A new SSL certificate authority may be set to shake up the market by offering free 3 year domain validated certificates. AffirmTrust announced its entry into the SSL market yesterday, with an interesting mission statement:
"To give away as many free certificates as possible because we can - also it is just a lot of fun. We want to move an industry forward making security more available to every legitimate merchant on the Internet. AffirmTrust is not just a business - it's a quest to make meaningful change that benefits both merchants and consumers."
Although the company is new to the market, AffirmTrust's management team already has several years of relevant experience behind it – they were responsible for co-founding SSL company GeoTrust, which was later acquired by VeriSign in 2006 for $125 million. Today, the GeoTrust brand is owned by Symantec, which acquired VeriSign's security business last year.
AffirmTrust is not alone in giving away free SSL certificates. Eddy Nigg's StartSSL also offers free domain validated certificates, although these are only valid for a period of 1 year. Both companies also sell Extended Validation certificates, which require a more costly vetting process to ensure they are only issued to legally established businesses or organisations.
Domain validated certificates are generally the cheapest type of certificate available. This is because the issuance process can be automated to a high degree, as the applicant does not have to prove their identity – all they have to do is prove that they own (or control) the domain in question. This has no doubt played a large part in the popularity of domain validated certificates compared with Extended Validation certificates, particularly amongst low-traffic, low-revenue websites.
Despite the free alternatives, the paid-for domain validated certificate market still looks extremely healthy today: Netcraft's latest SSL Survey shows Go Daddy having the largest net growth in domain validated certificates during each of the past 4 months. With that in mind, it will be interesting to see the impact that AffirmTrust will have on the market, and whether any other companies will follow suit by offering free domain validated certificates.
In the June 2011 survey we received responses from 346,004,403 sites.
Apache was the only major web server software to gain hostnames this month, with growth of 21M and nearly 2.2 percentage points of market share. The largest growth was seen at OVH, which gained more than 8.6M Apache hostnames. Large growth was also seen at Softlayer (5.6M), AmeriNOC (2.5M) and Hanaro Telecom (1.3M).
Among the other server vendors, Microsoft saw the largest loss with 1.4M fewer hostnames than in May. The majority of this loss was caused by VPLS losing nearly 1.5M hostnames.
nginx lost 1.2M hostnames, spread across a large number of hosting companies. The largest loss was at Ecatel, which saw a drop of nearly 700k hostnames.
Google experienced the smallest loss this month with 262k fewer hostnames than last month.
Total Sites Across All Domains
August 1995 - June 2011
Market Share for Top Servers Across All Domains
August 1995 - June 2011
|Developer||May 2011||Percent||June 2011||Percent||Change|
Datapipe was the most reliable hosting company in May 2011 with only a single failed request from Netcraft's performance monitors this month. Datapipe provides a range of managed services and colocation from data centres in New Jersey, California, London, Shanghai and Hong Kong. In May, Datapipe announced it had secured $176 million dollars in equity and finance to accelerate its expansion.
The second most reliable hosting company in May was www.serverbeach.com, which failed to respond to only two requests. ServerBeach offer cloud services, dedicated servers, managed hosting and colocation. As a child company of PEER 1 hosting, ServerBeach uses its parent company's IT infrastructure and network backbone.
Third this month was iWeb Technologies, a Canadian hosting company based in Montreal. iWeb Technologies provide web hosting, dedicated servers, managed hosting and colocation to customers from around the world.
Netcraft measures and makes available the response times of around forty leading hosting providers' sites. The performance measurements are made at fifteen minute intervals from separate points around the internet, and averages are calculated over the immediately preceding 24 hour period.
From a customer's point of view, the percentage of failed requests is more pertinent than outages on hosting companies' own sites, as this gives a pointer to reliability of routing, and this is why we choose to rank our table by fewest failed requests, rather than shortest periods of outage. In the event the number of failed requests are equal then sites are ranked by average connection times.
Information on the measurement process and current measurements is available.
Blogger is currently experiencing an extended outage after Wednesday's scheduled maintenance introduced some problems. The site was taken down again at approximately 20:00 UTC on Thursday and is still unavailable to blog authors.
Blogger is running in read-only mode while the problem is resolved. This means blogs can still be visited, but authors cannot write new posts and visitors cannot submit comments.
The Blogger Status blog, which is itself hosted on the Blogger platform, has not been updated since Monday. The most recent post read, "Blogger will go into read-only mode Wednesday (5/11) 10:00PM PST for about an hour for maintenance".
There has been speculation that the current outage was caused by a new user interface being rolled out; however, Blogger confirmed through its Twitter stream that this was not the cause.
Some users have expressed anger at losing posts and comments. A Google employee confirmed that Blogger had rolled back to a previous maintenance release, causing all posts and comments made after 7:37 am PDT on May 11 to be removed. The most recent tweet from Blogger suggests that these have only been temporarily removed.
Following last week's release of the X Factor 2011 contestant database on BitTorrent, The Lulz Boat (LulzSec on Twitter) has today released the passwords and email addresses of dozens of FOX employees.
Other files uploaded by LulzSec today suggest that the data may have been obtained through a hidden PHP script planted on fox.com, which allowed unauthorised access to a live production database. The attackers also listed the locations and partial content of several PHP configuration files on the server.
Earlier this week, two FOX Twitter accounts were also compromised. Both FOX UP and Fox 15 were hacked, presumably by LulzSec:
LulzSec also claimed to have hacked into 14 LinkedIn accounts belonging to FOX staff. The addresses of the affected accounts were posted on Pastebin.com on Monday, but the profiles have since been taken down.
LulzSec deny being vigilantes, cyberterrorists, or having any political motives. They say "we do it for the lulz" – an expression made popular by a FOX11 news report from 2007, which is often mocked for its inaccurate portrayal of the group Anonymous. Sven Slootweg, owner of AnonNews.org, described the FOX11 report as "complete nonsense" and told Netcraft that it had "spawned a ton of memes".
Parts of the Sony PlayStation Network are coming back online after more than two weeks of continuous downtime.
The PlayStation Store website went online around 02:00 UTC today, although online gaming services through the PlayStation Network are still undergoing maintenance.
Sony yesterday began the final stages of testing the new PlayStation Network and Qriocity services, making sure they are secure before the services are relaunched.
Six days after the PlayStation Network was taken offline, Sony revealed that 77 million users' names, addresses, email addresses, birth dates, logins and passwords had been compromised by hackers. Although the passwords were transformed with a cryptographic hashing function, weak passwords may nonetheless be vulnerable to offline brute-force attacks. Accordingly, Sony recommended that users change their passwords if they use the same credentials for other, unrelated services.
Although credit card details were stored in an encrypted format, these could also be at risk if the decryption key was stored on, or made available to, any of the compromised servers. However, as of Wednesday, the major credit card companies have not reported any fraudulent transactions resulting directly from the Sony security breach.