Are you ready to haaaaaaaaaaalfnarp?
https://events.ccc.de/en/2024/11/17/38c3-are-you-ready-to-haaaaaaaaaaalfnarp/
Help make schedule of #38C3 more balanced, by expressing all the things *you* would want not to miss (and thus helping them having them not scheduled concurrently!) <3
(also a first peek on the content itself!! yum!)
Parliament suspended as Maori reps perform Haka.
Fuck yeah!
PSA: You're not allowed to mock people for asking a question instead of using Google now. Maybe they want a quick and correct answer, you know?
14.11.90, Berlin: 1000s of cops started the eviction of squatted houses in the "Mainzer StraĂe". It comes to one of the hardest street battle in the history of squatting. Video: https://youtube.com/watch?v=xBDh3LsPVIw&feature=emb_logo
x.x.x.x - - [10/Nov/2024:00:02:37 +0000] "GET / HTTP/1.1" 301 162 "-" "okhttp/4.9.0"
You know whatâs interesting about this log line? It repeats 56,686,963 times in www.kernel.org logs for yesterday, across 4 nodes. Thatâs about 700 times a second, and this has been going on for months.
These requests arenât intentionally malicious â they issue a simple GET /
, receive their 301 redirect, and terminate the connection. From what I can tell, this is some kind of appliance or software installed on mobile clients that uses âcan I reach www.kernel.orgâ as a network test.
This wouldnât be that big of a deal â a single plaintext âGET /â that triggers an immediate 301 is very cheap for us to generate, but the number of these requests has been steadily growing.
If you have any idea what this is and how to make it stop, please reach out?