Let's Encrypt goes TITSUP
Let’s Encrypt suffered from a major service disruption today leaving users unable to access various services. The cause of the problem seems to have been an update to Boulder (ACME CA) which has since been reversed.
Let’s Encrypt suffered from a major service disruption today leaving users unable to access various services. The cause of the problem seems to have been an update to Boulder (ACME CA) which has since been reversed.
I regularly spend time investigating my server logs and occasionally come across a few special snowflakes. My onion (Tor) server hosted with a popular cloud provider was recently visited by a research scanner. The scanner initially greeted the server with a few standard GET requests:
In the last few days I’ve noticed a few unusual GET requests for supposedly exposed SSH private keys. All requests are following the same pattern:
This website recently celebrated its second year of Raspberry Pi based hosting. It’s currently running on a RPi3 with Slackware ARM 14.2 (32-bit soft float). Somewhat to my surprise, the second year went by without a single glitch.
My plan to install the latest Windows 10 Creators Update fell short during the weekend due to an error identified as 0xc1900200. I was using the “Windows 10 Update Assistant” to perform the upgrade, and the assistant did initially confirm that my system was ready for the upgrade.
Referrers from a domain called anonymizeme.pro have been filling up my logs lately. I initially believed it was visitors using an anonymizing service, but alas, it’s yet another referrer scam.
In a time-frame of just 10 seconds I got 1200 requests from the Jorgee vulnerability scanner, originating from 15 unique IP addresses. As usual it was just a blind attack probing a /24 subnet.
When you’ve been running GNU/Linux distributions for an adequate number of years, I do believe you’ll eventually find yourself walking the path to Mount Gentoo in hope of joining the ancient Greybeards. Many have met their demise on the road ahead, but armed with the Gentoo handbook we’re confident that it’s within our reach.