Bitcoin Forum
December 12, 2017, 08:12:54 PM *
News: Latest stable version of Bitcoin Core: 0.15.1  [Torrent].
 
   Home   Help Search Donate Login Register  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 »  All
  Print  
Author Topic: Ebit e9 miner with 6.8Th/s from Ebang company a new rival for existing producers  (Read 57579 times)
tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 05, 2017, 07:11:13 PM
 #441

Quote from bitmain:

"We hereby declare that this function is designed for those mine workers who trust their miners to a mining plant, to allow them to remotely shut down miners when miners are stolen or detained without permission, and meanwhile to provide tracing clues to the law enforcement agency. Just like the function of remote removal and shutdown provided by many smartphone manufacturers, Bitmain will never employ the function without miners’ permissions. This feature is especially important when thefts or mine staffs’ delinquency happen in mining plants."

I already found similar code in the ebang miners and posted it to the forum.

Everyone who donated I did not give them the firmware. I gave them books, and examples and what not to fuck with so you do not bust your machine. Then spent quiet a few hours Q/A. Just like I would not give someone the keys to a car without teaching them to drive, giving someone root without teaching them not to go rm -rf. There are alot of gpl programmers who fight with there bosses so that they can release gpl code. Yes there are bugs, they get fixed. But that is the whole point of it. To work together.

I have had these miners for awhile and if you think you are overclocking them you are wrong! 0-100 is not overclocking. They underclock them from the factory, The also put remote exploits on them to deactivated them just like bitmain did till they got caught. 

If you don't like these "hackers" who put up firmware. 15 bucks for firmware lmfao, Shit the info that he posted would cost A SHITLOAD MORE MONEY AND IS MORE VALUABLE then the time he spent to make it or will get back on it.

The VIRUS that was uploaded to the chat room was my bad, appweb from software.informer which used to be reliable, That was by accident which AS soon as I saw the notification I scanned it and like most cracks it pulls up false negatives. The only reason that happened too was because I do not have a windows machine. I am sorry.  After coding for 20 hours sometimes you make a fucking mistake. even after 35 years of coding.

You can ask anyone! All they have to do is ask I will help them. But ya know what there are bugs, there are remote shutoff backdoors, there is no security. AND WE FUCKING HAVE GITHUBS WHERE STICK OUR CODE IN THE GPL. AND ALL TAKE CODE FROM EACH OTHER AND DO NOT BITCH LIKE A GIRL WHEN WE DO. Like I said go ahead and deal with ebang for firmware that under-clocks your machine because 1 of about 5 will not get full speed. Backdoors your machines. Does not allow you access to the machines. I frankly don't give a shit.

I am running off to a small island I purchased with all the donations lmfao. I put the rest of the money to cloud crack it. lets see how they stand a full hex assault no bullshit just how everything at it  ?b?b?b?b?b?b?b    Fear thine hex mask for it is also known only by one other name. "the rabbit of cannerbog"


BUT DO NOT CALL PEOPLE WHO PUT UP THE TOOLS/ TAKE TIME TO PUT UP FIRMWARE, FIX THE BUGS, AND SECURE THE MACHINES SCAMMERS. BECAUSE THE FUCKING SCAMMERS ARE THE COMPANIES WHO WILL STEAL OUR CODE AND RETURN NOTHING, EXCEPT FIRMWARE WITH BACKDOORS IN IT AND BECAUSE WE DON"T EXPECT NOTHING. 

BECAUSE I WILL COME AND CRACK YOUR MOTHERFUCKING SKULL IN. 

Back to the point the code will be up on my github on Friday to change the the passwords and snmp. Since dumbass brought up a great point, you can compile it on whatever fucking machine you want. Because I am not going to paste any more binaries. So if you don't know how to cross compile from linux to arm or from windows to linux and did not pay attention on how to while I posted the tool chain and dev boards and repeated it 5 fucking times. 

So now you will have to asked all the people to compile it for you "SO YOU SHOULD BE FUCKING NICE TO THE HACKERS!"

The ones who OMFG ask for 15 bucks, FUCK YOU when I have to use that I will send him 15 BUCKS JUST FOR THAT
tech on how to interface into the miners is worth more then he will ever get in donations. 1%-100% last time I checked was not overclocking.

My machines I over freaking clock run nxsub on. AND RUN THEM AT 65% WITH NO AC. Yea the og china sweatshop style.

P. FUCKING to the S. You can not damage the machines by clocking them to the speed they are supposed to run at. Yes If you have no ventilation they will shut down. I know because I bought 4 machines and stock them outside and tested them for a month.

On the happy side of things if someone bitches a dev at a dev or at a dev for one of my mistakes i own up to it. Just as they would because we all make mistakes.

So now that we are all happy and shiny AND DON"T FUCKEN MAKE THREATS WHEN YOU CAN'T CARRY THEM OUT Smiley
EBANG CAN  CHANGE ONE LINE AND REMOTELY LOCK YOUR MACHINES.  Smiley
OR BETTER YET THEY WILL RALLY BEHIND A OLDER DEV WHO SAY FUCK THIS SHIT GUYS WE CAN DO THE SAME
THING AND HIT THE BOUNTIES FOR A GRAND OR TWO.

OH YEA IM IN A SHITTY MOOD TODAY CAUSE I WOKE UP AND SAW THAT SHIT BEFORE I HAD SOME COFFEE.
GO FUCKING GET SUPPORT FROM EBANG, OH WE SOWWY U LOOSE 5 PSU NOT OUR FAULT. FUCK YOU EBANG IT IS
YOU DID NOT GET THEM UL APPROVED AND NOW CUSTOMS CONFISCATED THEM.

So fuckoff while I make the finnaly bomb runs on the md5crypt and give everyone the root password especially your dumbass. But don't come crying to me if your fuck your shit up because you don't know your ass from your ears .because If I gave you instructions and you could not follow them Smiley
1513109574
Hero Member
*
Offline Offline

Posts: 1513109574

View Profile Personal Message (Offline)

Ignore
1513109574
Reply with quote  #2

1513109574
Report to moderator
1513109574
Hero Member
*
Offline Offline

Posts: 1513109574

View Profile Personal Message (Offline)

Ignore
1513109574
Reply with quote  #2

1513109574
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1513109574
Hero Member
*
Offline Offline

Posts: 1513109574

View Profile Personal Message (Offline)

Ignore
1513109574
Reply with quote  #2

1513109574
Report to moderator
1513109574
Hero Member
*
Offline Offline

Posts: 1513109574

View Profile Personal Message (Offline)

Ignore
1513109574
Reply with quote  #2

1513109574
Report to moderator
onegiantcock
Newbie
*
Offline Offline

Activity: 14


View Profile
December 06, 2017, 02:35:41 PM
 #442

Smartass11 is only asking for $15 and actually provides something useful. AVOID TEKCOMM - he is a threat to you and your miners. He's a blackhat punk hacker who poses as being helpful - asks for $50+ to install his "honest mistake" malware so he can steal from you some more. Then gives grade school bullshit excuses and after he gets paid.  The very definition of a SCAMMER.
freegeek
Member
**
Offline Offline

Activity: 69


View Profile
December 06, 2017, 03:45:10 PM
 #443

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.
smartass111
Jr. Member
*
Offline Offline

Activity: 40


View Profile
December 06, 2017, 04:21:40 PM
 #444

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.

Actually if you are running miners behind some NAT (in internal network behind router) - you don't need to worry about firewall I think

You may worry about china soft itself (inbound connections that cgminer make) - for example there are china pools hardcoded for sure

Just now ssh is just very very handy way to manage your miners remotely. And some insurance for cases when WebUI went down.
May be some more things and modifications will come in future (like nxsub support or fan control)

say thanks:
BTC 1NSkyiLvoF2SPpcBoWJF6pVLEkgBLxJBbg
BCH 182kTk7ziJoSjVENuADGVTShCUx3Qq6GAK
ETH 0xcb88FB0d4420C454a4b274C6c95800884373A0FB
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 07, 2017, 09:04:50 AM
 #445

WHen I turned on packet monitor , during dwang startup I've found  they are reporting or trying to report something to:
get ipaddr : 114.215.172.52officail name : e.g703.cn
their_ipaddr =114.215.172.52


that IP.
It comes back to some
Aliyun Computing Co.
City:
   Hangzhou
Country:
   China

It's live, you can ssh there.
I made a policy on my main router to send that address to oblivion.
smartass111
Jr. Member
*
Offline Offline

Activity: 40


View Profile
December 07, 2017, 11:11:07 AM
 #446


I created FW based on 6.0.20.40. You can download it here
https://www.dropbox.com/s/f05u5oantyk45ki/btc_upgrade_6.0.20.40_mod_root.tar.gz?dl=0
https://drive.google.com/file/d/1IxlJSVQ9RT4VQ7gMhDwIjdOo6MH-4p1Z/view?usp=sharing
please double check sha1hash after downloading
b3a851093dc13eafe3e0f48bc0f2557c21ad2267  btc_upgrade_6.0.20.40_mod_root.tar.gz

I see unclaimed root password changes. Don't be shy, ask for them in PM or here (provide mac address and time you rebooted your miner after flashing)

say thanks:
BTC 1NSkyiLvoF2SPpcBoWJF6pVLEkgBLxJBbg
BCH 182kTk7ziJoSjVENuADGVTShCUx3Qq6GAK
ETH 0xcb88FB0d4420C454a4b274C6c95800884373A0FB
freegeek
Member
**
Offline Offline

Activity: 69


View Profile
December 07, 2017, 12:15:24 PM
 #447

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.

Actually if you are running miners behind some NAT (in internal network behind router) - you don't need to worry about firewall I think

You may worry about china soft itself (inbound connections that cgminer make) - for example there are china pools hardcoded for sure

Just now ssh is just very very handy way to manage your miners remotely. And some insurance for cases when WebUI went down.
May be some more things and modifications will come in future (like nxsub support or fan control)


Yes you should. These things are shipped with a firmware that is basically a black box, it makes a connection from the inside to the outside. There is a very big misconception that NAT is a security feature
smartass111
Jr. Member
*
Offline Offline

Activity: 40


View Profile
December 07, 2017, 12:44:52 PM
 #448

Yes you should. These things are shipped with a firmware that is basically a black box, it makes a connection from the inside to the outside. There is a very big misconception that NAT is a security feature

I meant that nobody can control your miner using web/ssh/snmp behind NAT

Of course SW you have running inside OS behind NAT can connect somewhere and after that receive commands

say thanks:
BTC 1NSkyiLvoF2SPpcBoWJF6pVLEkgBLxJBbg
BCH 182kTk7ziJoSjVENuADGVTShCUx3Qq6GAK
ETH 0xcb88FB0d4420C454a4b274C6c95800884373A0FB
tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 07, 2017, 12:49:19 PM
 #449

You got it, you are definitely not a complete idiot like smart-ass.

Smiley
Here, to remove the remote exploit of the ebang miners try running this batch file.
Your firewalls are useless against ebangs remote exploit. Here is how to disable it on a per machine basis.
Check every version of firmware with fgrep -r baidu . You will find it in all of them
This is for both windows and windows 64 bit version. Linux users well we already know.
When you can remotely change any javascript variable on a page via remote execution its a bad thing mkay.

https://pastebin.com/raw/euPTXM1g

Update on the last bomb run on root, Currently the mask of 0X00EE-0X00FF on the 16 range pinyin for the root password has begun.

Smartass1 don't bother the code is in batch file and may be to complex for you.
Blob conversion of the s9's has begun to be fully gpl compliant.
Don't bother donating to me Ill collect the bounties Smiley

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.

Actually if you are running miners behind some NAT (in internal network behind router) - you don't need to worry about firewall I think

You may worry about china soft itself (inbound connections that cgminer make) - for example there are china pools hardcoded for sure

Just now ssh is just very very handy way to manage your miners remotely. And some insurance for cases when WebUI went down.
May be some more things and modifications will come in future (like nxsub support or fan control)

tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 07, 2017, 01:03:46 PM
 #450

You got it, you are definitely not a complete idiot like smart-ass.

Smiley
Here, to remove the remote exploit of the ebang miners try running this batch file.
Your firewalls are useless against ebangs remote exploit. Here is how to disable it on a per machine basis.
Check every version of firmware with fgrep -r baidu . You will find it in all of them
This is for both windows and windows 64 bit version. Linux users well we already know.
When you can remotely change any javascript variable on a page via remote execution its a bad thing mkay.

https://pastebin.com/raw/euPTXM1g

Update on the last bomb run on root, Currently the mask of 0X00EE-0X00FF on the 16 range pinyin for the root password has begun.

Smartass1 don't bother the code is in batch file and may be to complex for you.
How to tell a smartass is a dumbass, simple a dumbass can at least use cabextract to get one fucking file and follow directions.
Blob conversion of the s9's has begun to be fully gpl compliant.
Don't bother donating to me Ill collect the bounties Smiley

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.

Actually if you are running miners behind some NAT (in internal network behind router) - you don't need to worry about firewall I think

You may worry about china soft itself (inbound connections that cgminer make) - for example there are china pools hardcoded for sure

Just now ssh is just very very handy way to manage your miners remotely. And some insurance for cases when WebUI went down.
May be some more things and modifications will come in future (like nxsub support or fan control)

tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 07, 2017, 01:08:04 PM
 #451

Smartass11 is only asking for $15 and actually provides something useful. AVOID TEKCOMM - he is a threat to you and your miners. He's a blackhat punk hacker who poses as being helpful - asks for $50+ to install his "honest mistake" malware so he can steal from you some more. Then gives grade school bullshit excuses and after he gets paid.  The very definition of a SCAMMER.
It is not my fault, you can not follow fucking directions.

Call At&t, Boeing, ADM, Motorola,  Lockheed Martin, or Xerox and ask them. I can continue Smiley
Currently I am still under NDA contract with all of them.

How about You smartass11? Pokes at the little troll....
I also made it abundantly clear what the donation was for.
To cloud crack the root password.
Which is underway as we speak, so talk to the fucking hand Tongue

What have you done lately besides wine like a old bitch?
I released the code to remote gain root, then wow look it pops up all over the place?
Himm and the firmware pops up. wow.
I posted the code of ebangs remote exploit and poof.
Its fixed. wow.
I posted the structure of the main miner binary to remove the blobs add nxsub support?
poof. Nothing happened because I have not disassembled them yet.
I posted the code to remove the remote exploit of the ebang miners try running this batch file.
Smiley
poof. no more remote ebang self destruct enabled on all your machines.

So when you actually do something other then bitch. Blah you will still be blocked.
tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 07, 2017, 01:23:18 PM
 #452

So your telling me that the client that you use to connect to it does not allow connections to the miners. The exploit is in the appweb code itself in the firmware.
You------------------------> Miner
You----Fetch Code-----> Miner.
Does not matter what the Miners are behind because the code is run from the connecting client and then executed on the Miner.
Does not matter what the miners are behind or if your use a vpn to connect to them.
So, Unless you invalidate all ssl certified servers the code has already ran. On every page on every miner you have connected to.
Now is when you say. "Oh Shit".

And for those of us with S9's yea heres the mea culpa from bitmain about there backdoor.
https://enforum.bitmain.com/bbs/topics/4194


You got it, you are definitely not a complete idiot like smart-ass.

Smiley
Here, to remove the remote exploit of the ebang miners try running this batch file.
Your firewalls are useless against ebangs remote exploit. Here is how to disable it on a per machine basis.
Check every version of firmware with fgrep -r baidu . You will find it in all of them
This is for both windows and windows 64 bit version. Linux users well we already know.
When you can remotely change any javascript variable on a page via remote execution its a bad thing mkay.

https://pastebin.com/raw/euPTXM1g

Update on the last bomb run on root, Currently the mask of 0X00EE-0X00FF on the 16 range pinyin for the root password has begun.

Smartass1 don't bother the code is in batch file and may be to complex for you.
How to tell a smartass is a dumbass, simple a dumbass can at least use cabextract to get one fucking file and follow directions.
Blob conversion of the s9's has begun to be fully gpl compliant.
Don't bother donating to me Ill collect the bounties Smiley

All, there is no need to pay someone for some fancy firmware, put your miners behind a statefull firewall like an ubiquity edgemax ($70) and just block all inside to outside ip connections that have nothing to do with the pool you are using. Manage your miners via an encrypted vpn (ubiquity supports ssl and ipsec) and you are golden.

Actually if you are running miners behind some NAT (in internal network behind router) - you don't need to worry about firewall I think

You may worry about china soft itself (inbound connections that cgminer make) - for example there are china pools hardcoded for sure

Just now ssh is just very very handy way to manage your miners remotely. And some insurance for cases when WebUI went down.
May be some more things and modifications will come in future (like nxsub support or fan control)

tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 07, 2017, 02:09:28 PM
 #453

127.0.0.1 it.

nxsub and fan control have been done for awhile btw.
nxsub and fan control are accessed via the web interface
if you look for the hidden menus or know how to form a json query.
I have been running that with ssh access for months since the batch of miners arrived.
I did not know people did not enable them till months later when I read the posts.

WHen I turned on packet monitor , during dwang startup I've found  they are reporting or trying to report something to:
get ipaddr : 114.215.172.52officail name : e.g703.cn
their_ipaddr =114.215.172.52


that IP.
It comes back to some
Aliyun Computing Co.
City:
   Hangzhou
Country:
   China

It's live, you can ssh there.
I made a policy on my main router to send that address to oblivion.
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 07, 2017, 05:22:44 PM
 #454

127.0.0.1 it.



I made a rule on my firewall to deny packets from my miner group addresses out to any of these hardcoded BS sites. THe nice thing about that is the firewall keeps track of how many times it was denied and you can see those stats.
So far, hm.baidu.com was only once, it doesn't seem to get called on every page load. The e.g703.cn (114.215.172.52) gets hit every time dwang starts, this one looks bad, it's definitely reporting some crap to this site.
also hardcoded in dwang are several hidden pools, I denied all those too based on fqdn.
stratum+tcp://stratum.f2pool.com:3333
stratum+tcp://stratum.haobtc.com:3333
stratum+tcp://vipebite.btcxo.com:3334
stratum+tcp://stratum.btcchina.com:3333

none of those have been hit though, i think they may only exist to auto fill the details , when you go to the miner config webpage it has radio buttons for haobtc and btcchina (but not the other two???!?!?!?) ... but the rule to deny stays! We'll see if they get hit attempts over time
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 07, 2017, 05:25:04 PM
 #455

127.0.0.1 it.



I made a rule on my firewall to deny packets from my miner group addresses out to any of these hardcoded BS sites. THe nice thing about that is the firewall keeps track of how many times it was denied and you can see those stats.
So far, hm.baidu.com was only once, it doesn't seem to get called on every page load. The e.g703.cn (114.215.172.52) gets hit every time dwang starts, this one looks bad, it's definitely reporting some crap to this site.
also hardcoded in dwang are several hidden pools, I denied all those too based on fqdn.
stratum+tcp://stratum.f2pool.com:3333
stratum+tcp://stratum.haobtc.com:3333
stratum+tcp://vipebite.btcxo.com:3334
stratum+tcp://stratum.btcchina.com:3333

none of those have been hit though, i think they may only exist to auto fill the details , when you go to the miner config webpage it has radio buttons for haobtc and btcchina (but not the other two???!?!?!?) ... but the rule to deny stays! We'll see if they get hit attempts over time
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 07, 2017, 10:18:01 PM
 #456

Actually I just added a rule to allow to my pools and deny everything else.
The deny everything else has produced about 8 denials/hr/miner to various places, most of which you can ssh to and get a prompt. WTF ebang!?!?!?!?
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 07, 2017, 11:09:58 PM
 #457

Has anyone tried to just compile cgminer for arm and see if it picks up the asics on that thing? Never looked into how the mining software actually works, not sure how they talk to the asics.
the dwang crap really needs to go, dirty dirty stuff.
tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 08, 2017, 02:34:03 AM
 #458

Has anyone tried to just compile cgminer for arm and see if it picks up the asics on that thing? Never looked into how the mining software actually works, not sure how they talk to the asics.
the dwang crap really needs to go, dirty dirty stuff.
Already have did that and bgminer, They did the same thing as bitmain. Blob locked in cgiminer. Sad
The best thing I have come up with is to black hole dns resolution and then add the pools in etc hosts on the miner
tekcomm
Jr. Member
*
Offline Offline

Activity: 31


View Profile
December 08, 2017, 03:15:26 AM
 #459

#!/bin/bash
echo "#################Create new auth.conf and snmpd.conf to secure your ebit miner ##########"
echo
echo -n "Enter Username: "
read user
./authpass --cipher md5 --file auth.conf example.com $user adminstrator

echo "New auth.conf created"
echo
cat auth.conf
echo
echo ##########################################################################################
echo "Create snmp.conf ReadOnly/ReadWrite Password"
echo -n "Enter SNMP ReadOnly Commmunity: "
read suser
echo

echo -n "Enter SNMP ReadWrite Commmunity: "
read spass

echo rocommunity $spass > snmpd.conf
echo rwcommunity $suser >> snmpd.conf

echo "New snmpd.conf created"
cat snmpd.conf
echo
echo "#If you would like to help free cgiminer and its api access from the evil ebit empire"
echo "#Please send donations too: 19ZMUgy5KGucLWiehQbo3rzwXWX3EPZpqT .005 btc or more please"
73blazer
Member
**
Offline Offline

Activity: 62


View Profile
December 08, 2017, 03:52:34 AM
 #460

#!/bin/bash
echo "#################Create new auth.conf and snmpd.conf to secure your ebit miner ##########"
echo
echo -n "Enter Username: "
read user
./authpass --cipher md5 --file auth.conf example.com $user adminstrator

echo "New auth.conf created"
echo
cat auth.conf
echo
echo ##########################################################################################
echo "Create snmp.conf ReadOnly/ReadWrite Password"
echo -n "Enter SNMP ReadOnly Commmunity: "
read suser
echo

echo -n "Enter SNMP ReadWrite Commmunity: "
read spass

echo rocommunity $spass > snmpd.conf
echo rwcommunity $suser >> snmpd.conf

echo "New snmpd.conf created"
cat snmpd.conf
echo
echo "#If you would like to help free cgiminer and its api access from the evil ebit empire"
echo "#Please send donations too: 19ZMUgy5KGucLWiehQbo3rzwXWX3EPZpqT .005 btc or more please"


No need for authpass, it's just a md5 hash with no endline/newline char on it in the form of
admin:example.com:yourpasswd
Because they run appweb under the domain example.com, you can change that too in appweb.conf
Don't use a colon in your password!!! Appweb idgits.

Code:
echo
echo "Appweb auth.conf password generator"
echo
echo
echo "Enter userid (no colons!): \c"
read nuser
echo "Enter new Password (no colons!): \c"
read npass
echo "Generating appweb hash for user: $nuser password [$npass]....."
hash=`echo "${nuser}:example.com:${npass}\c" | openssl md5`
echo =================
echo "Your new Hash is : $hash"
echo =================
echo
echo "Place this line in your auth.conf:"
echo =================
echo "User admin $hash administrator"
echo =================
echo
exit 0

I thought about ditching the resolv.conf too, but that seems rather brute-force-ish. The rule on the firewall works great, allow out to your pools via FQDN so you don't need manage the round-robin ip's the pools use, then deny all  outbound from your miner group addys.
#      From   To   Priority   Source         Destination   Service   Action   Users
36      LAN      WAN   1   EbitMiner40-50           MinerPools    Any      Allow            All      
37      LAN      WAN   9   EbitMiner40-50           Any            Any      Deny            All   
I have defined on my firewall/router EbitMiner40-50 address object  as a range of addresses that only the miners fall in and MinerPools address object  as my pools by name, the router will keep track of the various ip's associated with those names
I've had a running trace on 37 to show me exactly what's being blocked..
After dwang is going, nothing, but during dwang startup..watch out, it wants to connect to all kinds of internet ip's, as well as many 192.168 internal ips they must being using in their development office.

I would HIGHLY recommend anyone with a ebang miner to create that rule-set on their firewall. It won't affect it's operation, there's no hack or code required and you don't need to touch your miners or break into them, just some rules to box in your miners so they can only talk to your pools,  and keeps your miner from reporting all kinds of stuff to various entities in china.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 [23] 24 »  All
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!