Post
Topic
Board Hardware
Re: ANTMINER S3 Discussion and Support Thread.
by
Red_Wolf_2
on 22/07/2014, 03:59:42 UTC
Has anyone run a network sniffer on these things while they are running. There is a lot more network noise than the S1's made. I am not talking about share request/response, I am talking about calls to hosts and socket connection responses(causing extra beep sounds), kind of like a bot.

I have the gift of always thinking the worst of people. Would it be possible a % of the hash power is utilized/reserved for an internal process named "4bitmainpool"?

Maybe its some debug/diagnose thing they forgot to take out?

I first used Fiddler to sniff but setting up a Unix VM for better tools now.

Imagine, what if they could take 2-4% hash power from every S3 miner on-line.............



Process list from the unit...

  PID USER       VSZ STAT COMMAND
    1 root      1372 S    /sbin/procd
    2 root         0 SW   [kthreadd]
    3 root         0 SW   [ksoftirqd/0]
    5 root         0 SW<  [kworker/0:0H]
    7 root         0 SW<  [khelper]
    8 root         0 SW   [kworker/u2:1]
   60 root         0 SW<  [writeback]
   62 root         0 SW<  [bioset]
   64 root         0 SW<  [kblockd]
   89 root         0 SW   [kworker/0:1]
   94 root         0 SW   [kswapd0]
  139 root         0 SW   [fsnotify_mark]
  152 root         0 SW<  [ath79-spi]
  230 root         0 SW<  [deferwq]
  231 root         0 SW   [kworker/0:2]
  241 root         0 SW   [khubd]
  327 root         0 SWN  [jffs2_gcd_mtd3]
  381 root       880 S <  ubusd
  382 root       768 S    /sbin/askfirst ttyATH0 /bin/ash --login
  418 root         0 SW   [kworker/u2:2]
  456 root         0 SW<  [cfg80211]
  530 root      1492 S    /sbin/netifd
  574 root      1516 S    /usr/sbin/crond -f -c /etc/crontabs -l 5
  585 root      1156 S    /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 22
  636 root      1500 S    udhcpc -p /var/run/udhcpc-br-lan.pid -s /lib/netifd/dhcp.script -f -t 0 -i br-lan -C
  637 root      1500 S    udhcpc -p /var/run/udhcpc-eth1.pid -s /lib/netifd/dhcp.script -f -t 0 -i eth1 -H antMinerS3 -C
  656 root      1152 S    /usr/sbin/uhttpd -f -h /www -r antMiner -x /cgi-bin -t 60 -T 30 -k 20 -A 1 -n 3 -N 100 -R -p 0.0.0.0 80
  684 nobody     956 S    /usr/sbin/dnsmasq -C /var/etc/dnsmasq.conf -k
  848 root      1596 S    wpa_supplicant -B -P /var/run/wifi-wlan0.pid -D nl80211 -i wlan0 -c /var/run/wpa_supplicant-wlan0.conf
  879 root      1508 S    udhcpc -p /var/run/udhcpc-wlan0.pid -s /lib/netifd/dhcp.script -f -t 0 -i wlan0 -H antMinerS3 -C
  951 root      1500 S    /usr/sbin/ntpd -n -p 0.openwrt.pool.ntp.org -p 1.openwrt.pool.ntp.org -p 2.openwrt.pool.ntp.org -p 3.open
  976 root     42780 R    cgminer --bitmain-options 115200:32:8:18:218.75:1106 -o stratum+tcp:/// -O
  995 root      1220 S    /usr/sbin/dropbear -F -P /var/run/dropbear.1.pid -p 22
  996 root      1508 S    -ash
 1104 root      1496 R    ps w


Bit unwise to make it capable of being hijacked if any old person can shell into the unit and play around, they'd be caught pretty quickly. More likely the traffic you're seeing could be from the ntp daemon.