I got into the self-hosting scene this year when I wanted to start up my own website run on old recycled thinkpad. A lot of time was spent learning about ufw, reverse proxies, header security hardening, fail2ban.

Despite all that I still had a problem with bots knocking on my ports spamming my logs. I tried some hackery getting fail2ban to read caddy logs but that didnt work for me. I nearly considered giving up and going with cloudflare like half the internet does. But my stubbornness for open source self hosting and the recent cloudflare outages this year have encouraged trying alternatives.

Coinciding with that has been an increase in exposure to seeing this thing in the places I frequent like codeberg. This is Anubis, a proxy type firewall that forces the browser client to do a proof-of-work security check and some other nice clever things to stop bots from knocking. I got interested and started thinking about beefing up security.

I’m here to tell you to try it if you have a public facing site and want to break away from cloudflare It was VERY easy to install and configure with caddyfile on a debian distro with systemctl. In an hour its filtered multiple bots and so far it seems the knocks have slowed down.

https://anubis.techaro.lol/

My botspam woes have seemingly been seriously mitigated if not completely eradicated. I’m very happy with tonights little security upgrade project that took no more than an hour of my time to install and read through documentation. Current chain is caddy reverse proxy -> points to Anubis -> points to services

Good place to start for install is here

https://anubis.techaro.lol/docs/admin/native-install/

  • non_burglar@lemmy.world
    link
    fedilink
    English
    arrow-up
    167
    arrow-down
    2
    ·
    19 hours ago

    Anubis is an elegant solution to the ai bot scraper issue, I just wish the solution to everything wasn’t just spending compute everywhere. In a world where we need to rethink our energy consumption and generation, even on clients, this is a stupid use of computing power.

    • cadekat@pawb.social
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      18 hours ago

      Scarcity is what powers this type of challenge: you have to prove you spent a certain amount of electricity in exchange for access to the site, and because electricity isn’t free, this imposes a dollar cost on bots.

      You could skip the detour through hashes/electricity and do something with a proof-of-stake cryptocurrency, and just pay for access. The site owner actually gets compensated instead of burning dead dinosaurs.

      Obviously there are practical roadblocks to this today that a JavaScript proof-of-work challenge doesn’t face, but longer term…

      • artyom@piefed.social
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        1
        ·
        3 hours ago

        You could skip the detour through hashes/electricity and do something with a proof-of-stake cryptocurrency, and just pay for access. The site owner actually gets compensated instead of burning dead dinosaurs.

        Maybe if the act of transferring crypto didn’t use a comparable or greater amount of energy…

      • Nate Cox@programming.dev
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        6
        ·
        18 hours ago

        The cost here only really impacts regular users, too. The type of users you actually want to block have budgets which easily allow for the compute needed anyways.

        • chicken@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          10
          ·
          16 hours ago

          I think maybe they wouldn’t if they are trying to scale their operations to scanning through millions of sites and your site is just one of them

          • cadekat@pawb.social
            link
            fedilink
            English
            arrow-up
            12
            ·
            16 hours ago

            Yeah, exactly. A regular user isn’t going to notice an extra few cents on their electricity bill (boiling water costs more), but a data centre certainly will when you scale up.

    • Leon@pawb.social
      link
      fedilink
      English
      arrow-up
      101
      arrow-down
      4
      ·
      edit-2
      19 hours ago

      It also doesn’t function without JavaScript. If you’re security or privacy conscious chances are not zero that you have JS disabled, in which case this presents a roadblock.

      On the flip side of things, if you are a creator and you’d prefer to not make use of JS (there’s dozens of us) then forcing people to go through a JS “security check” feels kind of shit. The alternative is to just take the hammering, and that feels just as bad.

      No hate on Anubis. Quite the opposite, really. It just sucks that we need it.

      • quick_snail@feddit.nl
        link
        fedilink
        English
        arrow-up
        3
        ·
        5 hours ago

        This is why we need these sites to have .onions. Tor Browser has a PoW that doesn’t require js

      • Nate Cox@programming.dev
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        18
        ·
        19 hours ago

        I feel comfortable hating on Anubis for this. The compute cost per validation is vanishingly small to someone with the existing budget to run a cloud scraping farm, it’s just another cost of doing business.

        The cost to actual users though, particularly to lower income segments who may not have compute power to spare, is annoyingly large. There are plenty of complaints out there about Anubis being painfully slow on old or underpowered devices.

        Some of us do actually prefer to use the internet minus JS, too.

        Plus the minor irritation of having anime catgirls suddenly be a part of my daily browsing.

      • cecilkorik@piefed.ca
        link
        fedilink
        English
        arrow-up
        11
        ·
        18 hours ago

        if you are a creator and you’d prefer to not make use of JS (there’s dozens of us) then forcing people to go through a JS “security check” feels kind of shit. The alternative is to just take the hammering, and that feels just as bad.

        I’m with you here. I come from an older time on the Internet. I’m not much of a creator, but I do have websites, and unlike many self-hosters I think, in the spirit of the internet, they should be open to the public as a matter of principle, not cowering away for my own private use behind some encrypted VPN. I want it to be shared. Sometimes that means taking a hammering. It’s fine. It’s nothing that’s going to end the world if it goes down or goes away, and I try not to make a habit of being so irritating that anyone would have much legitimate reason to target me.

        I don’t like any of these sort of protections that put the burden onto legitimate users. I get that’s the reality we live in, but I reject that reality, and substitute my own. I understand that some people need to be able to block that sort of traffic to be able to limit and justify the very real costs of providing services for free on the Internet and Anubis does its job for that. But I’m not one of those people. It has yet to cost me a cent above what I have already decided to pay, and until it does, I have the freedom to adhere to my principles on this.

        To paraphrase another great movie: Why should any legitimate user be inconvenienced when the bots are the ones who suck. I refuse to punish the wrong party.

      • SmokeyDope@piefed.socialOP
        link
        fedilink
        English
        arrow-up
        54
        arrow-down
        1
        ·
        edit-2
        18 hours ago

        Theres a compute option that doesnt require javascript. The responsibility lays on site owners to properly configure IMO, though you can make the argument its not default I guess.

        https://anubis.techaro.lol/docs/admin/configuration/challenges/metarefresh

        From docs on Meta Refresh Method

        Meta Refresh (No JavaScript)

        The metarefresh challenge sends a browser a much simpler challenge that makes it refresh the page after a set period of time. This enables clients to pass challenges without executing JavaScript.

        To use it in your Anubis configuration:

        # Generic catchall rule
        - name: generic-browser
          user_agent_regex: >-
            Mozilla|Opera
          action: CHALLENGE
          challenge:
            difficulty: 1 # Number of seconds to wait before refreshing the page
            algorithm: metarefresh # Specify a non-JS challenge method
        

        This is not enabled by default while this method is tested and its false positive rate is ascertained. Many modern scrapers use headless Google Chrome, so this will have a much higher false positive rate.

        • z3rOR0ne@lemmy.ml
          link
          fedilink
          English
          arrow-up
          11
          ·
          14 hours ago

          Yeah I actually use the noscript extension and i refuse to just whitelist certain sites unless I’m very certain I trust them.

          I run into Anubis checks all the time and while I appreciate the software, having to consistently temporarily whitelist these sites does get cumbersome at times. I hope they make this noJS implementation the default soon.

          • Prathas@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            1 hour ago

            Wait, you keep temporarily allowing then over and over again? Why temporary?

            Sincerely,
            Another NoScript fan

  • sudo@programming.dev
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    7
    ·
    16 hours ago

    I’ve repeatedly stated this before: Proof of Work bot-management is only Proof of Javascript bot-management. It is nothing to a headless browser to by-pass. Proof of JavaScript does work and will stop the vast majority of bot traffic. That’s how Anubis actually works. You don’t need to punish actual users by abusing their CPU. POW is a far higher cost on your actual users than the bots.

    Last I checked Anubis has an JavaScript-less strategy called “Meta Refresh”. It first serves you a blank HTML page with a <meta> tag instructing the browser to refresh and load the real page. I highly advise using the Meta Refresh strategy. It should be the default.

    I’m glad someone is finally making an open source and self hostable bot management solution. And I don’t give a shit about the cat-girls, nor should you. But Techaro admitted they had little idea what they were doing when they started and went for the “nuclear option”. Fuck Proof of Work. It was a Dead On Arrival idea decades ago. Techaro should strip it from Anubis.

    I haven’t caught up with what’s new with Anubis, but if they want to get stricter bot-management, they should check for actual graphics acceleration.

    • ___qwertz___@feddit.org
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      3
      ·
      10 hours ago

      Funnily enough, PoW was a hot topic in academia around the late 90s / early 2000, and it’s somewhat clear that the autor of Anubis has not read much about the discussion back then.

      There was a paper called “Proof of work does not work” (or similar, can’t be bothered to look it up) that argued that PoW can not work for spam protection, because you have to support both low-powered consumer devices while blocking spammers with heavy hardware. And that is very valid concern. Then there was a paper arguing that PoW can still work, as long as you scale the difficulty in such a way that a legit user (e.g. only sending one email) has a low difficulty, while a spammer (sending thousands of emails) has a high difficulty.

      The idea of blocking known bad actors actually is used in email quite a lot in forms of DNS block lists (DNSBLs) such as spamhaus (this has nothing to do with PoW, but such a distributed list could be used to determine PoW difficulty).

      Anubis on the other hand does nothing like that and a bot developed to pass Anubis would do so trivially.

      Sorry for long text.

      • Flipper@feddit.org
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        10 hours ago

        At least in the beginning the scrapers just used curl with a different user agent. Forcing them to use a headless client is already a 100x increase in resources for them. That in itself is already a small victory and so far it is working beautifully.

        • sudo@programming.dev
          link
          fedilink
          English
          arrow-up
          3
          ·
          4 hours ago

          Well in most cases it would by Python requests not curl. But yes, forcing them to use a browser is the real cost. Not just in CPU time but in programmer labor. PoW is overkill for that though.

      • sudo@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 hours ago

        Then there was a paper arguing that PoW can still work, as long as you scale the difficulty in such a way that a legit user

        Telling a legit user from a fake user is the entire game. If you can do that you just block the fake user. Professional bot blockers like Cloudflare or Akamai have machine learning systems to analyze trends in network traffic and serve JS challenges to suspicious clients. Last I checked, all Anubis uses is User-Agent filters, which is extremely behind the curve. Bots are able to get down to faking TLS fingerprints and matching them with User-Agents.

    • SmokeyDope@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      32
      arrow-down
      1
      ·
      edit-2
      16 hours ago

      Something that hasn’t been mentioned much in discussions about Anubis is that it has a graded tier system of how sketchy a client is and changing the kind of challenge based on a a weighted priority system.

      The default bot policies it comes with has it so squeaky clean regular clients are passed through, then only slightly weighted clients/IPs get the metarefresh, then its when you get to moderate-suspicion level that JavaScript Proof of Work kicks. The bot policy and weight triggers for these levels, challenge action, and duration of clients validity are all configurable.

      It seems to me that the sites who heavy hand the proof of work for every client with validity that only last every 5 minutes are the ones who are giving Anubis a bad wrap. The default bot policy settings Anubis comes with dont trigger PoW on the regular Firefox android clients ive tried including hardened ironfox. meanwhile other sites show the finger wag every connection no matter what.

      Its understandable why some choose strict policies but they give the impression this is the only way it should be done which Is overkill. I’m glad theres config options to mitigate impact normal user experience.

      • sudo@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        Anubis is that it has a graded tier system of how sketchy a client is and changing the kind of challenge based on a a weighted priority system.

        Last I checked that was just User-Agent regexes and IP lists. But that’s where Anubis should continue development, and hopefully they’ve improved since. Discerning real users from bots is how you do proper bot management. Not imposing a flat tax on all connections.

    • rtxn@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      2
      ·
      edit-2
      6 hours ago

      POW is a far higher cost on your actual users than the bots.

      That sentence tells me that you either don’t understand or consciously ignore the purpose of Anubis. It’s not to punish the scrapers, or to block access to the website’s content. It is to reduce the load on the web server when it is flooded by scraper requests. Bots running headless Chrome can easily solve the challenge, but every second a client is working on the challenge is a second that the web server doesn’t have to waste CPU cycles on serving clankers.

      POW is an inconvenience to users. The flood of scrapers is an existential threat to independent websites. And there is a simple fact that you conveniently ignored: it fucking works.

      • sudo@programming.dev
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        4 hours ago

        Its like you didn’t understand anything I said. Anubis does work. I said it works. But it works because most AI crawlers don’t have a headless browser to solve the PoW. To operate efficiently at the high volume required, they use raw http requests. The vast majority are probably using basic python requests module.

        You don’t need PoW to throttle general access to your site and that’s not the fundamental assumption of PoW. PoW assumes (incorrectly) that bots won’t pay the extra flops to scrape the website. But bots are paid to scape the website users aren’t. They’ll just scale horizontally and open more parallel connections. They have the money.

        • poVoq@slrpnk.net
          link
          fedilink
          English
          arrow-up
          3
          arrow-down
          1
          ·
          4 hours ago

          You are arguing a strawman. Anubis works because because most AI scrapers (currently) don’t want to spend extra on running headless chromium, and because it slightly incentivises AI scrapers to correctly identify themselves as such.

          Most of the AI scraping is frankly just shoddy code written by careless people that don’t want to ddos the independent web, but can’t be bothered to actually fix that on their side.

          • sudo@programming.dev
            link
            fedilink
            English
            arrow-up
            2
            ·
            edit-2
            4 hours ago

            You are arguing a strawman. Anubis works because because most AI scrapers (currently) don’t want to spend extra on running headless chromium

            WTF, That’s what I already said? That was my entire point from the start!? You don’t need PoW to force headless usage. Any JavaScript challenge will suffice. I even said the Meta Refresh challenge Anubis provides is sufficient and explicitly recommended it.

            • poVoq@slrpnk.net
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              2
              ·
              4 hours ago

              And how do you actually check for working JS in a way that can’t be easily spoofed? Hint: PoW is a good way to do that.

              Meta refresh is a downgrade in usability for everyone but a tiny minority that has disabled JS.

              • sudo@programming.dev
                link
                fedilink
                English
                arrow-up
                1
                ·
                3 hours ago

                And how do you actually check for working JS in a way that can’t be easily spoofed? Hint: PoW is a good way to do that.

                Accessing the browsers API in any way is way harder to spoof than some hashing. I already suggested checking if the browser has graphics acceleration. That would filter out the vast majority of headless browsers too. PoW is just math and is easy to spoof without running any JavaScript. You can even do it faster than real JavaScript users something like Rust or C.

                Meta refresh is a downgrade in usability for everyone but a tiny minority that has disabled JS.

                What are you talking about? It just refreshes the page without doing any of the extra computation that PoW does. What extra burden does it put on users?

                • poVoq@slrpnk.net
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  3 hours ago

                  If you check for GPU (not generally a bad idea) you will have the same people that currently complain about JS, complain about this breaking with their anti-fingerprinting browser addons.

                  But no, you can’t spoof PoW obviously, that’s the entire point of it. If you do the calculation in Javascript or not doesn’t really matter for it to work.

                  In the current shape Anubis has zero impact on usability for 99% of the site visitors, not so with meta refresh.

  • 0_o7@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    1
    ·
    13 hours ago

    I don’t mind Anubis but the challenge page shouldn’t really load an image. It’s wasting extra bandwidth for nothing.

    Just parse the challenge and move on.

      • Voroxpete@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        3
        ·
        edit-2
        6 hours ago

        It’s actually a brilliant monetization model. If you want to use it as is, it’s free, even for large corporate clients.

        If you want to get rid of the puppygirls though, that’s when you have to pay.

        • frongt@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          25 minutes ago

          It’s open source, so you could always just patch it without paying too. But you should support the maintainers if you think they deserve it.

    • Kilgore Trout@feddit.it
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      1
      ·
      edit-2
      12 hours ago

      It’s a palette of 10 colours. I would guess it uses an indexed colorspace, reducing the size to a minimum.
      edit: 28 KB on disk

      • CameronDev@programming.dev
        link
        fedilink
        English
        arrow-up
        11
        arrow-down
        3
        ·
        12 hours ago

        A HTTP get request is a few hundred bytes. The response is 28KB. Thats 280x. If a large botnet wanted to denial of service an Anubis protected site, requesting that image could be enough.

        Ideally, Anubis should serve as little data as possible until the POW is completed. Caching the POW algorithm (and the image) to a CDN would also mitigate the issue.

        • teolan@lemmy.world
          link
          fedilink
          English
          arrow-up
          10
          arrow-down
          1
          ·
          10 hours ago

          The whole point of Anubis is to not have to go through a CDN to sustain scrapping botnets

          • CameronDev@programming.dev
            link
            fedilink
            English
            arrow-up
            3
            ·
            9 hours ago

            I dunno that is true, nothing in the docs indicates that it is explicitly anti-CDN. And using a CDN for a static javascript resource and an image isn’t the same as running the entire site through a CDN proxy.

  • quick_snail@feddit.nl
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    2
    ·
    6 hours ago

    Kinda sucks how it makes websites inaccessible to folks who have to disable JavaScript for security.

    • poVoq@slrpnk.net
      link
      fedilink
      English
      arrow-up
      17
      arrow-down
      4
      ·
      5 hours ago

      I kinda sucks how AI scrapers make websites inaccessible to everyone 🙄

          • quick_snail@feddit.nl
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            2
            ·
            edit-2
            1 hour ago

            Lol I’m the sysadmin for many sites that doesn’t have these issues, so obviously I do…

            It you’re the one that thinks you need this trash pow fronting for a static site, then clearly you’re the one who is ignorant

            • poVoq@slrpnk.net
              link
              fedilink
              English
              arrow-up
              3
              ·
              1 hour ago

              Obviously I don’t think you need Anubis for a static site. And if that is what your admin experience is limited too, than you have a strong case of dunning krueger.

    • WhyJiffie@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 hours ago

      there’s a fork that has non-js checks. I don’t remember the name but maybe that’s what should be made more known

      • quick_snail@feddit.nl
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 hour ago

        Please share if you know.

        The only way I know how to do this is running a Tor Onion Service, since the tor protocol has built-in pow support (without js)

    • url@feddit.fr
      link
      fedilink
      Français
      arrow-up
      11
      arrow-down
      1
      ·
      6 hours ago

      Did i forgot to mention it doesnt work without js that i keep disabled

    • quick_snail@feddit.nl
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      5 hours ago

      Great article, but I disagree about WAFs.

      Try to secure a nonprofits web infrastructure with as 1 IT guy and no budget for devs or security.

      It would be nice if we could update servers constantly and patch unmaintained code, but sometimes you just need to front it with something that plugs those holes until you have the capacity to do updates.

      But 100% the WAF should be run locally, not a MiTM from evil US corp in bed with DHS.

  • smh@slrpnk.net
    link
    fedilink
    English
    arrow-up
    2
    ·
    45 minutes ago

    The creator is active on a professional slack I’m on and they’re lovely and receptive to user feedback. Their tool is very popular in the online archives/cultural heritage scene (we combine small budgets and juicy, juicy data).

    My site has enabled js-free screening when the site load is low, under the theory that if the site load is too high then no one’s getting in anyway.

      • Nate Cox@programming.dev
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        5
        ·
        19 hours ago

        I can’t access the page to validate this because I don’t allow JS; isn’t that gated behind a paywall?

          • Nate Cox@programming.dev
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            5
            ·
            15 hours ago

            Lots of idol worship in the dev community, question the current darling and people get upset.

            • Lemminary@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              3
              ·
              edit-2
              11 hours ago

              Not idol worship, rather, it’s silly to complain about JS when tools like NoScript allow you to selectively choose what runs instead of guessing what it is. It’s simply a documentation page like it says on the URL. I mean, they’re incredibly tame on the danger scale to leave your guard all the way up and instead take a jab at the entire community that had nothing to do with your personal choices.

              • Nate Cox@programming.dev
                link
                fedilink
                English
                arrow-up
                5
                arrow-down
                4
                ·
                11 hours ago

                Who jabbed at anything?

                I can’t get to that page, so I asked a question about the contents.

                Someone here is being silly, we just disagree about who.

                • Lemminary@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  arrow-down
                  3
                  ·
                  edit-2
                  11 hours ago

                  It gets quite silly when you blame the entire dev community for supposedly downvoting you over ideals rather than being overly strict about them. I also prefer HTML-first and think it should be the norm, but I draw the line somewhere reasonable.

                  I can’t get to that page, so I asked a question

                  Yeah, and you can run the innocuous JS or figure out what it is from the URL. You’re tying your own hands while dishing it out to everyone else.

        • CoyoteFacts@piefed.ca
          link
          fedilink
          English
          arrow-up
          4
          arrow-down
          2
          ·
          19 hours ago

          It looks like it might be; I just know someone that has a site using it and they use a different mascot, so I thought it would have been trivial. I kind of wonder why it wouldn’t be possible to just docker bind mount a couple images into the right path, but I’m guessing maybe they obfuscate/archive the file they’re reading from or something?

          • Axolotl@feddit.it
            link
            fedilink
            English
            arrow-up
            6
            arrow-down
            1
            ·
            17 hours ago

            It’s actually possible, also, it’s open source so nothing stop you from making your fork with your own images and build it

        • M.int@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          1
          ·
          18 hours ago

          You can just fork it and replace the image.

          The authors talks about it here on their blog a bit more.

    • SmokeyDope@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      27
      arrow-down
      6
      ·
      19 hours ago

      You know the thing is that they know the character is a problem/annoyance, thats how they grease the wheel on selling subscription access to a commecial version with different branding.

      https://anubis.techaro.lol/docs/admin/botstopper/

      pricing from site

      Commercial support and an unbranded version

      If you want to use Anubis but organizational policies prevent you from using the branding that the open source project ships, we offer a commercial version of Anubis named BotStopper. BotStopper builds off of the open source core of Anubis and offers organizations more control over the branding, including but not limited to:

      • Custom images for different states of the challenge process (in process, success, failure)
      • Custom CSS and fonts
      • Custom titles for the challenge and error pages
      • “Anubis” replaced with “BotStopper” across the UI
      • A private bug tracker for issues

      In the near future this will expand to:

      • A private challenge implementation that does advanced fingerprinting to check if the client is a genuine browser or not
      • Advanced fingerprinting via Thoth-based advanced checks

      In order to sign up for BotStopper, please do one of the following:

      • Sign up on GitHub Sponsors at the $50 per month tier or higher
      • Email sales@techaro.lol with your requirements for invoicing, please note that custom invoicing will cost more than using GitHub Sponsors for understandable overhead reasons

      I have to respect the play tbh its clever. Absolutely the kind of greasy shit play that Julian from the trailer park boys would do if he were an open source developer.

      • webghost0101@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        30
        arrow-down
        4
        ·
        19 hours ago

        I wish more projects did stuff like this.

        It just feels silly and unprofessional while being seriously useful. Exactly my flavour of software, makes the web feel less corporate.

  • perishthethought@piefed.social
    link
    fedilink
    English
    arrow-up
    11
    ·
    19 hours ago

    I don’t really understand what I am seeing here, so I have to ask – are these Security issues a concern?

    https://github.com/TecharoHQ/anubis/security

    I have a server running a few tiny web sites, so I am considering this, but I’m always concerned about the possibility that adding more things to it could make it less secure, versus more. Thanks for any thoughts.

    • artyom@piefed.social
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      2 hours ago

      This isn’t really a security issue as much as it is a DDOS issue.

      Imagine you own a brick and mortar store. And periodically one thousand fucking people sprint into your store and start recording the UPCs on all the products, knocking over every product in the store along the way. They don’t buy anything, they’re exclusively there to collect information from your store which they can use to grift investors and burn precious resources, and if they fuck your shit up in the process, that’s your problem.

      This bot just sits at the door and ensures the people coming in there are actually shoppers interested in the content of some items of your store.

    • SmokeyDope@piefed.socialOP
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      18 hours ago

      Security issues are always a concern the question is how much. Looking at it they seem to at most be ways to circumvent the Anubis redirect system to get to your page using very specific exploits. These are marked as m low to moderate priority and I do not see anything that implies like system level access which is the big concern. Obviously do what you feel is best but IMO its not worth sweating about. Nice thing about open source projects is that anyone can look through and fix, if this gets more popular you can expect bug bounties and professional pen testing submissions.

    • lime!@feddit.nu
      link
      fedilink
      English
      arrow-up
      17
      ·
      19 hours ago

      all of the issues listed are closed so any recent version is fine.

      also, you probably don’t need to deploy this unless you have a problem with bots.

  • Appoxo@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    46 minutes ago

    Maybe you know the answer to my question:
    If I’d want to use any app that doesnt run in a webbrowser (e.g. the native jellyfin app), how would that work? Does it still work then?