We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

hard for me to comment in max mode. 503s.

better. i stopped pretty quickly. site still lags but no

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

no. nothing.

fix has to be application layer performance... not ez sorry. cloudflare doing best can.

1 more flood 5 minutes to test new defenses perhaps make mr. magnora look silly. then won't ever do again

flood in few minutes. only last 5 minute.

if happen again after this one, not me

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

automatic pass. just keep socket alive until passed. up to 65,000 active socket 1 server...

tor comment error seem fix

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 3 insightful - 2 fun3 insightful - 1 fun4 insightful - 2 fun -  (0 children)

no. several thousand bot ips. cloudflare doesn't know they bot.

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 2 insightful - 4 fun2 insightful - 3 fun3 insightful - 4 fun -  (0 children)

edit2: The attacks stopped shortly after we blocked them properly, event over.

attack did not stop from anything site did. attack stop from us.

can start again if wanted

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 2 insightful - 2 fun2 insightful - 1 fun3 insightful - 2 fun -  (0 children)

we think increased cloudflare protection why. from tor

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 3 insightful - 1 fun3 insightful - 0 fun4 insightful - 1 fun -  (0 children)

If the attack is real we most likely hit / login / with a unique POST so no cache

503 when commenting very annoying. we have to try 10+ times to succeed in comment

We are being DDOSed again, and cloudflare is catching most of it so the site is still usable. We are tweaking the settings of our DDOS protection to make it load faster by magnora7 in SaidIt

[–]notaddos1 5 insightful - 2 fun5 insightful - 1 fun6 insightful - 2 fun -  (0 children)

Yes, although when we noticed the 429s, the other IP addresses that we didn't have also returned 429. Are you sure you're limiting the real IPS, not the IPS cloudflare?

The end point does not matter. Any url, the url contains a random xxxxxx number that is appended at the end to avoid some caching