The Arch Linux team has once again been forced to respond to a distributed denial-of-service attack targeting its AUR repository infrastructure. As a result, DDoS protection has been enabled for aur.archlinux.org to help mitigate the ongoing disruption.

While this measure helps keep the AUR website accessible, it has introduced a significant side effect: pushing to the AUR is currently not possible.

  • beerclue@lemmy.world
    link
    fedilink
    arrow-up
    12
    ·
    4 days ago

    But… why? I mean, who’s targeting Arch? Sounds like the Arch team has some info that they won’t release (for now), but this is so confusing to me…

      • teawrecks@sopuli.xyz
        link
        fedilink
        arrow-up
        2
        ·
        3 days ago

        If it’s blocking AUR updates, it could be an attempt to keep some patches to certain exploits from going out? But it seems unlikely that the cost of a ddos is worth the tiny number of possibly vulnerable AUR users out there…

      • Fecundpossum@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        1
        ·
        4 days ago

        I wonder if it could be a state actor? I can imagine that the powers that be in MANY countries could be motivated to keep users away from operating system software that isn’t spyware.

        • Laser@feddit.org
          link
          fedilink
          arrow-up
          13
          ·
          4 days ago

          Then why go against the AUR and not the official mirrors? The former isn’t always exactly the epitome of securely packaged trusted applications

          • Fecundpossum@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            4 days ago

            Just spitballing, because honestly the amount of effort that must go into sustaining this attack in the long term just baffles me. Like, why?

    • lengau@midwest.social
      link
      fedilink
      arrow-up
      3
      ·
      4 days ago

      Services I know that have both HTTPS and SSH access have seen all sorts of weird stuff seemingly related to LLM bot scraping over the past few months. Enough to bring down some git servers.