Author

Topic: Is anyone having error 504? (Read 793 times)

copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
September 04, 2018, 02:45:25 PM
#57
They seem to be seperate people (but maybe I'm wrong)...
Good to see you again Jack.

After exploring the accounts I am confident that hilariousandco and hilariousetc are alts to each others.
Quote
My alt account used on unsecure connections/computers. Do not send any coins or do any business with this account without confirming it with my main one first.
Ref: https://bitcointalk.org/index.php?action=trust;u=164822

I spotted another one which is hilarious*
Quote
I just voted with the following account which is a Newbie: https://bitcointalksearch.org/user/hilarious-1424594 hilarious*
Ref: https://bitcointalksearch.org/topic/m.44695485

So, to summarise: hilariousandco, hilariousetc and hilarious* are indeed alt to each others and I am 100% positive about it  Smiley

By the way: After the last 504 issues have we had any other server crashing?

Ah yes Smiley I seem to be being too ignorant for my own good at this stage... - nice spot!

I don't think there has been much errors recently (or at least ones I've noticed) this forum seems to be back up to quite a good speed.
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
September 04, 2018, 12:26:44 PM
#56
They seem to be seperate people (but maybe I'm wrong)...
Good to see you again Jack.

After exploring the accounts I am confident that hilariousandco and hilariousetc are alts to each others.
Quote
My alt account used on unsecure connections/computers. Do not send any coins or do any business with this account without confirming it with my main one first.
Ref: https://bitcointalk.org/index.php?action=trust;u=164822

I spotted another one which is hilarious*
Quote
I just voted with the following account which is a Newbie: https://bitcointalksearch.org/user/hilarious-1424594 hilarious*
Ref: https://bitcointalksearch.org/topic/m.44695485

So, to summarise: hilariousandco, hilariousetc and hilarious* are indeed alt to each others and I am 100% positive about it  Smiley

By the way: After the last 504 issues have we had any other server crashing?
hero member
Activity: 518
Merit: 500
August 31, 2018, 09:34:18 PM
#55
sometime i also have issue with error 504 when login to forum, but reload and wait a little bit, every thing is oke.
legendary
Activity: 1372
Merit: 1252
August 31, 2018, 01:28:19 PM
#54
The copies would need to be encrypted kind of like freenet style, and it decrypts as you log in.. the passes could be hashes that check in the blockchain so it's like keeping your private keys from bitcoin safe... just throwing in some ideas.

It could probably be done but im not a good enough coder to actually get it working. I would wait until we have sidechains, I don't really see people throwing in electricity for a PoW that only servers this forum, we need to take advantage of the BTC blockchain hashrate.

Too complicated so for now we'll have to deal with the ddosers the oldschool way.

I could probably do quite a bit of the signatures stuff. The transmission would be what I struggle with though but that could already be sampled from the regular core.
As for the proof of work, that would be done whn you post, each post is a block and y'all get the score (or it could even be each topic is a block, you download the block, sign your new block, verify the entire block after checking the signatures of all the transactions/posts inside of that block/thread)...

Interesting take on it, but im not sure about post per block, even thread per block, I mean, as with everything in life, it is prone to exploits, in this case people could just spam the fuck out of it, I mean this forum is pretty fast paced already, so I have my doubts this would work out well. Perhaps more advanced members would have their "blocks" mined with a priority.. merit could act as a "fee" of sorts? im not sure, there are some good angles to research in the field of decentralizing a forum and protecting it against ddos. But then, if it becomes too complicated for noobs to get started and posting, someone else may just attack the niche with a classic forum and get traffic away from deflecting users of this forum in current form, ranking better in Google and then ending in ad revenue loss... very hard to balance things out here.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 31, 2018, 05:35:13 AM
#53
They are cousin brothers.  Grin
Okay, I'm kidding. @hilariousetc is the alternative account of @hilariousandco. Or, @hilariousandco is the alternative account of @hilariousetc, but I think the first one is correct assuming @hilariousandco was created before and is in the DT, or has been a part of DT for a longer time, because I'm not sure if @hilariousetc is in the DT or not.
Thanks for the information. I am keeping it simple meaning they are alt to each others.

I think that's unlikely as hilariousandco was the first username I spotted (moderating bitcoin discussion) and hilarious is quite a common word.

They seem to be seperate people (but maybe I'm wrong)...
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 31, 2018, 05:30:12 AM
#52
They are cousin brothers.  Grin
Okay, I'm kidding. @hilariousetc is the alternative account of @hilariousandco. Or, @hilariousandco is the alternative account of @hilariousetc, but I think the first one is correct assuming @hilariousandco was created before and is in the DT, or has been a part of DT for a longer time, because I'm not sure if @hilariousetc is in the DT or not.
Thanks for the information. I am keeping it simple meaning they are alt to each others.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 30, 2018, 10:37:19 AM
#51
The copies would need to be encrypted kind of like freenet style, and it decrypts as you log in.. the passes could be hashes that check in the blockchain so it's like keeping your private keys from bitcoin safe... just throwing in some ideas.

It could probably be done but im not a good enough coder to actually get it working. I would wait until we have sidechains, I don't really see people throwing in electricity for a PoW that only servers this forum, we need to take advantage of the BTC blockchain hashrate.

Too complicated so for now we'll have to deal with the ddosers the oldschool way.

I could probably do quite a bit of the signatures stuff. The transmission would be what I struggle with though but that could already be sampled from the regular core.
As for the proof of work, that would be done whn you post, each post is a block and y'all get the score (or it could even be each topic is a block, you download the block, sign your new block, verify the entire block after checking the signatures of all the transactions/posts inside of that block/thread)...
legendary
Activity: 1372
Merit: 1252
August 30, 2018, 09:33:08 AM
#50
Apparently there is a new .onion format that is very improved and works faster. But still, all the encryption and so on will always make things slower than clearnet. So this default slowness will make things as bad when ddos'd or even worse (even if ddossed have a harder time ddossing, it will still be effective)
Tor runs quite quickly on my computer.
My internet history is very long on firefox so when I put it to connect through tor it doesn't slow down very much.

The solution is most likely a blockchain based forum. Perhaps with sidechains somehow we can use BTC's blockchain to host a forum? who knows. I just hope it doesn't require javascript. Cloudfare forces javascript and then add the google catpcha. Not good.
I don't think theymos likes to hand out copies of the forum (as it opens up the potential for the site to gain phishing attempts).
The login stuff would still need to be done by the loginserver otherwise there would be a lot of issues (unless we get masternodes that moderators and legendaries can have which can allow users to autehnticate their way onto the website)...
All of the core devs also seem to have ditched bitcointalk so I'm not sure how kindly they'd take to a suggestion of hosting it.


The copies would need to be encrypted kind of like freenet style, and it decrypts as you log in.. the passes could be hashes that check in the blockchain so it's like keeping your private keys from bitcoin safe... just throwing in some ideas.

It could probably be done but im not a good enough coder to actually get it working. I would wait until we have sidechains, I don't really see people throwing in electricity for a PoW that only servers this forum, we need to take advantage of the BTC blockchain hashrate.

Too complicated so for now we'll have to deal with the ddosers the oldschool way.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 30, 2018, 07:17:20 AM
#49
Apparently there is a new .onion format that is very improved and works faster. But still, all the encryption and so on will always make things slower than clearnet. So this default slowness will make things as bad when ddos'd or even worse (even if ddossed have a harder time ddossing, it will still be effective)
Tor runs quite quickly on my computer.
My internet history is very long on firefox so when I put it to connect through tor it doesn't slow down very much.

The solution is most likely a blockchain based forum. Perhaps with sidechains somehow we can use BTC's blockchain to host a forum? who knows. I just hope it doesn't require javascript. Cloudfare forces javascript and then add the google catpcha. Not good.
I don't think theymos likes to hand out copies of the forum (as it opens up the potential for the site to gain phishing attempts).
The login stuff would still need to be done by the loginserver otherwise there would be a lot of issues (unless we get masternodes that moderators and legendaries can have which can allow users to autehnticate their way onto the website)...
All of the core devs also seem to have ditched bitcointalk so I'm not sure how kindly they'd take to a suggestion of hosting it.
legendary
Activity: 1372
Merit: 1252
August 30, 2018, 07:10:17 AM
#48
It might be easier to make a dark web sersion of this site (.onion) so that we can access it during ddos attacks although I'm not sure whether that would work very well (having two instances of the same software/systems).

.onion is even worse for DDoS attacks because the clients are all anonymous, so you can't ban abusive IPs. That's why I haven't created a .onion, even though it would be very easy to do.

Tor needs to address this somehow. I've mentioned some ideas in the past.

Ahh, I thought that the .onion versions of sites are generally a bit stronger as people are then limited to the speeds that tor can function at, meaning people that are further away from the DDoSers should be less affected by it (although I'm probably wrong).

And yes but I sense they're unlikely to do major updates of the system anytime soon, which is a shame, they'd also then have to start tracking people somewhat...

Apparently there is a new .onion format that is very improved and works faster. But still, all the encryption and so on will always make things slower than clearnet. So this default slowness will make things as bad when ddos'd or even worse (even if ddossed have a harder time ddossing, it will still be effective)

Also the problem that theymos mentioned of unbanned IP's.

The solution is most likely a blockchain based forum. Perhaps with sidechains somehow we can use BTC's blockchain to host a forum? who knows. I just hope it doesn't require javascript. Cloudfare forces javascript and then add the google catpcha. Not good.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 30, 2018, 06:06:14 AM
#47
It might be easier to make a dark web sersion of this site (.onion) so that we can access it during ddos attacks although I'm not sure whether that would work very well (having two instances of the same software/systems).

.onion is even worse for DDoS attacks because the clients are all anonymous, so you can't ban abusive IPs. That's why I haven't created a .onion, even though it would be very easy to do.

Tor needs to address this somehow. I've mentioned some ideas in the past.

Ahh, I thought that the .onion versions of sites are generally a bit stronger as people are then limited to the speeds that tor can function at, meaning people that are further away from the DDoSers should be less affected by it (although I'm probably wrong).

And yes but I sense they're unlikely to do major updates of the system anytime soon, which is a shame, they'd also then have to start tracking people somewhat...
administrator
Activity: 5222
Merit: 13032
August 29, 2018, 07:10:39 PM
#46
It might be easier to make a dark web sersion of this site (.onion) so that we can access it during ddos attacks although I'm not sure whether that would work very well (having two instances of the same software/systems).

.onion is even worse for DDoS attacks because the clients are all anonymous, so you can't ban abusive IPs. That's why I haven't created a .onion, even though it would be very easy to do.

Tor needs to address this somehow. I've mentioned some ideas in the past.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 29, 2018, 07:04:12 PM
#45
Why don't you work on that after you're done with he new forum? I've always though cloudflare was crap. If something better can be made then I'm sure you could make a business out of it, or at the very least the forum would benefit.

It's not my main area of interest, so I might never get around to it.

If I was interested in that, what I'd do is create an open source project which would basically replicate Cloudflare (plus improvements) by using your own AWS, Azure, Google Cloud, etc. account. So you'd download the open source script, give it your cloud-provider credentials, and it'd set it all up for you, maybe even including a nice Web interface. It would create a small CDN of a few very-lightweight instances spread across the world, and automatically spin up more instances in the correct regions when the existing ones are overloaded. The instances would reverse-proxy your site, cache appropriately, keep track of IP reputation, sometimes insert challenges, etc. Costs would probably be higher than the cheaper Cloudflare plans, but much cheaper than Cloudflare Enterprise.

Also, that this sort of need exists shows that the Internet is fundamentally broken. PoW should be part of TCP, not a janky hack which requires hiding behind huge networks and probably accepting a MITM.

It might be easier to make a dark web sersion of this site (.onion) so that we can access it during ddos attacks although I'm not sure whether that would work very well (having two instances of the same software/systems).

We should have a new BIP where bitcoin nodes broadcast bitcointalk topics and the site instead of using the main server so that people can put in "bitcointalk.org" and access their closest node Grin.
administrator
Activity: 5222
Merit: 13032
August 29, 2018, 06:42:29 PM
#44
Can I assume that the DDoS attack is finally over now? Site response time is fast again.

They were trying various different things for several hours, but they stopped for now. I wouldn't be surprised if they try it again tomorrow, but I re-activated one of the systems which was part of my custom anti-DDoS setup before moving to Cloudflare, and that's been able to identify and block them so far.

DDoS attacks are back-and-forth affairs:
1. The attacker tries something.
2. Your automated systems handle it, or the site goes down until you manually figure out how to mitigate it.
3. The attacker tries something else.
4. Repeat until one side gets sick of it.

Why don't you work on that after you're done with he new forum? I've always though cloudflare was crap. If something better can be made then I'm sure you could make a business out of it, or at the very least the forum would benefit.

It's not my main area of interest, so I might never get around to it.

If I was interested in that, what I'd do is create an open source project which would basically replicate Cloudflare (plus improvements) by using your own AWS, Azure, Google Cloud, etc. account. So you'd download the open source script, give it your cloud-provider credentials, and it'd set it all up for you, maybe even including a nice Web interface. It would create a small CDN of a few very-lightweight instances spread across the world, and automatically spin up more instances in the correct regions when the existing ones are overloaded. The instances would reverse-proxy your site, cache appropriately, keep track of IP reputation, sometimes insert challenges, etc. Costs would probably be higher than the cheaper Cloudflare plans, but much cheaper than Cloudflare Enterprise.

Also, that this sort of need exists shows that the Internet is fundamentally broken. PoW should be part of TCP, not a janky hack which requires hiding behind huge networks and probably accepting a MITM.
sr. member
Activity: 1162
Merit: 450
August 29, 2018, 06:33:49 PM
#43
It looks like another batch of butthurts tries to disable the whole system. Maybe because of merits lol Grin

I thought it was the configuration of the language code published by theymos making the forum down for about 3 hours. Huh Or maybe the new bitcointalk forum or the badge system.
legendary
Activity: 1372
Merit: 1252
August 29, 2018, 06:15:03 PM
#42
I wonder who are the no-lifers always attacking this forum. Perhaps they are Roger Ver related? they want to see this forum dead so bad so he can get all the traffic into his bitcoin dot com forum, similar to how he wants the bitcoin subreddit dead so traffic is sent to the btc subredddit, or ideally, taking control of it.

You always have to be alert because they will keep trying. As far as todays ddos, it has ruined any chances of me using the forum today, specially with Tor, the nodes were struggling, wereas in clearnet you had a chance to browse it in insanely slow mode.
copper member
Activity: 2856
Merit: 3071
https://bit.ly/387FXHi lightning theory
August 29, 2018, 05:01:29 PM
#41
I was being redirected to the cloudflare site earlier with the static version on it...

As far as i have heard that this is one of the methods how hackers could gain acces to information which is stored to server..? like passwords.
Also as others have mentioned before, it could be an attemt to extort webpage owners if the server or admin cant handle the attack.

Yes, I think Theymos is too intelligent to fall for ddos attacks. Now i'm getting the hashcash redirection initially also (I think it's hashcash anyway).

Crypto related email addresses sell like hotcakes on the black market (as far as I understand it anyway). And if you can login to one, you can reset someone's password if you can't get it from the forum. Equally people have hashed passwords stored on this forum but there are certain ways to find some peoples' passwords if they're particularly weak.
full member
Activity: 490
Merit: 123
August 29, 2018, 04:09:18 PM
#40
I too had some problems with acces to forum, was thinking that it could be beacause of increased bot traffic. It seems that everything is working well at the moment. Smiley

Why would someone DDos these forums? What could they possibly gain from doing this?

Glad to see everything working now, because I wasn't able to use the forums the past 3 hours.

As far as i have heard that this is one of the methods how hackers could gain acces to information which is stored to server..? like passwords.
Also as others have mentioned before, it could be an attemt to extort webpage owners if the server or admin cant handle the attack.


hero member
Activity: 882
Merit: 544
August 29, 2018, 03:35:23 PM
#39
So theoretically it can stop bots, who spam nonsense posts forumwide? Does this work in practice as well?
Or those bots are not that kind of bots?
If noscript browser means e.g. tor browser
No script browser can pertain to any browser with a script blocker installed. As far as I know, it can stop bots because most of the times bots use no script browsers to do the repetitive tasks set by its user and enabling the checking your browser feature of Cloudflare makes them somehow unable to access the forum.
DDoS attack over?
No, but for now I'm successfully filtering it.
Can I assume that the DDoS attack is finally over now? Site response time is fast again.
legendary
Activity: 3304
Merit: 1617
#1 VIP Crypto Casino
August 29, 2018, 02:09:47 PM
#38
Seems quick for me now but wasn’t able to get on at all today until now
hero member
Activity: 1442
Merit: 629
Vires in Numeris
August 29, 2018, 02:00:41 PM
#37
...
First of all, I can enable the "checking your browser" thing, and that stops almost all attacker traffic. But that also breaks noscript browsers and bots, so I don't like to do it too much. Skilled attackers can also sometimes get through that, though I think that it does require a proof-of-work.
...

Checking your browser is still on, but it's not a problem for me.
The interesting part in your answer is the following:
...
But that also breaks noscript browsers and bots

So theoretically it can stop bots, who spam nonsense posts forumwide? Does this work in practice as well?
Or those bots are not that kind of bots?

If noscript browser means e.g. tor browser, than I can understand that you don't like to use this checking your browser a lot, just when it's absolutely necessary.


legendary
Activity: 1428
Merit: 1166
🤩Finally Married🤩
August 29, 2018, 12:44:21 PM
#36
It often happens lately.
I think this was the fourth time.
Am I the only one who noticed it?
Or Am I just the only one who has been experiencing it?
jr. member
Activity: 78
Merit: 1
August 29, 2018, 12:43:22 PM
#35
Is everything back to normal now? This is the first time I've been able to get on here today. Though it might be a DDOS. There are some vindictive people out there  Shocked
hero member
Activity: 2646
Merit: 686
August 29, 2018, 12:35:20 PM
#34
DDoS attack over?

No, but for now I'm successfully filtering it.

Has Cloudflare had an effect on DDOS attacks at all? I'm guessing there's been a few attempts since it was introduced, but we haven't noticed. I haven't used cloudflare, but I assume they let you know if there is an unusual amount of traffic happening?

CF stops all sub-layer-7 attacks, which is somewhat useful. But I was doing pretty well at stopping those on my own. What caused me to switch to Cloudflare in the first place was tens of thousands of IPs doing things which seemed indistinguishable from real-world traffic. For those layer-7 attacks, Cloudflare has been a mixed bag.

First of all, I can enable the "checking your browser" thing, and that stops almost all attacker traffic. But that also breaks noscript browsers and bots, so I don't like to do it too much. Skilled attackers can also sometimes get through that, though I think that it does require a proof-of-work.

Cloudflare is honestly not very good at detecting attack traffic. You'd think that they'd be able to detect things like a huge influx of IPs that are not the regular visitors, or IPs that are not used for regular traffic on any of CF's sites, or a bunch of weird request patterns that have never been done before in the history of the site. I feel like I'd be able to write this kind of general detection code if I had a year to dedicate to it, and I'm not a giant corporation. So that's a disappointment. But nobody else is better AFAIK. I talked to Incapsula at length, and their tech is AFAICT basically the same as Cloudflare, but a lot more expensive.
It's a DDoS.

I suspected this was the reason after initial 30 minutes of not being able to access the site I decided to see if there was any update on twitter, last time in a similar situation we had gotten a update there. I'm glad the site is up and running for all, this is the second big Ddos attack on this site in two years, but im glad thermos got it up in time.

I was planning to take Ddos for my site but after reading this review I feel it's not worth to take it for my website thanks theymos for the detailed explanation.
sr. member
Activity: 476
Merit: 359
August 29, 2018, 12:24:29 PM
#33
It is working just fine for me now, I can say the forum is back for me.

snipe
Why don't you work on that after you're done with he new forum? I've always though cloudflare was crap. If something better can be made then I'm sure you could make a business out of it, or at the very least the forum would benefit.

Theymos would be gone if you bring the topic of "new forum" Grin . Well cant blame him tho, i believe it is a hard thing to maintain a big forum like these,

snip

Because they're dicks. Some people just get off on it and do it because they can. Sometimes people also do it in an extortion attempt: "pay up or we won't stop".

Or maybe some competitor? This question would raise a lot of thing i guess, but i am not accusing someone here.
sr. member
Activity: 1204
Merit: 290
August 29, 2018, 12:15:16 PM
#32
PS: Just out of curiosity, is there any relationship between hilariousetc and hilariousandco?

They are cousin brothers.  Grin
Okay, I'm kidding. @hilariousetc is the alternative account of @hilariousandco. Or, @hilariousandco is the alternative account of @hilariousetc, but I think the first one is correct assuming @hilariousandco was created before and is in the DT, or has been a part of DT for a longer time, because I'm not sure if @hilariousetc is in the DT or not.
legendary
Activity: 3136
Merit: 3213
August 29, 2018, 12:03:08 PM
#31
Yeah working fast and great again !
Refreshing and Threads opening have taken long but worked !
Only creating Posts or Quotes hasnt worked for me , but fine now again wooot  !

 Grin  Cheesy Grin
member
Activity: 532
Merit: 15
Trader
August 29, 2018, 11:21:56 AM
#30

There was an DDos  attack on the site. So there was a problem in the server for 5 hours.  we all felt some problems. so we could not access your account. Now it's okay.
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 29, 2018, 11:21:31 AM
#29
Sometimes people also do it in an extortion attempt: "pay up or we won't stop".
Some people find it fun to do it which is obviously bad for the victim.

PS: Just out of curiosity, is there any relationship between hilariousetc and hilariousandco?
legendary
Activity: 2968
Merit: 3061
Join the world-leading crypto sportsbook NOW!
August 29, 2018, 11:15:26 AM
#28
I feel like I'd be able to write this kind of general detection code if I had a year to dedicate to it, and I'm not a giant corporation. So that's a disappointment.

Why don't you work on that after you're done with he new forum? I've always though cloudflare was crap. If something better can be made then I'm sure you could make a business out of it, or at the very least the forum would benefit.

Why would someone DDos these forums? What could they possibly gain from doing this?

Glad to see everything working now, because I wasn't able to use the forums the past 3 hours.

Because they're dicks. Some people just get off on it and do it because they can. Sometimes people also do it in an extortion attempt: "pay up or we won't stop".
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 29, 2018, 11:13:34 AM
#27
DDoS attack over?

No, but for now I'm successfully filtering it.
I can see the filtering is working. I am browsing the forum smoothly from last 15 minutes. Hope it's over for now until the attacker have their next move  Smiley
jr. member
Activity: 106
Merit: 6
August 29, 2018, 11:03:24 AM
#26
Why would someone DDos these forums? What could they possibly gain from doing this?

Glad to see everything working now, because I wasn't able to use the forums the past 3 hours.
newbie
Activity: 215
Merit: 0
August 29, 2018, 11:01:12 AM
#25
Yes, It happened to my browser too.  Probably they are having some updates with the site that is why we'd experience that.  I thought I was the only one having that error that I had to turn my PC on and off for several times.
administrator
Activity: 5222
Merit: 13032
August 29, 2018, 11:00:39 AM
#24
DDoS attack over?

No, but for now I'm successfully filtering it.

Has Cloudflare had an effect on DDOS attacks at all? I'm guessing there's been a few attempts since it was introduced, but we haven't noticed. I haven't used cloudflare, but I assume they let you know if there is an unusual amount of traffic happening?

CF stops all sub-layer-7 attacks, which is somewhat useful. But I was doing pretty well at stopping those on my own. What caused me to switch to Cloudflare in the first place was tens of thousands of IPs doing things which seemed indistinguishable from real-world traffic. For those layer-7 attacks, Cloudflare has been a mixed bag.

First of all, I can enable the "checking your browser" thing, and that stops almost all attacker traffic. But that also breaks noscript browsers and bots, so I don't like to do it too much. Skilled attackers can also sometimes get through that, though I think that it does require a proof-of-work.

Cloudflare is honestly not very good at detecting attack traffic. You'd think that they'd be able to detect things like a huge influx of IPs that are not the regular visitors, or IPs that are not used for regular traffic on any of CF's sites, or a bunch of weird request patterns that have never been done before in the history of the site. I feel like I'd be able to write this kind of general detection code if I had a year to dedicate to it, and I'm not a giant corporation. So that's a disappointment. But nobody else is better AFAIK. I talked to Incapsula at length, and their tech is AFAICT basically the same as Cloudflare, but a lot more expensive.
hero member
Activity: 2576
Merit: 883
Freebitco.in Support https://bit.ly/2I9BVS2
August 29, 2018, 10:57:28 AM
#23
Has Cloudflare had an effect on DDOS attacks at all? I'm guessing there's been a few attempts since it was introduced, but we haven't noticed. I haven't used cloudflare, but I assume they let you know if there is an unusual amount of traffic happening?

I'm still finding the site a little sluggish, but not running into any errors or anything.

The main effect it has is that it can be adjusted to deal with an attack a lot easier than if you have your own custom system. It just saves a lot of work.
staff
Activity: 3304
Merit: 4115
August 29, 2018, 10:52:25 AM
#22
Has Cloudflare had an effect on DDOS attacks at all? I'm guessing there's been a few attempts since it was introduced, but we haven't noticed. I haven't used cloudflare, but I assume they let you know if there is an unusual amount of traffic happening?

I'm still finding the site a little sluggish, but not running into any errors or anything.
Vod
legendary
Activity: 3668
Merit: 3010
Licking my boob since 1970
August 29, 2018, 10:51:02 AM
#21
It's responding fast for me now.  DDoS attack over?
hero member
Activity: 1806
Merit: 672
August 29, 2018, 10:47:20 AM
#20
Weren't able to have a proper connection for 4-5 hours but as of right now it starting to look good but the problem I am having right now is even thought I don't get the Error 504 the pages of the forum seems that it takes a while to load but other than that BCT is fully accessible to me now.
legendary
Activity: 2492
Merit: 1232
August 29, 2018, 10:41:37 AM
#19
It's a DDoS.
Thanks on this information finally we have now a clear as a crystal information regarding the error that we encounter in a few minutes ago.

That was also in my mind that it might a DDoS attacked again, and thank you it is fixed now.

Good to see that our beloved forum is now back to normal.
copper member
Activity: 2338
Merit: 4543
Join the world-leading crypto sportsbook NOW!
August 29, 2018, 10:35:29 AM
#19
It's a DDoS.

I suspected so much.  I couldn't get on at all, and then the cloudfair backup would load.  It's probably not even worth the effort to try to pin down the IP address of the culprit. 
copper member
Activity: 630
Merit: 420
We are Bitcoin!
August 29, 2018, 10:24:39 AM
#18
I didn't get 504, the error exactly stated Error 525: SSL handshake failed.
This seems a completely different one that we all have experienced. This means something related to the SSL of the website.


It's a DDoS.
Finally we have the confirmation. Yeah seems like ddos broke my life @hilariousandco  Tongue
global moderator
Activity: 3990
Merit: 2717
Join the world-leading crypto sportsbook NOW!
August 29, 2018, 10:23:49 AM
#17
DDoS ruins lives.
administrator
Activity: 5222
Merit: 13032
August 29, 2018, 10:19:34 AM
#16
It's a DDoS.
legendary
Activity: 2212
Merit: 2061
Join the world-leading crypto sportsbook NOW!
August 29, 2018, 10:19:22 AM
#15
It's coming back to life now.

Bots on suicide watch not being able to post/spam for couple of hours.  Grin
legendary
Activity: 1988
Merit: 1317
Get your game girl
August 29, 2018, 10:15:04 AM
#14
And this is not the first time this happens. The last time it was also a DDoS attack.
Which last time? The most recent one was due to the query theymos had run...
 
My conclusions are based on the error codes I received during the time out. I didn't get 504, the error exactly stated Error 525: SSL handshake failed. However, I don't disagree that it also could be due to Ddos.
jr. member
Activity: 243
Merit: 2
August 29, 2018, 10:07:53 AM
#13
I thought im the only one experiencing this and makes me think maybe im banned. Lol. But its getting okay as of now.
legendary
Activity: 2408
Merit: 2226
Signature space for rent
August 29, 2018, 09:32:36 AM
#12
During 3 hour's (Aprrox) unable to open. Just now open forum but still too slow. Perhaps ddos attack (IMO). Although I am using high speed internet but still forum loading is very low speed. As far as I know if cloudflare detect suspicious entry they disable website for few moment.
legendary
Activity: 2758
Merit: 6830
August 29, 2018, 09:26:47 AM
#11
I don't think it's Ddos.. As Cloudflare describes it

-snip-

Maybe some miss-configuration theymos did while setting up the local language thingy? It's still very bad for me. I can barely access the website and takes about 10-20 reloads to open a page.
More like a DDoS (or at least something along with what @mdayonliner said). According to this page, the error 502 and 504 (what I'm getting all the time) means that the back-end servers are not communicating correctly.

"2. The server at the origin is overloaded or unreachable at the time the request was made. The could be due to the server crashing, traffic spikes, or lack of connectivity to the server."

And this is not the first time this happens. The last time it was also a DDoS attack.
copper member
Activity: 630
Merit: 420
We are Bitcoin!
August 29, 2018, 09:18:03 AM
#10
Probably a ddos.
I don't think it's Ddos.. As Cloudflare describes it

Apparently it's over 3 hours so far that we are having the same issue. I am sure it's not the ddos (on the same page as Joel_Jantsen), it's not something with the language codes update as well since those were only the HTML tags.

It could be something to do with the Homographs update. When theymos added the additional script for the homographs check, he must left a glitch on the code. I am sure the script is checking all the characters individually to see if it is a match for the slimier letter for another language.

By the way, don't blame me if I am totally wrong since I do not have any idea about the sever config and all other factors related to the server we have the forum hosted.


There is a 503 error as well which I encountered and this is not from cloudflare by the way.

legendary
Activity: 1988
Merit: 1317
Get your game girl
August 29, 2018, 08:40:07 AM
#9
Probably a ddos.
I don't think it's Ddos.. As Cloudflare describes it

Quote
Common causes
The most common causes include:

The origin web server does not have a valid SSL certificate installed.
The origin web server is not listening on port 443 (or other custom secure port).
The origin web server does not support or is not configured properly for SNI.
The cipher suites that Cloudflare accepts and the cipher suites that the origin server supports do not match.

Maybe some miss-configuration theymos did while setting up the local language thingy? It's still very bad for me. I can barely access the website and takes about 10-20 reloads to open a page.
sr. member
Activity: 476
Merit: 359
August 29, 2018, 07:37:02 AM
#8
It's alternating with cloudflare archive pages for me.

I guess the bounty spammers and the Twitbook posters with their bots are soaking up most of the server power. It's time they were moved onto a sidechain. Smiley

Well i got the cloudfare archive pages for me too. I hope that is the problem, because we dont want this

Quote from: hillariousandco
Probably a ddos.

to happen. It is annoying indeed, and i hope it will be solved soon and nothing happen to our beloved forum.

ps. It is a good thing if there is an explanation after this incidence.

global moderator
Activity: 3990
Merit: 2717
Join the world-leading crypto sportsbook NOW!
August 29, 2018, 06:47:28 AM
#7
Probably a ddos.
member
Activity: 364
Merit: 46
August 29, 2018, 06:09:14 AM
#6
Its so annoying right now.



member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 29, 2018, 05:43:47 AM
#5
It's alternating with cloudflare archive pages for me.
It took me several attempts before posting my original topic and the 2nd one. Not sure how may attempts it's gonna take me to post this comment.

Quote
I guess the bounty spammers and the Twitbook posters with their bots are soaking up most of the server power. It's time they were moved onto a sidechain. Smiley
I would be interested to know about the current sever configuration. Is there any way to see it publicly?
legendary
Activity: 2814
Merit: 2472
https://JetCash.com
August 29, 2018, 05:30:15 AM
#4
It's alternating with cloudflare archive pages for me.

I guess the bounty spammers and the Twitbook posters with their bots are soaking up most of the server power. It's time they were moved onto a sidechain. Smiley
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 29, 2018, 05:29:20 AM
#3
I'm also having the same error and I guess everyone's experiencing the error too. Maybe Admin is up to something?

The 504 means1 the server is down or not working properly. So, it could be something to do with admins recent update?
Done. I only did the ones that look really similar to Latin characters, and it only applies to English sections. It's done at display time, so it's retroactive.


1
Quote
One server did not receive a timely response from another server that it was accessing while attempting to load the web page or fill another request by the browser. This usually means that the other server is down or not working properly.
ref
sr. member
Activity: 602
Merit: 327
Politeness: 1227: - 0 / +1
August 29, 2018, 05:19:26 AM
#2
I'm also having the same error and I guess everyone's experiencing the error too. Maybe Admin is up to something?

It's always showing when something's happening. Get used to it  Tongue
member
Activity: 164
Merit: 35
Earn 20% ref commission https://bit.ly/2MaHCEr
August 29, 2018, 05:11:11 AM
#1
From last 10 20 30 minutes or so, I am having problems when exploring the site. It's keep saying....

Code:
Error 504 Ray ID: 451--------d8 • 2018-08-29 10:06:52 UTC
Gateway time-out

Seems like the website is having heavy load?
Jump to: