Skip to content
  • Categories
  • Recent
  • Tags
  • All Topics
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo
  1. Home
  2. Uncategorized
  3. Cloudflare Setup
Welcome to Caint!

Issues? Post in Comments & Feedback
You can now view, reply, and favourite posts from the Fediverse. You can click here or click on the on the navigation bar on the left.

Cloudflare Setup

Scheduled Pinned Locked Moved Uncategorized
7 Posts 4 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • yasasY This user is from outside of this forum
    yasasY This user is from outside of this forum
    yasas
    wrote last edited by
    #1

    Hi all,

    We’ve been using Cloudflare for a while now and atm we are in the free tier if that helps(and have turned off acceleration).

    Since like last week we’ve seen a sudden hike in requests to the point where the server cannot handle it anymore.

    c565cb7d-b40f-4e4c-8c34-1ef344883e6c-image.png

    These should be AI crawlers and we’re trying to limit access to them but they seem to crawl into the forum somehow.

    While we would want non-logged-in users/visitors to see the content, since no one can use the site anymore we have decided to only let in logged-in users without checks and for others, for a human check to go through.

    The following is the rule we’re using to identify logged in/actual users:

    19bebf17-9484-4b47-93cf-cb9eec823add-image.png

    I was wondering if there is a better/more standardised/more accurate way to identify logged in users.

    Thanks very much!

    D 1 Reply Last reply
    0
    • yasasY yasas

      Hi all,

      We’ve been using Cloudflare for a while now and atm we are in the free tier if that helps(and have turned off acceleration).

      Since like last week we’ve seen a sudden hike in requests to the point where the server cannot handle it anymore.

      c565cb7d-b40f-4e4c-8c34-1ef344883e6c-image.png

      These should be AI crawlers and we’re trying to limit access to them but they seem to crawl into the forum somehow.

      While we would want non-logged-in users/visitors to see the content, since no one can use the site anymore we have decided to only let in logged-in users without checks and for others, for a human check to go through.

      The following is the rule we’re using to identify logged in/actual users:

      19bebf17-9484-4b47-93cf-cb9eec823add-image.png

      I was wondering if there is a better/more standardised/more accurate way to identify logged in users.

      Thanks very much!

      D This user is from outside of this forum
      D This user is from outside of this forum
      D1re_W0lf
      wrote last edited by
      #2

      Since you are on Cloudflare, do you have their Block AI bots rules on?
      They seem to help.

      julianJ 1 Reply Last reply
      0
      • D D1re_W0lf

        Since you are on Cloudflare, do you have their Block AI bots rules on?
        They seem to help.

        julianJ This user is from outside of this forum
        julianJ This user is from outside of this forum
        julian
        wrote last edited by
        #3

        D1re_W0lf those rules do not seem to help, I have enabled them as well.

        yasas we have been seeing the same behaviour starting perhaps a week ago. The bursts seem to happen for maybe half a day and then disappear.

        Since we wanted the site to start working quickly, we opted for an allow-list approach. We turned on “I’m under attack” mode, which has some unfortunate side effects (namely, causing federation to stop).

        These are our rules:

        (any(http.request.headers["accept"][*] eq "application/ld+json; profile=\"https://www.w3.org/ns/activitystreams\"")) or (any(http.request.headers["accept"][*] eq "application/activity+json")) or (http.request.method eq "POST" and starts_with(http.request.uri.path, "/inbox")) or (starts_with(http.request.uri.path, "/assets")) or (starts_with(http.request.uri.path, "/.well-known"))
        

        This lets (respectively):

        1. ActivityPub fetches
        2. Same
        3. ActivityPub publishes to the NodeBB inbox
        4. Static assets
        5. Certbot and webfinger (also for AP)
        1 Reply Last reply
        0
        • yasasY This user is from outside of this forum
          yasasY This user is from outside of this forum
          yasas
          wrote last edited by
          #4

          D1re_W0lf Thanks for the response. Seem they do not work as Julian has confirmed.

          Hi julian
          Thanks a lot. Our current version is still NodeBB v3 so guess we may have to either make some tweaks or schedule a v4 upgrade soon. Thanks anyway Julian. Hope crawlers from search engines are still able to get through with the above setup yeah?

          julianJ 1 Reply Last reply
          0
          • omegaO This user is from outside of this forum
            omegaO This user is from outside of this forum
            omega
            wrote last edited by
            #5

            yasas Yep seen the same last week, not nodeBB install, but the server behind cloudflare showed a huge uptick, not served by cache either. SO I am guessing scanning the whole site or large parts.

            IIRC the traffic was coming manly from swiss-german based servers but did not have the time to dig in. This is even with Block AI cralwers turned on.

            In the recent past it’s been Asia, like mostly Singapore.

            The only way to handle this in Cloudflare is to watch and then put in place with geo-based challenge security rules in place afaict

            1 Reply Last reply
            0
            • omegaO This user is from outside of this forum
              omegaO This user is from outside of this forum
              omega
              wrote last edited by
              #6

              You can also use this online tool to check servers when reviewing the logs in cloudflare, this is an example of one of those serves that showed up, the radar tracks it as 86.8% bot

              https://radar.cloudflare.com/bots/as132203

              Here can be seen the 6th of September surge on on the graph and it coincides with the server traffic

              A lot of these bots are hammering wordpress exploits with targets such as /wp-content/index.php and so on, it might not be a bad idea to block by default if you have server load issues.

              1 Reply Last reply
              0
              • yasasY yasas

                D1re_W0lf Thanks for the response. Seem they do not work as Julian has confirmed.

                Hi julian
                Thanks a lot. Our current version is still NodeBB v3 so guess we may have to either make some tweaks or schedule a v4 upgrade soon. Thanks anyway Julian. Hope crawlers from search engines are still able to get through with the above setup yeah?

                julianJ This user is from outside of this forum
                julianJ This user is from outside of this forum
                julian
                wrote last edited by
                #7

                yasas turning on “I’m Under Attack” mode will likely block search engine crawlers as well.

                It is meant to be used as a last resort.

                1 Reply Last reply
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Don't have an account? Register

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • All Topics
                • Popular
                • World
                • Users
                • Groups