Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Crawler causing SYN floods #15

Open
apienk opened this issue Jun 28, 2022 · 6 comments
Open

Crawler causing SYN floods #15

apienk opened this issue Jun 28, 2022 · 6 comments

Comments

@apienk
Copy link

apienk commented Jun 28, 2022

Yesterday at 18:17 CEST we noted a SYN flood caused by the project crawler. Please implement request limits.

@jordangarrison
Copy link

Also experiencing this issue. We've had to block this project.

@kalebdf
Copy link

kalebdf commented Jun 29, 2022

We experienced a sudden flood of requests as well. We have currently blocked this project (429 Too Many Request). All the best!

@tb0hdan
Copy link
Owner

tb0hdan commented Jun 30, 2022

Hi guys,

I apologize for this unintended behavior. DomainsProject crawler (https://github.com/tb0hdan/idun) doesn't have any kind of port scanning functionality and uses plain "net/http" library for connections. I am already working on additional limits (on top of existing robots.txt handling):

  • delay/sleep between requests
  • decreased number of connections to single site
  • HTTP 429 code handling

Thank you very much for reporting this. Issue will remain open for historical purposes after the fix.

@Bmess1
Copy link

Bmess1 commented Jun 30, 2022 via email

@apienk
Copy link
Author

apienk commented Jul 1, 2022

Thanks for the response. We will not blacklist your crawler for now.

@tb0hdan
Copy link
Owner

tb0hdan commented Jul 2, 2022

  • delay/sleep between requests is set to 1 seconds + CrawlDelay as specified by robots.txt
  • HTTP 429 code handling was added by use of hashicorp/go-retryablehttp

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants