Comment by bayindirh

Comment by bayindirh 3 hours ago

27 replies

I mean, they're battling with DDoS all the time. I follow their account on Mastodon, and they're pretty open about it.

I believe the correct question is "Why they are getting DDoSed this much if they are not something important?"

For anyone who wants to follow: https://social.anoxinon.de/@Codeberg

Even their status page is under attack. Sorry for my French, but WTF?

exceptione 3 hours ago

Crazy. Who would have an incentive to spend resources on DDoS'ing Codeberg? The only party I can think of would be Github. I know that the normalization of ruthlessness and winner-takes-all mentality made crime mandatory for large parts of the economy, but still cannot wrap my mind around it.

  • Kelteseth 3 hours ago

    Not just them. For example, Qt self hosted cgit got ddos just two weeks ago. No idea why random open source projects getting attacked.

    > in the past 48 hours, code.qt.io has been under a persistent DDoS attack. The attackers utilize a highly distributed network of IP addresses, attempting to obstruct services and network bandwidth.

    https://lists.qt-project.org/pipermail/development/2025-Nove...

  • ncruces 27 minutes ago

    Big tech would be far more interested in slurping data than DDoS'ing them.

    An issue with comments, linked to a PR with review comments, the commit stack implementing the feature, and further commits addressing comments is probably valuable data to train a coding agent.

    Serving all that data is not just a matter of cloning the repo. It means hitting their (public, documented) API end points, that are likely more costly to run.

    And if they rate limit the scrappers, the unscrupulous bunch will start spreading requests across the whole internet.

  • rcxdude 2 hours ago

    DDoS are crazy cheap now, it could be a random person for the lulz, or just as a test or demo (though I suspect Codeberg aren't a bit enough target to be impressive there).

    • Sammi 2 hours ago

      Is it because the s in iot stands for security? I'm asking genuinely. Where are these requests coming from?

  • sznio 2 hours ago

    >The only party I can think of would be Github.

    I think it's not malice, but stupidity. IoT made even a script kiddie capable of running a huge botnet capable of DDoSing anything but CloudFlare.

  • Ygg2 3 hours ago

    > Who would have an incentive to spend resources

    That's not how threat analysis works. That's a conspiracy theory. You need to consider the difficulty of achieving it.

    Otherwise I could start speculating which large NAS provider is trying to DDoS me, when in fact it's a script kiddie.

    As for who would have the most incentives? Unscrupulous AI scrapers. Every unprotected site experiences a flood of AI scrapers/bots.

    • theteapot 2 hours ago

      Actually I think that's roughly how threat analysis works though.

      • Ygg2 an hour ago

        For threat analysis, you need to know how hard you are to break in, what the incentives are, and who your potential adversaries are.

        For each potential adversary, you list the risk strategy; that's threat analysis 101.

        E.g. you have a locked door, some valuables, and your opponent is the state-level. Risk strategy: ignore, no door you can afford will be able to stop a state-level actor.

        • theteapot an hour ago

          I concur the question, "Who would have an incentive to spend resources on DDoS'ing Codeberg?" is a bit convoluted in mixing incentive and resources. But it's still, exactly, threat analysis, just not very useful threat analysis.

  • tonyhart7 3 hours ago

    its easier for MS to buy codeberg and close it than to spent time and money to DDOS things

    • matrss 2 hours ago

      How do you buy an e.V.?

      • tonyhart7 2 hours ago

        You goes to BYD dealership???

        • matrss an hour ago

          I said e.V., not EV. Codeberg is an e.V., i.e. a "registered association" in Germany. I am not actually sure if you could technically buy an e.V., but I am 100% certain that all of the Codeberg e.V. members would not take kindly to an attempt at a hostile takeover from Microsoft. So no, buying Codeberg is not easier than DDoSing them.

bit1993 an hour ago

Part of the problem is that Codeberg/Gitea's API endpoints are well documented and there are bots that scrape for gitea instances. Its similar to running SSH on port 22 or hosting popular PHP forums software, there are always automated attacks by different entities simply because they recognize the API.

letmetweakit 3 hours ago

That's rough ... it is a bad, bad world out there.

  • bayindirh 3 hours ago

    Try exposing a paswordless SSH server to outside to see what happens. It'll be tried immediately, non-stop.

    Now, all the servers I run has no public SSH ports, anymore. This is also why I don't expose home-servers to internet. I don't want that chaos at my doorstep.

    • 63stack a few seconds ago

      This is just FUD, there is nothing dangerous in having an SSH server open to the internet. Sure, scanners will keep pinging it, but nobody is ever going to burn an ssh 0day on your home server.

    • nrhrjrjrjtntbt 6 minutes ago

      Yeah no need for public ssh. Or if you do pick a random port and fail2ban or better just whitelist the one IP you are using for the duration of that session.

      To avoid needing SSH just send your logs and metrics out and do something to autodeploy securely then you rarely need to be in. Or use k8s :)

    • letmetweakit 3 hours ago

      Yeah, I have been thinking about hosting a small internet facing service on my home server, but I’m just not willing to take the risk. I’d do it on a separate internet connection, but not on my main one.

      • nrhrjrjrjtntbt 3 minutes ago

        Would tailscale or cloudflare do the trick. Let them connect to the server.

      • bayindirh 3 hours ago

        You can always use a small Hetzner server (or a free Oracle Cloud one if you are in a pinch) and install tailscale to all of your servers to create a P2P yet invisible network between your hosts. You need to protect the internet facing one properly, and set ACLs at tailscale level if you're storing anything personal on that network, though.

        • letmetweakit 3 hours ago

          I would probably just ssh into the Hetzner box and not connect it to my tailnet.

    • gear54rus 3 hours ago

      this can be fixed by just using random ssh port

      all my services are always exposed for convenience but never on a standard port (except http)

      • bayindirh 3 hours ago

        It reduces the noise, yes, but doesn't stop a determined attacker.

        After managing a fleet for a long time, I'd never do that. Tailscale or any other VPN is mandatory for me to be able to access "login" ports.