Hi,
We're experiencing widespread network problems, including a DDoS and
also a possible hardware failure on barbar, all at the same time.
I am investigating and will let you know more as soon as I can.
Apologies for the disruption.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting
Hi,
A large number of DNS "recovery" alerts were just sent out for
domains hosted on c.authns.bitfolk.com. Apologies, they were sent in
error.
The hosting provider for c.authns was doing some work last night so
I disabled alerts. Unfortunately I disabled them while the host was
offline and Nagios didn't check again until I re-enabled them just now,
which resulted in a flood of "recovery" alerts. In reality the host
was only down for a short time.
Sorry for any confusion this may have caused.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting
Hi,
For around the last hour there have been intermittent periods of
high packet loss. I'm working with our transit provider on this at
the moment and will give you more information when I have it.
Apologies for the disruption.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting
Hello,
It's been a while since I last posted a reminder about protecting
against SSH dictionary attacks.
http://lists.bitfolk.com/lurker/message/20100314.085112.f5be7da9.en.html
The problem of course has not gone away and since then there have
been many more compromises that could have been easily avoided.
So, please, if you are running sshd on port 22 and allowing password
authentication, please consider taking some steps to protect
yourself. It can very easily happen to you, and aside from the
damage it can cause to other hosts on the Internet it risks
significant downtime for your own services.
I wrote up some more info from previous discussions:
https://tools.bitfolk.com/wiki/Protecting_against_SSH_dictionary_attacks
If you have further input please do feel free to add to the above
wiki article.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting
Hi,
As you may be aware a major security problem was recently found in PHP when
run in CGI mode. A customer has recently had their VPS compromised
and has discovered probes for this vulnerability as described here:
http://blog.sucuri.net/2012/05/php-cgi-vulnerability-exploited-in-the-wild.…
So, if you are running PHP in CGI mode you absolutely must secure it
against this.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting