AdamJacobMuller 11 hours ago
301 response to a selection of very large files hosted by companies you don't like.
When their AWS instances start downloading 70000 windows ISOs in parallel, they might notice.
Hard to do with cloudflare but you can also tar pit them. Accept the request and send a response, one character at a time (make sure you uncork and flush buffers/etc), with a 30 second delay between characters.
700 requests/second with say 10Kb headers/response. Sure is a shame your server is so slow.
swiftcoder 20 hours ago
gzip bomb is good if the bot happens to be vulnerable, but even just slowing down their connection rate is often sufficient - waiting just 10 seconds before responding with your 404 is going to consume ~7,000 ports on their box, which should be enough to crash most linux processes (nginx + mod-http-echo is a really easy way to set this up)
xena 11 hours ago
neya 19 hours ago
I was so pissed off that I setup a redirect rule for it to send them over to random porn sites. That actually stopped it.
yabones 10 hours ago
bigfatkitten a day ago
scrps 10 hours ago
jedberg 11 hours ago
geraldcombs 7 hours ago
Retric 4 hours ago
Through discovery you can get the name of the parties involved from Amazon, but Amazon is very likely to drop them as a client solving the issue.
pickle-wizard 6 hours ago
MrThoughtful 21 hours ago
janis1234 2 hours ago
stevoski 18 hours ago
This is from your own post, and is almost the best answer I know of.
I recommending you configure a Cloudflare WAF rule to block the bot - and then move on with your life.
Simply block the bot and move on with your life.
jimrandomh 4 hours ago
_pdp_ 19 hours ago
Depending on how the crawler is designed this may or may not work. If they are using SQS with Lambda then that will obviously not work but it will fire back nevertheless because the serverless functions will be running for longer (5 - 15 minutes).
Another technique that comes to mind is to try to force the client to upgrade the connection (i.e. websocket). See what will happen. Mostly it will fail but even if it gets stalled for 30 seconds that is a win.
n_u 10 hours ago
Sometimes these crawlers are just poorly written not malicious. Sometimes it’s both.
I would try a zip bomb next. I know there’s one that is 10 MB over the network and unzips to ~200TB.
molszanski 20 hours ago
1a527dd5 6 hours ago
locusm 17 hours ago
Scotrix 21 hours ago
Bender 9 hours ago
Assuming one trusts the user-agent in this case one could reduce the traffic reply to them and avoid touching the disk or any applications in Nginx with something like:
if ($http_user_agent ~ (crawler|some-other-bot) ) { return 200 '\n\n\n\nBot quota exceeded, check back in 2150 years.\n\n\n\n'; }
There are other variables to look for to see if something is a bot but such things should be very well tested. $http_accept_language, $http_sec_fetch_mode, etc...I don't use CF but maybe they have a way to block the entire ASN for AWS on your account assuming one does not need inbound connections from them. I just blackhole their CIDR blocks [1] but that won't help someone using a CDN.
kachapopopow 10 hours ago
g-mork 10 hours ago
Similarly, you can also try delivering one byte every 10 seconds or 30 seconds or whatever keeps the client on the other end hanging around for without hitting an internal timeout.
for char in itertools.repeat(b"FUCKOFF"):
await resp.send(char)
await resp.flush()
await asyncio.sleep(10)
# etc
In the SMTP years we called this tarpitting IIRCnijave 5 hours ago
Another idea is replying with large cookies and seeing if the bot saves them and replies with them (once again, to eat traffic)
The idea is to increase their egress to the point someone notices (the bill)
Jean-Papoulos 21 hours ago
bcwhite 15 hours ago
theginger 18 hours ago
Rothnargoth 11 hours ago
It sounds like the bot operator is spending enough on AWS to withstand the current level of abuse reports.
If you really wanted to retaliate, you could try getting a warrant to force AWS to disclose the owners of that AWS instance.
lucastech 6 hours ago
I wish AWS would curtail abuse from their networks. My hope is to build some tools to automate detection and reporting of this sort of abuse, so we can force it into AWS's court.
shishcat 21 hours ago
sp1982 4 hours ago
giardini a day ago
jeroenhd 7 hours ago
As for trying to get them to stop, maybe redirect the bot to random IP:port combinations in a network that's less friendly to being scanned? I believe certain parts of DoD IP space tends to not look kindly upon attempts to scan them.
Depending on your setup, you could try to poison the bot's DNS for your domain. Send them the IP address of their local police force maybe.
My guess is that this is yet another AI scraper. There are others complaining about this bot online but all they seem to come up with is blocking the ASN in Cloudflare.
If there's no technical solution, if consider consulting with a legal professional to see if you can get Amazon to take action. Lawyers are expensive, but so is a Cloudflare bill when they decide you need to be on the "enterprise" tier.
bcwhite 14 hours ago
10 hours ago
Comment deletedreconnecting 11 hours ago
I'd suggest taking a look into patterns and IP rotation (if any) and perhaps blocking IP CIDR at the web server level, if the range is short.
Why simple deny from 12.123.0.0/16 (Apache) is not working for you?
hamburgererror 18 hours ago
hyperknot 17 hours ago
ahazred8ta 17 hours ago
cactusplant7374 4 hours ago
sim7c00 17 hours ago
otherwise, maybe redirect to aws customer portal or something -_- maybe they will stop it if it hit themselves...
pknerd 10 hours ago
brunkerhart 20 hours ago
lloydatkinson 8 hours ago
nurettin 17 hours ago
2OEH8eoCRo0 9 hours ago
> The traffic is hitting numbers that require me to re-negotiate my contract with CloudFlare and is otherwise a nuisance when reviewing analytics/logs.
So you're able to show financial hardship
19 hours ago
Comment deletedznpy 19 hours ago
Make it follow redirects to some kind of illegal website. Be creative, I guess.
The reasoning being that if you can get AWS to trigger security measures on their side, maybe AWS will shut down their whole account.
pingoo101010 20 hours ago
It's a reverse-proxy / load balancer with built-in firewall and automatic HTTPS. You will be able to easily block the annoying bots with rules (https://pingoo.io/docs/rules)
10 hours ago
Comment deleted2000swebgeek 21 hours ago
snvzz 20 hours ago
JCM9 20 hours ago
AWS has become rather large and bloated and does stupid things sometimes, but they do still respond when you get their lawyers involved.
reisse 20 hours ago