You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
either you are testing against a different lemmy version than you claim or you are omitting something in your minimal example.
this api is no longer available without an authenticated user since 0.19.6.
once authenticated, it'd be a reflected DoS, not DDoS when used through a single instance.
this is covered under the message rate limit, although the limit is up to instance configuration, and due to this being shared with various other resources it may be quite high.
this also shouldn't amplify the amount of requests, as there should only be a single outbound request per user request, which means that this will at best act as a relay to obscure the original source IP.
The point is that someone can use curl to make the backend send thousands of requests to a random website. If that site has some kind of rate limiting, it'll block backend's IP, which affects everyone on Lemmy, not just the attacker
Requirements
Summary
A simple curl like this can be used to initiate a DDOS:
Version
BE: 0.19.8
The text was updated successfully, but these errors were encountered: