Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAPmip_x500e2byteqx7jO7BpnWUai-rbgsKgWhenRU-PaEyUBA@mail.gmail.com>
Date: Sat, 2 May 2026 07:10:11 -0400
From: cyber security <cs7778503@...il.com>
To: oss-security@...ts.openwall.com
Subject: Ubuntu back up, In Saturday after DDoS attacks

Hello, Everyone

I wanted to represent, That we confirmed the ubuntu and canonical
websites are back up and working, that is exciting


```
relunsec@...unsec:~$ ping ubuntu.com
PING ubuntu.com (185.125.190.29) 56(84) bytes of data.
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=1 ttl=53 time=44.4 ms
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=2 ttl=53 time=43.0 ms
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=3 ttl=53 time=44.1 ms
^C
--- ubuntu.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 43.030/43.845/44.375/0.585 ms
relunsec@...unsec:~$ sudo apt update
[sudo: authenticate] Password:
Hit:1 http://ma.archive.ubuntu.com/ubuntu resolute InRelease
Hit:2 http://ma.archive.ubuntu.com/ubuntu resolute-updates InRelease
Hit:3 http://security.ubuntu.com/ubuntu resolute-security InRelease
Hit:4 http://ma.archive.ubuntu.com/ubuntu resolute-backports InRelease
All packages are up to date.
relunsec@...unsec:~$ ping snapcraft.io
PING snapcraft.io (185.125.190.20) 56(84) bytes of data.
64 bytes from website-content-cache-1.ps5.canonical.com
(185.125.190.20): icmp_seq=1 ttl=50 time=47.3 ms
64 bytes from website-content-cache-1.ps5.canonical.com
(185.125.190.20): icmp_seq=2 ttl=50 time=49.4 ms
^C
--- snapcraft.io ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 47.253/48.332/49.412/1.079 ms
relunsec@...unsec:~$ ping security.ubuntu.com
PING security.ubuntu.com (91.189.91.82) 56(84) bytes of data.
64 bytes from ubuntu-mirror-2.ps6.canonical.com (91.189.91.82):
icmp_seq=1 ttl=47 time=203 ms
64 bytes from ubuntu-mirror-2.ps6.canonical.com (91.189.91.82):
icmp_seq=2 ttl=47 time=225 ms
64 bytes from ubuntu-mirror-2.ps6.canonical.com (91.189.91.82):
icmp_seq=3 ttl=47 time=145 ms
^C
--- security.ubuntu.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 145.119/191.014/225.377/33.764 ms
relunsec@...unsec:~$ nslookup ubuntu.com
Server:        127.0.0.53
Address:    127.0.0.53#53

Non-authoritative answer:
Name:    ubuntu.com
Address: 185.125.190.29
Name:    ubuntu.com
Address: 185.125.190.21
Name:    ubuntu.com
Address: 185.125.190.20
Name:    ubuntu.com
Address: 2620:2d:4000:1::28
Name:    ubuntu.com
Address: 2620:2d:4000:1::26
Name:    ubuntu.com
Address: 2620:2d:4000:1::27

relunsec@...unsec:~$ ping canonical.com
PING canonical.com (185.125.190.29) 56(84) bytes of data.
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=1 ttl=53 time=44.0 ms
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=2 ttl=53 time=43.2 ms
64 bytes from website-content-cache-3.ps5.canonical.com
(185.125.190.29): icmp_seq=3 ttl=53 time=44.9 ms
^C
--- canonical.com ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 43.181/44.051/44.946/0.720 ms
relunsec@...unsec:~$
```

Everything working no slowdown, no connection timedout, no connection
refused, That is a good news, Now peoples must update and upgrade
their system now and your snaps and monitor the status of CopyFail,
before attackers resume their operation.

Best Regards,
RelunSec

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.