Most Reliable Hosting Company Sites in January 2019

Rank Performance Graph OS Outage
hh:mm:ss
Failed
Req%
DNS Connect First
byte
Total
1 www.choopa.com Linux 0:00:00 0.000 0.258 0.012 0.170 0.170
2 EveryCity SmartOS 0:00:00 0.000 0.227 0.070 0.346 0.346
3 Bigstep Linux 0:00:00 0.000 0.225 0.071 0.145 0.145
4 Hyve Managed Hosting Linux 0:00:00 0.000 0.162 0.075 0.150 0.150
5 CWCS Managed Hosting Linux 0:00:00 0.000 0.285 0.081 0.156 0.156
6 www.dinahosting.com Linux 0:00:00 0.004 0.278 0.089 0.178 0.178
7 Pair Networks FreeBSD 0:00:00 0.004 0.335 0.095 0.192 0.192
8 www.viawest.com Linux 0:00:00 0.013 0.430 0.012 0.239 0.240
9 Netcetera Linux 0:00:00 0.017 0.195 0.084 0.167 0.167
10 Swishmail FreeBSD 0:00:00 0.021 0.228 0.086 0.172 0.173

See full table

Choopa.com had the most reliable hosting company website in January 2019, responding to all of Netcraft's requests. The company offers cloud hosting, dedicated servers, colocation and managed services from four locations across the US, Europe and Asia. Choopa.com's primary data centre is located in Piscataway, New Jersey.

EveryCity, Bigstep, Hyve Managed Hosting and CWCS Managed Hosting made up the rest of the top five, with their sites also responding to all of Netcraft's requests last month. The top five sites are separated by their average connection time. EveryCity has appeared in the top 10 hosting company sites over 35 times, maintaining 99.9994% uptime over 4 years. Bigstep has now made six consecutive appearances in the top 10 and maintained 99.97% uptime over 5 years.

Seven of the top ten most reliable hosting company websites used the Linux operating system in January. FreeBSD appears twice in the top ten, with SmartOS also making an appearance.

Netcraft measures and makes available the response times of around twenty leading hosting providers' sites. The performance measurements are made at fifteen minute intervals from separate points around the internet, and averages are calculated over the immediately preceding 24 hour period.

From a customer's point of view, the percentage of failed requests is more pertinent than outages on hosting companies' own sites, as this gives a pointer to reliability of routing, and this is why we choose to rank our table by fewest failed requests, rather than shortest periods of outage. In the event the number of failed requests are equal then sites are ranked by average connection times.

Information on the measurement process and current measurements is available.

Netcraft's Android app now available on the Amazon Appstore

Netcraft's new anti-phishing app, already available in the Google Play store, has just been released to the Amazon Appstore. The iOS app is with Apple for review.

Available at Amazon Appstore Get it on Google Play

Android web browsers lack comprehensive protection against malicious websites, and in most cases only block a small fraction of the sites blocked by their desktop counterparts. The Netcraft app solves this problem by extending our industry-leading phishing protection services to your mobile device. The app equips your Android device with Netcraft's continuously updated feed of phishing websites, and will alert you whenever you visit a site that's included in this blacklist.

The Netcraft app works with the most popular mobile web browsers on Android — including Amazon's Silk browser, Chrome, and Firefox — and other apps, such as Facebook, Twitter, and Slack.

The app's malicious site warning page in Amazon's Silk browserThe app's malicious site warning page in Amazon's Silk browser.

See our original post about the app for more information.

Download the app on Google Play or the Amazon Appstore now to protect yourself from phishing threats on your Android device. Subscribe to our mailing list to be among the first to hear when the Netcraft app for iOS is available, along with other news items from Netcraft.

Netcraft releases anti-phishing app for Android

Netcraft has developed a new anti-phishing app for Android to defend against fraudulent sites. The Netcraft app is available now on Google Play and at the Amazon Appstore. The Netcraft app for iOS is with Apple for review.

Available now on Google Play
Available at Amazon Appstore

Netcraft's new Android app provides rapid protection against phishing threats, with new attacks blocked as soon as they're determined to be fraudulent by Netcraft. It offers free protection during a one-month trial, after which a monthly or annual subscription can be purchased. You can use the app to report phish to Netcraft without a subscription.

Protect yourself from harmful websites; Blocking backed by Netcraft's extensive feed of phishing websites.

Phishing is not confined to the desktop: in an analysis of a month's worth of log files recovered from phishing sites, Netcraft found that two thirds of visits came from mobile browsers. Some fraudsters also add mobile-specific user interfaces to their phishing attacks, making them even more effective against phone and tablet users.

Despite this, mobile browsers lack comprehensive anti-phishing protection, unlike their desktop counterparts. In a study performed last year, Netcraft found that iOS and Android browsers block only a fraction of the sites that are blocked by their desktop equivalents, leaving mobile users more exposed.

The app makes use of Netcraft's industry-leading anti-phishing feed, which is licensed to the leading web browser vendors, as well as anti-virus, firewall, intrusion detection and content filtering companies. Every day Netcraft processes millions of suspicious URLs to identify phishing attacks. Over 56 million unique phishing sites have been detected and blocked by Netcraft’s community to date.

The Netcraft app works with the most popular mobile web browsers on Android – including Chrome and Firefox – and other apps such as Facebook, Twitter, and Slack. In addition to blocking phish across the web, the app automatically detects phishing URLs in SMS messages, and will alert you to the danger with a notification.

Always up-to-date protection with real-time checks against our block list. Easily report phishing sites you encounter.

The app allows you to report phishing websites and SMS phishing attacks to Netcraft with just a few taps, protecting other users and making you part of a global safeguarding community.

Download the app on Google Play now to benefit from Netcraft's comprehensive mobile phishing protection on your Android devices. Desktop browser protection is also available in the Netcraft extension for Firefox, Google Chrome, and Opera. Subscribe to our mailing list to be amongst the first to hear when the Netcraft app for iOS is available, along with other news items from Netcraft.

January 2019 Web Server Survey

In the January 2019 survey we received responses from 1,518,207,412 sites, 228,607,903 unique domains, and 8,209,715 web-facing computers. This reflects a loss of 138 million sites, and gains of 768.9k domains, and 61.9k web-facing computers.

The vast majority of the loss of sites this month was seen for those using Microsoft web server software — dropping by 203 million sites (-29%). While much of this loss was concentrated at a single hosting provider and made up of automatically generated sites, Microsoft suffered losses in all metrics this month, albeit with much smaller reductions elsewhere. While Microsoft lost more than two hundred million sites in a single month, the net loss of domains was just 89k. Much of this drop can be attributed to IIS 6.0 and 7.5, while the latest version 10.0 saw a gain of 89k domains, and IIS 8.5 gained 164k.

nginx continues to gain market share in the web-facing computer metric, with the largest increase of 47k computers this month being more than double that of Apache's 21k gain. In the domains market nginx remains at somewhat of a plateau, with a loss of 144k domains taking its market share down to 22.7% — just 0.2pp higher than its share in April 2018. The largest factor this month — a single domain parking company, Bodis, moving all of its parked sites over to OpenResty. While the survey tracks these two products separately, OpenResty makes uses of the nginx core, integrating it with additional Lua-based modules.

Apache experienced a large gain in the domains metric this month with an increase of 245k. However, even with the losses seen for both Microsoft and nginx, it was not enough to boost Apache's market share which remains at 32.5%. The largest gain in domains came again for Cloudflare with an increase of 500k. Cloudflare predominantly uses its own server software originally based on nginx. OpenResty also saw greater gains than the market leader Apache, increasing by 388k with help from the movement of sites from nginx at Bodis.

Apache has released an update to httpd 2.4.38 to address an "important" remote DoS vulnerability, which allowed remote attackers to trigger an infinite loop through client-initiated renegotiation on servers using httpd 2.4.37 and OpenSSL version 1.1.1 or later. This is the first "important" level security issue in Apache HTTP Server since July 2017.

Total number of websites

Web server market share

DeveloperDecember 2018PercentJanuary 2019PercentChange
Microsoft688,039,05641.53%485,175,88531.96%-9.58
nginx358,383,16921.63%375,594,87524.74%3.11
Apache313,736,73918.94%323,398,86621.30%2.36
Google23,810,3361.44%23,982,0331.58%0.14
Continue reading

Manufacturing.gov and White House security suffer under U.S. shutdown

Dozens more U.S. government websites have become inaccessible since last week, when Netcraft highlighted the impact of security certificates expiring during the federal shutdown.

As of today, more than 130 TLS certificates used by U.S. government websites have expired without being renewed. Some of these sites are now completely inaccessible in modern browsers due to their strict transport security policies.

The latest sites to be affected include some particularly prominent examples.

manufacturing-snippet

Take https://manufacturing.gov, for instance. While Trump is keen to highlight the performance of U.S. manufacturing during his administration, the shutdown has meant that nobody was available to renew the site's TLS certificate when it expired on 14 January 2019. Consequently, https://manufacturing.gov is dead in the water, along with https://manufacturingusa.com which shares the same certificate.

manufacturing

Furthermore, as https://manufacturing.gov appears in Chromium's HSTS preload list, visitors are unable to bypass the browser's security warnings, rendering the site unreachable.

manufacturing.gov appears in Chromium's HSTS preload list, which ensures that the website's strict transport policy will always be enforced, even when a browser has never visited the site before. manufacturing.gov appears in Chromium's HSTS preload list, which ensures that the website's strict transport policy will always be enforced, even when a browser has never visited the site before. www.manufacturing.gov uses a different certificate, which is currently valid.

A White House subdomain at https://pages.mail.whitehouse.gov has also become unreachable. The certificate used by this site expired on 15 January 2019 and has not been renewed. This site is also covered by an effective preloaded HSTS policy.

White House security warnings in Mozilla Firefox. White House security warnings in Mozilla Firefox.

Other notable websites to have been affected by expired certificates over the past five days include two FAA (Federal Aviation Authority) websites, a National Archives customer portal, the FFIEC (Federal Financial Institutions Examination Council) Anti-Money Laundering Infobase, several Department of Agriculture sites, and several governmental remote access services.

When the federal government restarts, the White House will need to renew its certificate for pages.mail.whitehouse.gov. The list price for a replacement DigiCert organisation validated certificate — similar to the expired one — could be up to $399 per year, or about 70 Big Macs.

.gov security falters during U.S. shutdown

Dozens of U.S. government websites have been rendered either insecure or inaccessible during the ongoing U.S. federal shutdown. These sites include sensitive government payment portals and remote access services, affecting the likes of NASA, the U.S. Department of Justice, and the Court of Appeals.

The DigiCert certificate used by this U.S. Court of Appeals website expired on 5 January 2019 and has not yet been renewed. The site provides links to a document filing system and PACER (Public Access to Court Electronic Records). The DigiCert certificate used by this U.S. Court of Appeals website expired on 5 January 2019 and has not yet been renewed. The site provides links to a document filing system and PACER (Public Access to Court Electronic Records).

With around 400,000 federal employees currently furloughed, more than 80 TLS certificates used by .gov websites have so far expired without being renewed. To compound the situation, some of these abandoned websites can no longer be accessed due to strict security measures that were implemented long before the shutdown started.

One such example is https://ows2.usdoj.gov, a U.S. Department of Justice website which uses a certificate that expired in the week leading up the shutdown. The certificate has been signed by a trusted certificate authority, GoDaddy, but it has not been renewed since it expired on 17 December 2018.

All U.S. Department of Justice subdomains are covered by an HSTS policy. Combined with an expired TLS certificate, this currently makes it difficult for regular users to ignore the warnings and use the website. All U.S. Department of Justice subdomains are covered by an HSTS policy. Combined with an expired TLS certificate, this currently makes it difficult for regular users to ignore the warnings and use the website.

In a twist of fate, the usdoj.gov domain — and all of its subdomains — are included in Chromium's HSTS preload list. This is a prudent security measure which forces modern browsers to only use secure, encrypted protocols when accessing the U.S. DoJ websites; however, it will also prevent users from visiting the HTTPS sites when an expired certificate is encountered. In these cases, modern browsers like Google Chrome and Mozilla Firefox deliberately hide the advanced option that would let the user bypass the warning and continue through to the site.

While this behaviour is bound to frustrate some users, in this case, security is arguably better than usability when you can't have both. If users were to ignore such warnings, they would be vulnerable to the type of man-in-the-middle attacks that TLS certificates were intended to combat.

However, only a few of the affected .gov sites implement correctly-functioning HSTS policies. Just a handful of the sites appear in the HSTS preload list, and only a small proportion of the rest attempt to set a policy via the Strict-Transport-Security HTTP header – but the latter policies will not be obeyed when they are served alongside an expired certificate, and so will only be effective if the user has already visited the sites before.

Consequently, most of the affected sites will display an interstitial security warning that the user will be able to bypass. This introduces some realistic security concerns, as task-oriented users are more likely to ignore these security warnings, and will therefore render themselves vulnerable to man-in-the-middle attacks.

For example, https://rockettest.nasa.gov/ is not included in the HSTS preload list, and its certificate expired on 5 January 2019. This causes browsers to display an interstitial security warning that users can ignore.

This NASA website is still using an expired certificate, but the domain does not appear on the HSTS preload list.  Users can therefore ignore the browser's warnings and proceed to the site. This NASA website is still using an expired certificate, but the domain does not appear on the HSTS preload list. Users can therefore ignore the browser's warnings and proceed to the site.

The following example clearly demonstrates the potential dangers of ignoring browser security warnings. The certificate used by this Berkeley Lab .gov website at https://d2l.lbl.gov expired on 8 January 2019 (although Berkeley Lab was not affected by the shutdown) and has not yet been replaced. As there is no effective HSTS policy, users can ignore the browser's warnings and proceed to the login form.

Encouraging users to ignore browser warnings could make them more susceptible to man-in-the-middle attacks. Encouraging users to ignore browser warnings could make them more susceptible to man-in-the-middle attacks. In this example, clicking next to the browser's address bar will explicitly advise the user not to enter any sensitive information, such as passwords – but anyone who really needs to use the site may foolishly end up doing so anyway.

With Donald Trump seemingly unwilling to compromise on his demands for a wall along the border with Mexico, and Democrats refusing to approve a budget containing $5.7bn for the wall, the hundreds of thousands of unpaid federal employees might not be the only ones hurting. As more and more certificates used by government websites inevitably expire over the following days, weeks — or maybe even months — there could be some realistic opportunities to undermine the security of all U.S. citizens.