From 02a9c364c074f3b4ff4cefa10f20b0485e6e55dd Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Radim=20Lipov=C4=8Dan?= Date: Fri, 17 May 2019 13:36:15 +0200 Subject: [PATCH] Docs - complete --- docs/_posts/2019-05-01-cryptocurrency.md | 2 - .../_posts/2019-05-04-Monero-user-research.md | 3 - ...Monero-Usage-And-Storage-Best-Practices.md | 3 - ...btaining-Monero-And-Running-The-Network.md | 2 - .../2019-05-07-Monero-Miners-Research.md | 233 ++++++++ ...-08-Designing-Secure-Mining-Environment.md | 527 ++++++++++++++++++ 6 files changed, 760 insertions(+), 10 deletions(-) create mode 100644 docs/_posts/2019-05-07-Monero-Miners-Research.md create mode 100644 docs/_posts/2019-05-08-Designing-Secure-Mining-Environment.md diff --git a/docs/_posts/2019-05-01-cryptocurrency.md b/docs/_posts/2019-05-01-cryptocurrency.md index 3571365..1058ee2 100644 --- a/docs/_posts/2019-05-01-cryptocurrency.md +++ b/docs/_posts/2019-05-01-cryptocurrency.md @@ -5,8 +5,6 @@ subtitle: Introduction to Cryptocurrency terminology tags: [introduction,cryptocurrency,terminology] gh-badge: [star, fork, follow] --- - -## 1 Introduction Monero project offers a decentralized and anonymous open-source cryptocurrency with a regular update cycle that does not limit the user to use certain software or hardware. With such an open approach, it is often difficult for users to keep up and be aware of many choices on the client side, that can be either good or bad for them. As cryptocurrency usage is rising in general, it is also more and more frequent to encounter malicious sites or software developersthat aim to take control over users funds to gain an easy profit. This thesis focuses on the Monero usage and mining from usable security view to explain the current state in the Monero ecosystem and reflect the real-world usage data from both users and miners surveys. The goal of this thesis is to map usage habits of Monero cryptocurrency users and miners from both technological as well as security view. Another goal is to create a detailed user guideline for user-friendly and secure usage of the Monero cryptocurrency including key management and backup strategy. For miners, the goal is to implement an automated deployment of mining rigs using one of the popular configuration management tools. To find an answer to such research questions and to get real world usage data, I conducted a Monero User Research survey in which 113 participants shared their habits regarding Monero cryptocurrency. diff --git a/docs/_posts/2019-05-04-Monero-user-research.md b/docs/_posts/2019-05-04-Monero-user-research.md index 4a6b237..7c35bda 100644 --- a/docs/_posts/2019-05-04-Monero-user-research.md +++ b/docs/_posts/2019-05-04-Monero-user-research.md @@ -5,9 +5,6 @@ subtitle: Getting into users perception tags: [research,cryptocurrency,users] gh-badge: [star, fork, follow] --- - -## 5 Monero User Research - The goal of this research is to gather information on end users behavior regarding Monero cryptocurrency with emphasis on key management and security practices. For this purpose, an online questionnaire was diff --git a/docs/_posts/2019-05-05-Monero-Usage-And-Storage-Best-Practices.md b/docs/_posts/2019-05-05-Monero-Usage-And-Storage-Best-Practices.md index 8ec4e61..95215fb 100644 --- a/docs/_posts/2019-05-05-Monero-Usage-And-Storage-Best-Practices.md +++ b/docs/_posts/2019-05-05-Monero-Usage-And-Storage-Best-Practices.md @@ -5,9 +5,6 @@ subtitle: Monero best practice tags: [usage, storage, guideline] gh-badge: [star, fork, follow] --- - -## 6 Monero Usage and Storage Best Practices - Ease of use is one of the critical aspects of every cryptocurrency and although Monero can offer a wide range of privacy features it has to be usable and user-friendly to be used by a substantial margin of people. diff --git a/docs/_posts/2019-05-06-Obtaining-Monero-And-Running-The-Network.md b/docs/_posts/2019-05-06-Obtaining-Monero-And-Running-The-Network.md index 7eefc4d..af01275 100644 --- a/docs/_posts/2019-05-06-Obtaining-Monero-And-Running-The-Network.md +++ b/docs/_posts/2019-05-06-Obtaining-Monero-And-Running-The-Network.md @@ -5,8 +5,6 @@ subtitle: How are coins gained tags: [coins, network, mining, pools ] gh-badge: [star, fork, follow] --- -## 7 Obtaining Monero and Running the Network - Monero mining is a process done by miners to verify transactions on the network and add them to the blockchain together in the form of a block. This results for them in a reward in the form of new coins that diff --git a/docs/_posts/2019-05-07-Monero-Miners-Research.md b/docs/_posts/2019-05-07-Monero-Miners-Research.md new file mode 100644 index 0000000..93f701d --- /dev/null +++ b/docs/_posts/2019-05-07-Monero-Miners-Research.md @@ -0,0 +1,233 @@ +--- +layout: post +title: Monero Miners Research +subtitle: Researching the miners +tags: [miners,research,terminology] +gh-badge: [star, fork, follow] +--- +The goal of this research is to gather information on people who run +mining cryptocurrency software and map their behavior regarding +system administration with the emphasis on security practices. For +this purpose, an online questionnaire was created and is available in +the Appendix Figure C. +To the best of my knowledge, this is the first work that studies +cryptocurrency miners. Specific research questions are based on cryp- +tocurrency mining setup patterns, used software and problematic +areas regarding computer and data security in general. + +### 8.1 Research questions + +The survey was designed around seven question groups. Some of them +were shown only if the participant chose the appropriate answer. + +- G01 - Introductory information +- G02 - Mining setup +- G03 - Mining software +- G04 - Pool choice +- G05 - Windows platform +- G06 - Linux platform +- G07 - Demographics + + +Following this pattern, five research questions were set: + +- R1: Who are Monero miners in general? What are their typical + mining setups? +- R2: Which types of software do participants use as operating + systems, management, and mining tools? +- R3: What security and update policies miners follow? +- R4: Do miners suffer from security incidents like compromised + mining operation? How do they deal with them? +- R5: What are the factors that affect pool choice? + +### 8.2 Participants and survey’s background + +As mentioned in the Chapter 5, the survey was not hosted on third +party servers, but instead on dedicated VPS running Lime Survey +self-hosted software with HTTPS interface using signed Letsencrypt +certificates. +This means that data exchanged between participants and survey +software stays only between these two parties, so Google or other +big data companies cannot analyze them. To allow extended privacy +features, Tor and proxy connections were allowed, but each participant +had to solve the CAPTCHA before starting the survey. + +#### 8.2.1 Methodology + +Data collection method was online only and was using the survey +website software. Participants selection was based on opportunity +sampling, links for the research were shared among dedicated Reddit +Monero community, Facebook Mining groups as well as Cryptocur- +rency forums. This form was distributed together with the Monero +User Research survey in mentioned mining communities. Study limi- +tations are described in the Section 6.3. +To reduce nonresponse rate, participants were asked only to fill +out parts that were significant for them, e.g., Windows OS part stayed +hidden in the form if the user selected that he/she used Linux OS only. +The data from the respondents were collected from 11.15.2018 to +01.27.2019. The complete survey is attached in the Appendix Figure C. + +### 8.3 Collected data + + +Before entering the survey, each participant had to pass the bot test +by entering the correct CAPTCHA, which resulted in 323 participants +of the questionnaire in total. As for survey data cleansing, following +measurements for valid dataset were taken: + +1. Partially answered or unanswered questionnaires were not taken + into account (261 out of 323). +2. Respondents that filled out the survey in less than two minutes + were discarded (0 out of 323). +3. Responses with more than four entries with the same IP were +filtered (0 out of 323). +4. Responses containing invalid answers, e.g., not using Monero +or repeating the same answer pattern in multiple submissions +(2 out of 323). + +Usingg eoiplookuppackage in Ubuntu on the filtered dataset, most +of the responses were from the USA (10 out of 60) as well as from +the Czech Republic (10 out of 60) followed by Germany (6 out of 60). +Detailed list of countries with the corresponding number of responses +is available in the Appendix Table C.1. + +### 8.4 Results + +Upcoming pages are based on the final filtered dataset with 60 re- +sponses of people who voluntarily entered the research based on +opportunity sampling. + +General information + +When asked about the motivation for mining Monero, two-thirds of the +respondents 67% (40 out of 60) think about Monero as an investment, +but also as a way to gain some profit from mining cryptocurrencies +62% (37 out of 60). +Although Monero is not considered to be more profitable to mine +by the majority in the dataset 77% (46 out of 60), almost half of the +miners 47% (28 out of 60) favor this cryptocurrency due to its mining +characteristics CPU minable and the fact that they directly help to +secure the network by mining 60% (36 out of 60). +Note that the reasons for mining Monero are biased by the way +the respondents in the dataset were selected. In general, there would +be a higher percentage of the cryptocurrency miners that care only for +the profitability rather than cryptocurrency features [68]. + +## 8.3 Mining setup question. + + +Gathering information about mining setups was designed as a multiple- +choice question where every choice was described in detail as illus- +trated in the Figure 8.3. + + +Even through dataset cleansing, from the final 60 respondents, 15 +of them chose both _Regular PC only_ and _Mining rig_ option. Therefore, +only 45 respondents are taken into account in this part. + +## 8.4 Mining types comparison. + +When asked about mining setup, the majority of the miners mine +on their PC 33% (15 out of 45) or also on mining rig 69% (31 out +of 45), but there is also a small portion of miners 18% (8 out of 45) +that use their employer’s hardware and electricity to run their mining +operation. On the other side, only two of the respondents mentioned +mining on a VPS instance and no one selected cloud mining or botnet +mining as their way to mine Monero. +## 8.5 Mining setup properties. + +97% (58 out of 60) of respondents shared their current hashrate with +median hashrate value being 4.4Kh/s. This hashrate represents a typ- +ical setup with 5 high-performance GPUs (AMD RX 480 8GB with +800-850h/s) or 7 high-performance CPUs (AMD Ryzen 7 1700 with +600-650h/s). +Majority of miners mine in their property 87% (52 out of 60) and +set up their mining rigs 93% (56 out of 60). The operating system is not +dominant nor on the Windows side 65% (39 out of 60) nor the Linux +part 55% (33 out of 60) described in the Figure 8.5. This is mainly +because of multiplatformity of mining software and availability of +guides for mining setups. + +## 8.6 Mining setup preferences. + +Miners generally tend to update their rigs 70% (42 out of 60) as well +as clean them 52% (31 out of 60) but refrain from additional infras- +tructure costs like buying a UPS 23% (14 out of 60) as shown in the +Figure 8.7. + +## 8.7 Mining software preference. + +The choice of mining software impacts mining profitability as well as +the number of shares that are donated to the developer (if any). +As described in the Chapter 7.2, most popular mining software +falls into open source with great moderation regarding code updates +from the crypto community in general. This follows results from the +dataset where XMR Stak project, that is the most active on Github, is +also the most preferred way to run the mining operation 78% (47 out +of 60 miners). + + +XMRig is used less 30% (18 out of 60), but more often in combination +with other mining software like previously mentioned XMR Stak. +From closed source miners, only MinerGate was mentioned 3% (2 +out of 60). A small portion of miners also solo mine 12% (7 out of 60) +using the official wallet software. +In general, miners in the dataset tend to mine in pools 83% (50 out +of 60), some of them try to combine mining approaches where the +primary way of obtaining the coins is by pool mining, but they also +try their luck with solo mining 13% (8 out of 60). True solo miner was +represented by only one specimen. + +Pool choice + +Pool choice itself has the biggest impact on the final payout for the +miner as described in the Chapter 7.1. This depends on the method of +reward distribution, total hashrate of the pool and minimal payout. +Note that often pools also have fees which are deducted from the +number of coins mined by the miner. +When asked about pool preferences, two larger mining pools +were often mentioned Monerooceanstream 23% (14 out of 60) and +nanopool.org 23% (14 out of 60). Important preference factors for +choosing pool were pool fees 87% (52 out of 60), pool security history +77% (46 out of 60), total hashrate 73% (44 out of 60) and minimal +payout 62%(37 out of 60). Least important are additional features to +the pool like mobile apps 23% (14 out of 60) or anti-botnet policy 35% +(21 out of 60). + +Windows platform + +Out of 60 miners in the dataset, 39 of them use Windows as their choice +of OS for mining. Regarding periodic updates, only a small part of +miners 26% (10 out of 39) tend to use Windows with its default update +settings (automatic restart of the OS to apply updates, unattended +driver updates). +Majority of Windows miners 59% (23 out of 39) tend to apply +updates after some time after their release and have remote access +enabled. There is also a part of miners in the dataset 28% (11 out of +39) that tend to “set up and forget” with Windows update completely +disabled. Setup preferences are shown in the Figure 8.8. + +## 8.8 Windows mining setup preferences. + +Linux platform + +While Linux is used by 33 out of 60 miners, the majority of them tend +to use Ubuntu 52% (17 out of 33) or Debian 33% (11 out of 33). The +specialized OS for mining - MineOS is used by six users, least use has +community derivate from RHEL, CentOS. +Although information about update frequency was not submitted +by all miners, many of them 42% (14 out of 33) manage updates +manually, with only a small portion of other miners 18% (6 out of 33) +having the process automated. +Remote management is represented mainly by SSH 67% (22 out of +33) followed by VNC 9% (3 out of 33) and TeamViewer 9% (3 out of +33). Automation tools are used only by 13 miners from the dataset. + +Demographics + +Survey participants were mainly males 83% (50 out of 60), females +3% (2 out of 60) represented only a small portion of the dataset and +some of the participants did not disclose their gender 13% (8 out of +60). Most respondents in the dataset were from the age groups 25-34 +55% (33 out of 60) followed by 35-44 age group 20% (12 out of 60) as +well as 18-24 18% (11 out of 60). \ No newline at end of file diff --git a/docs/_posts/2019-05-08-Designing-Secure-Mining-Environment.md b/docs/_posts/2019-05-08-Designing-Secure-Mining-Environment.md new file mode 100644 index 0000000..1e6a511 --- /dev/null +++ b/docs/_posts/2019-05-08-Designing-Secure-Mining-Environment.md @@ -0,0 +1,527 @@ +--- +layout: post +title: Designing Secure Mining Environment +subtitle: Miners and Mining Operations +tags: [mining,xmr-stak,monero] +gh-badge: [star, fork, follow] +--- + +The goal of this Chapter is to design and develop secure and reason- +ably easy way how to set up and run mining operations on any scale. +Inspired by both results from the Monero Miners Research as well as +industry standards of large scale IT operations, the main emphasis is +placed on the automation and security aspect of the whole system. +Repository containing all the code from this Chapter is publicly +available in the GitHub repository mentioned in the Appendix Figure +A. Video showing the implementation of the system can be found in +the Section 9.5. + +### 9.1 Automation + +Automation is a key aspect for designing and running IT operations +that are secure, up-to-date, scalable and easy to maintain. To do that, +the proposed mining node provisioning scheme is divided into two +parts, first being OS installation with early configuration and second +is the automated configuration of provisioned nodes using Ansible. +Workflow is described in the Figure 9.1. + +## 9.1 Deployment nodes workflow. + +### 9.2 Ansible introduction + + +Ansible is an IT automation engine that in this case is used for config- +uration and application management of local mining nodes [69]. +Playbook is a YAML formatted file that provides the declaration of +hosts and plays that are executed when running the playbook. +Hosts file declares connection information about hosts, e.g., IP and +login credentials. + +**ansible-playbook -i hosts xmr01.yml** is a CLI command that exe- +cutesxmr01.ymlplaybook file and takes connection information about +hosts and groups involved from thehostsfile. + +### 9.3 Linux-based solution + +**9.3.1 Kickstart installation media** + +To easily scale the mining operation, every bit of the software provi- +sioning has to be automated. This part describes a process of creating +automated CentOS 7 or RHEL 7 installation media with minimal pack- +age installation without GUI. + +The first step is to obtain installation media at https://www.ce +ntos.org/download/. After downloading the Minimal ISO version, +extract the iso file into a separate folder. From there navigate to the +isolinuxfolder and editisolinux.cfgconfiguration file. +For reference,CentOS-7-x8664-Minimal-1804.isowas used in +the following steps. + +Isolinux.cfg file + +Four changes are needed to get the installation process working: + +- timeoutproperty changed from 600 to 50 (seconds * 10). +- Change the boot menu to go straight for the install. +- Edit paths for the custom ISO image. +- Add kickstart file entry. +
+<@\textcolor{blue}{timeout 50}@>
+# only relevant part of the file is displayed
+label linux
+menu_label ^Install CentOS 7
+<@\textcolor{blue}{menu_default}@>
+kernel vmlinuz
+append initrd=initrd.img <@\textcolor{blue}{inst.ks=hd:LABEL=CENTOS:/
+ks/ks.cfg inst.stage2=hd:LABEL=CENTOS}@> quiet
+
+ +## 9.2 Customised installator entry. + +The kickstart file is a single file that contains all OS installation param- +eters for RHEL based operating systems [70]. This installation method +enables automated provisioning of machines without the need for +the administrator input. When the file is presented to the installer, it +reads the required parameters resulting in the unattended installation +process [71]. + +The created kickstart file for CentOS 7 mining installation media +is available in the Appendix Figure F.1. + +**9.3.3 Generating ISO** + +The specific process of packaging extracted CentOS installation media +back into the iso file varies by the used operating system. In both +mentioned scenarios, few specific parameters have to be set: + +- Boot image file/isolinux/isolinux.bin +- Updated boot information table +- Volume label for ISO9660 and UDF set toCENTOS(depends on + the configuration that is set in theisolinux.cfgfile). + +Once files are prepared, packaging into the iso at Linux is done by +one-liner command: +mkisofs -o centos7.iso -b isolinux.bin -c boot.cat +-no-emul-boot -V CENTOS -boot-load-size 4 -boot-info-table +-R -J -v -T isolinux/. + +After installation from the ISO that was prepared with the kickstart file, +the target machine is accepting SSH connections under root account +using password-based authentification. Without proper configuration, +this would leave machine open to brute force attempts for the root +account. +Ansible uses following set of files to provision mining nodes with +software and configuration: +
+/
+xmr01.yml
+hosts
+ansible.cfg
+roles/
+ansible-sw-common-apps
+ansible-sw-firewalld
+ansible-sw-ntp
+ansible-sw-postfix
+ansible-sw-sshsec
+ansible-sw-xmrstak
+ansible-sys-hostname
+ansible-user-add
+ansible-yum-cron
+ansible-yum-update
+
+## 9.4 Ansible prepared roles. + +- Xmr01.ymlrepresents a playbook file that defines what group + of nodes will be provisioned together with the list of roles that +will be applied to them. +Hostsfile contains groups of hosts with information on how +Ansible can connect to them. +- Ansible.cfgwas used only in the testing environment where + host key checking was disabled. +- Rolesfolder contains roles that are applied when running the + playbook. + +To make Linux mining nodes updated and secure, following roles +were written: + +ansible-sw-common-apps + +The common baseline for all mining nodes that consists of the follow- +ing tasks: + +1. Ensure EPEL (Extra Packages for Enterprise Linux) repository + is configured or install it. +2. Install the following packages:htop, rsync, screen, tmux, + iftop, iotop, nano, git, wget, unzip, mc. + +ansible-sw-firewalld + +Installs and enables the firewalld service that has default policy for +connections set to thepublic networkand accepts incoming connec- +tions only for SSH service. + +ansible-sw-ntp + +To report correct information through the web interface of the mining +software, the target machine has to be in sync with NTP servers to do +that role establishes the following: + +1. Packagentpdateinstalled from the CentOS repository. +2. Ensures correct timezone usingtimedatectlinterface. +3. Creates daily cronjob for synchronization of system time. + +ansible-sw-postfix + +Sets up email gateway for correct email delivery together with internal +mail aliases mapped to a single outbound address. Email gateway can +deliver email on its own to the recipient’s server or can also act as a +relay to Gmail account that is used for sending out emails. + +Using Gmail account is preferred as this solution is an Internet +Service Provider (ISP) agnostic (blocked SMTP and SSMTP commu- +nication for outbound connections at the ISP level would be a problem +for the gateway mode). + +Separate Gmail account for sending out email alerts is recom- +mended as Postfix has login credentials saved in/etc/postfix/sasl +passwdfile in plaintext [70]. This can be made more secure if the +credentials file has appropriate permissions, e.g., ownership set to +root, the group to wheel and chmod changed to 0600. + +ansible-sw-sshsec + +Takes care about incoming SSH connections in case somebody wants +to try brute force attack on the mining machine. After a predefined +amount of failed login attempts, the incoming IP address is put into +"jail". + +Under the hood, fail2ban monitors sshd log for incoming failed +attempts and after certain threshold creates a firewalld rule to block +the IP for a predefined amount of time. The default setting for this +rule is relatively strict, 3 failed attempts in 10-hour window result in a +10-hour ban for incoming connections from the IP address. +This role is a fork ofansible-role-fail2banthat is available at +https://github.com/resmo/ansible-role-fail2ban. + + +ansible-sw-xmrstak + +Installs software collectionscentos-release-sclpackage for CentOS +together withcmake3, devtoolset-4-gcc*, hwloc-devel, make, +libmicrohttpd-devel, openssl-develpackages used for compiling +XMR-Stak from source code. + +After that, the folder structure inside the non-privileged user ac- +count is created, and XMR-Stak repository is cloned into the user di- +rectory. With appropriate permissions set, cmake compiles the source +code with following flags:cmake3 .. -DCPUENABLE=ON -DCUDA ENABLE= +OFF -DOpen CLENABLE=OFFresulting in CPU only miner for CentOS +[72]. + +If the mining node would use GPU, appropriate drivers from AMD +or Nvidia website are a prior requirement for running the miner. As +GPU feature is only a flag, it can be enabled on demand in the play- +book file as cmake3 flags are set as variables in the tasks file of the +ansible-sw-xmrstakrole in the Jinja2 format: +cmake3 .. -DCPUENABLE={{ DCPUENABLE }} -DCUDA ENABLE={{ +DCUDAENABLE }} -DOpenCLENABLE={{ DOpenCLENABLE }} +As next step, role copies over to the node CPU, pool and miner +configuration and creates a crontab entry for automatic miner start. +For the final touch, HugePages are set tovm.nrhugepages=128in/ +etc/sysctl.conffor CPU mining memory allocation, and sysctl is +reloaded. + +ansible-sys-hostname +Changes system hostname to inventory hostname set inhostsfile +usinghostnamectlAnsible module. + +ansible-user-add +User-add-roleis used for creating the mining user that is not within +the wheel group (unprivileged user). + +ansible-yum-cron +Installs and configures automatic security updates for CentOS that +are daily checked against the online repository. If packages marked +for security update are found, email notification to root is sent [73]. + +ansible-yum-update +All packages including kernel are updated so that mining node is ready +to use and won’t send update notification on the next day (unless there +are new updates in the meantime). + +Additional notes +Roles are installed in the order specified in thexmr01.ymlfile as sys- +tem update is done as first to prevent any problems with XMR-Stak +compilation. +Using root account login on SSH is not recommended as the proper +way would be to disable root login in/etc/sshdconfigand login to +SSH using created non-privileged user account (ideally using ssh-key +based authentification). +Later if the user needs to login as user, this can be done bysu root +command. To minimize the chance of success brute force attack of the +root account using SSH, fail2ban is set to strict mode. Although this is +not the most secure way to access the system, with above settings this +acts as a middle ground between security and usability of the mining +operation. + +### 9.4 Windows-based solution + +9.4.1 Installation media +For Windows scenario, Windows 10 image from autumn 2018 was +used. As installation is intended to run unattended, custom media has +to be created. + +There are many ways how to provision changes to original Win- +dows media, most straightforward is generating anautounattend.xml +file that covers all installation steps for Windows 10 installer. +This process of Windows image customization can be done using +Windows Assessment and Deployment Kit (Windows ADK) as it +includes Windows System Image Manager (Windows SIM) that is +an authoring tool forautounattend.xmlfiles. Using Windows ADK, +more complex Windows deployment can be achieved as the adminis- +trator can bundle applications and drivers in the image [74]. +For this guide, generatingautounattend.xmlfile is based on on- +line autounattend generator tool located atwindowsafg.com. After +generating the file, a block of commands that is executed after the first +logon was added. + +
+
+powershell−Command Set−ItemProperty−Path
+HKLM:\SOFTWARE\Wow6432Node\Microsoft\ .NetFramework\v4.0.30319
+−Name SchUseStrongCrypto−Value 1−Type DWord
+Set PowerShell ExecutionPolicy
+42
+true
+
+
+## 9.5 .NetFramework adjustments in the Autounattend file. + + +For example, .NetFramework in Windows 10 doesn’t have strong +cryptography enabled for all .Net applications. Due to this, in the +default state, Powershell can’t be used for downloading updated code +that is required for setting up the environment for Ansible. To fix that, +one of the commands after the first logon is dedicated to this issue as +shown in the Figure 9.5. + +After finishing the installation process and provisioning the Win- +dows environment withincluded in the unat- +tended file, Ansible can connect to the Windows machine and set up +thing properly. + +Note that installer opens RDP, WinRM, temporarily disables Win- +dows Firewall (which will be properly configured by Ansible later) +and sets up self-signed WinRM HTTPS certificate using Ansible Power- +shell fileConfigureRemotingForAnsible.ps1[75]. Mining node has +to be connected to the network to download all required files properly. + +9.4.2 Ansible at Windows + +Before applying roles in Ansible for Windows, unlike in Ansible with +Linux machines, environment for both Windows and Linux controller +has to be prepared [76]. +**Windows** needs to have WinRM setup. This is already done as it +was part of the installation process where Ansible Powershell script +set up HTTPS WinRM environment [77]. +**Linux** doesn’t have Ansible modules for Windows in default An- +sible install. Those can be installed using the package manager, e.g.: + +- Ubuntu: + **-** Python 2: apt-get install python-winrm + **-** Python 3: apt-get install python3-winrm +- CentOS: + **-** With EPEL enabled: yum install python2-winrm +- Or using PIP: + **-** pip install pywinrm + + +9.4.3 Ansible roles + +Once Ansible is ready to launchxmratwin.ymlplaybook, the following +roles are played: + + +9. Designing Secure Mining Environment +
+/
+xmratwin.yml
+hosts
+ansible.cfg
+roles/
+ansible-win-sec
+ansible-win-updates
+ansible-win-xmrstak
+
+## 9.6 Ansible roles for Windows. + + +ansible-win-sec + +Sets up firewall rules for RDP, WinRM and XMR-Stak web interface, +enables Windows firewall for all zones. + +ansible-win-updates + +Windows update policy is set to download and notify for install as +Windows updates are managed by this Ansible role. +The administrator can configure which updates category will be in- +cluded in the updates, in default role install updates fromSecurityUpdates +andCriticalUpdatescategory [77]. This can be changed using vari- +ableUpdateEverythingin the playbook. + + +ansible-win-xmrstak + +Downloads latest release of XMR-Stak from developers GitHub page, +configures mining software and downloads required libraries from +Microsoft site. It also creates scheduled task under the mining user +to run with elevated permissions after login so that UAC can be kept +enabled and the miner is running without UAC prompts. +Also adds the exception in Windows Defender to ignore Desktop +folder as a binary XMR-Stak file is considered as a malicious file for +being a mining software. + + +9. Designing Secure Mining Environment + +### 9.5 Automated installation process + +In order to show automated installation process for both Windows +and Linux miners, both installation processes were recorded using +HDMI capture card and Open Broadcaster Software (OBS). Timeline +detailing installation process is available in the Figures 9.7 and 9.9. +Video is available athttps://github.com/Ownercz/ssme-thesi +s/blob/master/video.md. + +
+00:20 ······• Start of unattended Windows installation using the
+autounattend file.
+05:35 ······• Install part complete, OS first boot.
+```
+```
+11:07 ······• Windows 10 installation complete.
+```
+```
+11:15 ······• Running Ansible playbook on the Windows machine.
+```
+```
+13:38 ······• Ansible completes miner deployment and reboots
+the machine.
+```
+#### 15:17 ······•
+
+```
+Ansible sets up firewall, Windows environment and
+reboots the machine. Miner is already running
+because of scheduled task after reboot.
+```
+```
+17:18 ······• Ansible updates the OS using Windows update
+module.
+```
+```
+55:24 ······•
+Ansible reboots the machine to complete the
+updates.
+```
+#### 57:25 ······•
+
+```
+Ansible completes the playbook and mining machine
+is ready.
+```
+
+## 9.7 Automated deployment of Windows mining machine. + + +## 9.8 Windows miner deployment. + +Both installations were done using USB drive as installation source. +Hardware specifications of the installation computer were CPU Intel +i5 4460, 24GB of DDR3 RAM and target installation drive was 60GB +Intel 330 SATA SSD. +
+#### 00:46 ······•
+
+```
+Start of unattended Linux CentOS 7 installation
+using the kickstart file.
+```
+```
+05:06 ······• Install part complete, OS first boot.
+```
+```
+05:06 ······• Running Ansible playbook on the Linux machine.
+```
+#### 11:29 ······•
+
+```
+Ansible completes the playbook and mining machine
+is ready.
+```
+
+## 9.9 Automated deployment of Linux mining machine. + + +## 10 Conclusion + +Monero cryptocurrency is a large and active project that offers a wide +range of applications for both users and miners. For its open-source +nature, everyone can build their own wallet software, miner or even +a website that provides wallet and key management. Because of this, +many good, but also potentially malicious applications are released to +the public. + +The goal of this thesis is to map usage habits of Monero cryptocur- +rency users and miners from both technological as well as security +view. Another goal is to create a detailed user guideline for user- +friendly and secure usage of the Monero cryptocurrency including +key management and backup strategy. For miners, the goal is to im- +plement an automated deployment of mining rigs using one of the +popular configuration management tools. + +To address this issue, the thesis provides a detailed overview of +Monero environment, comparison of wallet client software and ex- +changes, comparison of mining software and list of malicious events +and software connected with Monero cryptocurrency. + +For a deeper investigation of the listed issues, I have conducted +surveys aimed at Monero users and miners. With 173 (113 in users +and 60 in miners survey) respondents in total, this provides a real +Monero users sample upon which two guidelines were proposed. + +Results of Monero User Research follow the way how participants +were selected (by self-selection) as well as the sites they came from +(Reddit, Facebook cryptocurrency groups). That meant that the ma- +jority of users said they prefer Linux OS with official wallet software +and also that they tend to use open-source more than closed-source +software. Only a few of them used closed-source apps or website por- +tals that can be labeled as dangerous for the user. Contrary to popular +belief, respondents revealed that they use Monero for darknet markets +only in 18% (20 out of 113), in case of drugs in 10% (11 out of 113) +and for other illegal use cases in 5% (6 out of 113). + +Based on the results of the research, I formulated Monero usage +and storage best practices part of the thesis, which gives users detailed +steps on how to work with the Monero cryptocurrency. + +Monero Miners Research revealed that both Windows and Linux +mining operations are set up using manual deployment and updates +are usually disabled or delayed. Mining software was in almost all +cases open-source with XMR Stak being used the most. + +Based on the results from the Monero Miners Research, I imple- +mented an automated deployment system for both major platforms +using unattended/kickstart installation media and Ansible. By using +application deployment and configuration management tool like An- +sible, miners can deploy large mining operations with correct security +settings that are both secure and easy to maintain. + +As for the future work on this topic, it would be appropriate +to extend current research to include other cryptocurrencies (Dash, +Ethereum or Bitcoin) as well as the deployment of their miners. +To make results from this thesis more open to the public, every- +thing is published under the GitHub repository and GitHub pages +website. Website links are available in the Appendix Figure A. +