Remix.run Logo
fusl 9 hours ago

Happy to hear anyone's suggestions about where else to go or what else to do in regards to protecting from large-scale volumetric DDoS attacks. Pretty much every CDN provider nowadays has stacked up enough capacity to tank these kind of attacks, good luck trying to combat these yourself these days?

trollbridge 8 hours ago | parent | next [-]

Somehow KiwiFarms figured it out with their own "KiwiFlare" DDOS mitigation. Unfortunately, all of the other Cloudflare-like services seem exceptionally shady, will be less reliable than Cloudflare, and probably share data with foreign intelligence services I have even less trust for than the ones Cloudflare possibly shares them with.

isodev 9 hours ago | parent | prev | next [-]

Anubis and/or Bunny are good alternatives/combination depending on your exact needs

- https://anubis.techaro.lol/

- https://bunny.net/

fusl 9 hours ago | parent | next [-]

Unfortunately Anubis doesn't help where my pipe to the internet isn't fat enough to just eat up all the bandwidth that the attacker has available. Renting tens of terabits of capacity isn't cheap and DDoS attacks nowadays are in the scale of that. BunnyCDN's DDoS protection is unfortunately too basic to filter out anything that's ever so slightly more sophisticated. Cloudflare's flexibility in terms of custom rulesets and their global pre-trained rulesets (based on attacks they've seen in the past) is imo just unbeatable at this time.

isodev 9 hours ago | parent | next [-]

The Bunny Shield is quite similar to the Cloudflare setup. Maybe not 100% overlap of features but unless you’re Twitter or Facebook, it’s probably enough.

I think at the very least, one should plan the ability to switch to an alternative when your main choice fails… which together with AWS and GitHub is a weekly event now.

immibis an hour ago | parent | prev [-]

We live in the world of mass internet surveillance. DDoS like this are not very common, partly because people who do it keep going to jail.

Doman 9 hours ago | parent | prev | next [-]

bunny.net is not reachable for me too... really funny

https://imgur.com/a/8gh3hOb

isodev 6 hours ago | parent | next [-]

All the edges are gone! :)

haar 9 hours ago | parent | prev [-]

I clicked the image thinking I was seeing the message you were getting (geoblocked in the UK), then realised I'd clicked an imgur link :facepalm:

(Note: Zero negative sentiment towards imgur here)

7 hours ago | parent | prev | next [-]
[deleted]
RKFADU_UOFCCLEL 7 hours ago | parent | prev [-]

Why do people on a technical website suggest this? It's literally the same snake oil as Cloudflare. Both have an endgame of total web DRM; they want to make sure users "aren't bots". Each time the DRM is cracked, they will increase its complexity of the "verifier". You will be running arbitrary code in your big 4 browser to ensure you're running a certified big 4 browser, with 10 trillion man hours of development, on an certified OS.

callalex 4 hours ago | parent [-]

Because there is a real problem that needs to be solved one way or another.

RKFADU_UOFCCLEL 29 minutes ago | parent [-]

Anubis doesn't solve anything, bud.

bandrami 8 hours ago | parent | prev | next [-]

Is a DDOS more frequent and/or worse than stochastic CDN outages?

q3k 9 hours ago | parent | prev [-]

Just accept that a DDoS might happen and that there's nothing you can do about it. It's fine, it's just how the Internet works.

herbst 9 hours ago | parent | next [-]

That was possible when a DDos was usually still an occasional attack by a bad actor.

Most time I get ddosed now it's either Facebook directly, Something something Azure or any random AI.

q3k 9 hours ago | parent | next [-]

That sounds like an app-level (D)DoS, which is generally something you can mitigate yourself.

7 hours ago | parent | next [-]
[deleted]
geerlingguy 8 hours ago | parent | prev [-]

It's harder when it's a new group of IPs and happens 2-3x every month.

herbst 7 hours ago | parent [-]

And if you do rule based blocking they just change their approach. I am constantly blocking big corps these days, barely any work with normal bad actors.

And lots of real users time wasted for captchas.

nhecker 8 hours ago | parent | prev [-]

How (or to what end) would Facebook want to directly DoS someone?

herbst 7 hours ago | parent | next [-]

What do they even have an spider for? I never saw any actual traffic with source Facebook. I don't understand either, but it's their official IPs, their official bot headers and it behaves exactly like someone who wants my sites down.

Does it make sense? Nah, but is it part of the weird reality we live in. Looks like it

I have no way of contacting Facebook. All I can do is keep complaining on hackernews whenever the topic arrises.

Edit:// Oh and I see the same with Azure, however there I have no list of IPs to verify it's official just because it looks like it.

inferiorhuman 7 hours ago | parent | prev [-]

I got DoS'd by them once, email not HTTP traffic though. Quick slip of their finger and bam low cost load testing.

peanut-walrus 9 hours ago | parent | prev [-]

So accept that your customers won't be able to use your services whenever some russian teenager is bored? Yeah, good luck with justifying that choice.

q3k 9 hours ago | parent [-]

And how often does that happen?

peanut-walrus 9 hours ago | parent [-]

For the service I'm responsible for, 4 times in the last 24 hours.

q3k 9 hours ago | parent [-]

Congratulations, you're the exception rather than the norm.