English Español Deutsch Français Italiano

mirrors: kaizushih5iec2mxohpvbt5uaapqdnbluaasa2cmsrrjtwrbx46cnaid.onion kloshost.i2p

Site logo image

<Main Page | Services | Blog | Price List | Canary | About | User Policy | Guides | FAQ | Contact>
<Account FAQ | Hosting | Service Management | Relays | Shell Accounts | ViewPVS vendor store | Virtual Private Servers>

I cook a delicious onion stew, without any chilli peppers.

Join the KLOS Community Forum to chat darkweb. (i2p helper)
We also sponsor Juvenile, a links list and communications server.


Unexpected Security Outage

I just brought down the service to deal with a current zero-day exploit. It is now back online and it was easier than it looked. Things are now back to normal.

Fortunately the server was not vulnerable to the exploit, at least not any of the popular PoC code out there. One reason was simply the way Hardened Gentoo does permissions in a default install, but also hardening features used in the kernel also contributed. Other issues on my system is that the SUID binary exploited would be running in the user_u SELinux context.

I honestly think this zero day is overblown and systems affected are ran by morons. Though, I have made sure the issue is fixed anyway. Nobody should have dirty pipes, as a point of pride.

Back to business!







2024 Kaizu Shibata, server time 2:25:50 29/03/24 UTC

Powered by Kaizu's Picosite 1.2.3 (klos version)!, and nginx running on Gentoo Hardened.

The picosite template file for this website, and the current page.php.
$ ln -s page.php page.php.txt
XxVeGYPXJmPgjLp