Today, like the past few days, we have had some downtime. Apparently some script kids are enjoying themselves by targeting our server (and others). Sorry for the inconvenience.

Most of these ‘attacks’ are targeted at the database, but some are more ddos-like and can be mitigated by using a CDN. Some other Lemmy servers are using Cloudflare, so we know that works. Therefore we have chosen Cloudflare as CDN / DDOS protection platform for now. We will look into other options, but we needed something to be implemented asap.

For the other attacks, we are using them to investigate and implement measures like rate limiting etc.

  • @M_Reimer
    link
    6
    edit-2
    10 months ago

    deleted by creator

    • @echo64
      link
      171 year ago

      Cloudflare decrypts to do the ddos protection, then reencrypts to the server.

      If you are worried about security, cloudflare is provably more secure than any lemmy server.

      • @M_Reimer
        link
        2
        edit-2
        10 months ago

        deleted by creator

        • @echo64
          link
          01 year ago

          Not if you want to provide a website accessible through modern web browsers.

          If you want stable and distributed resources you need tech like bittorrent which survived everything the entertainment industry had to throw at it.

          If you want a website, you need cloudflare.

    • @colonial
      link
      101 year ago

      Cloudflare is a proxy, so by its very nature it has to decrypt traffic. (I believe their enterprise plans may offer a way around this, but don’t quote me.)

      I wouldn’t worry, however. If someone wanted to attack this site (or any site, really) they’re almost certainly going to have an easier time going after the origin rather than trying to take on a juggernaut like Cloudflare.

    • @themusicman
      link
      41 year ago

      Other posters are correct that cloudflare decrypts traffic. BUT it is highly unlikely that they will see your password in plaintext, since it is best practice to hash the password first on the front-end.