Canonical/Ubuntu have been under DDoS for more than 15h
44 points by jtlebigot 3 hours ago | 9 comments
TonyTrapp 10 minutes ago
While the timing with the copy.fail patches mentioned by a few comments here seems suspicious indeed, I have seen this repeating over the last few weeks: packages.ubuntu.com was hardly reachable on some days, causing apt-get to take forever to update the system. They have been struggling hard recently, it seems.
Best of luck to the people having to deal with this mess on a holiday!
replyFaaak 2 hours ago
Tinfoil hat mode: a competitor wants to exploit copy.fail on some ubuntu servers, and is DDoSing canonical so that they can't update and thus patch the vuln
replyyallpendantools 15 minutes ago
Double tinfoil hat mode: an attacker learned of my plan to finally update my personal computer out of 20.04 today and is DDoSing canonical so I can't do that and I remain vulnerable to the backdoors they've found.
replyThe plot thickens...
bouncycastle 2 hours ago
Seems reasonable to assume it's something to do with the recently publicized exploits. More likely, this could be an extortion attempt by criminals rather than a competitor.
replycorvad 37 minutes ago
This seems to be pretty targeted, and with the services affected like livepatch and such this could indeed be an actor DDoSing to avoid patches rolling out for copy.fail
replyWxc2jjJmST9XWWL 57 minutes ago
Noticed it because snap didn't work, snap has its own status page just fyi: https://status.snapcraft.io/
replyForHackernews 27 minutes ago
Frustrating because the Slack snap is broken so every day you have to downgrade it and I guess you can't without connectivity.
replyThis might be the incentive I need to finally purge snap.
someperson 40 minutes ago
I like to imagine it's returning a 500 error response asking you to email rhonda@ubuntu.com
reply