2017 8:39 am

VanessaEzekowitz wrote:Steve, how big of a machine/how much performance do you actually need? I've been a satisfied customer of OVH for a few years now, and their "So You Start" line of dedicated servers is decently-powered, while still being inexpensive. The downside (might not actually affect you) is that network is capped at 250 Mbps (total bandwidth/traffic is unmetered though).

They have decent DDoS protection. Last time one happened to my server, if I recall correctly, it was about 300 Gbps and lasted for a few hours, but it only caused a minor disruption in services/accessibility (for maybe one minute) before OVH's mitigation systems absorbed it.

Looks like you can forget Cloudflare - if I read their help center right, they do not protect port 3333, let alone dealing with stratum+tcp: https://support.cloudflare.com/hc/en-us ... work-with-
I found a place called Javapipe that seems to have a solution.

The main limitation is that we can't reconfigure the system because we have to maintain physical control of the hardware. Therefore, it seems to me that the best choice is to have a remote host filter traffic that goes to Verizon.

I found a place called Javapipe that appears to do just that, and the price is low enough that the pool would still be worth running while using it. I don't think that 300Gbps attacks are very common, and if they are, they have to be extraordinarily expensive because ISPs would quickly notice that hundreds of their customers suddenly saturated their upload capacity all at the same time and shut off those bots, permanently reducing the capabilities of the botnet.

When Chris wakes up in 30m, I'm going to sign up for them and we'll try setting up a VPN, where this remote server takes all the connections after whatever filtering they do, and simply retransmits the packets to the other machines.
Post Reply