113

The Arch Linux team has once again been forced to respond to a distributed denial-of-service attack targeting its AUR repository infrastructure. As a result, DDoS protection has been enabled for aur.archlinux.org to help mitigate the ongoing disruption.

While this measure helps keep the AUR website accessible, it has introduced a significant side effect: pushing to the AUR is currently not possible.

top 17 comments
sorted by: hot top controversial new old
[-] cerement@slrpnk.net 61 points 1 day ago
[-] beerclue@lemmy.world 11 points 1 day ago

But... why? I mean, who's targeting Arch? Sounds like the Arch team has some info that they won't release (for now), but this is so confusing to me...

[-] BurgerBaron@piefed.social 28 points 1 day ago* (last edited 1 day ago)

Nobody has been claiming responsibility. Some of the AUR forum peoples think it's butthurt malware devs who got caught uploading malware, but it's just a shot in the dark.

https://status.archlinux.org/

Been on and off for months now.

[-] teawrecks@sopuli.xyz 1 points 2 hours ago

If it's blocking AUR updates, it could be an attempt to keep some patches to certain exploits from going out? But it seems unlikely that the cost of a ddos is worth the tiny number of possibly vulnerable AUR users out there...

[-] krooklochurm@lemmy.ca 1 points 14 minutes ago

If people just used Hannah Montana Linux then we wouldn't have these problems.

[-] Fecundpossum@lemmy.world 7 points 1 day ago

I wonder if it could be a state actor? I can imagine that the powers that be in MANY countries could be motivated to keep users away from operating system software that isn’t spyware.

[-] Laser@feddit.org 13 points 22 hours ago

Then why go against the AUR and not the official mirrors? The former isn't always exactly the epitome of securely packaged trusted applications

[-] Fecundpossum@lemmy.world 5 points 22 hours ago

Just spitballing, because honestly the amount of effort that must go into sustaining this attack in the long term just baffles me. Like, why?

[-] Alaknar@sopuli.xyz 1 points 36 minutes ago

It costs, like $10 to rent a botnet for a couple-hour attack.

[-] lengau@midwest.social 3 points 23 hours ago

Services I know that have both HTTPS and SSH access have seen all sorts of weird stuff seemingly related to LLM bot scraping over the past few months. Enough to bring down some git servers.

[-] gusgalarnyk@lemmy.world 5 points 22 hours ago

Is there anything we can do? Like, pardon my lack of knowledge on the subject, but could I host like a mirror and therefore expand the servers... width (would that be the right word)? That way the bots have to hit even more end points?

[-] mushroommunk@lemmy.today 6 points 19 hours ago

You could donate to the project but I don't think a mirror would help.

Mirrors still see a specific instance as the truth and sync to that. A mirror would make it possible for someone to download an update from you while the truth instance is down (or always from you if you're closer and faster) but without that first truth instance there'll be no new updates. There won't be syncing across mirrors. And it wouldn't really impact any DDOS because it's still that first instance being targeted.

DDOS mitigation can take one of two main ways. Add enough server power to overcome the DDOS, this is insanely expensive and out of each for most all but like Amazon and Meta. The second is to cut off whatever is doing the DDOS, either by disabling the specifically protocol or endpoint being used or not allowing certain IPs to connect. These are probably what they are doing already and there's not much you can do as an outsider to help with this either sadly.

[-] gusgalarnyk@lemmy.world 1 points 18 hours ago

I already donate but I'll review my contribution and see if I can throw a few more euros their way.

Thanks for the explanation on truth in terms of mirrors, that helps me understand. I was offering server power but that might not be feasible or meaningful. And based on what you've said, it seems like the Disable focused warfare is the best approach.

[-] dormedas@lemmy.dormedas.com 18 points 1 day ago

Okay that’s what was happening… yay

[-] rozodru@pie.andmc.ca 8 points 21 hours ago

I installed arch to a VM yesterday for some stuff and for the life of me I couldn't figure out why I couldn't get Paru or Yay going and well...there ya have it. spent like an hour trying to figure out why they both weren't working.

[-] mushroommunk@lemmy.today 10 points 19 hours ago

It's a good habit when if you're hitting something weird and it just doesn't work to check a status page. It's saved me so much time over the years. Here it is for Arch AUR

[-] _cryptagion@anarchist.nexus 14 points 1 day ago

yay and paru both

this post was submitted on 27 Oct 2025
113 points (100.0% liked)

Linux

9913 readers
863 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS