Welcome, Guest. Please login or register.
July 19, 2025, 04:41:23 PM

Login with username, password and session length

Search:     Advanced search
we're back, baby
*
Home Help Search Login Register
f13.net  |  f13.net General Forums  |  Gaming  |  Topic: Sony's PSN down "for a day or two" 0 Members and 1 Guest are viewing this topic.
Pages: 1 ... 5 6 [7] 8 9 ... 17 Go Down Print
Author Topic: Sony's PSN down "for a day or two"  (Read 148244 times)
KallDrexx
Terracotta Army
Posts: 3510


Reply #210 on: May 04, 2011, 12:41:49 PM

Though how a hacker could get in through a successful DDoS is beyond me...  Head scratch

They aren't saying they got through directly because of the DDoS, they are saying they got through unnoticed because the network staff was busy dealing with the DDoS and not performing routine monitoring of the other aspects that could have detected an intrusion faster.
CharlieMopps
Terracotta Army
Posts: 837


Reply #211 on: May 04, 2011, 01:03:16 PM

Though how a hacker could get in through a successful DDoS is beyond me...  Head scratch

They aren't saying they got through directly because of the DDoS, they are saying they got through unnoticed because the network staff was busy dealing with the DDoS and not performing routine monitoring of the other aspects that could have detected an intrusion faster.

Total and complete horseshit. There is no defense against a DDOS attack, you block the IP they're trying to hit at the core router level and thats all you can do. An intrusion isn't something you detect and stop... like a burglar... A network intrusion is like a leak in a damn. If the route exists the water/intrusion is GOING to happen. You have to make your damn/network leak/intrusion proof. If the damns already got a crack in it, finding the leak doesn't do you any good. When it collapses it's your fault for building a shitty damn, you can't blame the water. They can make it illegal for water to flow downhill they want, but it'll never do them any good.
KallDrexx
Terracotta Army
Posts: 3510


Reply #212 on: May 04, 2011, 01:25:36 PM

Total and complete horseshit. There is no defense against a DDOS attack, you block the IP they're trying to hit at the core router level and thats all you can do. An intrusion isn't something you detect and stop... like a burglar... A network intrusion is like a leak in a damn. If the route exists the water/intrusion is GOING to happen. You have to make your damn/network leak/intrusion proof. If the damns already got a crack in it, finding the leak doesn't do you any good. When it collapses it's your fault for building a shitty damn, you can't blame the water. They can make it illegal for water to flow downhill they want, but it'll never do them any good.

1) You have to monitor what traffic is DDoS traffic and what isn't, and actively block those IP addresses.  There's no magical block_all_ddos_ips executable.  Thus my point, it takes resources away from general NOC operations to block and stave off the DDOS attack.

2) If there is no way to detect an intrusion then how do we know there was an intrusion?  Oh right, because they saw signs that an intrusion occurred and investigated it.  This requires resources, which may not have been available due to issue #1

There is no such thing as a network being intrusion proof, except for systems that have no network access at all.  People have hacked into DOD and pentagon systems before, and the most you can do is be vigilant in keeping up with security practices and monitoring to catch things before or as they are happening. 

I'm not excusing Sony, but what they are saying is believable.  It doesn't make it any less their fault or any less their problem, but it's still believable in what they are saying.
CharlieMopps
Terracotta Army
Posts: 837


Reply #213 on: May 04, 2011, 01:43:59 PM

Total and complete horseshit. There is no defense against a DDOS attack, you block the IP they're trying to hit at the core router level and thats all you can do. An intrusion isn't something you detect and stop... like a burglar... A network intrusion is like a leak in a damn. If the route exists the water/intrusion is GOING to happen. You have to make your damn/network leak/intrusion proof. If the damns already got a crack in it, finding the leak doesn't do you any good. When it collapses it's your fault for building a shitty damn, you can't blame the water. They can make it illegal for water to flow downhill they want, but it'll never do them any good.

1) You have to monitor what traffic is DDoS traffic and what isn't, and actively block those IP addresses.  There's no magical block_all_ddos_ips executable.  Thus my point, it takes resources away from general NOC operations to block and stave off the DDOS attack.

2) If there is no way to detect an intrusion then how do we know there was an intrusion?  Oh right, because they saw signs that an intrusion occurred and investigated it.  This requires resources, which may not have been available due to issue #1

There is no such thing as a network being intrusion proof, except for systems that have no network access at all.  People have hacked into DOD and pentagon systems before, and the most you can do is be vigilant in keeping up with security practices and monitoring to catch things before or as they are happening. 

I'm not excusing Sony, but what they are saying is believable.  It doesn't make it any less their fault or any less their problem, but it's still believable in what they are saying.

1) you're wrong. I worked in a NOC for 3 years. Our customers would get hit by DDOS attacks all the time. You don't block the incoming IP addresses, that would be stupid... there are usually thousands, if not tens of thousands of IPs hitting you at once. You block the destination at a core router. Then the attacker has to start switching target IPs. Every new IP they add to their attack vector degrades their effectiveness.

2) I shouldn't have said their is no way to detect an intrusion... there is... but by the time you've detected it, it's pointless. In my example, the damn is already doomed. They're already in, you've already lost your info. All the info they need was probably smaller than a few hundred megabytes... maybe a couple of gigabytes that the most. Given the probable size of Sony's outbout trunks and that the attacker was probably also operating from inside some other hacked system with equivalent bandwidth the movement of data off Sonys network likely took minutes, maybe even seconds.

What they're saying is not believable. It's silly. The data that was stolen should never have been accessible from outside Sonys firewall... period. Unless you're sitting in the Corporate IS department of Sony Inc after going through 2 or 3 security doors, then logging into your work PC, then logging into their billing system should you have been able to see that kind of info. They only people at sony that would need to see that level of data are developers.

Arthur_Parker
Terracotta Army
Posts: 5865

Internet Detective


Reply #214 on: May 04, 2011, 02:03:57 PM

Received the email


Figured was odd as last game I touched of SOE was SWG back in August 2003, then searched the old email account and the only reference to sony was the Vanguard Beta  DRILLING AND WOMANLINESS  I knew that 30 minutes was a mistake.
Amaron
Terracotta Army
Posts: 2020


Reply #215 on: May 04, 2011, 03:02:54 PM

There is no defense against a DDOS attack, you block the IP they're trying to hit at the core router level and thats all you can do.

You can also upgrade so that's not totally true.
sinij
Terracotta Army
Posts: 2597


WWW
Reply #216 on: May 04, 2011, 03:20:07 PM

At this point, Sony is officially Circling The Drain.

Eternity is a very long time, especially towards the end.
Tale
Terracotta Army
Posts: 8567

sıɥʇ ǝʞıן sʞןɐʇ


Reply #217 on: May 04, 2011, 05:37:57 PM

Figured was odd as last game I touched of SOE was SWG back in August 2003, then searched the old email account and the only reference to sony was the Vanguard Beta  DRILLING AND WOMANLINESS  I knew that 30 minutes was a mistake.

I specifically created an email redirect on my domain to use in applying for the Vanguard beta. It has received the SOE email, but I don't think my EverQuest email address has.
Hawkbit
Terracotta Army
Posts: 5531

Like a Klansman in the ghetto.


Reply #218 on: May 04, 2011, 05:42:50 PM

At this point, Sony is officially Circling The Drain.

Soon all we'll have left is Steam. 
Soln
Terracotta Army
Posts: 4737

the opportunity for evil is just delicious


Reply #219 on: May 04, 2011, 06:04:59 PM

indeed, this DDoS excuse seems convenient.  Blame a loose confederation of well known (via Wikileaks) hackers.  In short, blame the only people politicians may have heard of.
kildorn
Terracotta Army
Posts: 5014


Reply #220 on: May 04, 2011, 06:24:34 PM

"network staff was busy dealing with the DDoS" => code for "we kept bugging the network folks and having hourly huddles to discuss our current status so often that they couldn't get any actual work done"

At least, if it's anything like any major outage I've worked on. My favorite was bugging the Ops staff every 30 minutes for a status update when the problem was electrical. So, you know, ask the fucking electrician, none of us are actually working on the issue and could be doing something useful instead of running between our office and meeting rooms all day just to say "I don't fucking know?"
01101010
Terracotta Army
Posts: 12007

You call it an accident. I call it justice.


Reply #221 on: May 04, 2011, 06:26:19 PM

"network staff was busy dealing with the DDoS" => code for "we kept bugging the network folks and having hourly huddles to discuss our current status so often that they couldn't get any actual work done"

At least, if it's anything like any major outage I've worked on. My favorite was bugging the Ops staff every 30 minutes for a status update when the problem was electrical. So, you know, ask the fucking electrician, none of us are actually working on the issue and could be doing something useful instead of running between our office and meeting rooms all day just to say "I don't fucking know?"

Working as intended.  why so serious?

Does any one know where the love of God goes...When the waves turn the minutes to hours? -G. Lightfoot
bhodi
Moderator
Posts: 6817

No lie.


Reply #222 on: May 04, 2011, 08:11:19 PM

Kildorn has it exactly right.

A conference bridge has been opened on this P1, please dial in for 6 hours of finger pointing and pacing!
tgr
Terracotta Army
Posts: 3366

Just another victim of cyber age discrimination.


Reply #223 on: May 05, 2011, 03:55:33 AM

We discovered that the intruders had planted a file on one of our Sony Online Entertainment servers named “Anonymous” with the words “We are Legion.”
Credible evidence. Ohhhhh, I see.

Cyno's lit, bridge is up, but one pilot won't be jumping home.
CharlieMopps
Terracotta Army
Posts: 837


Reply #224 on: May 05, 2011, 09:39:55 AM

And the real cause is? Incompetence!

"Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford."

http://consumerist.com/2011/05/security-expert-sony-knew-its-software-was-obsolete-months-before-psn-breach.html
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #225 on: May 05, 2011, 09:52:24 AM

And the real cause is? Incompetence!

This is always the real answer in any major debacle.  That and "budget-minded" executives.

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
rattran
Moderator
Posts: 4258

Unreasonable


Reply #226 on: May 05, 2011, 10:40:59 AM

And I picked a bad time to switch to LastPass I guess.
http://blog.lastpass.com/2011/05/lastpass-security-notification.html

Hooray for the cloud, always available except when it isn't.
KallDrexx
Terracotta Army
Posts: 3510


Reply #227 on: May 05, 2011, 11:27:07 AM

You always have access to your passwords though without access to their servers.  Just not syncing.
Minvaren
Terracotta Army
Posts: 1676


Reply #228 on: May 05, 2011, 02:14:31 PM

More fun Sony/PSN news

Quote
According to Spafford, security experts monitoring open Internet forums learned months ago that Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford.

I'm looking for an adjective past "clownshoes" here and failing...   swamp poop 

"There are many things of which a wise man might wish to remain ignorant." - Ralph Waldo Emerson
Yegolev
Moderator
Posts: 24440

2/10 WOULD NOT INGEST


WWW
Reply #229 on: May 05, 2011, 02:48:03 PM

My new favorite word/phrase is "best shore".

Why am I homeless?  Why do all you motherfuckers need homes is the real question.
They called it The Prayer, its answer was law
Mommy come back 'cause the water's all gone
fuser
Terracotta Army
Posts: 1572


Reply #230 on: May 05, 2011, 04:02:27 PM

More fun Sony/PSN news

Quote
According to Spafford, security experts monitoring open Internet forums learned months ago that Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford.

I'm looking for an adjective past "clownshoes" here and failing...   swamp poop  


The IRC log of the "hack" is the one from #ps3dev on efnet.

Quote
[13:41:06]   <trixter>   I also know that the server that does the x-i-5 tickets is a bit more tight about the ciphers than any other system in sonyland
[13:41:56]   <trixter>   if sony is watching this channel they should know that running an older version of apache on a redhat server with known vulnerabilities is not wise, especially when that server freely reports its version and its the auth server
[13:42:33]   <SKFU>   its not old version, they just didnt update the banner
[13:43:03]   <trixter>   I consider apache 2.2.15 old
[13:43:08]   <SKFU>   which server
[13:43:11]   <trixter>   it also has known vulnerabilities

Curious that RHEL/CentOS doesn't ship with 2.2.15 or updated to it. From the time/kernel it sounds like an OS of 5.2/5.3 setup but with a custom/source compiled 2.2.15 Apache for some reason. I'm wondering if they pulled in the 2.2.15 for some feature that the vendor package didn't have let the whole security lapsed because the staff never kept on top of the source compiled updates. Even if they were running Spacewalk to monitor and deploy updates the httpd(apache) one would slip by any monitoring unless the staff monitoring updates were aware of the lack of a Apache package.
Soln
Terracotta Army
Posts: 4737

the opportunity for evil is just delicious


Reply #231 on: May 05, 2011, 04:28:53 PM

this RHEL3 or RHEL5?   Ohhhhh, I see.
Tale
Terracotta Army
Posts: 8567

sıɥʇ ǝʞıן sʞןɐʇ


Reply #232 on: May 05, 2011, 08:57:34 PM

The IRC log of the "hack" is the one from #ps3dev on efnet.

Quote
[13:41:06]   <trixter>   I also know that the server that does the x-i-5 tickets is a bit more tight about the ciphers than any other system in sonyland
[13:41:56]   <trixter>   if sony is watching this channel they should know that running an older version of apache on a redhat server with known vulnerabilities is not wise, especially when that server freely reports its version and its the auth server
[13:42:33]   <SKFU>   its not old version, they just didnt update the banner
[13:43:03]   <trixter>   I consider apache 2.2.15 old
[13:43:08]   <SKFU>   which server
[13:43:11]   <trixter>   it also has known vulnerabilities

That's the log I posted on April 28: http://forums.f13.net/index.php?topic=20733.msg924037#msg924037
Rendakor
Terracotta Army
Posts: 10138


Reply #233 on: May 05, 2011, 10:19:36 PM

And this was posted 4 posts up:
More fun Sony/PSN news

Quote
According to Spafford, security experts monitoring open Internet forums learned months ago that Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford.

I'm looking for an adjective past "clownshoes" here and failing...   swamp poop 
And the real cause is? Incompetence!

"Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford."

http://consumerist.com/2011/05/security-expert-sony-knew-its-software-was-obsolete-months-before-psn-breach.html


"i can't be a star citizen. they won't even give me a star green card"
Simond
Terracotta Army
Posts: 6742


Reply #234 on: May 06, 2011, 05:17:30 AM

More fun Sony/PSN news

Quote
According to Spafford, security experts monitoring open Internet forums learned months ago that Sony was using outdated versions of the Apache Web server software, which "was unpatched and had no firewall installed." The issue was "reported in an open forum monitored by Sony employees" two to three months prior to the recent security breaches, said Spafford.

I'm looking for an adjective past "clownshoes" here and failing...   swamp poop 
"Sony"

"You're really a good person, aren't you? So, there's no path for you to take here. Go home. This isn't a place for someone like you."
kildorn
Terracotta Army
Posts: 5014


Reply #235 on: May 06, 2011, 06:00:19 AM

this RHEL3 or RHEL5?   Ohhhhh, I see.

It's Redhat, their repos are old enough I'm shocked they have x64 rpms. I have no idea why people insist on paying redhat for slow shitty service.

(RHEL 3->5 stock 2.0.57, RHEL6 stocks 2.2.15. Both are crazy out of date.)
fuser
Terracotta Army
Posts: 1572


Reply #236 on: May 06, 2011, 07:04:34 AM

To everyone who said "already posted", wanted to put some reference around the version numbers and OS posted  why so serious?

It's Redhat, their repos are old enough I'm shocked they have x64 rpms. I have no idea why people insist on paying redhat for slow shitty service.

(RHEL 3->5 stock 2.0.57, RHEL6 stocks 2.2.15. Both are crazy out of date.)

RHEL5.x uses Apache 2.2.3 and RHEL6 moved up to 2.2.15 if I remember correctly (using CentOS everywhere so haven't used 6 in production). Ah here's a RHEL distro package overview. Both are technically behind the curve in latest and greatest but Redhat patches any venerabilities against the packages. Redhat is aimed to give a stable life cycle product not going to a bleeding edge version every release.

The problem here is the either they left a RHEL6 box totally unpatched (which doesn't work because there is only one errata for mod_auth_mysql) or a manually compiled package
« Last Edit: May 06, 2011, 07:11:53 AM by fuser »
Minvaren
Terracotta Army
Posts: 1676


Reply #237 on: May 06, 2011, 07:45:50 AM

And this was posted 4 posts up:

I r kin reed gud.   swamp poop

"There are many things of which a wise man might wish to remain ignorant." - Ralph Waldo Emerson
brellium
Terracotta Army
Posts: 1296


Reply #238 on: May 07, 2011, 12:06:03 PM

Large fraud hit?  You call your card company, say the words "I didn't make this charge", and they go poof.  Shred the card and wait for your new one to arrive.  It's not like you ever have to pay it.

I use my card for absolutely everything.  I don't carry cash most of the time.  Checking account is for bills.  We've had one fraudulent charge in 10 years, and we live in the identity theft capitol of America.  Hell, the credit card calls us about charges they think might be fraud (mostly me buying shit late at night).

Maybe I'm just lucky, but I find the fraud risk completely manageable and easy to nullify in the case that it occurs.  


This, most thieves hit in the same manner, and the bank quickly stops charges.

‎"One must see in every human being only that which is worthy of praise. When this is done, one can be a friend to the whole human race. If, however, we look at people from the standpoint of their faults, then being a friend to them is a formidable task."
—‘Abdu’l-Bahá
waffel
Terracotta Army
Posts: 711


Reply #239 on: May 07, 2011, 12:17:42 PM

Who can forget this classic?

http://www.youtube.com/watch?v=8AyVh1_vWYQ
fuser
Terracotta Army
Posts: 1572


Reply #240 on: May 08, 2011, 08:32:46 AM

It cannot get any worse from the latest reports

Quote
TOKYO, May 7 (Reuters) - Sony said on Saturday it had removed from the Internet the names and partial addresses of 2,500 sweepstakes contestants that had been stolen by hackers and posted on a website, and said it did not know when it could restart its PlayStation video games network.
Tale
Terracotta Army
Posts: 8567

sıɥʇ ǝʞıן sʞןɐʇ


Reply #241 on: May 08, 2011, 02:50:21 PM

Soon we will be marking three weeks of PSN downtime, when they initially said "a day or two", and there's no ETA. They don't deserve to get any of us back.
Hawkbit
Terracotta Army
Posts: 5531

Like a Klansman in the ghetto.


Reply #242 on: May 08, 2011, 03:08:25 PM

Take a game like Brink, they're fucked on PS3 launch if Sony doesn't get it going.  At least Portal 2 got a day or two of sales before the crash, and also has a single player.  From what I've seen of Brink, it's about 98% online... if multiplayer isn't live at launch, there's potential for significant losses. 
CaptainNapkin
Terracotta Army
Posts: 395

Once split a 12.5lb burger with a friend.


WWW
Reply #243 on: May 08, 2011, 05:02:49 PM

Yeah I typically pick up multiplatform games for the Xbox, but because of the Steam deal I went PS3 for Portal 2. Since I just set up a projector I want to play the co-op on the PS3 (I haven't built my HTPC yet). I suppose you could say it's set of circumstances/timing thing, but it's left a bad taste in my mouth for the PS3. On the other hand, my only PS3 purchases to date were Demon's Souls, Uncharted, Fat Princess, and Flower... so at the end of the day I guess I wasn't a Sony cash cow anywho.

For me it's the simple fact of how long it's been down. If it was back up in a week or so I likely wouldn't have given resubscribing to their services a second thought, now not so much.

*edit - bourbon = typos
« Last Edit: May 08, 2011, 05:05:26 PM by CaptainNapkin »
Raguel
Terracotta Army
Posts: 1419


Reply #244 on: May 08, 2011, 07:48:10 PM

The only thing I care about really is getting my unlockables/dlc for Dragon Age 2.  Mob
Pages: 1 ... 5 6 [7] 8 9 ... 17 Go Up Print 
f13.net  |  f13.net General Forums  |  Gaming  |  Topic: Sony's PSN down "for a day or two"  
Jump to:  

Powered by SMF 1.1.10 | SMF © 2006-2009, Simple Machines LLC