Zikama Posted August 18, 2015 Share Posted August 18, 2015 Other than delaying my visit on OSbot by 3-5 seconds. Quote Link to comment Share on other sites More sharing options...
TheRealSwaps Posted August 18, 2015 Share Posted August 18, 2015 you d`serious? Quote Link to comment Share on other sites More sharing options...
QuakedM8 Posted August 18, 2015 Share Posted August 18, 2015 Its called cloudfare. Quote Link to comment Share on other sites More sharing options...
Dex Posted August 18, 2015 Share Posted August 18, 2015 CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats. Quote Link to comment Share on other sites More sharing options...
Zikama Posted August 18, 2015 Author Share Posted August 18, 2015 CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats. I know that the site has been hosted on Cloudflare for a while, but It's only from today I've noticed that page when I access OSbot, never before. 1 Quote Link to comment Share on other sites More sharing options...
bellic Posted August 18, 2015 Share Posted August 18, 2015 CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats.You mean like against a ddos? Then how come they were able to take osbot down with a layer 7 ddos. Quote Link to comment Share on other sites More sharing options...
Apaec Posted August 18, 2015 Share Posted August 18, 2015 Other bots have this system implemented too. It seems this optional addon was added within the last couple of days This check ensures that you're not part of a botnet, and in order to pass the check you need to have javascript enabled on your browser apa Quote Link to comment Share on other sites More sharing options...
Skizow Posted August 18, 2015 Share Posted August 18, 2015 (edited) Since OSBot had DDoS attacks the last days this might come in handy ^^ Edited August 18, 2015 by Skizow Quote Link to comment Share on other sites More sharing options...
The Hero of Time Posted August 18, 2015 Share Posted August 18, 2015 (edited) if you look really, really closely Edited August 18, 2015 by The Hero of Time Quote Link to comment Share on other sites More sharing options...
Dex Posted August 18, 2015 Share Posted August 18, 2015 You mean like against a ddos? Then how come they were able to take osbot down with a layer 7 ddos. Because sometimes, the attacks are too strong but this should help us in reducing the amount of DDoS attacks significantly. Quote Link to comment Share on other sites More sharing options...
x3li Posted August 18, 2015 Share Posted August 18, 2015 I get it every a while, like twice or three times a week. Quote Link to comment Share on other sites More sharing options...
Bobrocket Posted August 18, 2015 Share Posted August 18, 2015 Other bots have this system implemented too. It seems this optional addon was added within the last couple of days This check ensures that you're not part of a botnet, and in order to pass the check you need to have javascript enabled on your browser apa It's not necessarily JavaScript that they check for, as some legitimate users do indeed have JS disabled. It's moreso checking for footprints, eg if you're under a HTTP flood you may see a lot of requests like this: GET /forum/ HTTP/1.1 Host: osbot.org User-Agent: Opera 9.0 Accept: */*;text/plain;text/html;application/json Now, if you see 1000 requests similar to this every second (with different IPs), you know they are all there for the same intent which is to take the site down. There is also another type of flood, called Slowloris, which utilises open HTTP POST connections to flood the server. A request for that may look like this: POST /forum/ HTTP/1.1 Host: osbot.org User-Agent: Opera 9.0 Content-Length: 999999999999999999 (at this point, the request is open and the server is receiving all the data until it reaches length 999999999999999999, which the end user exploits) If a request like that happens, then it's likely an attacker. Quote Link to comment Share on other sites More sharing options...