Skip to main content


FYI #fediverse


reshared this

in reply to pasjrwoctx

I'm getting NXDOMAIN when trying to access activitypub-troll.cf

reshared this

in reply to Fae Empress

@Fae Empress I did too, I was going to just do an ip block, but nslookup activitypub-troll.cf ** server can't find activitypub-troll.cf: NXDOMAIN so I had to temporally shutdown my instance, and do a lot of fast homework and cleaning, and blocking, what I did, at the moment seems to be working, I fear as the fediverse grows, so will the troubles with keeping up with this, but its really no different than back when everyone got online through a cd rom, and bombed each others computers through im and chat rooms the difference today is, the bad actors have vast resources and us little people, have to walk a fine line between blocking everything and letting just enough in to stay connected.

reshared this

in reply to pasjrwoctx

The real problem is that we might end up with positive connection lists instead of negative listing of servers.
I guess we all start to think about how tor create some kind of fediWeb of trust where we mutually confirm and integrate servers into our permitted server lists. Even maybe some kind of rules set for new servers restricting their access and bumping some allow request to the server admin for a domain and/or IP?
🤔

Where are the main problems for us as friendicans?
(Forum) profile pages that allow automatic following and any kind of automatic manually unapproved connections?
Well no, as interaction with public posts always is possible, some kinda emergency beak for spamming would be needed.

reshared this

in reply to pasjrwoctx

@pasjrwoctx

Go to /moderation/blocklist/server and enter *.activitypub-troll.cf in ‘Add new blocklist entry’. Then click ‘Check pattern’.
In the new window that opens, click ‘Remove server’ and, if you wish, enter a reason. Finally, click ‘Add pattern to blocklist’.
Then *.activitypub-troll.cf and all its subdomains will be blocked.

Once that's done, you just have to delete the corresponding entries from the database.

mysql -u [user_name] -p[password] [database_name]

SELECT COUNT(*) FROM gserver where nurl LIKE ‘%.activitypub-troll.cf’;

DELETE from gserver where nurl LIKE ‘%.activitypub-troll.cf’ LIMIT 1000000;

OPTIMIZE TABLE gserver;

EXIT;

reshared this