Youβre doing a great job so far. Thanks for the update.
Lemmy.World Announcements
This Community is intended for posts about the Lemmy.world server by the admins.
Follow us for server news π
Outages π₯
https://status.lemmy.world
For support with issues at Lemmy.world, go to the Lemmy.world Support community.
Support e-mail
Any support requests are best sent to info@lemmy.world e-mail.
Report contact
- DM https://lemmy.world/u/lwreport
- Email report@lemmy.world (PGP Supported)
Donations π
If you would like to make a donation to support the cost of running this platform, please do so at the following donation URLs.
If you can, please use / switch to Ko-Fi, it has the lowest fees for us
Join the team
I'm learning a lot by following lemmy.worlds actions. Appreciate the transparency!
ty for all ur hard work β₯οΈ
The more you attack a Lemmy instance, the more stronger it gets.
It's like tempering iron or steel.
Where can we donate toward server costs?
I put this site behind cloudflare in response to this post. Other than having to change SSL/TLS encryption mode to Full, it seemed easy. I turned on bot fight mode and I'm using the managed WAF ruleset that comes with the free tier. Any configuration recommendations anywhere in the panel?
It's not ideal, but there's not a whole lot of options out there for DDoS mitigation.
I wonder now with the semi-adversarial/semi-cooperative nature between lemmy instances, if wer'e not going to see more DDOS and other types of raids happening because a different instance has an ax to grind against yours. Say between you defederated them, or they consider your instance too big etc.
Is it just me, or is old.lemmy.world
still using its old IP address?
lemmy.world
and m.lemmy.world
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=1 ttl=56 time=46.9 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=2 ttl=56 time=50.3 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=3 ttl=56 time=48.0 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=4 ttl=56 time=50.1 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=5 ttl=56 time=50.1 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=6 ttl=56 time=50.2 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=7 ttl=56 time=47.0 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=8 ttl=56 time=54.0 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=9 ttl=56 time=50.1 ms
64 bytes from 104.21.53.208 (104.21.53.208): icmp_seq=10 ttl=56 time=49.8 ms
***
lemmy.world ping statistics
***
10 packets transmitted, 10 received, 0% packet loss, time 9010ms
rtt min/avg/max/mdev = 46.893/49.635/54.048/1.956 ms
old.lemmy.world
should be cloudflared, too
Yeah we will fix that soon
If you decide to use Akamai, hmu. I'm not an Alamai guru, but I do it professionally.
Maybe is that Reddit dude, jealous of Lemmy's increasing popularity.
It seems like you made this comment in jest, but I wouldn't say it's outside the realm of possibility. We can't fly off the handle and lob accusations absent any sort of proof, but it would hardly be the first example of a corporation targeting an up-and-coming disruptive service run by amateurs.
Nice try, Mr. Huffman.
Welcome to the internet, glad thereβs a working solution