Canonical/Ubuntu have been under DDoS for more than 15h (status.canonical.com)

51 points by jtlebigot 3 hours ago

TonyTrapp an hour ago

While the timing with the copy.fail patches mentioned by a few comments here seems suspicious indeed, I have seen this repeating over the last few weeks: packages.ubuntu.com was hardly reachable on some days, causing apt-get to take forever to update the system. They have been struggling hard recently, it seems. Best of luck to the people having to deal with this mess on a holiday!

corvad an hour ago

This seems to be pretty targeted, and with the services affected like livepatch and such this could indeed be an actor DDoSing to avoid patches rolling out for copy.fail

Faaak 2 hours ago

Tinfoil hat mode: a competitor wants to exploit copy.fail on some ubuntu servers, and is DDoSing canonical so that they can't update and thus patch the vuln

yallpendantools an hour ago

Double tinfoil hat mode: an attacker learned of my plan to finally update my personal computer out of 20.04 today and is DDoSing canonical so I can't do that and I remain vulnerable to the backdoors they've found.

The plot thickens...

bjackman 23 minutes ago

If you can access AF_ALG on a server you don't need to do shenanigans like that. It's much easier to just find another bug and exploit that one instead.

The copy.fail website is very silly, it is not a special bug. If anyone gets compromised by that vuln their node architecture was broken anyway, patching copy.fail doesn't help.

mustardo 10 minutes ago

I thought copy.fail is a privelage escalation exploit, become root from a regular user? Am I missing something?

How would "node architecture" make people vulnerable to this?

You have to have shell access to a victim first right? Or am I missing something?

kubb 2 hours ago

s/competitor/intelligence services/

touwer 24 minutes ago

why a competitor? Criminals, secret services, country adversaries...

bouncycastle 2 hours ago

Seems reasonable to assume it's something to do with the recently publicized exploits. More likely, this could be an extortion attempt by criminals rather than a competitor.

jollymonATX 26 minutes ago

We are so broken as society ddos'n ubuntu is now a thing.

Wxc2jjJmST9XWWL 2 hours ago

Noticed it because snap didn't work, snap has its own status page just fyi: https://status.snapcraft.io/

ForHackernews an hour ago

Frustrating because the Slack snap is broken so every day you have to downgrade it and I guess you can't without connectivity.

This might be the incentive I need to finally purge snap.

esseph 44 minutes ago

Just move to flatpak, much nicer to deal with

someperson an hour ago

I like to imagine it's returning a 500 error response asking you to email [email protected]