this post was submitted on 15 Sep 2025
834 points (98.2% liked)

memes

17384 readers
1445 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 

Welcome to 2025
@memes@lemmy.world

you are viewing a single comment's thread
view the rest of the comments
[–] DaPorkchop_@lemmy.ml 131 points 2 days ago (10 children)

if you can provide me a better way to keep my homelab from getting DDoSed every five minutes then by all means, please share it

[–] daniel@federation.network 29 points 2 days ago (2 children)

@DaPorkchop_@lemmy.ml @memes@lemmy.world Is that an actual issue or a hypothetical one? I've never had an attack in 10 years of publicly hosting stuff.

[–] purplemonkeymad@programming.dev 19 points 2 days ago (1 children)

As someone else who used to host via an open port, you get random connections all the time. Almost constantly and the request paths make it obvious they are scanning for vulnerabilities. Via cloud flare the number of those requests is much lower, as they have to know at least the DNS to do so, (and can't guess it from a presented SSL cert.)

[–] sobchak@programming.dev 10 points 1 day ago

Yeah, I see random https and other connections all the time blindly scanning for vulnerabilities. Not enough to cause any real problems though. One time I publicly exposed redis or rabbitmq (can't remember which) and didn't set a password, so someone set a password for me :). That's about the worst that's happened to me.

[–] DaPorkchop_@lemmy.ml 5 points 2 days ago (2 children)

It's the reason I set up cloudflare in the first place, so yeah. I was getting SYN flood-ed to the point that my router would just crash almost immediately, and after rebooting it the attack would resume after a minute or two.

[–] pulsewidth@lemmy.world 6 points 1 day ago (1 children)

Get a router that has flood protection? This is like.. Extremely basic network protection.

OpenWRT has had configurable syn-flood protection (enabled by default) since like 2010.

[–] DaPorkchop_@lemmy.ml 3 points 1 day ago

Even if the SYN packets were being ignored, the connection would still be unusable if there's enough incoming traffic for most legitimate packets to get dropped. And as mentioned in other comments, the router in question is a shitty ISP router which can't be replaced (although I do have a much fancier router with OpenWRT running behind that).

[–] daniel@federation.network 7 points 2 days ago (1 children)

@DaPorkchop_@lemmy.ml @memes@lemmy.world Hm weird, I don't see why they would spend their resources attacking random people without any kind of demand. Even at work I've never seen one happening.
I still believe Cloudflare has most of its customers because of fearmongering tbh.

[–] Alaknar@sopuli.xyz 7 points 1 day ago (1 children)

It's a bit like saying "having a password on your account is fearmongering, why would anyone try to access your data".

It's only fearmongering until you get attacked, and it's already too late when you do. Better to be proactive.

[–] daniel@federation.network 6 points 1 day ago (1 children)

@Alaknar@sopuli.xyz @memes@lemmy.world Being proactive doesn't mean you have to hide your personal service behind a billion dollar company. That is precisely the kind of overreaction triggered by fearmongering. If you don't know how to secure access points or harden configurations, no service will be able to do it for you as if by magic. Not to mention your responsibility towards your users, who may not want to be tracked by a third-party company without their knowledge every time they visit your site (or half of the internet by now).

[–] Alaknar@sopuli.xyz 1 points 21 hours ago

If you don’t know how to secure access points or harden configurations, no service will be able to do it for you as if by magic

That's the point. Cloudflare does this as if by magic.

Not to mention your responsibility towards your users, who may not want to be tracked by a third-party company

Cloudflare doesn't track your users.

As a sidenote - am I reading you correctly? Your main issue with Cloudflare is "they're large"? Like, if they were "two dudes in a basement" and provided the same quality product as they do now, you'd be happy to use their service?

[–] expr@programming.dev 15 points 1 day ago (2 children)
[–] daq@lemmy.sdf.org 2 points 16 hours ago

Awesome project, but that's just one of many features CF offers. Most people I suspect rely on tunnels more than bot protection.

[–] DaPorkchop_@lemmy.ml 12 points 1 day ago (1 children)

That doesn't help against a SYN flood.

[–] expr@programming.dev 4 points 1 day ago

From what I understand elsewhere in the thread, I believe that's just a matter of router configuration.

[–] wildbus8979@sh.itjust.works 57 points 2 days ago* (last edited 2 days ago) (3 children)

Just put it behind a wireguard server and don't expose any ports?

If you absolutely must expose some stuff, get a cheap 3$/mo vps that connects via wireguard to your home and setup a reverse proxy? They almost all come with DDoS protection.

[–] Kolanaki@pawb.social 41 points 2 days ago* (last edited 2 days ago) (1 children)

How do I stop a DDOS attack of my website without having port 80 or 443 open, so you can access the website?

[–] jim3692@discuss.online 8 points 2 days ago

Conservatives will get really upset once they realize you are changing genders

[–] MummysLittleBloodSlut@lemmy.blahaj.zone 7 points 2 days ago (1 children)

What's a good VPS provider for privacy enthusiasts?

[–] sol6_vi@lemmy.makearmy.io 4 points 1 day ago

I use Hetzner. Its fine. Boring/10 would use it again I guess?

[–] daniskarma@lemmy.dbzer0.com 15 points 2 days ago* (last edited 2 days ago) (1 children)

Is you homelab getting ddosed constantly?

I had had it for years and never ever got ddosed.

Are you sure it's actually ddos and not just the typical bots scanning for vulnerabilities? Which are easy defended for by keeping updated.

It's weird as a DDOS is not something that's just happens, it's a targeted attack. It's a rare occurrence that someone decided to attack a homelab.

[–] DaPorkchop_@lemmy.ml 9 points 2 days ago (1 children)

I spent multiple days getting SYN flooded to the point my router would crash and reboot over and over, and it stopped the moment I set up cloudflare and asked my ISP to change my IP. This was the instance which pushed me over the edge, but there had been smaller attacks lasting a few minutes each for years leading up to this.

[–] gagootron@feddit.org 11 points 2 days ago (1 children)

What kind of router to you have? A good router should not crash from any amount WAN traffic. But yes, if you host anything you will get scanned even harder than usual.

[–] DaPorkchop_@lemmy.ml 3 points 1 day ago (2 children)

A shitty ISP-supplied modem/router which I have to use :|

[–] pulsewidth@lemmy.world 3 points 1 day ago (1 children)

Where are you? I bet there's at least a few local ISPs that would allow you to use a user-supplied router.

[–] DaPorkchop_@lemmy.ml 3 points 1 day ago

There are better ISPs around, but my parents (who are the ones paying for it) don't want to switch providers because... reasons? At any rate it isn't happening any time soon, but once I move out I'll finally be able to switch to Init7 and be done with it all :)

[–] gagootron@feddit.org 1 points 1 day ago (1 children)

Maybe you can enable bridge mode on it? Then you could run something like opnsense behind it.

[–] DaPorkchop_@lemmy.ml 2 points 1 day ago

It's only got a DMZ mode where I can configure it to forward all incoming traffic to my own router running behind it, but even in that mode it still has to NAT all the packets. IPv6 traffic seems to get forwarded along without much (if any) additional processing, but for hosting stuff publicly I would obviously need to expose IPv4 as well.

[–] mlg@lemmy.world 11 points 2 days ago (1 children)

Host your own cloud worthy anti DDOS solution with fail2ban /s

[–] monogram@feddit.nl 3 points 1 day ago (2 children)
[–] mlg@lemmy.world 1 points 1 day ago

fail2ban is good for preventing spam and DDOS on authenticated endpoints, but it's harder to prevent attacks on public endpoints against a botnet or even a lazy proxy chain spam, which is why cloudflare adds some cookies and a buffer to handle a wave of new connections and maintain an address rank to drop any bad clients.

Although that being said, cloudflare can be bypassed via other timing tricks and even just using a specific request chain to get fresh cf cookies to avoid getting blocked.

[–] PotatoesFall@discuss.tchncs.de 1 points 1 day ago (1 children)

There was a pretty bad CVE a while back I vaguely recall

[–] monogram@feddit.nl 3 points 1 day ago

The fact that a CVE was found doesn’t make it bad

In fact I’d say if it is handled well, fixed in an appropriate way & communicated correctly, having a fixed CVE should be seen as a good thing.

The alternative, lying to yourself and all your users that your code is perfectly sculpted and reviewed by each godly entity, is not the way.

[–] Fizz@lemmy.nz 5 points 1 day ago

Could you shell out for a decent firewall? It should be able to protect against majority of ddos attacks unless someone is paying for something big.

But it really is fine to use cloudflare if you want the ddos protection. I wouldnt feel bad at all.

[–] this@sh.itjust.works 1 points 1 day ago

Crowdsec+pangolin maybe? I would actually like to hear people's thoughts on this.

[–] lefixxx@lemmy.world 1 points 1 day ago

i dont understand why people hate cloudflare so much. Do they see the cloudflare logo when a server is down and assume its CFs fault?

[–] MonkderVierte@lemmy.zip -1 points 1 day ago

If you didn't piss off one of the big bot groups, then you have likely a configuration issue.