Is this somehow preventing server updates? e.g. to keep the recent vulnerability unpatched for longer?
I'm not sure if that makes sense, I think the apt mirrors are all over the place, hosted by universities etc.
loloquwowndueo 5 hours ago [-]
If you have a mirror configured, you likely won’t be prevented from downloading upgrades.
Some Ubuntu repository urls may live in the affected Canonical infrastructure and those would be affected, but you can switch your apt sources list file to, for example, a country mirror and you’ll be mostly ok.
jcgrillo 4 hours ago [-]
Won't the mirrors themselves be unable to get updates from Canonical, though? Or do they distribute them some other way?
tcp_handshaker 9 hours ago [-]
It seems Ubuntu infra is hosted at cloud provider? All have the mechanisms to protect from these types of attacks. Is this an architecure design failure?
loloquwowndueo 8 hours ago [-]
Which cloud provider? Unless things have changed, Canonical runs their own servers by leasing racks in data centres. Since one of their main offerings is managed Openstack, they favor running things on their in-house openstack deployment instead of using a public cloud (AWS etc).
esseph 9 hours ago [-]
If the DDoS is from residential proxies and high volume it becomes a real problem to shut down.
When asked for ransom terms, the attackers said, “no more systemd”
throw1234567891 7 hours ago [-]
Systemd is fine. Maybe you mean “no more snaps”.
tonymet 5 hours ago [-]
I didn’t even know Ubuntu had snaps. Hadn’t used it in 10 years.
BobbyTables2 2 hours ago [-]
Can’t even install Firefox without them…
2ndorderthought 6 hours ago [-]
I'm scratching my head on this one too. What is there to even gain? Kids these days
aussieguy1234 4 hours ago [-]
It's an Iranian state based actor.
They're targeting the most popular Linux distro, likely to prevent access to patches for the CopyFail attack so they can use it to do even more damage.
(CopyFail allows any unprivileged user to be elevated to root very easily)
recursivegirth 2 hours ago [-]
Worth calling out that CopyFail can be trivially patched. I did so on my personal devices + remote servers. The attack vector is apparently only typically utilized for exploits anyways, it supposedly has little practical/legitimate use.
cross-border attack? The internet doesn't have borders. The title of the article has nothing to do with the title submitted here.
edit: I should probably add more context as some commenters didn't understand. The DDOS attack is likely coming from compromised IoT devices. Most, if not all, of the big ones in the last few years(decades?) were that. Unless all the devices are located within a specific country and non are within the US then I think it is silly to use that term to imply that this is some sort of war from across the border. The reporting is fine for what they know so far, the submitted title is not.
nomel 9 hours ago [-]
> The internet doesn't have borders.
The overwhelming majority of internet connected devices have an internet connection that's physically connected, for 99.9??% of the distance, with wires or fiber cables, to every other user in the world, with a very nearby wireless hop at the ends. If the cables weren't so fragile, you could pull on your wifi AP and they would see their wifi AP (or maybe nearby cell tower) move.
The tiny fraction of the rest is passed by shining RF transmitters to some distant receiver, separated by some physical distance, to some base station sitting on the ground within a border.
8 hours ago [-]
dirasieb 9 hours ago [-]
the real world (the place where ubuntu servers are hosted) does have borders, singing kumbaya won’t stop terrorists from attacking western infrastructure
also, “cross-border attack” is a direct quotation from canonical by ars technica, take it up with them
Rendered at 04:33:17 GMT+0000 (Coordinated Universal Time) with Vercel.
I'm not sure if that makes sense, I think the apt mirrors are all over the place, hosted by universities etc.
Some Ubuntu repository urls may live in the affected Canonical infrastructure and those would be affected, but you can switch your apt sources list file to, for example, a country mirror and you’ll be mostly ok.
To address that, here is how to disable that local root access in Ubuntu 24.04:
https://news.ycombinator.com/item?id=47957409
1. https://ubuntu.com/blog/copy-fail-vulnerability-fixes-availa...
They're targeting the most popular Linux distro, likely to prevent access to patches for the CopyFail attack so they can use it to do even more damage.
(CopyFail allows any unprivileged user to be elevated to root very easily)
This article has instructions on how to self-patch: https://www.bleepingcomputer.com/news/security/new-linux-cop...
edit: I should probably add more context as some commenters didn't understand. The DDOS attack is likely coming from compromised IoT devices. Most, if not all, of the big ones in the last few years(decades?) were that. Unless all the devices are located within a specific country and non are within the US then I think it is silly to use that term to imply that this is some sort of war from across the border. The reporting is fine for what they know so far, the submitted title is not.
The overwhelming majority of internet connected devices have an internet connection that's physically connected, for 99.9??% of the distance, with wires or fiber cables, to every other user in the world, with a very nearby wireless hop at the ends. If the cables weren't so fragile, you could pull on your wifi AP and they would see their wifi AP (or maybe nearby cell tower) move.
The tiny fraction of the rest is passed by shining RF transmitters to some distant receiver, separated by some physical distance, to some base station sitting on the ground within a border.
also, “cross-border attack” is a direct quotation from canonical by ars technica, take it up with them