English Español Deutsch Français Italiano

mirrors: bzznfzwjjeiwzrsy6xxlsahswldtq2jcfydq7qhopjctt327qlna.b32.i2p kaizushih5iec2mxohpvbt5uaapqdnbluaasa2cmsrrjtwrbx46cnaid.onion


Site logo image

<Home | Services | Blog | Price List | Canary | About | User Policy | Guides | FAQ | Contact>
<Account FAQ | Hosting | Service Management | Relays | Shell Accounts | ViewPVS | Virtual Private Servers>


I cook a delicious onion stew, without any chilli peppers.



Unexpected Security Outage

I just brought down the service to deal with a current zero-day exploit. It is now back online and it was easier than it looked. Things are now back to normal.

Fortunately the server was not vulnerable to the exploit, at least not any of the popular PoC code out there. One reason was simply the way Hardened Gentoo does permissions in a default install, but also hardening features used in the kernel also contributed. Other issues on my system is that the SUID binary exploited would be running in the user_u SELinux context.

I honestly think this zero day is overblown and systems affected are ran by morons. Though, I have made sure the issue is fixed anyway. Nobody should have dirty pipes, as a point of pride.

Back to business!







2022 Kaizu Shibata, server time 14:11:26 03/10/22 UTC

Powered by Kaizu's Picosite!, and nginx running on Gentoo Hardened.

The picosite template file for this website.