Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
dch :flantifa: :flan_hacker: boosted
Christian :vbike:
Christian :vbike:
@christian@einbeck.social  ·  activity timestamp 2 weeks ago

TIL: If permissions of a pam.d file does not allow reading for a program it's ignored and any unix account is accepted. No logging about that whatsoever. Insane!

#linux #ops #sysops

  • Copy link
  • Flag this post
  • Block
Christian :vbike:
Christian :vbike:
@christian@einbeck.social  ·  activity timestamp 2 weeks ago

TIL: If permissions of a pam.d file does not allow reading for a program it's ignored and any unix account is accepted. No logging about that whatsoever. Insane!

#linux #ops #sysops

  • Copy link
  • Flag this post
  • Block
Roni Rolle Laukkarinen
Roni Rolle Laukkarinen
@rolle@mementomori.social  ·  activity timestamp 2 weeks ago

As our company hosts servers, we have a public Security Policy and a security.txt file for ethical hackers to disclose vulnerabilities responsibly: https://handbook.dude.fi/security-policy

Because of this, I receive quite a few reports, most of them ineligible. I've also run into some "security experts" getting upset about not receiving a bounty for a non-issue or putting heavy pressure on payments for valid ones. It often feels unfair, like I'm being held hostage.

That's why replies like the one I just received warm my heart so much:

"Thank you very much for the clarification and for taking quick action to remove the DNS record. I appreciate the transparency and the kind offer as well.

I'd prefer to donate the amount to a child support charity instead. You’re very welcome to donate it on my behalf to any such organization of your choice."

Donation made. Thank you, stranger. Kindness costs nothing.

#Security #SysOps #SysAdmin #SecOps

  • Copy link
  • Flag this post
  • Block
nullagent boosted
Roni Rolle Laukkarinen
Roni Rolle Laukkarinen
@rolle@mementomori.social  ·  activity timestamp 2 months ago

What a great and transparent analysis of the outage. No excuses, honest admission of mistakes, and even shared an internal chat. Many large corporations could learn from this.

https://blog.cloudflare.com/18-november-2025-outage/

#Cloudflare #CloudflareDown #CloudflareOutage #Outage #SysOps #Servers

The Cloudflare Blog

Cloudflare outage on November 18, 2025

Cloudflare suffered a service outage on November 18, 2025. The outage was triggered by a bug in generation logic for a Bot Management feature file causing many Cloudflare services to be affected.
  • Copy link
  • Flag this post
  • Block
Roni Rolle Laukkarinen
Roni Rolle Laukkarinen
@rolle@mementomori.social  ·  activity timestamp 2 months ago

What a great and transparent analysis of the outage. No excuses, honest admission of mistakes, and even shared an internal chat. Many large corporations could learn from this.

https://blog.cloudflare.com/18-november-2025-outage/

#Cloudflare #CloudflareDown #CloudflareOutage #Outage #SysOps #Servers

The Cloudflare Blog

Cloudflare outage on November 18, 2025

Cloudflare suffered a service outage on November 18, 2025. The outage was triggered by a bug in generation logic for a Bot Management feature file causing many Cloudflare services to be affected.
  • Copy link
  • Flag this post
  • Block
Roni Rolle Laukkarinen
Roni Rolle Laukkarinen
@rolle@mementomori.social  ·  activity timestamp 3 months ago

How does a typical DDoS on a WordPress installation happen?

- A search-based DDoS attack by bypassing the cache
- Attacker sends a large volume of unique search queries so responses never hit the cache example ?s=something-xyz
- Each request becomes a cache miss, forwarded from network edge
- WordPress runs PHP + WP_Query for every request often triggering expensive database work.
- Repeated heavy queries exhaust CPU, memory and DB capacity so the website slows and eventually crashes.
- This is an Application-layer (Layer 7) HTTP flood that mimics normal user traffic.
- Key signals to look out for: huge spikes of /?s= requests in the logs, very high query entropy, cache-hit rate collapses.

Cache-busting search queries force every request through the database, turning cheap HTTP calls into expensive backend load.

Great Sysops lightning talk by Tiia Ohtokallio!

#WPSuomi #wpfi #WordPress #Sysops

A slide and press the presentation in WP Suomi seminar. Slide text: How does a typical DDoS on a WordPress installation happen?

- A search-based DDoS attack by bypassing the cache
- Attacker sends a large volume of unique search queries so responses never hit the cache example ?s=something-xyz
- Each request becomes a cache miss, forwarded from network edge
- WordPress runs PHP + WP_Query for every request often triggering expensive database work.
- Repeated heavy queries exhaust CPU, memory and DB capacity so the website slows and eventually crashes.
- This is an Application-layer (Layer 7) HTTP flood that mimics normal user traffic.
- Key signals to look out for: huge spikes of /?s= requests in the logs, very high query entropy, cache-hit rate collapses.

Cache-busting search queries force every request through the database, turning cheap HTTP calls into expensive backend load.
A slide and press the presentation in WP Suomi seminar. Slide text: How does a typical DDoS on a WordPress installation happen? - A search-based DDoS attack by bypassing the cache - Attacker sends a large volume of unique search queries so responses never hit the cache example ?s=something-xyz - Each request becomes a cache miss, forwarded from network edge - WordPress runs PHP + WP_Query for every request often triggering expensive database work. - Repeated heavy queries exhaust CPU, memory and DB capacity so the website slows and eventually crashes. - This is an Application-layer (Layer 7) HTTP flood that mimics normal user traffic. - Key signals to look out for: huge spikes of /?s= requests in the logs, very high query entropy, cache-hit rate collapses. Cache-busting search queries force every request through the database, turning cheap HTTP calls into expensive backend load.
A slide and press the presentation in WP Suomi seminar. Slide text: How does a typical DDoS on a WordPress installation happen? - A search-based DDoS attack by bypassing the cache - Attacker sends a large volume of unique search queries so responses never hit the cache example ?s=something-xyz - Each request becomes a cache miss, forwarded from network edge - WordPress runs PHP + WP_Query for every request often triggering expensive database work. - Repeated heavy queries exhaust CPU, memory and DB capacity so the website slows and eventually crashes. - This is an Application-layer (Layer 7) HTTP flood that mimics normal user traffic. - Key signals to look out for: huge spikes of /?s= requests in the logs, very high query entropy, cache-hit rate collapses. Cache-busting search queries force every request through the database, turning cheap HTTP calls into expensive backend load.
  • Copy link
  • Flag this post
  • Block
Roni Rolle Laukkarinen
Roni Rolle Laukkarinen
@rolle@mementomori.social  ·  activity timestamp 6 months ago

Does anyone know what could cause the error "HTTP/2 stream 1 was not closed cleanly: INTERNAL_ERROR (err 2)" or "Stream error in the HTTP/2 framing layer" when using cURL and monitoring? In the browser, this shows up as a blank page or an HTTPS error.

I'm running Nginx and PHP-FPM with FastCGI cache. This issue is new to me, and I have no idea how to fix it. Disabling FastCGI cache completely resolves the problem, which does not solve the underlying cause and of course leads to page not having a caching mechanism like this.

#SysOps#Webserver#Servers

  • Copy link
  • Flag this post
  • Block
alcinnz boosted
François
François
@fkooman@floss.social  ·  activity timestamp 6 months ago

The systemd project was and is a huge leap forward for Linux. I can't imagine doing sysops without it.

https://blog.tjll.net/the-systemd-revolution-has-been-a-success/

Update: suspected "AI" usage for the images in the post, in case you want to avoid this.

#systemd #Linux #sysops

  • Copy link
  • Flag this post
  • Block
François
François
@fkooman@floss.social  ·  activity timestamp 6 months ago

The systemd project was and is a huge leap forward for Linux. I can't imagine doing sysops without it.

https://blog.tjll.net/the-systemd-revolution-has-been-a-success/

Update: suspected "AI" usage for the images in the post, in case you want to avoid this.

#systemd #Linux #sysops

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct