Various “news” sites have reported that EA, Nintendo and Sony have dropped their SOPA support, though they’ve never published a press release about it and they weren’t even on the official list of SOPA supporters, Techdirt explains what caused this error.
A security advisory was released yesterday detailing a denial-of-service vulnerability that most of the web could be affected by.
The vulnerability lies in the hashing algorithms used by a variety of programming languages (including Python, Ruby, PHP and Java). When collisions happens these algorithms will take up large amounts of CPU cycles to deal with them (From what I understand).
To give you an idea of the extent of this problem I’ll quote the PDF linked in the advisory, take for example PHP:
On an i7 core, the 60 seconds take a string of multi-collisions of about 500k. 30 seconds of CPU time can be generated using a string of about 300k. This means that an attacker needs about 70-100kbit/s to keep one i7 core constantly busy. An attacker with a Gigabit connection can keep about 10.000 i7 cores busy.
A typical POST size limit in Ruby frameworks is 2 MB, which takes about 6 hours of i7 CPU time to parse. Thus, an attacker with a single 850 bits/s line can keep one i7 core busy. The other way around, an attacker with a Gigabit connection can keep about 1.000.000 (one million!) i7 cores busy.
This allows someone to take down almost any webserver with (very) limited resources. Possible workarounds are: limiting CPU time, limiting the POST size, or limiting the maximum amount of POST variables.
I’m currently waiting for the first PoCs and exploits to be published and will post an update when I get my hands on one (Which will also confirm if I understand the exploit correctly).
Update: I can see how this will ruin your day
Update 2: Go here for an easy to understand explanation.
GoDaddy has seen a massive amount of domains being transferred away from them as customers are moving elsewhere because of their support for SOPA. Among the companies transferring are Wikipedia and the Cheezburger Network (Who own over 1000 domains). It all took off when a GoDaddy boycott was started on Reddit. Various other domain registrars are even offering discount codes for anyone transferring to them.
Just today (The 25th of December) the counter is standing on 28,656 domains transferred out as seen on DailyChanges, and the amount just keeps climbing, day after day more and more domains are being transferred away.
GoDaddy has now retracted their public support for SOPA but the damage has been done, not to forget that they helped write SOPA, not just support it. I have no idea how long this will keep going and how many people will move away but it’s gonna hurt (It’s already hurting actually). GoDaddy is even begging for people to stay.
I’m sure more companies will face the wrath of the public because of their SOPA support, and various companies are already retracting their support for it, some companies never even explicitly supported SOPA “they agreed with Floyd Abrams’ analysis of SOPA. That’s it. They didn’t say their firms supported SOPA”.
This tweet just went out from the @AnonymousIRC Twitter account (First occurance of the tweet I could find), a mirror of the defacement can be found on Zone-H. The Stratfor website is down as I write this.
Stratfor is a large private intelligence corporation having fortune 500 companies and international intelligence agencies as their clients (source). A full list of clients can be found here.
Edit: there’s also this:
Over 90,000 Credit cards from LEA, journalists, intelligence community and whitehats leaked and used for over a million dollars in donations
So one million dollars from compromised credit cards, from what I can understand of later tweets they only used corp execs credit cards, who wont feel it that hard in their pockets, but not sure if I’m very fond of this action.
I myself was unfortunately late to the party for the initial battle, this due to it starting at 6AM in the morning and me having to work, but here’s what I’ve been able to gather.
HOIC (High Orbit Ion Cannon) attacks were started on the main site but proved to be unsuccessful, after a while SlowLoris was suggested which was used on the 9GAG store with success, taking it down for an hour.
Joining and voting were turned off shortly after the attack started, so we lost that method of attack.
Note that this was only the initial strike, plans are being forged and executed as we speak, this isn’t a one-shot operation, this is an extended campaign.
This was posted quite a while ago (1-2 months I think), but I didn’t have the time to write a response.
Now they’ve been moderately accurate, but I can’t help but feel for the poor sod(s) whose name/email address was used in this document. The name Justin Brunk was obtained from the YouTube account Xeross which as you might’ve guessed isn’t me, I’ll help them along a bit by pointing to my Youtube Account.
Next up, the email address I have no idea where they got that from, perhaps they wanted to bother whomever is managing WeHasLinks.com. Also interesting is that they deem Reddit a reliable source for dox.
The last discrepancy there is to point out is that I supposedly wear Guy Fawkes masks to parties, I don’t, thephotos they’re talking about were of some guys we ran across at Reverze 2011 who indeed did wear Guy Fawkes masks.
Anyway, thanks for the laugh BR1CKSQU4D, try harder next time
Today I had to figure out how to trigger a 403 error and display the appropriate error page. I wanted to use the configured 403 page that the authentication system displays on failure. So after a bit of digging I found that to display this page you call the following (From the controller):