Old (-ish) server equipment, old (very, no ish about it) PHP v5.3.xx and WordPress version 4.xx don’t work together. Period. Don’t believe us, net search for “wordpress image upload error”. You’ll see. Google says right now: About 1,310,000 results (0.59 seconds)
It reminds me of a level of Serious Sam – the one where 1,000s of those headless bomb-toting zombie-soldiers and screamers came pouring at you relentlessly, seemingly to infinity (and beyond).
It was a backdraft. Or the eye of the Zombie-Nado-Cane. When the bad-bots got some air around August 5th – hak4umz.net DDoS or DNS Amplification – fail2ban (and the servers) got burned.
Even the “eye-dee-keff-kuh-may” (TammyBelle’s God Mode Code for DOOM][ ) cheat didn’t help. fail2ban got clobbered… ‘already banned’ every one second in the log and no more bans happening because 100s or 1000s of times per second from 100s or thousands of bots: bad requests.
Equally exciting, terrifying, low-budget and prone to sequels.
So bad it’s good movie lovers, click the link above and see if you can survive that whirlwind of bites.
Server admins, stay right here and get ready for DNS-Zombie-Bots Two: More Tech-Talk and .configs Than You Can Stand! (Or, “Bored To Death!” Or, “You can have the whole seat, but you only need the edge!”) Continue reading
The fun post title is the only thing fun about this. Unless you are in hosting, server admin, or run your own DNS servers this is going to be complicated, technical and boring.
First [is first ~LK]: an apology to any “upstream” DNS servers that our pet zombie bots may have passed bad requests to. Like us, you probably didn’t know it was happening.
~ Dana (Dominique Dunne, Poltergeist, 1982)
Thousands Hundreds of thousands Millions Hundreds of millions of bad DNS requests.