I just came from playing with my own stuff. For my splash engine, I solved
externally from nginx, converting call to db layer to static resources in
configuration arrays: just to fire your ideas, eg. if you know cvs has any
cashing mechanism by reading files or diffs that it a way to solve. I
Stuart Henderson wrote:
> However nginx would allow blocking user agents by regex (and also would
> avoid another problem that these sites run into from time..)
I observe a lot of malicious bot traffic that masquerades as Chrome so
this technique is only effective against the lowest hanging fruit
On Fri, 14 Mar 2025 at 17:36, Nick Holland wrote:
>
> hello.
> As you may have noticed, cvsweb.openbsd.org has been having
> issues. This time, it is due to effectively a Distributed Denial of
> Service, though I don't actually believe it is /deliberately/
> malicious. Speculation is someone is
On 2025-03-15, Kirill A Korinsky wrote:
> On Fri, 14 Mar 2025 23:33:45 +0100,
> Nick Holland wrote:
>>
>> As you may have noticed, cvsweb.openbsd.org has been having
>> issues. This time, it is due to effectively a Distributed Denial of
>> Service, though I don't actually believe it is /delibe
On 3/14/25 18:47, Nick Owens wrote:
...
sorry to hear about AI's latest victim. i had this problem on my gitea
instance running on openbsd, where the crawler decided to follow every
link to every revision of my mirrors of openbsd src and linux, and i
"fixed" it with robots.txt which the particula
Actually in my nginx.conf among the tweaks to cache, limit and speed up
figure the followings:
# backend cache
proxy_temp_path directive
proxy_cache_[*] directives
# file cache
open_file_cache[*] directives
# connection limits
limit_conn_zone [*] directives
limit_conn conn_per_[*] directives
Ancidentally, I'm also running recently into these kind of problems with my
Splash engine (now stopped)
code.5mode.com (https://5mode.net/l/ddos1)
However my log for code. reports "just" 12 server errors in 1 week..
Obviously target of these gentlemen are the few web apps heavy dependent on db
On Fri, 14 Mar 2025 23:33:45 +0100,
Nick Holland wrote:
>
> As you may have noticed, cvsweb.openbsd.org has been having
> issues. This time, it is due to effectively a Distributed Denial of
> Service, though I don't actually believe it is /deliberately/
> malicious. Speculation is someone is tr
Am 14.03.2025 23:47 schrieb Nick Owens:
"fixed" it with robots.txt which the particular crawler ("claudebot")
respected. robots.txt:
Esp "claude" is known to me to be very ignorant of robots.txt (kinda
that way it is funny that it is downloading everything BUT robots.txt
...)
one can muse to
On Fri, Mar 14, 2025 at 3:39 PM Nick Holland
wrote:
>
> hello.
> As you may have noticed, cvsweb.openbsd.org has been having
> issues. This time, it is due to effectively a Distributed Denial of
> Service, though I don't actually believe it is /deliberately/
> malicious. Speculation is someone i
hello.
As you may have noticed, cvsweb.openbsd.org has been having
issues. This time, it is due to effectively a Distributed Denial of
Service, though I don't actually believe it is /deliberately/
malicious. Speculation is someone is trying to feed a so-called AI
application from cvsweb. While
11 matches
Mail list logo