Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday March 02 2018, @12:46PM   Printer-friendly
from the quick-reaction dept.

GitHub has been hit with the largest-ever DDoS attack, and it was only down for a few minutes:

On Wednesday, February 28, 2018 GitHub.com was unavailable from 17:21 to 17:26 UTC and intermittently unavailable from 17:26 to 17:30 UTC due to a distributed denial-of-service (DDoS) attack.

[...] Cloudflare described an amplification vector using memcached over UDP in their blog post this week, "Memcrashed - Major amplification attacks from UDP port 11211". The attack works by abusing memcached instances that are inadvertently accessible on the public internet with UDP support enabled. Spoofing of IP addresses allows memcached's responses to be targeted against another address, like ones used to serve GitHub.com, and send more data toward the target than needs to be sent by the unspoofed source. The vulnerability via misconfiguration described in the post is somewhat unique amongst that class of attacks because the amplification factor is up to 51,000, meaning that for each byte sent by the attacker, up to 51KB is sent toward the target.

[...] Between 17:21 and 17:30 UTC on February 28th we identified and mitigated a significant volumetric DDoS attack. The attack originated from over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints. It was an amplification attack using the memcached-based approach described above that peaked at 1.35Tbps via 126.9 million packets per second.

Also at Wired and The Register.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 2, Interesting) by Anonymous Coward on Friday March 02 2018, @01:05PM (16 children)

    by Anonymous Coward on Friday March 02 2018, @01:05PM (#646326)

    I wonder if this has anything to do with the fact that Slashdot has been "in offline mode" for days, and from time to time unavailable. Someone mentioned SourceForge yesterday as well.

    GitHub seems like an unusual target for a DDOS. Trying to imagine a motivation for the usual run of scum who do this sort of thing. Coming up blank.

    • (Score: 5, Interesting) by VLM on Friday March 02 2018, @01:19PM (5 children)

      by VLM (445) on Friday March 02 2018, @01:19PM (#646328)

      GitHub seems like an unusual target for a DDOS.

      https://readwrite.com/2015/03/30/github-biggest-ddos-attack/ [readwrite.com]

      Some of the main GitHub pages targeted in the attack are repositories that specifically aim to help Chinese nationals get around the government’s firewall.

      There's been some crazy news about internet censorship out of China over the last week or so "China's Censors Ban Winnie the Pooh and the Letter 'N' After Xi's Power Grab" and so forth. Basically the current leader of China is setting up as dictator and theres modest unrest leading to, so far, modest censorship and DDOS type stuff from the Chinese government. And Trump's trade renegotiation is not cheering them up, unclear if thats related or not. Probably related, why wait so long to talk about infinitely exciting steel tariffs until the day after the new Chinese emperor coronates himself...

      • (Score: 1, Insightful) by Anonymous Coward on Friday March 02 2018, @01:22PM

        by Anonymous Coward on Friday March 02 2018, @01:22PM (#646330)

        Seems their Great Firewall actually isn't that Great if they have to resort to DRDoS to make a site unavailable to their citizens.

      • (Score: 2) by zocalo on Friday March 02 2018, @01:33PM

        by zocalo (302) on Friday March 02 2018, @01:33PM (#646336)
        Funnily enough, almost all of what might have been "recon scanning" for the port 11211 DDoS I've seen over the last few weeks (yep, it ticked up a few weeks before memcached was a trending topic in IT security circles) has been from IP addresses that APNIC has assigned to China, and typically from ranges I have flagged for lots of other APT-style scans and attacks. Of course, targetting the VPN clients is just the low-hanging fruit - the GFC leaks like a sieve and there are any number of ways of exfiltrating data through it if you were sufficiently inclined, including encapsulating data in the very port scans that the Chinese government seems to think are perfectly OK and/or not their problem for that matter. (See also "IP over DNS" et al.)
        --
        UNIX? They're not even circumcised! Savages!
      • (Score: 1, Interesting) by Anonymous Coward on Friday March 02 2018, @02:18PM (1 child)

        by Anonymous Coward on Friday March 02 2018, @02:18PM (#646364)

        There's been some crazy news about internet censorship out of China over the last week or so

        Yeah... but unless such a DDOS can be maintained (it can't), it does the government of China very little good. Perhaps none at all.

        Plus, GIT is a distributed system where the repos can be trivially cloned and in the case of such ware, no doubt have been. GitHub may be down, but the repositories that were seeded from there most certainly are not.

        Yet people involved in DDOS attacks are generally really, really stupid, that's why they do such things, so perhaps you're right and someone in China's government thought (for very low levels of qualification as "thought") this would be meaningful.

        • (Score: 2) by VLM on Friday March 02 2018, @03:03PM

          by VLM (445) on Friday March 02 2018, @03:03PM (#646396)

          I can't help but notice here we are talking about Chinese military activity and this is basically the American propaganda response when the Chinese encircled the Chosin Reservoir in the (First, so far) Korean War. Its weird to mentally search and replace parts of your comment to read like a newsreel from 1950. Possibly you were doing this on purpose because it is kinda cool.

          Chosin Reservoir was kinda the LOTR scene for the Chinese where Gandalf says "You shall not pass". Chinese human wave attacks meant the extremely rapid march north to the NK/China border ended with a march right back to the old NK/SK border (more or less) and just sit there and do attrition for a couple more years and then a couple decades of the DMZ thing. Obviously that's what the Chinese are hoping for their DDOS against github, eventually they'll do something big enough to knock github out and start progressing.

          People get confused about github. Its not a cloudy filestore, all the money goes into social engineering to include codes of conduct for later censorship of the "wrong" opinions or enforcing diversity, which is supposedly good, although no one can explain why, via pretty explicit sexism and racism against white/asian males, which is supposedly good although no one can explain why hate is so doubleplus good if its against the correct victims. So, if you still think they're a filestore, then dumping firewall avoidance tools (proxies, I suppose) is a huge fail, but if you think the purpose of github is two minutes hate of fucking white males, then why not dump some code that isn't anti-asian enough anyway? So the Chinese have good reason to think they will win, its not really crazy from their position.

      • (Score: 2) by DeathMonkey on Friday March 02 2018, @07:10PM

        by DeathMonkey (1380) on Friday March 02 2018, @07:10PM (#646551) Journal

        Yeah, they banned Animal Farm too. [independent.co.uk]

        I'm surprised we didn't cover it here.

        (Actually, I'm gonna go submit it.)

    • (Score: 4, Insightful) by epitaxial on Friday March 02 2018, @02:03PM (6 children)

      by epitaxial (3165) on Friday March 02 2018, @02:03PM (#646354)

      The people who run Slashdot don't have a clue what they are doing. They still can't figure out that unicode bug that only affects them. Show me another website right now with that same problem. According to an admin they are fixing a problem on the "backend" and it will take a few days.

      • (Score: -1, Troll) by Anonymous Coward on Friday March 02 2018, @02:49PM

        by Anonymous Coward on Friday March 02 2018, @02:49PM (#646386)

        The worst part is all the Slashdolts need do is look at GitHub to see how The Bigly Fucktard and his nigger buddies at ShitstainNews did to fix the Unicode problem.

      • (Score: 2) by VLM on Friday March 02 2018, @03:08PM (3 children)

        by VLM (445) on Friday March 02 2018, @03:08PM (#646400)

        The people who run Slashdot

        There's still people left? After a zillion mergers and sales and downsizing I thought the whole site was one small shell script. ALL the old timers are long gone, correct?

        I know from professional experience how "fun" it is to maintain something where the last original team member quit three years ago.

        • (Score: 5, Interesting) by zocalo on Friday March 02 2018, @03:49PM

          by zocalo (302) on Friday March 02 2018, @03:49PM (#646433)
          Not sure how much truth there is to the tale, but ISTR the current owners dumped all the previous editors bar one (the oft-maligned Timothy) who was only kept on to train up the current batch at which point they would then let go as well. Yeah, that's a really good way of motivating someone to do a good job. They now clearly have have no one who has much experience with the code left, and from the multiple protracted outages without so much of a Twitter post to explain what's going on, it seems they don't have much experience with running servers either. It wasn't that many years ago that Slashdot being down was given the same level of attention in the tech media as Twitter or Facebook going down today is, yet today no one even seems to care. How the mighty have fallen...
          --
          UNIX? They're not even circumcised! Savages!
        • (Score: 1) by DECbot on Friday March 02 2018, @09:31PM (1 child)

          by DECbot (832) on Friday March 02 2018, @09:31PM (#646646) Journal

          ... I thought the whole site was one small shell script.

          I imagine it is done more in Linux fashion, where there is one small shell script linking to hundreds of small scripts, utilities, and perl-one-liners dynamically calling thousands of more small scripts, utilities, and perl-one-liners stored in a MySQL database that has not been updated since 2006 when the database crashed after achieving 2²⁴ − 1 comments.

          --
          cats~$ sudo chown -R us /home/base
          • (Score: 2) by VLM on Sunday March 04 2018, @04:24PM

            by VLM (445) on Sunday March 04 2018, @04:24PM (#647642)

            when the database crashed after achieving 2²⁴ − 1 comments.

            I remember that although I remember it as being some autoincrementing primary key exceeded 32 bit integer. A somewhat common problem. Fixing it can be hard.

      • (Score: 1) by angelosphere on Friday March 02 2018, @10:33PM

        by angelosphere (5088) on Friday March 02 2018, @10:33PM (#646667)

        /. is written in Perl ... why do you wonder that they have troubles to fix simple bugs is beyond me.
        Well soylent news is Perl, too ... but they fixed stuff at a time where perl was still a trenending language :D

    • (Score: 2) by takyon on Friday March 02 2018, @04:44PM (2 children)

      by takyon (881) <reversethis-{gro ... s} {ta} {noykat}> on Friday March 02 2018, @04:44PM (#646465) Journal

      GitHub seems like an unusual target for a DDOS. Trying to imagine a motivation for the usual run of scum who do this sort of thing. Coming up blank.

      I can think of at least one Anonymous Coward that had the motive, if not the means.

      --
      [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
      • (Score: 0, Troll) by Anonymous Coward on Saturday March 03 2018, @01:09AM (1 child)

        by Anonymous Coward on Saturday March 03 2018, @01:09AM (#646746)

        Stop talking about me, you little bitch. You're lucky I'm a nice guy.

  • (Score: 1, Offtopic) by VLM on Friday March 02 2018, @01:24PM (4 children)

    by VLM (445) on Friday March 02 2018, @01:24PM (#646331)

    How is it possible the site went down?

    I was told if they just stop hiring asians, whites, and males, that rainbows will spurt from the sky and unicorns will fly around?

    Its hard to imagine racism and sexism could have a cost in terms of operational quality and performance and results.

    To quote a sexist racist piece of trash who happens to be one of github's vice presidents: "Some of the biggest barriers to progress are white women."

    http://www.businessinsider.com/github-the-full-inside-story-2016-2 [businessinsider.com]

    The sooner github goes out of business the better the tech world will be.

    • (Score: 0) by Anonymous Coward on Friday March 02 2018, @02:46PM (1 child)

      by Anonymous Coward on Friday March 02 2018, @02:46PM (#646384)

      please get trump to stop the IT outsourcing and I'll ride your rainbow.

      • (Score: 0) by Anonymous Coward on Friday March 02 2018, @03:02PM

        by Anonymous Coward on Friday March 02 2018, @03:02PM (#646395)

        Outsourcing makes American corporate profits great!

    • (Score: 0) by Anonymous Coward on Friday March 02 2018, @08:46PM

      by Anonymous Coward on Friday March 02 2018, @08:46PM (#646620)

      Your "oppression" might have more to do with your shitty personality and conspiracy-as-truth beliefs.

    • (Score: 2) by ants_in_pants on Saturday March 03 2018, @04:51AM

      by ants_in_pants (6665) on Saturday March 03 2018, @04:51AM (#646844)

      I don't get how this is at all relevant.

      It's kind of like neo-nazi primates scream "DA JOOS" at everything.

      --
      -Love, ants_in_pants
  • (Score: 2) by BsAtHome on Friday March 02 2018, @01:55PM (22 children)

    by BsAtHome (889) on Friday March 02 2018, @01:55PM (#646350)

    I still do not understand why the edges have such a hard time implementing reverse path filtering. That would make spoofing IP a lot harder to abuse. There is generally no good reason for a packet to leave your interface that has a reverse path other than your own local network(s). Most L2/3 switches have this functionality readily available and does not cost very much when performed at the edge.

    • (Score: 2) by c0lo on Friday March 02 2018, @02:17PM (19 children)

      by c0lo (156) Subscriber Badge on Friday March 02 2018, @02:17PM (#646362) Journal

      I still do not understand why the edges have such a hard time implementing reverse path filtering.

      How would the internet route around damage if all devices implement reverse path filtering?

      --
      https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
      • (Score: 3, Interesting) by BsAtHome on Friday March 02 2018, @02:29PM (9 children)

        by BsAtHome (889) on Friday March 02 2018, @02:29PM (#646369)

        You do not do RPF in the backbone because you have multiple routes for transit to consider. The (outer-) edge is entirely different and is not involved in generic routing transit traffic. Your tiny little server or home PC is not part of the transit-network and there is generally no need for it to send with a different source-address than its own.

        • (Score: 2) by c0lo on Friday March 02 2018, @02:40PM (8 children)

          by c0lo (156) Subscriber Badge on Friday March 02 2018, @02:40PM (#646378) Journal

          Your tiny little server or home PC is not part of the transit-network and there is generally no need for it to send with a different source-address than its own.

          Who exactly are you speaking of?
          The guys who left their memcached accessible? If true, how RPF would have helped?
          The hackers running the reflection/amplification attack? They do know enough to disable it even if enabled.

          --
          https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
          • (Score: 2) by BsAtHome on Friday March 02 2018, @03:28PM (7 children)

            by BsAtHome (889) on Friday March 02 2018, @03:28PM (#646415)

            The memcached servers accepted packets with a forged source-address and replied to that address. They only amplified the problem (and were badly configured to allow access in the first place). The originator (original and actual source) packets to the memcached servers should have been filtered at the *source-network* because they are *easily*detectable* forged packets.

            This is no rocket science and has been best practice network 101 for a very long time. There are only /very/ rare occasions and server-setups where RPF can be problematic. Your standard "we host a website" junk-machine or your home-PC has no business sending out packets that have the wrong source-address. If your machine sends packets with foreign source-addresses, then it is most likely compromised in one or another way.

            • (Score: 2) by c0lo on Friday March 02 2018, @03:40PM (5 children)

              by c0lo (156) Subscriber Badge on Friday March 02 2018, @03:40PM (#646425) Journal

              The originator (original and actual source) packets to the memcached servers should have been filtered at the *source-network* because they are *easily*detectable* forged packets.

              Since at the origin there be haxors, possibly state-sponsored haxors, why would they filter out those packets they so carefully nurtured?
              Is this some sort of a RFC 3514 joke?

              --
              https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
              • (Score: 2) by BsAtHome on Friday March 02 2018, @03:50PM (4 children)

                by BsAtHome (889) on Friday March 02 2018, @03:50PM (#646434)

                The situation is so problematic not because of the state-sponsored attacks. Those state-sponsored attacks use *other* badly configured networks to cover their tracks!

                So, lets get rid of those other badly configured networks first. Then we can _see_ where the original attack came from and point a finger at them!

                • (Score: 2) by vux984 on Friday March 02 2018, @06:13PM (3 children)

                  by vux984 (5045) on Friday March 02 2018, @06:13PM (#646512)

                  I think I follow your argument. I think you are right.

                  The final leg of the attack is packets arrive at vulnerable memcached, spoofed to appear to come from github. The vulnerable memcached then hits gitshub with a bunch of garbage.
                  If the packet with the spoofed origin came directly from china, there's probably nothing that can be done to stop it. (at least not with RPF) given China is going out of its way to allow the spoofed packets to exit their networks, and once they're out onto the backbone there's no easy way to know they didn't come from where they claim to have come from.

                  However, more often than not, the packet with spoofed github origin will not be coming from China, but rather from a compromised security camera at Jane Q Public's house in Montana or Jorge's Corner store in Mexico, etc. These are not hostile state actors, and the ISPs in these locations there can should be filtering packets originating at their customer endpoints to prevent them from participating in such amplification attacks. It doesn't solve the problem, but it would dramatically dilute the scale.

                  • (Score: 1, Interesting) by Anonymous Coward on Saturday March 03 2018, @05:52AM

                    by Anonymous Coward on Saturday March 03 2018, @05:52AM (#646881)

                    I asked a friend of my brother's who is a network admin at my ISP about that once at a family function. Our exchange went roughly as so:

                    Me: I was reading that an good way to help prevent web attacks is if ISPs filter packets with a source address that didn't originate in their network.

                    Him: I suppose it would but we don't have the resources to analyze every packet that goes across our network.

                    Me: But don't you already analyze every packet? I mean, you already do to filter all the incoming packets directed at certain ports (80, 443, 137-139, and some others), all outgoing packets based on what their destination is, and every packet in both directions for size in order to charge them against my data cap.

                    Him: Yeah, but this is different because... uh... common carrier? If we messed with traffic? ... and... uh... Say is that your mother? (walks away)

                  • (Score: 2) by maxwell demon on Saturday March 03 2018, @02:03PM (1 child)

                    by maxwell demon (1608) on Saturday March 03 2018, @02:03PM (#647043) Journal

                    But wouldn't Jane's security camera send the packet through Jane's home router, whose NAT would replace the origin IP with the IP given to her by her ISP anyway?

                    --
                    The Tao of math: The numbers you can count are not the real numbers.
            • (Score: 2) by FatPhil on Saturday March 03 2018, @09:26AM

              by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Saturday March 03 2018, @09:26AM (#646967) Homepage
              > This is no rocket science

              Yes, but *not* doing it is absolutely zero cost, unless you're the victim of one, in which case someone else is to blame. If you don't benefit from doing things the right way, then why would you bother?

              It should be a default, to be honest. Every device that knows that it bridges between a small subnet (because it serves DHCP to them, for example, and has a routing table to match) and the wider internet should just do the obvious.
              --
              Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
      • (Score: 3, Insightful) by FatPhil on Friday March 02 2018, @02:30PM (8 children)

        by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Friday March 02 2018, @02:30PM (#646370) Homepage
        Routing around damage is about deciding who to send a packet to.
        Reverse path filtering is about deciding whether a packet you've recieved is sporged.
        They're unrelated concepts apart from the aspect that they happen on the internet.
        --
        Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
        • (Score: 2) by c0lo on Friday March 02 2018, @02:45PM (7 children)

          by c0lo (156) Subscriber Badge on Friday March 02 2018, @02:45PM (#646383) Journal

          Reverse path filtering is about deciding whether a packet you've recieved is sporged.

          You receive an IP packet which passed to 15 routers before reaching you, with the source IP (reply address) being sporged - how would you know it was sporged?
           

          --
          https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
          • (Score: 2) by VLM on Friday March 02 2018, @03:15PM (3 children)

            by VLM (445) on Friday March 02 2018, @03:15PM (#646406)

            As the g-g-great-grandpost specified, why don't the edges work properly, and the answer as always is its cheap and lazy.

            If your cablemodem doesn't sniff DHCP traffic and try to dynamically insert firewall rules to only forward legit src addrs, then it can not have bugs related to that code nor can it be late to market due to dev and testing time nor will it get blamed for being in a DDOS attack because every other piece of edge gear is trash so its not any worse and its all the big bad hacker's fault anyway plus or minus some victim shaming.

            So to circularize the argument and answer g-g-grand OPs post, the edge sux (doesn't block bad traffic) because the edge sux (its gotta be cheap and no one cares if it works "right" as long as the customers pay their bills).

            • (Score: 2) by c0lo on Friday March 02 2018, @03:25PM

              by c0lo (156) Subscriber Badge on Friday March 02 2018, @03:25PM (#646412) Journal

              If your cablemodem doesn't sniff DHCP traffic

              Hang on! You or the OP imply that the haxors would be stopped by their cablemodem?
              Especially the gov-sponsored chinese haxors?

              --
              https://www.youtube.com/watch?v=aoFiw2jMy-0 https://soylentnews.org/~MichaelDavidCrawford
            • (Score: 3, Interesting) by BsAtHome on Friday March 02 2018, @03:40PM (1 child)

              by BsAtHome (889) on Friday March 02 2018, @03:40PM (#646424)

              The cable-modem is normally not involved in RPF because of dynamic IPs. Therefore, the first convenient place to enable RPF is the router (often L2/3 switch) at the ISP side (the one the cable-modem connects to). There you simply filter the local network segment as valid source.

              As a network provider you know where your IP segments are and it is a matter of standard procedure to do proper setup at the right place. Yes, there are a lot who don't care, but that does not mean that we cannot reduce the problem quite easily. This can additionally be solved by ingress/egress verification at the BGP border. Any egress out of the first AS hop is always determinate (which equals the ingress of the second AS).

              • (Score: 2) by VLM on Friday March 02 2018, @08:58PM

                by VLM (445) on Friday March 02 2018, @08:58PM (#646626)

                Yes thats the longer more professional answer. With a side dish that adding filtering creates a possible failure mode where you move an IP segment from here to there and forget to update the filtering leading to mysterious phone call complaints from end users.

                IPv6 will fix everything when you can allocate such giant chunks of space you'll never wiggle /25 from here to there to make things fit.

          • (Score: 2) by FatPhil on Friday March 02 2018, @03:37PM

            by FatPhil (863) <pc-soylentNO@SPAMasdf.fi> on Friday March 02 2018, @03:37PM (#646421) Homepage
            Would you be prepared to receive the response and forward it on to the next hop?

            If you're an edge router, that's a very easy question to answer, and if the answer's "no", you don't let it out.
            If you're backbone, it's also very easy to answer, the answer's very unlikely to be "no".
            --
            Great minds discuss ideas; average minds discuss events; small minds discuss people; the smallest discuss themselves
          • (Score: 2) by bob_super on Friday March 02 2018, @05:56PM

            by bob_super (1357) on Friday March 02 2018, @05:56PM (#646501)

            You could imagine a protocol where the first packets you receive from a brand-new return IP range get challenged before being forwarded. If the sender pretending to be at that address doesn't respond to a challenge, you discard. The challenge has to be a small packet, on the edge of the network (a tiny ping), to avoid adding congestion.
            That wouldn't stop state-sponsored attacks, but script kiddies playing with Memcached would be limited to bugging their neighbors.

          • (Score: 2) by sjames on Friday March 02 2018, @06:52PM

            by sjames (2882) on Friday March 02 2018, @06:52PM (#646537) Journal

            The idea is for the ISP that owns the edge routers to do the egress filtering. And if they don't, de-peer them.

            The closer you get to the core, the harder it is to get right. Right in the core, the list of plausible addresses is nearly the entire address space, so it's not feasible there.

    • (Score: 3, Interesting) by zocalo on Friday March 02 2018, @03:11PM (1 child)

      by zocalo (302) on Friday March 02 2018, @03:11PM (#646403)
      Or just the basic BCP38 [bcp38.info] for that matter - filtering spoofed packets entering your network from the edge. If you're a big webhost or end-user connectivity supplier, then if you're not already doing this then please either get it sorted or admit you don't know what the hell you are doing and try another line of business. If more people does this then UDP amplification attacks would be much harder to accomplish and far more limited in scope.
      --
      UNIX? They're not even circumcised! Savages!
      • (Score: 3, Insightful) by VLM on Friday March 02 2018, @03:20PM

        by VLM (445) on Friday March 02 2018, @03:20PM (#646408)

        I worked in that cutthroat line of business a long time ago and if you do the right thing, that'll cost time and money, and you'll get replaced in the market by people who save time and money by not bothering.

  • (Score: 2) by canopic jug on Friday March 02 2018, @02:17PM

    by canopic jug (3949) Subscriber Badge on Friday March 02 2018, @02:17PM (#646361) Journal

    Some how I missed this one from takyon and wrote about it too: https://soylentnews.org/submit.pl?op=viewsub&subid=25136 [soylentnews.org]

    I checked and the URL is also there in takyon's post so it would be a good idea to delete mine from the queue. Sorry. I do check the queue but just plain missed the pre-existing post this time.

    --
    Money is not free speech. Elections should not be auctions.
  • (Score: 0) by Anonymous Coward on Friday March 02 2018, @02:38PM

    by Anonymous Coward on Friday March 02 2018, @02:38PM (#646375)

    So I shouldn't put my git commits in a while loop then...

  • (Score: 0) by Anonymous Coward on Friday March 02 2018, @04:24PM

    by Anonymous Coward on Friday March 02 2018, @04:24PM (#646454)

    s/t

  • (Score: 2, Funny) by Anonymous Coward on Friday March 02 2018, @05:03PM

    by Anonymous Coward on Friday March 02 2018, @05:03PM (#646476)

    If only there was some sort of distributed revision control system we could use. A centralized service seems somewhat vulnerable to DDoS attacks.

  • (Score: 1) by nitehawk214 on Friday March 02 2018, @06:01PM

    by nitehawk214 (1304) on Friday March 02 2018, @06:01PM (#646506)

    I wonder if they moved onto easier targets. Atlassian's bitbucket has been mostly unreachable all morning.

    --
    "Don't you ever miss the days when you used to be nostalgic?" -Loiosh
(1)