Email or username:

Password:

Forgot your password?
Codeberg.org

Honestly, we are currently out of ideas on how to restore access to Codeberg.org.

We are fighting with extreme traffic and high load for several hours now, we have done the typical procedure to identify and block misbehaving AI crawlers.

However, we are currently having a hard time figuring out details about the ongoing high traffic situation.

39 comments
Simx72 :gaming_kirby5:

@Codeberg 🥲

Well, I will keep my development offline and upload it when its okay, just hope you get to fix it, if any help just ask it, O don't have much knowledge but I do have will :)

Codeberg.org

@Simx72 Right now, pushing is even possible, but web access is currently restricted.

DELETED

@Codeberg if you are not already maybe pass it trough clouflare some day to have better statistics over sources etc ?

better understanding might help you mitigate the cause also they have an anti AI crawling

cobratbq - cranky-by-design

@Codeberg hi, I appreciate you guys, your initiative and your effort in this. I'm not bothered with a bit of downtime as I can work offline. Good luck on your issues. I doubt I have useful knowledge in this area that you don't or I would've tried to help.

natacha 🍉

@Codeberg
Courage and thanks for doing your best

Codeberg.org

We were not able to identify the actor who is causing the high load on our systems. We have made the hard decision to temporarily shut off access to a certain project to keep Codeberg available for everyone else.

As soon as we allow web access to a certain project, our system resources are used up within seconds.

Flx

@Codeberg Maybe somebody is abusing Codeberg for hosting stuff used in an app/website (happened to Wikimedia before)?

Morgan Peyre

@Codeberg oh no :(
#hugops, and let's hope these assholes go away

~

@Codeberg fascinating. I hope this is a benign accidental ddos and not a malign one that’s *aiming* to reduce access to said project. Best of luck on this

Patryk :proletariat_verified:

@Codeberg i had somewhat similar situation this week on my forgejo instance and the only idea I had was to

1. Make one of my public repos private (it did help, but just a little)
2. Block whole Facebook and Google ASNs

But this solution is suboptimal in your case, as you care about indexing

Jörn Franke

@Codeberg I do not know the exact architecture that you have setup in Codeberg and you may have set it up already, but what about reverse proxies that introduce rate limiting based on a window (e.g. haproxy.com/blog/four-examples ). You will need to check which software makes most sense to you here. That could address the scenario you have that a specific repository is affected.

Of course, all this does not address all possibly sources of Ddos attacks.

DELETED

@Codeberg i will clean empty projects, that i haven't used yet, i just was too lazy todo that /tbh :ablobcatwink:

Codeberg.org

@jornfranke There's a lot of spamming and scraping happening on the Internet. ~n

Jan Wildeboer 😷:krulorange:

@Codeberg Thank you for your hard work for us, your community members. I hope you will find out what exactly happened here!

DELETED

@Codeberg since you don't use a competent service for freaking 2 day to have better insight on who is the culprit and go back to what you have now after 2 freaking days …

Continue to have this kind of issue without knowing the culprit …
Cloudflare is the only one with this much information so … good bye to your service i guess.

Ed Summers

@Codeberg good luck dealing with this. Can you say which repo was being requested so much?

Ed Summers

@Codeberg thanks! that does sound like it could have been part of some poorly designed automated software update process?

Codeberg.org

@edsu Unlikely. It was massive and distributed, and hammering so much that our systems went down as quickly as within one second of re-allowing the access. It calmed down now, though.

It seemed to be mostly related to some web operations, so we still think it was crawling and only hammering this massive repo by coincidence.

Nico -telmich- Schottelius

@Codeberg Wishing you all the best for recovery, we know those challenges @ungleich unfortunately too well.

フィリップ

@Codeberg Fastly have a free program to support open source projects which may mitigate traffic spikes like this by shielding the traffic from your servers.

I can make the introduction if you’re interested and help get you set up.

Cranca

@Codeberg I hope you can resolve and mitigate the root cause. Stay strong, and remember that we are a community, and you have our support.
💪💪💪♥️♥️♥️

Kai 🇪🇺

@Codeberg Maybe some DDOS protection from your ISP?

Tony Richardson

@Codeberg
Could #AI crawlers lead to the end of access to #opensource projects on the Internet?

thereisnoanderson

@Codeberg hey webtraffic... how can youuuu slap???!!!??? 🤣

Máňa Zalabák

@Codeberg the recent pattern of frequent attacks on neutral non-profit sites providing services for public benefit is disgusting, be it accidental or not.

Alex Schroeder

@Codeberg Sorry to hear about your troubles. In this post I'll try to explain how I handled a similar situation, albeit at a much smaller scale.

This is about me and my problems hosting Emacs Wiki. In the last two months, it must have ended up on some sort of list. The "attack" usually starts around Friday, driving up load to nearly 40 on my tiny VPS. At first, the only solution I had was to shut down the virtual host.

Eventually, I identified a URL pattern that humans are very unlikely to use and when this "attack" starts I scan the access log for that pattern, take the IP number and then I ban the whole range (!) at the firewall. The idea being that these attacks are not from residential networks and therefore they are safe to ban (for me).

For documentation purposes I also run whois for every rule just so that I know who's doing this.

This is a script that sets up the firewall rules and implements all the bans, with comments from WHOIS, so you can get an idea:
https://alexschroeder.ch/admin/ban-cidr

This is the lookup script I use these days. I effectively only care about the ipset commands it prints and append these to the ban-cidr script listed above.
https://alexschroeder.ch/admin/network-lookup

And here are two blog posts about me discovering what was happening. This one has long lists of example as I was trying to figure out what was happening.
https://alexschroeder.ch/view/2024-09-15-emacs-china

And this is me two months later, still complaining, but also documenting the script setup I use:
https://alexschroeder.ch/view/2024-11-25-emacs-china

@Codeberg Sorry to hear about your troubles. In this post I'll try to explain how I handled a similar situation, albeit at a much smaller scale.

This is about me and my problems hosting Emacs Wiki. In the last two months, it must have ended up on some sort of list. The "attack" usually starts around Friday, driving up load to nearly 40 on my tiny VPS. At first, the only solution I had was to shut down the virtual host.

Renaud Chaput

@Codeberg do you want an introduction to the Amazon people at Fastly ? They can probably help you for free through their Fast Forward program, and have tools to fight this

Go Up