this post was submitted on 27 Oct 2025
122 points (100.0% liked)

Linux

9913 readers
751 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
 

The Arch Linux team has once again been forced to respond to a distributed denial-of-service attack targeting its AUR repository infrastructure. As a result, DDoS protection has been enabled for aur.archlinux.org to help mitigate the ongoing disruption.

While this measure helps keep the AUR website accessible, it has introduced a significant side effect: pushing to the AUR is currently not possible.

top 17 comments
sorted by: hot top controversial new old
[–] cerement@slrpnk.net 64 points 1 day ago
[–] beerclue@lemmy.world 12 points 1 day ago (2 children)

But... why? I mean, who's targeting Arch? Sounds like the Arch team has some info that they won't release (for now), but this is so confusing to me...

[–] BurgerBaron@piefed.social 28 points 1 day ago* (last edited 1 day ago) (2 children)

Nobody has been claiming responsibility. Some of the AUR forum peoples think it's butthurt malware devs who got caught uploading malware, but it's just a shot in the dark.

https://status.archlinux.org/

Been on and off for months now.

[–] teawrecks@sopuli.xyz 1 points 12 hours ago (1 children)

If it's blocking AUR updates, it could be an attempt to keep some patches to certain exploits from going out? But it seems unlikely that the cost of a ddos is worth the tiny number of possibly vulnerable AUR users out there...

[–] krooklochurm@lemmy.ca 4 points 10 hours ago

If people just used Hannah Montana Linux then we wouldn't have these problems.

[–] Fecundpossum@lemmy.world 6 points 1 day ago (1 children)

I wonder if it could be a state actor? I can imagine that the powers that be in MANY countries could be motivated to keep users away from operating system software that isn’t spyware.

[–] Laser@feddit.org 13 points 1 day ago (1 children)

Then why go against the AUR and not the official mirrors? The former isn't always exactly the epitome of securely packaged trusted applications

[–] Fecundpossum@lemmy.world 5 points 1 day ago (1 children)

Just spitballing, because honestly the amount of effort that must go into sustaining this attack in the long term just baffles me. Like, why?

[–] Alaknar@sopuli.xyz 1 points 11 hours ago

It costs, like $10 to rent a botnet for a couple-hour attack.

[–] lengau@midwest.social 3 points 1 day ago

Services I know that have both HTTPS and SSH access have seen all sorts of weird stuff seemingly related to LLM bot scraping over the past few months. Enough to bring down some git servers.

[–] dormedas@lemmy.dormedas.com 18 points 1 day ago (2 children)

Okay that’s what was happening… yay

[–] rozodru@pie.andmc.ca 8 points 1 day ago (1 children)

I installed arch to a VM yesterday for some stuff and for the life of me I couldn't figure out why I couldn't get Paru or Yay going and well...there ya have it. spent like an hour trying to figure out why they both weren't working.

[–] mushroommunk@lemmy.today 10 points 1 day ago

It's a good habit when if you're hitting something weird and it just doesn't work to check a status page. It's saved me so much time over the years. Here it is for Arch AUR

[–] _cryptagion@anarchist.nexus 14 points 1 day ago

yay and paru both

[–] gusgalarnyk@lemmy.world 5 points 1 day ago (1 children)

Is there anything we can do? Like, pardon my lack of knowledge on the subject, but could I host like a mirror and therefore expand the servers... width (would that be the right word)? That way the bots have to hit even more end points?

[–] mushroommunk@lemmy.today 6 points 1 day ago (1 children)

You could donate to the project but I don't think a mirror would help.

Mirrors still see a specific instance as the truth and sync to that. A mirror would make it possible for someone to download an update from you while the truth instance is down (or always from you if you're closer and faster) but without that first truth instance there'll be no new updates. There won't be syncing across mirrors. And it wouldn't really impact any DDOS because it's still that first instance being targeted.

DDOS mitigation can take one of two main ways. Add enough server power to overcome the DDOS, this is insanely expensive and out of each for most all but like Amazon and Meta. The second is to cut off whatever is doing the DDOS, either by disabling the specifically protocol or endpoint being used or not allowing certain IPs to connect. These are probably what they are doing already and there's not much you can do as an outsider to help with this either sadly.

[–] gusgalarnyk@lemmy.world 2 points 1 day ago

I already donate but I'll review my contribution and see if I can throw a few more euros their way.

Thanks for the explanation on truth in terms of mirrors, that helps me understand. I was offering server power but that might not be feasible or meaningful. And based on what you've said, it seems like the Disable focused warfare is the best approach.