Welcome to the May First Movement Technology Status Page

Please see below for any known interuptions to our service. If you are experiencing a problem not listed here, please open a support ticket.

Subscribe to an RSS feed of these alerts, get them by email, or learn how to subscribe to other messages.

Return to mayfirst.coop

update on DDOS attack

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Servers Affected/Servidores afectados: all telehouse servers
Period Affected/Horas afectadas: 2016-03-17
Date/Fecha: 2016-03-17

May First/People Link experienced several brief waves of denial of service
attacks between 1:30 am and 5:30 pm New York time on Thursday, March 17th.

The attackers choose a variety of addresses that suggests they were attacking
May First/People Link itself, rather than a particular member of the
organization.

The attackers used a variation of the UDP amplification attack used last summer
during the attack that started with the web sites of organizations supporting
abortion funding and then moved to an attack against May First/People Link.

Our upstream provider has adjusted our filters to block this kind of attack and
all IP addresses that were null routed have been re-instated.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=f/82
-----END PGP SIGNATURE-----