Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
The Internet Censorship Security

AT&T Blocks Part of 4chan 342

holdenkarau writes "Several news sources (Mashable, The Inquistr, etc.) are reporting that AT&T is blocking img.4chan.org in the southern United States. That server is used for the infamous /b/ board (the home of anonymous). TechCrunch calls the decision to block 4chan 'stupid,' noting that they may have 'opened perhaps the most vindictive, messy can of worms.' The Inquisitr suggests that 'The global internet censorship debate landed in the home of the free.' moot (who runs 4chan) asks users to call AT&T, while some others suggest more drastic action (like cutting AT&T fiber)." Update: 07/27 09:23 GMT by T : Readers' comments below suggest that a) the purpose of the block was to curtail the effects of a serious DDoS attack and b) that the block has now been lifted, at least for some regions.
This discussion has been archived. No new comments can be posted.

AT&T Blocks Part of 4chan

Comments Filter:
  • by jx100 ( 453615 ) on Monday July 27, 2009 @02:03AM (#28833573)

    http://www.merit.edu/mail.archives/nanog/msg19609.html [merit.edu]

    The president of unWired (a much more reputable ISP) has also blocked the same server. A DDoS was apparently attacking said server which wast travelling over both lines. According to this post, the block was due solely to stop the DDoS.

  • by yamamushi ( 903955 ) <yamamushi@gma i l . c om> on Monday July 27, 2009 @02:06AM (#28833605) Homepage
    As of 1am CST, it looks like the block is beginning to be lifted : http://encyclopediadramatica.com/AT%26T_Blocks_4chan#THIS_JUST_IN [encycloped...matica.com] I can confirm access to img.4chan.org open from the Austin/South Texas area now, whereas it wasn't about an hour ago.
  • by MichaelSmith ( 789609 ) on Monday July 27, 2009 @02:08AM (#28833621) Homepage Journal

    So to stop a DDoS attack on a server, they remove any and all access to that server?

    How else would you do it?

  • by partyguerrilla ( 1597357 ) on Monday July 27, 2009 @02:09AM (#28833623)
    I don't know how credible this is http://img193.imageshack.us/img193/2523/1248672053880.png [imageshack.us] But the IP specified there is the same for http://img.4chan.org/ [4chan.org]
  • by BadAnalogyGuy ( 945258 ) <BadAnalogyGuy@gmail.com> on Monday July 27, 2009 @02:12AM (#28833635)

    Sex outside of marriage? You can be damned well sure she ought to be arrested.

    http://www.digitaljournal.com/article/246259/Saudi_Arabia_Rape_victim_gets_200_lashes [digitaljournal.com]

  • Simmer Down Now. (Score:5, Informative)

    by ibaboon ( 582611 ) <josh.thull @ g mail.com> on Monday July 27, 2009 @02:13AM (#28833643) Homepage Journal
    The block is gone. It was for 4chans own good. They have been DDoSed for weeks. AT&T just stopped access for a short bit. Settle the heck down.
  • Re:Net Neutrality (Score:3, Informative)

    by bipbop ( 1144919 ) on Monday July 27, 2009 @02:32AM (#28833777)

    I have mod points, but I'm not using them, because there's no "-1 polite but very, very wrong" option.

    To be more specific, I laughed pretty hard at "Anonymous is trying to fight this peacefully, they're not going to be DDoSing any DNS servers, backbone routers, or the like." They're not one person, and they're not a body directed by an individual, and no one controls what the assholes do, so the best you can do is "Some people are urging others not to, and they may or may not care". Good luck with that ;-)

  • by KDingo ( 944605 ) on Monday July 27, 2009 @02:32AM (#28833779)

    I was confused until I read this.

    http://mailman.nanog.org/pipermail/nanog/2009-July/012198.html [nanog.org]

    If IP source headers are spoofed to somewhere else, say to AT&T networks, it makes sense to block them

  • by Anonymous Coward on Monday July 27, 2009 @02:34AM (#28833799)

    Posting something in the likes of asking your audience to sabotage the network infrastructure.

    Funny how some stuff gets rushed to the front page, I don't think Digg was gullible enough to get that even close to front page.

  • by Anonymous Coward on Monday July 27, 2009 @02:37AM (#28833815)

    You're an idiot... obviously there was a DOS going on. http://status.4chan.org/index.html#1567027617431107851

  • ACK Attack (Score:5, Informative)

    by iYk6 ( 1425255 ) on Monday July 27, 2009 @02:49AM (#28833855)

    So to stop a DDoS attack on a server, they remove any and all access to that server? Am I the only one seeing the irony here?

    The post you responded to is misleading. According to this: http://img193.imageshack.us/img193/2523/1248672053880.png [imageshack.us], this was an ACK attack, which causes problems not only for the directly attacked host, but for other users as well.

    Ordinarily, a TCP connection is set up when you send a SYN packet to a website, such as 4chan, and then 4chan responds with a ACK, and then you respond again with a SYN-ACK.

    Here is how an ACK attack works. I, the attacker, will send a SYN packet to 4chan, but I am pretending to be you, or your IP address. 4chan then sends an ACK packet to you, excepting a SYN-ACK in response. However, you did not initiate the connection, so you send a RST back to 4chan (or nothing at all, depending on your firewall settings).

    Then I do it again. And again. I effectively flood both you and 4chan with meaningless traffic. Your traffic problems are even worse, because if you have a firewall blocking the RST packets, then 4chan will send you 4 ACK packets (depending on configuration) for every SYN packet I send them.

    In this case, AT&T and other ISPs decided that the simplest solution to ending this DOS against their users was to block packets to and from 4chan (or a specific part of 4chan).

  • Re:ACK Attack (Score:1, Informative)

    by Anonymous Coward on Monday July 27, 2009 @03:33AM (#28834089)

    SYN
    SYN-ACK
    ACK

    The right 3-way handshake

  • Re:ACK Attack (Score:1, Informative)

    by Anonymous Coward on Monday July 27, 2009 @03:48AM (#28834161)
    More commonly known as a SYN flood [wikipedia.org]. Much more commonly.
  • by Xelios ( 822510 ) on Monday July 27, 2009 @03:48AM (#28834163)
    I think you're confusing what you want to see happen with what actually will. Contrary to popular belief, most of the people over at 4chan aren't terrorists, I very much doubt they'll do anything IRL that might get them into serious legal trouble. Even if the chance of being caught is next to nothing, cutting someone's fiber is a few steps beyond what they normally do. Some of the smarter people there have already realized the best way to fight this is through legal means, calling their support lines, writing them, getting the story to various news organizations etc.

    Though it doesn't help that most of 4chan is inaccessible right now, due to (I would guess) another DDoS attack.
  • Re:4chan Down (Score:2, Informative)

    by ChoboMog ( 917656 ) on Monday July 27, 2009 @04:13AM (#28834259)
    According to http://status.4chan.org/ [4chan.org]

    "Cogent Communications has joined the club-they're now blocking all of 4chan. I can't even access the site at this point. We're working on it..."

    So the site isn't down, in the sense that the servers are still running, and its not a DDOS attack but simply a denial of service by the ISPs/Backbones needed to access it. Net Neutrality anyone?...
  • by Anonymous Coward on Monday July 27, 2009 @04:42AM (#28834401)

    The "Anonymous" thing on imageboards is more of a historical accident than anything, it was certainly never intended to conceal criminality (and doesn't, logs are kept and mods cooperate with the authorities like every other admin.) It has been retained because, at its best, it produces a unique and positive atmosphere. Posts are judged on CONTENT rather than the user's postcount, how much mod penis they have sucked etc. The very idea of censorship of anything not illegal becomes silly, hence bizarre topics offensive to most "normal" forum users can be discussed. Trolling and abuse of other users is of course rampant, but it's mostly good natured and the users wouldn't want it any other way.

  • AT&T DSL user here. (Score:3, Informative)

    by Alex Belits ( 437 ) * on Monday July 27, 2009 @05:08AM (#28834485) Homepage

    I can confirm that img.4chan.org and www.4chan.org are unreachable from my home DSL (AT&T/Yahoo in Northern California). Everything works fine once I have routed 207.126.64.0/24 through OpenVPN over a non-AT&T network.

  • by Anonymous Coward on Monday July 27, 2009 @05:16AM (#28834513)

    Damn. I was tricked and manipulated. :)

  • by Futurepower(R) ( 558542 ) on Monday July 27, 2009 @05:30AM (#28834585) Homepage
    The issue was reported on Reddit.com [reddit.com] 16 hours ago. At no time, apparently, was access to img.4chan.org slow. Also, at present the IP address 207.126.64.181 connects directly to 4chan.org, as it should.

    So, AT&T, is not blocking img.4chan.org, the company is only blocking some of its users. Check 4chan status [4chan.org]. Quote: "UPDATE: Some coverage on TechCrunch [techcrunch.com], Digg [digg.com], reddit [reddit.com], and Google News [google.com]. Also, note that AT&T has yet to contact us."
  • Re:Net Neutrality (Score:3, Informative)

    by TuaAmin13 ( 1359435 ) on Monday July 27, 2009 @06:07AM (#28834731)

    Actually it surprises me that they haven't been labeled a terrorist group yet

    Actually, they have [slashdot.org]

  • by shacky003 ( 1595307 ) on Monday July 27, 2009 @06:51AM (#28834929)
    "It's come to our attention that AT&T is filtering/blocking img.4chan.org (/b/ & /r9k/) for many of their customers. There is no remedy at this time. If you've been affected, I would advise you call or write customer support and corporate immediately. UPDATE: Some coverage on TechCrunch, Digg, reddit, and Google News. Also, note that AT&T has yet to contact us. by moot @ 6:41 PM "
  • Re:ACK Attack (Score:3, Informative)

    by Suzuran ( 163234 ) on Monday July 27, 2009 @09:37AM (#28836231)
    No, a SYN flood is different. In a SYN flood, I attempt to use up every available port on your server by leaving it in a half-open state waiting for a handshake to complete.
  • by rezalas ( 1227518 ) on Monday July 27, 2009 @10:18AM (#28836743)
    This is the very reason at the ISP I work for we cut our user's access to the net once we discover they are spamming/botting/flooding anyone for any reason. We block them off, mark their account, and notify them by phone of why they lost internet access. Once they notify us they've had their PC cleaned we allow them access again. If they do it again though (and we monitor their bandwidth usage for two weeks to be sure they didn't miss something) we require them to bring in a receipt showing they had their PC cleaned by professionals and that they have antivirus before turning them on again. AT&T (if they really are attempting to protect them... which is likely BS) made the poor choice. We receive notification from AT&T when our customers SPAM or flood anyone about how they'll blackhole their IP if we don't stop them (effectively costing us an IP until we fix it), so I know they have an automated system for dumping individual attackers into a block list without interaction from us. This just seems like a power play to eliminate a server they don't particularly like.
  • by clone53421 ( 1310749 ) on Monday July 27, 2009 @11:18AM (#28837637) Journal

    If I was using your ISP and was told I had to "bring in a receipt as proof that my PC was cleaned by a professional", I'd laugh and ask for my account to be canceled, right after that.

    That's on the second offense. The first time you're only required to inform them that it's been cleaned. If you're successfully able to clean it yourself, you won't have the requirement of showing a receipt from a professional. If you're unsuccessful in cleaning it or you get re-infected shortly thereafter, you obviously need help.

    In his exact words, on the first offense, service is restored "Once they notify us they've had their PC cleaned"; if it happens again, "we require them to bring in a receipt showing they had their PC cleaned by professionals and that they have antivirus". Not all too heavy-handed, really.

    In fact, severa of my very computer-savvy friends have managed to infect their PCs [...] someone decided to infect the self-extracting .EXE file that extracted the multi-sgement .RAR files they downloaded.

    Self-extracting RAR archives? Some free advice: The safe way to extract them is to open them in WinRAR and extract them like you would normal archives. That way if the self-extracting executable part is infected it won't affect your machine because you aren't ever running it.

    most people I know who use their computer enough to order broadband Internet in the first place own SEVERAL computers, typically networked together at home - it's not at all inconceivable they'd clean ONE machine, only to find out a second one was causing some/all of the spamming or flooding issues

    More free advice: clean the one you use for porn. ;P

  • by rezalas ( 1227518 ) on Monday July 27, 2009 @11:54AM (#28838353)
    First off, I think you read too far into some of my statements and this is possibly upsetting you a bit too much. I've been in this business for a while now, and believe me when I say that the last thing I want is to alienate my customers; in fact unlike many ISPs we don't even care if you are hosting a server from your home; we merely request (quite reasonably) that if your PC becomes infected you clean it for the safety of our other customers.

    If you do on-site service then I'm certain you understand that whatever you have on your PC is your responsibility and thus making you liable for damages caused to others. By requesting our customers have their PC checked and cleaned/repaired by a professional on the SECOND (not first) offense we are attempting to help both the user (who may have been ignorant of the trouble being caused) and everyone else. If you noticed, I didn't state that we sniff packets or persecute them; we merely require that they be responsible users when accessing our network. Out of the possible hundred times I've done this not a single time did a user get angry; quite the contrary actually. I receive thank you letters (twice actually) or emails (a few) that they are happy we're looking out for them. As a service we also offer free antivirus to our customers upon request (though I usually suggest downloading something like Avast so they don't have to deal with licenses through us).

    If you find our tactics heavy handed or obtrusive then I think you might have a skewed and excessively open expectation of what should be allowed on a network. In the end, no matter what people say about "net neutrality" and carrier immunity ISPs will still blackhole each other for not controlling their user base when it comes to attacks. I think the proactive approach we take with our customers is more personal and effective than other options out there.
  • Re:Net Neutrality (Score:3, Informative)

    by Knara ( 9377 ) on Monday July 27, 2009 @03:09PM (#28841897)
    Anonymous has an interesting, inconsistent filtering mechanism for the causes it chooses to champion (the only consistent cause that will be taken up is if someone acts against 4chan or /b/ itself). There's people who post asking for anonymous' help on a daily basis, which are met with replies of "(anonymous or /b/) is not your personal army". Any given incident is likely to feature entirely different groups of individuals, with entirely different ranges of skills.
  • 4chan advertising? (Score:3, Informative)

    by Futurepower(R) ( 558542 ) on Monday July 27, 2009 @05:25PM (#28843915) Homepage
    YES. But I'm guessing this [wired.com] is not the whole story:

    But now 4chan's founder, Moot, has admitted the whole thing was kind of his fault.

    "For the past three weeks, 4chan has been under a constant DDoS attack," Moot wrote in an afternoon update. "We were able to filter this specific type of attack in a fashion that was more or less transparent to the end user. ... Unfortunately, as an unintended consequence of the method used, some Internet users received errant traffic from one of our network switches. A handful happened to be AT&T customers."
  • by LackThereof ( 916566 ) on Monday July 27, 2009 @05:47PM (#28844227)

    moot has posted the details on status.4chan.org [4chan.org].

    Basically he confirms all the speculation that AT&T blocked 4chan because of ACK bouncebacks from a DDOS. Real /b/tards probably already had off-network proxies at the ready to deal with it.

    Also, being on AT&T and unable to access 4chan doesn't necessarily mean that it's been blocked. 4chan is up and down all the time, because they're under constant DDOS attacks, at pretty much all times, from various sources. It seems that DDOSing 4chan is a basic holding pattern for botnets that aren't otherwise occupied.

    Here's what happened:

    For the past three weeks, 4chan has been under a constant DDoS attack. We were able to filter this specific type of attack in a fashion that was more or less transparent to the end user.

    Unfortunately, as an unintended consequence of the method used, some Internet users received errant traffic from one of our network switches. A handful happened to be AT&T customers.

    In response, AT&T filtered all traffic to and from our img.4chan.org IPs (which serve /b [4chan.org]/ & /r9k/) for their entire network, instead of only the affected customers. AT&T did not contact us prior to implementing the block. Here is their statement regarding the matter [att.com].

    In the end, this wasn't a sinister act of censorship, but rather a bit of a mistake and a poorly executed, disproportionate response on AT&T's part. Whoever pulled the trigger on blackholing the site probably didn't anticipate [nor intend] the consequences of doing so.

    We're glad to see this short-lived debacle has prompted renewed interest and debate over net neutrality and internet censorshipâ"two very important issues that don't get nearly enough attentionâ"so perhaps this was all just a blessing in disguise.

    Aside from that, I'll also add that there is some big news due later this week. Keep an eye on the News page, Twitter, and global message for updates.

    As always, I can be reached at moot@4chan.org.

    ---

    PS: If any companies would like to hook us up with some better hardware, feel free! The architecture we've got powering this large and influential beast is really quite embarrassing. ( ._.)

It is easier to write an incorrect program than understand a correct one.

Working...