this post was submitted on 15 Sep 2025
757 points (98.1% liked)

memes

17365 readers
2640 users here now

Community rules

1. Be civilNo trolling, bigotry or other insulting / annoying behaviour

2. No politicsThis is non-politics community. For political memes please go to !politicalmemes@lemmy.world

3. No recent repostsCheck for reposts when posting a meme, you can only repost after 1 month

4. No botsNo bots without the express approval of the mods or the admins

5. No Spam/Ads/AI SlopNo advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.

A collection of some classic Lemmy memes for your enjoyment

Sister communities

founded 2 years ago
MODERATORS
 

Welcome to 2025
@memes@lemmy.world

top 50 comments
sorted by: hot top controversial new old
[–] lena@gregtech.eu 10 points 11 hours ago (1 children)

Though I'm not a big fan of centralization, I use cloudflare. Their DDoS protection is unmatched, they have scraping protection, and just in case they decide to screw their users over, switching to another service is trivial.

[–] Knock_Knock_Lemmy_In@lemmy.world -1 points 10 hours ago (1 children)

I can stop drinking whenever I want.

If switching is trivial, why not do it now?

[–] Liz@midwest.social 6 points 10 hours ago (1 children)

Their DDoS protection is unmatched

Is it? Try switching and see how often you are DDoSed.

[–] wintervoid@lemmy.blahaj.zone 3 points 11 hours ago

I mean I don't really have a choice because i don't see a better way to put my home server on a url because I live in a dorm and can't port forward or get a static ip

[–] lefixxx@lemmy.world 20 points 22 hours ago (2 children)

cloudflare ddos protection is cetralization?

[–] ne0phyte@feddit.org 53 points 21 hours ago (2 children)

About 20% of global traffic is routed through Cloudflare so unfortunately Cloudflare is very much a massive case of centralization.

A Cloudflare outage would affect a huge number of websites and services and they have some degree of control over the way you host your and use their services.

[–] skepller@lemmy.world 23 points 19 hours ago

Yeah, did people forget the last big Cloudflare outage already? A good chunk of all big services went down simultaneously. Discord, Amazon, Twitter and even the PS and Xbox consoles networks lmao.

[–] InFerNo@lemmy.ml 8 points 16 hours ago

How long before a website not behind something Cloudflare is considered suspicious or unwanted

[–] MonkderVierte@lemmy.zip 7 points 18 hours ago

Yes, use a competitor at least.

[–] mlg@lemmy.world 89 points 1 day ago (1 children)

I deadass got a cloudflare error after reopening this post:

[–] GreenKnight23@lemmy.world 47 points 1 day ago

the people on selfhost would be very upset if they could read this.

[–] DaPorkchop_@lemmy.ml 126 points 1 day ago (14 children)

if you can provide me a better way to keep my homelab from getting DDoSed every five minutes then by all means, please share it

[–] this@sh.itjust.works 1 points 10 hours ago

Crowdsec+pangolin maybe? I would actually like to hear people's thoughts on this.

[–] expr@programming.dev 11 points 19 hours ago (1 children)
[–] DaPorkchop_@lemmy.ml 9 points 19 hours ago (1 children)

That doesn't help against a SYN flood.

[–] expr@programming.dev 2 points 19 hours ago

From what I understand elsewhere in the thread, I believe that's just a matter of router configuration.

[–] daniel@federation.network 26 points 1 day ago (2 children)

@DaPorkchop_@lemmy.ml @memes@lemmy.world Is that an actual issue or a hypothetical one? I've never had an attack in 10 years of publicly hosting stuff.

[–] purplemonkeymad@programming.dev 17 points 23 hours ago (1 children)

As someone else who used to host via an open port, you get random connections all the time. Almost constantly and the request paths make it obvious they are scanning for vulnerabilities. Via cloud flare the number of those requests is much lower, as they have to know at least the DNS to do so, (and can't guess it from a presented SSL cert.)

[–] sobchak@programming.dev 8 points 19 hours ago

Yeah, I see random https and other connections all the time blindly scanning for vulnerabilities. Not enough to cause any real problems though. One time I publicly exposed redis or rabbitmq (can't remember which) and didn't set a password, so someone set a password for me :). That's about the worst that's happened to me.

[–] DaPorkchop_@lemmy.ml 5 points 23 hours ago (2 children)

It's the reason I set up cloudflare in the first place, so yeah. I was getting SYN flood-ed to the point that my router would just crash almost immediately, and after rebooting it the attack would resume after a minute or two.

[–] pulsewidth@lemmy.world 4 points 20 hours ago (1 children)

Get a router that has flood protection? This is like.. Extremely basic network protection.

OpenWRT has had configurable syn-flood protection (enabled by default) since like 2010.

[–] DaPorkchop_@lemmy.ml 2 points 14 hours ago

Even if the SYN packets were being ignored, the connection would still be unusable if there's enough incoming traffic for most legitimate packets to get dropped. And as mentioned in other comments, the router in question is a shitty ISP router which can't be replaced (although I do have a much fancier router with OpenWRT running behind that).

[–] daniel@federation.network 7 points 23 hours ago (1 children)

@DaPorkchop_@lemmy.ml @memes@lemmy.world Hm weird, I don't see why they would spend their resources attacking random people without any kind of demand. Even at work I've never seen one happening.
I still believe Cloudflare has most of its customers because of fearmongering tbh.

[–] Alaknar@sopuli.xyz 6 points 22 hours ago (1 children)

It's a bit like saying "having a password on your account is fearmongering, why would anyone try to access your data".

It's only fearmongering until you get attacked, and it's already too late when you do. Better to be proactive.

[–] daniel@federation.network 6 points 20 hours ago

@Alaknar@sopuli.xyz @memes@lemmy.world Being proactive doesn't mean you have to hide your personal service behind a billion dollar company. That is precisely the kind of overreaction triggered by fearmongering. If you don't know how to secure access points or harden configurations, no service will be able to do it for you as if by magic. Not to mention your responsibility towards your users, who may not want to be tracked by a third-party company without their knowledge every time they visit your site (or half of the internet by now).

[–] daniskarma@lemmy.dbzer0.com 13 points 23 hours ago* (last edited 23 hours ago) (1 children)

Is you homelab getting ddosed constantly?

I had had it for years and never ever got ddosed.

Are you sure it's actually ddos and not just the typical bots scanning for vulnerabilities? Which are easy defended for by keeping updated.

It's weird as a DDOS is not something that's just happens, it's a targeted attack. It's a rare occurrence that someone decided to attack a homelab.

[–] DaPorkchop_@lemmy.ml 8 points 23 hours ago (1 children)

I spent multiple days getting SYN flooded to the point my router would crash and reboot over and over, and it stopped the moment I set up cloudflare and asked my ISP to change my IP. This was the instance which pushed me over the edge, but there had been smaller attacks lasting a few minutes each for years leading up to this.

[–] gagootron@feddit.org 11 points 22 hours ago (5 children)

What kind of router to you have? A good router should not crash from any amount WAN traffic. But yes, if you host anything you will get scanned even harder than usual.

load more comments (5 replies)
[–] wildbus8979@sh.itjust.works 54 points 1 day ago* (last edited 1 day ago) (3 children)

Just put it behind a wireguard server and don't expose any ports?

If you absolutely must expose some stuff, get a cheap 3$/mo vps that connects via wireguard to your home and setup a reverse proxy? They almost all come with DDoS protection.

[–] jim3692@discuss.online 8 points 23 hours ago

Conservatives will get really upset once they realize you are changing genders

[–] Kolanaki@pawb.social 40 points 1 day ago* (last edited 1 day ago) (10 children)

How do I stop a DDOS attack of my website without having port 80 or 443 open, so you can access the website?

load more comments (10 replies)
[–] MummysLittleBloodSlut@lemmy.blahaj.zone 7 points 1 day ago (1 children)

What's a good VPS provider for privacy enthusiasts?

[–] sol6_vi@lemmy.makearmy.io 4 points 18 hours ago

I use Hetzner. Its fine. Boring/10 would use it again I guess?

[–] Fizz@lemmy.nz 5 points 22 hours ago

Could you shell out for a decent firewall? It should be able to protect against majority of ddos attacks unless someone is paying for something big.

But it really is fine to use cloudflare if you want the ddos protection. I wouldnt feel bad at all.

load more comments (7 replies)
[–] bjoern_tantau@swg-empire.de 27 points 1 day ago (1 children)

Don't forget your SSL certificate to prevent man-in-the-middle attacks. 🤪

[–] pulsewidth@lemmy.world 7 points 20 hours ago (1 children)

Don't forget to have the SSL certificate supplied and managed by Cloudflare, of course 🤫

[–] hornedfiend@sopuli.xyz 2 points 12 hours ago

mTLS would solve your entire man in the middle problems.

load more comments
view more: next ›