• wildbus8979@sh.itjust.works
    link
    fedilink
    arrow-up
    13
    arrow-down
    20
    ·
    edit-2
    2 days ago

    Don’t expose the website. That’s the point. Only connect remotely via wireguard.

    If you must expose the website, I also provided options in my original post.

      • kautau@lemmy.world
        link
        fedilink
        arrow-up
        12
        arrow-down
        3
        ·
        2 days ago

        A cheap VPS hosting

        https://anubis.techaro.lol/docs/admin/installation/

        as a reverse proxy may work. The VPS will do the work of verifying requests and stopping bad requests from hitting the target resource. Though certainly if the DDoS is a matter of a massive botnet raiding your domain it may not work as well as something like cloudflare

        • maus@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          1
          ·
          7 hours ago

          Anubis does not prevent a ddos attack and only shifts the saturation point to your VPS. Anubis is the answer for bots and ai scrappers, not DDoS.

          • kautau@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            5 hours ago

            Sure, but to someone running a website out of there house, 100,000 bots trying to hit the site at the same time to scrape it is going to have the same effect. So yes, you’re correct, Anubis has nothing to do with stopping a literal DDoS attack, but it does help smaller websites stay alive by avoiding responding to requests from scrapers or one-off malicious agents.

      • wildbus8979@sh.itjust.works
        link
        fedilink
        arrow-up
        9
        arrow-down
        8
        ·
        edit-2
        2 days ago

        Yes, I’ve addressed this in my original message.

        Get yourself a 3$/month VPS, they almost all come with DDoS protection, and reverse proxy from there. Either restrict the ports on your home network to only that IP, or better yet tunnel all the traffic via Wireguard.

        Obviously if you’re hosting a large server this is another matter, but nevertheless almost all serious hosting services offer in house DDoS protection.

        But the comment I was originally replying to specifically refered to homelabs.

        • 🇰 🌀 🇱 🇦 🇳 🇦 🇰 🇮 @pawb.social
          link
          fedilink
          English
          arrow-up
          8
          ·
          edit-2
          2 days ago

          What would be a good resource to, like, relearn modern networking stuff cuz some of these solutions are totally new ideas to me? I was CISCO and A+ certified way back in 2003; but the only thing I ever really used from those classes and training since then was making cables and setting up smaller, simple networks for home or small businesses. I get the sense a fuckton has changed and this exchange made me want to brush up.

          • ProjectPatatoe@lemmy.world
            link
            fedilink
            English
            arrow-up
            9
            ·
            2 days ago

            I found just doing it the best for me. Start with proxmox hypervisor on some old pc. Start running a bunch of services. Some documentation mentions “heres how you set it up behind a reverse proxy”. “Hmm…whats that” is pretty much how i learned it.

            Then compare with people in the homelab communities who are doing differently and find out why.

      • wildbus8979@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        1 day ago

        Again, this thread replying to the original comment is talking about homelabs.

        But also, again, this is addressed in the second half of my comment.