Ask me anything.

I also develop Tesseract UI

  • 28 Posts
  • 254 Comments
Joined 2 years ago
cake
Cake day: March 17th, 2024

help-circle



  • Tesseract (t.lemmy.world) both badges and lets you filter new accounts. You can configure the number of a days an account is considered “new” from 1 to 30 days. Anything that’s filtered will be shown as a stub/collapsed item in the feed.

    In the upcoming release (delayed due to personal issues but in progress), you can completely hide content from new accounts (versus just collapsing it) among other filters.

    Additionally, (in the upcoming release) it will automatically hide content from users less than a week old who have deleted their accounts. This feature is a direct response to this “hit it and quit it” nonsense from the accounts you’re describing.





  • Check your web access logs for these 3 IPs:

    • 134.19.178.167
    • 213.152.162.5
    • 134.19.179.211

    And see if they’re making repeated un-scoped (no page paramater) requests to /api/v3/comment/list. If they are, block them in your firewall.

    Those used to hit my instance constantly with requests like /api/v3/comment/list?sort=Old&page=16514 (yes, page 16,414). When I blocked those IPs making those requests, problem solved.


  • Tesseract used to have that same bug. To fix it, I now poll /api/v3/federated_instances at startup and save those to a lookup variable. Before localizing a community, user, post, or comment link, it checks to see if the domain is to a known federated instance by looking for it in the list of federated instances.

    There may be other ways to solve that problem, but that was what I went with. Bonus is it doesn’t require any extra network calls beyond the one to fetch the list of federated instances at startup.





  • Not that that isn’t good advice to make mods’ lives easier in general, but for the ban evader I think you’re talking about, it’s usually pretty apparent if you look at the profile of the user being reported:

    1. Minutes old, 10+ posts and no comments or maybe 1 boilerplate-looking one.
    2. Usually cycles through c/Politics, c/News, c/Health, c/UK, c/Ohio, c/Television and a few others
    3. Here lately, spams out 10+ posts rapid-fire and then deletes the account (not all UIs indicate a user is deleted, but that info is often helpful).

    Granted, I’m really good at pattern matching. It’s like my one neurodivergent superpower lol.









  • Can’t edit the post (Thanks Cloudflare! /s) but additional info:

    • I truncated the log excerpts in the post. The user agent string in these requests isn’t shown here, but it is blank in the actual logs.
    • This is for Lemmy admins only. It might apply to others in some form, but this seems to be specifically exploiting a Lemmy API endpoint
    • My Nginx solution may have room for improvement; I was just trying to block that behavior without breaking comments in posts and move on with my day. Suggestions for improvement are welcome.