|
Donations |
|
|
|
|
|
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
|
|
|
Survey |
|
|
|
|
|
|
|
|
Translate |
|
|
|
|
|
|
|
|
|
|
View previous topic :: View next topic |
Author |
Message |
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Mon May 24, 2004 6:58 pm Post subject: Akamai -current DDoS attack? -affects Symantec/TrendMicro |
|
|
FYI...from the Internet Storm Center:
- http://isc.sans.org/diary.php?date=2004-05-23
Updated May 24th 2004 15:21 UTC
"It appears that websites that use Akamai's distribution system are currently not reachable. Security related web sites effected are symantec.com and trendmicro.com. Virus updates may fail as a result. Further details are currently not available and updates will be posted here as they become available...According to a post to NANOG, the outage may be the result of a DDOS attack. At this point, Akamai has no ETA for a resolution..."
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Mon May 24, 2004 8:24 pm Post subject: |
|
|
FYI...
- http://isc.sans.org/diary.php?date=2004-05-23
"...Akamai posted this statement: "Due to a peering problem between ATT and UUNet, a subset of UUNet users may have experienced problems accessing Akamai delivered sites between 8-10pm EDT on Saturday May 22, 2004. The problem has been fully resolved..."
(...so they say, but intermittent problems accessing www.sarc.com and www.trendmicro.com appear to remain...)
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Tue May 25, 2004 7:27 am Post subject: |
|
|
FYI...from the Internet Storm Center:
Akamai Problems...
- http://isc.sans.org/diary.php?date=2004-05-24
Updated May 25th 2004 03:17 UTC
"Akamai, the largest of the large scale content delivery services was not delivering content earlier today. According to a post from Akamai: "An isolated issue occurred this morning (roughly during the period of 8:00 a.m. - 9:30 a.m. ET), where multiple Akamai customers experienced intermittent performance and availability degradation. This degradation was the result of a bug within one of Akamai’s backend content control management tools, which allows the expiration of content on the Akamai network. The degradation was not a result of any outside interference with Akamai’s network (such as Denial of Service or hacking). Upon identification of the bug, Akamai quickly took corrective action which returned customers to normal service levels. Akamai is currently putting measures in place to return the content management tool to its normal working order and is adding safeguards such that the issue will not occur in the future. In the meantime, Akamai customers are able to serve their content through the Akamai Network normally."
So, although it sounds like the rollout of a new version of an internal tool caused them to essentially DoS themselves, things seem to be all better now..."
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Tue May 25, 2004 7:35 pm Post subject: |
|
|
FYI...
- http://www.computerworld.com/printthis/...27,00.html
MAY 25, 2004
"...The tool in question allows Akamai customers to specify how long Web site content hosted on Akamai's global server network should remain before being updated. Once Akamai staff determined the cause of the problem, they disabled that tool and the performance of the customer sites returned to normal. Akamai declined to comment on how many servers or customers were affected, citing company policy not to name customers, Young said. The company is working to restore the content management tool to service and is putting measures in place to prevent future outages."
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
jvmorris
Security Expert
Joined: Dec 10, 2002
Posts: 152
Location: USA
|
Posted: Wed May 26, 2004 4:48 pm Post subject: |
|
|
I know you've been following this Akamai problem rather closely and keeping us informed of its progress and I appreciate that.
I'm now beginning to wonder if the occurrence of this problem and then the propagation of a fix may not have had serious, inconsistent consequences for NIS/NPF 2002 users looking for LiveUpdates to correct a problem associated with the 12 May LiveUpdate.
Specifically, have you run across anything that identifies when this problem first surfaced? Next question: Any information you've run across on the progress of the Akamai fix? We've got some NIS/NPF 2002 users who are apparently finding fixes for the 12 May glitch and others who are finding absolutely nothing. To me, that suggests that some of the Akamai servers (possibly up until sometime on 25 May) had not yet had the revised Liveupdate propagated to them.
Thanks for any enlightenment you can shed on this issue.
_________________
Regards,
Joseph V. Morris
'The man who was not there" |
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Wed May 26, 2004 5:53 pm Post subject: |
|
|
Way too much "Marketing" and "Company Policy" involved, which gets in the way of the facts, apparently.
However, I did get my NAV LiveUpdate for 5/26/2004 about an hour ago OK.
EDIT/ADD: An occasional "look-see" here might be helpful -> http://www.internetpulse.com/
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
.
Last edited by AplusWebMaster on Wed May 26, 2004 6:07 pm, edited 1 time in total |
|
Back to top |
|
|
jvmorris
Security Expert
Joined: Dec 10, 2002
Posts: 152
Location: USA
|
Posted: Wed May 26, 2004 6:04 pm Post subject: |
|
|
Danke, here's why I was asking.
This involves the NIS/NPF 2002 fiasco, based on various inputs. Different individuals have different versions of this file (but 'new' ones now seem to be appearing -- only people are getting skittish).
Quote: |
sonofjay on dsl:
##BEFORE RESTORE -- did not work
SymFW.sys
5.3.1.55
C:\WINDOWS\system32\drivers
162 KB (166,048 bytes)
Sunday, May 23, 2004, 2:23:10 PM
Tuesday, May 18, 2004, 1:01:28 AM
troy mcclure on computer cops: --- ??? (DDOS again, can't check current situation)
SYMFW.SYS
Size: 165,984
Size on disk: 167,936
Created: Thursday, April 29 2004, 21:26:52
Modified: Thursday, April 29 2004, 21:26:52
File Version: 5.3.1.53
Lurkers Anonymous (e-mail) -- Win XP UK -- does work
5.3.1.54
C:\WINDOWS\system32\drivers
162 KB (165,984 bytes)
created 13 May 2004, 21:25:10
13 May 2004, 21:25:10
Amazingly, the File/Build Versions are consistent with the date modified information! |
_________________
Regards,
Joseph V. Morris
'The man who was not there"
|
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Wed May 26, 2004 6:16 pm Post subject: |
|
|
Possibly related to this?
- http://www.sarc.com/avcenter/security/C...05.12.html
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
jvmorris
Security Expert
Joined: Dec 10, 2002
Posts: 152
Location: USA
|
Posted: Wed May 26, 2004 6:37 pm Post subject: |
|
|
AplusWebMaster wrote: |
Possibly related to this?
- http://www.sarc.com/avcenter/security/C...05.12.html
|
Yep, that's where the whole thing started. The Symantec patch apparently worked for NIS/NPF 2003/2004 users, but totally ruined the NIS/NPF 2002 users who you will note were also vulnerable.
For the most part, those NIS/NPF 2002 users who have not simply given up in disgust and changed to another software firewall have now 'rolled back' to the pre-12 May situation -- if they could. For some inexplicable reason, some of them have found that some of the above three releases work for them.
_________________
Regards,
Joseph V. Morris
'The man who was not there"
|
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Wed May 26, 2004 7:46 pm Post subject: |
|
|
Where have you gone, Peter Norton? With Joe DiMaggio?
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
jvmorris
Security Expert
Joined: Dec 10, 2002
Posts: 152
Location: USA
|
Posted: Wed May 26, 2004 7:51 pm Post subject: |
|
|
AplusWebMaster wrote: |
Peter Norton, where are you? |
Rumor has it that he took the last train to the Coast, . . . the day the music died (with apologies to Don McLean).
_________________
Regards,
Joseph V. Morris
'The man who was not there"
|
|
Back to top |
|
|
AplusWebMaster
Sergeant
Joined: Mar 14, 2004
Posts: 124
Location: USA
|
Posted: Wed May 26, 2004 10:57 pm Post subject: |
|
|
FYI...(a bit off the original topic, but related to the Norton/Symantec category):
- http://isc.sans.org/diary.php?date=2004-05-26
Updated May 27th 2004 02:06 UTC
"...Unconfirmed report that Norton Internet Security 4.0 2002, 2003 & 2004 for Windows has added a new feature which pre-scans the inline html images prior to writing the images to the temp directory and displaying them in the web-browser. This effort is to try to identify web borne worms and viruses. The unfortunate side effect is that pages load incredibly slowly. The report stated that Verizon's page took over 3 minutes to load with the scanner and under 3 seconds without it. This could result in users disabling their firewalls which is not a good thing."
_________________
AplusWebMaster ~ www.apluswebmaster.net
Are you up to date or vulnerable to Hackers?
. |
|
Back to top |
|
|
|
|
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum
|
Powered by phpBB 2.0.8a © 2001 phpBB Group
Version 2.0.6 of PHP-Nuke Port by Tom Nitzschner © 2002 www.toms-home.com
Version 2.2 by Paul Laudanski © 2003-2004 Computer Cops
|