-
the programming.dev instance is getting hammered by /inbox requests. I'm not sure if it's coming from a mobile client or not, but turning on DDOS protection seems to immediately break the clients, with the error: Turning down the DDOS protection immediately fixes the issue. Is this resolvable, or is it a consequence of wefwef not being able to complete the javascript check? |
Beta Was this translation helpful? Give feedback.
Replies: 4 comments 1 reply
-
@snowe2010 the You might be able to identify the source by inspecting the nginx logs for Lemmy. The User-Agent header by default is configured to have the instance name and version. Here's an example of my nginx access logs, coming from lemmy.world and beehaw.org:
As for fixing the mobile app... Since wefwef has a server component that acts as a proxy between the user and the Lemmy instance, you may be able to whitelist wefwef's server IP. An nslookup of wefwef.app gives the following: Name: wefwef.app
Address: 64.227.15.201 So if you were to allow wefwef through in Cloudflare, this should theoretically work. |
Beta Was this translation helpful? Give feedback.
-
Dang.. Magic Transit (needed for that) is an enterprise only product.. Let me see what I can do. Thank you for the prompt response! |
Beta Was this translation helpful? Give feedback.
-
Why would you need transit for this? Assuming if the above is correct, you should be able to just whitelist the IP in WAF if you need to allow an IP to bypass you WAF: https://developers.cloudflare.com/waf/tools/ip-access-rules/ security > WAF > tools > ip address rules |
Beta Was this translation helpful? Give feedback.
-
Moving to a discussion. |
Beta Was this translation helpful? Give feedback.
Why would you need transit for this? Assuming if the above is correct, you should be able to just whitelist the IP in WAF if you need to allow an IP to bypass you WAF: https://developers.cloudflare.com/waf/tools/ip-access-rules/
security > WAF > tools > ip address rules