-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ptpb.pw 500 Internal Server Error on uploading png #245
Comments
Not sure what was going on here; I was not able to observe a meaningful server-side error. I restarted the pb container and am no longer able to reproduce this. Sorry about that. |
|
Thanks! I can confirm the issue is resolved. |
It looks like the same fault has occurred again. It is pretty sporadic.
|
:( |
I still have completely no idea what's happening here. I reproduced this, and attempted a label upload:
The string I then restarted openresty, and only openresty:
I was then no longer able to reproduce the issue. This is not helpful because:
|
I vaguely suspect this is some "resource not completely closed" issue between openresty/varnish. The good/bad news is this appears to be triggered over a large number of days. Reproducing this in a development environment might be tricky; some fun stats about the ptpb.pw deployment:
Over the most recent ~25,000 requests, at least 90% were related to wownero/monero command-and-control/executable distribution (specifically the minexmr.com operators appear to be abusing ptpb.pw for free network transit). |
Top 5 pastes on ptpb.pw right now:
|
Contributing factors:
To properly catch this, I'll need to:
It would also be convenient to generate/log/return request identifiers at all levels in the stack. |
Tangentially I might also need to shut down ptpb.pw, until/unless I implement long-needed abuse mitigation features. |
ptpb.pw has shutdown ptpb/pb#245 ptpb/pb#240
I run 0x0.st and I have also observed increasingly crafty attempts at uploading miner payloads, configuration files and so on. However I am actively filtering them, as well as deploying more aggressive firewall rules and malware scanning. This and some idiot scanning all possible file URLs via anonymizing networks have caused well over 15 TB of monthly traffic since November 2018 (which doesn’t cost me a penny because I don’t run on shitty cloud hosting). It seems I have mitigated that for now. Edit: After inspecting logs, I can assume that a majority of requests has been blocked by my dynamic firewall rules before it could hit the web server. Props to https://github.com/firehol/firehol for making this easy. |
ptpb.pw has shutdown ptpb/pb#245 ptpb/pb#240
ptpb.pw has been our default provider since 2017-03-23T21:10:25+01:00, this was introduced in the commit 993db7e. But now ptpb.pw has been shut down due to extensive abuse: ptpb/pb#245 ptpb/pb#240 ptpb.pw, you were the best paste service out there and have served webpaste.el and many others very well. You will be missed. So Long, and Thanks for All the Fish.
ptpb.pw has been our default provider since 2017-03-23T21:10:25+01:00, this was introduced in the commit 993db7e. But now ptpb.pw has been shut down due to extensive abuse: ptpb/pb#245 ptpb/pb#240 ptpb.pw, you were the best paste service out there and have served webpaste.el and many others very well. You will be missed. So Long, and Thanks for All the Fish. This fixes #36.
ptpb.pw has shutdown ptpb/pb#245 ptpb/pb#240
This is the image https://u.teknik.io/0E2nn.png .
The text was updated successfully, but these errors were encountered: