←back to thread

597 points classichasclass | 10 comments | | HN request time: 1.372s | source | bottom
1. yumraj ◴[] No.45011231[source]
Wouldn't it be better, if there's an easy way, to just feed such bots shit data instead of blocking them. I know it's easier to block and saves compute and bandwidth, but perhaps feeding them shit data at scale would be a much better longer term solution.
replies(3): >>45011266 #>>45011290 #>>45011397 #
2. throwawayffffas ◴[] No.45011266[source]
No serving shit data costs bandwidth and possibly compute time.

Blocking IPS is much cheaper for the blocker.

replies(1): >>45011761 #
3. sotspecatcle ◴[] No.45011290[source]

    if ($http_user_agent ~* "BadBot") {
        limit_rate 1k;
        default_type application/octet-stream;
        proxy_buffering off;
        alias /dev/zero;
        return 200;
    }
replies(1): >>45025352 #
4. internet_points ◴[] No.45011397[source]
https://zadzmo.org/code/nepenthes/
5. fuckaj ◴[] No.45011761[source]
Zip bomb?
replies(1): >>45012067 #
6. aspenmayer ◴[] No.45012067{3}[source]
Doesn’t that tie up a socket on the server similarly to how a keepalive would on the bot user end?
replies(1): >>45015110 #
7. recursive ◴[] No.45015110{4}[source]
I don't think so. The payload size of the bytes on the wire is small. This premise is all dependent on the .zip being crawled synchronously by the same thread/job making the request.
replies(1): >>45025944 #
8. Avamander ◴[] No.45025352[source]
I recommend you use gzip_static and serve a zip-bomb instead. Frees up the connection sooner and probably causes bad crawlers to exhaust their resources.
9. aspenmayer ◴[] No.45025944{5}[source]
What if bots catch on to zip bombs, and just download them really slowly?

https://en.wikipedia.org/wiki/Zeno%27s_paradoxes#Dichotomy_p...

replies(1): >>45058250 #
10. throwawayffffas ◴[] No.45058250{6}[source]
Their objective is not to DDOS websites, if they catch on, they will download it fast and then discard it.