August 18, 201510 yr CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats.
August 18, 201510 yr Author CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats. I know that the site has been hosted on Cloudflare for a while, but It's only from today I've noticed that page when I access OSbot, never before.
August 18, 201510 yr CloudFlare is designed to accelerate and secure any website. The system works somewhat like a content delivery network (CDN), but is designed to be much easier to setup and configure. A lot of sites use it to protect their sites from any threats.You mean like against a ddos? Then how come they were able to take osbot down with a layer 7 ddos.
August 18, 201510 yr Other bots have this system implemented too. It seems this optional addon was added within the last couple of days This check ensures that you're not part of a botnet, and in order to pass the check you need to have javascript enabled on your browser apa
August 18, 201510 yr Since OSBot had DDoS attacks the last days this might come in handy ^^ Edited August 18, 201510 yr by Skizow
August 18, 201510 yr if you look really, really closely Edited August 18, 201510 yr by The Hero of Time
August 18, 201510 yr You mean like against a ddos? Then how come they were able to take osbot down with a layer 7 ddos. Because sometimes, the attacks are too strong but this should help us in reducing the amount of DDoS attacks significantly.
August 18, 201510 yr Other bots have this system implemented too. It seems this optional addon was added within the last couple of days This check ensures that you're not part of a botnet, and in order to pass the check you need to have javascript enabled on your browser apa It's not necessarily JavaScript that they check for, as some legitimate users do indeed have JS disabled. It's moreso checking for footprints, eg if you're under a HTTP flood you may see a lot of requests like this: GET /forum/ HTTP/1.1 Host: osbot.org User-Agent: Opera 9.0 Accept: */*;text/plain;text/html;application/json Now, if you see 1000 requests similar to this every second (with different IPs), you know they are all there for the same intent which is to take the site down. There is also another type of flood, called Slowloris, which utilises open HTTP POST connections to flood the server. A request for that may look like this: POST /forum/ HTTP/1.1 Host: osbot.org User-Agent: Opera 9.0 Content-Length: 999999999999999999 (at this point, the request is open and the server is receiving all the data until it reaches length 999999999999999999, which the end user exploits) If a request like that happens, then it's likely an attacker.
Create an account or sign in to comment