Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have a fosstodon account which I don't often use, but today I logged in on the offchance of finding something interesting (I didn't). Immediately I got an email from them saying that someone had logged in in my name with such-and-such an ip address (which was new apparently), and if it wasn't me, I should change my password, etc.etc.
It obviously was me from the timing. But the address they gave was different from the one that I get from the usual show-my-ip-address search. So I fed it into an ip address lookup site and it actually belongs to Cloudflare.Those people seem to be getting into everything nowadays.
As I see it, Cloudflare must be part of the site's own script-jungle. If I am right, they are sending out these warnings a lot. In any case, you should check with the site-administrator – I do not know what fosstodon is.
" Fosstodon is for people who are interested in open source technology and the awesome community around it. Whether that be Linux, open source software like Firefox, or Mastodon itself."
Either a Proxy or VPN would have a different source IP. A proxy should have a header to identify the probable source ip, but most detectors might not trust or decode it. A VPN would just look like it came from the VPN endpoint.
Yeah, I'm going to ignore it. Incidently, the internet-facing address I usually get when I search for it is registered to my isp. So obviously clownflare is acting as some kind of man-in-the-middle between them and the fosstodon site. And this is apparently recent. They are getting their claws into everything.
Yeah, I'm going to ignore it. Incidently, the internet-facing address I usually get when I search for it is registered to my isp. So obviously clownflare is acting as some kind of man-in-the-middle between them and the fosstodon site. And this is apparently recent. They are getting their claws into everything.
But who invites them? They are not hacking into systems and do no blackmailing.
Yeah, I'm going to ignore it. Incidently, the internet-facing address I usually get when I search for it is registered to my isp. So obviously clownflare is acting as some kind of man-in-the-middle between them and the fosstodon site. And this is apparently recent. They are getting their claws into everything.
So when using a load balancer, that is a case where it changes the source ip. Most LBs will detect and add a forwarding header, but if the script uses the network ip and not the header "apparent" ip, it will flag it.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.