Readit News logoReadit News
geuis · 2 years ago
Many years ago, some person misconfigured their squid proxy and was hitting https://jsonip.com to the point my server at the time was turning green in the gills.

I started responding with 418 "You are a tea kettle" or something like that to those specific requests. The originating dev actually paid attention to their error messages and quickly resolved their config issue.

Fast forward to March this year. Some fucking numb nuts a-hole decided to add jsonip.com to an EXTREMELY widely used version of Dalvik/Android software that gets deployed to hundreds of thousands or millions of devices.

Overnight my traffic levels increased by 300%. I'm a solo dev offering a free service for 12 years. That kind of increase in traffic costs me money I've never had to plan for.

I ended up switching to Cloudeflare to handle the load with a WAF filter on the offending android tvs and other devices.

However Cloudflare doesn't properly route ipv4 address because "ipv6 is cool so we only do that" or something. Despite numerous support requests, that's still shmaybe an enterprise level feature.

I apologize to any long time users of the service. This was completely unexpected after more than a decade. I've been trying different "fixes" for 2 months and have not resolved a way to block this garbage traffic and still provide the original services.

Yea sorry I turned this funny old internet post about the mit coffee pot into a thing happening to me.

But if for some ungodly reason you're the dev or know who did it, REMOVE MY SERVICE ADDRESS FROM YOUR OUT OF DATE FROM TV/SMART DEVICE ANDROID code. You're literally fucking killing me. I've literally spend dozens of hours trying to find out if this was a contribution to a public source repo. Nothing.

Based on the Dalvik user agent, I only found a handful of references in Chinese repos. But google search is so terrible these days, even those are false flags.

So I have no idea who to contact about this. Some dipshit on your team(s) decided to abuse a free service as though there isn't a single human person behind it absorbing the costs and making sure it runs.

mrweasel · 2 years ago
Could you start returning wrong answers, "country":"TW" should do it.

We had to deal with image scrapers who didn't respond to requests to stop, even if we provided an API service. I configured nginx to just serve them images of a beaver and a few 1GB junk files, they stopped pretty quickly.

dannyw · 2 years ago
Your website on https://getjsonip.com/ says:

> Supports unlimited requests and is free.

Maybe update that text? There is no guidance on acceptable thresholds, rate limits, etc.

geuis · 2 years ago
Yeah I know. That is a legit critique. What's been happening is your essential black swan event. I've been running the service for 12 years and have never had this problem. There are hundreds of websites and independent users that have never abused the api like this until March. I have always been able to absorb the traffic impact.

This is different. Someone wasn't thinking and randomly added the domain to a lazy piece of code somewhere that got deployed to millions of devices pretty much over night. The only way I've been able to keep jsonip active is by incorporating Cloudflare. But they don't actually solve the problem. As a corporation, they treat ipv4 addresses like 3rd class citizens.

Anyway yeah I've been evaluating changing the TOS, requiring registered signins, etc. But NONE of those fixes a 300% level of traffic that's been hitting the service for months now. I can change the verbiage all I want. But it does absolutely nothing to stop the a-hole dev from China or wherever that rolled out an update to hundreds of thousands of millions of devices with simply emailing me if that's ok.

I've literally, and successfully, run the service for free to the public because no one has done this before.

And to the nginx people. No, returning 444 doesn't seem to fix the problem. I've tried. It doesn't work.

d0ugal · 2 years ago
That appears to be a different URL
n0n0n4t0r · 2 years ago
Wikipedia had a similar situation with a single flower image being requested so many times. I can't find the story and don't remember it well, but I think it was a big indian company using this image to check if internet was available.

IMHO, one of the problems is that many dev. don't realize both the size of their company and the impact of so many requests.

I hop you'll find a solution, and thank you for your service!

PS: maybe you should create a dedicated post about this subject to attract visibility

parekhnish · 2 years ago
Oh yes! I remember that!

[1]: Wikimedia Phabricator link: https://phabricator.wikimedia.org/T273741

[2]: HackerNews thread: https://news.ycombinator.com/item?id=26072025

Mandatum · 2 years ago
That’s typically why it’s a good idea to include a crappy “generate API” key button so you can block traffic like this, you don’t even need a registration process - someone can just email with reference to their API key to discuss their issues.
usrbinbash · 2 years ago
> you don’t even need a registration process

You should put it behind a CAPTCHA of some sort however, otherwise, some smartass will just write a "library" auto-fetching an api key as soon as the one it has currently cached stops working.

And yes, that is an annoyance to users, but so what? Please direct all complaints to the comparatively small number of people responsible for the fact that the rest of us cannot have nice things.

ransackdev · 2 years ago
icanhazip.com had similar issues. Cloudflare took over the project https://major.io/2021/06/06/a-new-future-for-icanhazip/

Fyi, dns can be used to obtain public ip from large companies, without the overhead of tcp and http

dig +short txt ch whoami.cloudflare @1.0.0.1

dig +short txt o-o.myaddr.l.google.com @ns1.google.com

dig +short myip.opendns.com @resolver1.opendns.com

KomoD · 2 years ago
What does the "ch" mean?
ozr · 2 years ago
You're a better person than me. I'd start returning nonsense like `999.9` to see if I could trigger a ton of bug reports for someone.
lloeki · 2 years ago
other evil ideas:

- return a 200 with broken JSON, possibly triggering parse errors or exceptions in the caller

- return a payload that generates catastrophic resource consumption on the other end, e.g Content-Encoding: gzip and feed it a deflate bomb

- hack TCP and/or TLS to leave the other end waiting/stalling in an attempt to rate limit (timeout) or starve resources (ulimit) on the other end (e.g abuse 3 way handshake)

gnfargbl · 2 years ago
Unfortunately, this seems to be the pattern that people offering the same service as you experience.

Take a look at https://major.io/2021/06/06/a-new-future-for-icanhazip/, if you haven't seen it already.

geuis · 2 years ago
Thanks for the link. That's like reading something from a really scary personal future.
pkphilip · 2 years ago
Sorry but I laughed aloud at all the swearing! But yes, I empathise complelely with your situation. People abusing someone else's free service really gets my goat. I hope this situation is resolved soon.

I do agree with one of the other comments - returning something about Taiwan or Tiannenmen square may do the trick

jgrahamc · 2 years ago
I’d love to know more about

“However Cloudflare doesn't properly route ipv4 address because "ipv6 is cool so we only do that" or something. Despite numerous support requests, that's still shmaybe an enterprise level feature.”

jgc@cloudflare.com if you can share your interactions with us.

timbuchwaldt · 2 years ago
We see your exact Dalvik problem on deepl.com as well. We get a constant flood of those requests, sometimes subsiding. They are globally distributed, preliminary in lower-income countries. We have tried lots of things, like letting them just time out, returning different errors, redirecting of many sorts including Android intents, no solution. They now made it to our permanent blocklist and we just deal with the useless additional traffic. We are still hyper curious what on earth is loading us and for what reason though. AFAIK we couldn't see translation requests from them, just loading our website.
ransackdev · 2 years ago
Welcome to the internet. Install pfsense/opnsense and run your own firewall at home and you'll be shocked at the flood of non-stop portscans hitting your ip getting blocked. This is par for the course and there is nothing you can do to prevent it, you have to build systems able to mitigate, offload, block bad actors. This will always be the case.

Any free service that has utility will be quickly scripted against and used to make someone else money. Build accordingly

ransackdev · 2 years ago
You mentioned low income countries. This could be infected devices running ancient unpatched OSes, but what if the traffic is legit, coming from impoverished countries who found your service and use it to teach their children and learn things they'd otherwise not have access to?

Personally I would deep dive the traffic and try to determine the intent behind it, you could be destroying a future generation's potential, and not blocking malware I'm assuming you can correlate the requests from those ips with that they are translating. Odds are someone is hitting your service to translate for their paid service, but if it's an important part of a poor country, I'd find a way to allow it to keep happening

> AFAIK we couldn't see translation requests from them, just loading our website.

Browser homepage? Or maybe the unlucky victim of a "connectivity check/am I online" recurring task

geuis · 2 years ago
That's interesting. The traffic sources hitting me seem to be the opposite. Mainly US, Western Europe, and other better well to do places around the world. I suspect a lot of the traffic is from apps on smart devices. I've seen user agents that reference Bravia tvs for example.
ransackdev · 2 years ago
Couple things to consider

1. Check your competitors who return json and see if they have a Location header 301'ing or 302'ing all their traffic to your service (if the client follows redirects).

2. Reverse dns lookup your origin ips and see if anyone has a domain's dns pointed at your service. Check the Host header on your end and make sure it's your domain as well as ensure your web server and/or proxy are not blindly accepting traffic for `*`/any host, and make sure it's serving only your host

3. Ip address headers can be spoofed. It might not be coming from where you think it's coming from

danpalmer · 2 years ago
> However Cloudflare doesn't properly ... Despite numerous support requests, that's still shmaybe an enterprise level feature.

This matches my experience. I'd use the CF free plan assuming no guarantees for a low risk site like my personal site, and I'd use the expensive enterprise plan where I'm paying individually for features and quota, but I'd never use the middle-ground "sure it's unlimited!" plan – it's far too vague about what it _actually_ provides.

TallGuyShort · 2 years ago
Ironically, "sure it's unlimited" is now a thing the parent comment has probably learned not to say too.
ransackdev · 2 years ago
> That kind of increase in traffic costs me money I've never had to plan for.

https://getjsonip.com/#plus

  Going further with jsonip Plus
  With the upcoming Plus service, you get special features and 
  even more information about your users.

    - All of the free service features
    - IP geo location - Country and city to within best available accuracy
    - ISP Info
    - Time zone data
    - Full referer data
    - Browser and OS info
https://web.archive.org/web/20200811215649/https://getjsonip...

A paid service has been "upcoming" since at least August 2020, which would subsidize the free tier usage you allow on your site. Aside from the ISP and geo data, everything else is given to you in the request headers or can be determined with the ip address (geo can get tz).

If it's costing you money, shipping the Plus features might offset your out of pocket expenses.

This is a failure of growth/capacity planning and lack of a proper TOS that clarifies "unlimited within reason and at our sole discretion with no SLA or warranty of any kind for non-paying users", as well as failure to ship any monetizing features 3 years after announcing it.

Contacting them to have them stop wouldn't solve your problems. What happens when the next million devices get random updates from literally anybody that starts doing it again? Try to implement rate limiting, optimize your hot code paths, watch out for slow clients (buffered reverse proxies), needless header parsing, slow template rendering, etc. Any language capable of concurrency should be able to handle 100s of thousands of requests on a cheap vm. The client ip is coming to you in the request headers and all you do is print it back to them... A go handler would be a few lines of code to do this and that's including dealing with reverse proxy real-ip type stuff. You don't need to allocate an actual struct and serialize into a json object, just printf a hardcoded string with a replacement for the ip from the header, or better yet benchmark the fastest solution.

I'll do it for you, I'm looking for a job ;)

manfre · 2 years ago
You assumed the issue relates only to compute costs. Even with a small payload, bandwidth fees can add up quickly when millions of clients are polling.

Deleted Comment

Dalewyn · 2 years ago
>as though there isn't a single human person behind it absorbing the costs and making sure it runs.

Obligatory https://xkcd.com/2347/

geuis · 2 years ago
You are a legend. Many hugs.
RobotToaster · 2 years ago
I hate to add to your headache, but multiple pihole ad blacklists contain your domain. It looks like https://winhelp2002.mvps.org/ may be the original source of the blacklisting.
News-Dog · 2 years ago
hosts file (modified) sourced from; Steven-Black - hosts @GitHub : https://github.com/StevenBlack/hosts

cat /etc/hosts |grep -i 'jsonip.com'

  0.0.0.0 jsonip.com
  0.0.0.0 www.jsonip.com

ransackdev · 2 years ago
pihole and other dns blocklists would reduce traffic to their service, not increase it
christiangenco · 2 years ago
Sounds like you’ve built a valuable service that large companies are using in production! Why not start charging for it?
geuis · 2 years ago
Have been thinking about it for a couple years. People generally don't realize the complexity that gets added when you start charging money for something.
netsharc · 2 years ago
> You're literally fucking killing me.

Literally being killed? Call the police!!!11

megablast · 2 years ago
> literally fucking killing me

Wow, that's crazy.

ricardobayes · 2 years ago
No, sorry this is 100% on you. You should have implemented throttling, and daily query limits. Once you put something on the internet for free, you can't complain then if people are using it.
usrbinbash · 2 years ago
> you can't complain then if people are using it.

Yes he can complain, and bombarding a free service for unlimited requests isn't okay.

For starters because the people doing that, will usually be among the first to cry when the free service stops being free, blocks their requests or suddenly requires an API key.

GuB-42 · 2 years ago
I would have agreed if it was a piece of source code. For example if you put a bit of code on the internet using a permissive license and it is good, don't complain that some tech giant took all your work for themselves without giving you anything in return. By choosing that licence you explicitly told the world that doing this is fine. Also, using someone else source code doesn't incur recurring costs on the author's part.

But here, you are actually taking resources from the author. That's something that is not only rude, but also puts the user at risk. The author is really nice for maintaining service, he could have just stopped it, or even served malicious payloads. After all, there is no contract saying that he should be nice. Here, despite the strong language, he is trying to stay nice instead of just cutting a service that many people rely on, which he has all right to do.

Throttling and daily query limits would make the service unreliable and not so different from cutting it off completely. Keep in mind that it is not a single user abusing the service, it is many users who got redirected there by an abusive app. He could have used the "API key" that is suggested here, but it is a hurdle that will affect usability.

misnome · 2 years ago
You absolutely can. Nobody has an obligation to serve you if you are an asshole.
CPLX · 2 years ago
I mean, we've all got a right to grievances.
scoofy · 2 years ago
I honestly use this a lot when I'm testing, because it's basically the only response that can show up where I know god damned well that it's only happening because I programmed it to happen under certain conditions.

edit: a common one for me is that if any test passes a post request without a csrf token... sorry, I'm a teapot, because I forgot to add a csrf token to that form.

EdSharkey · 2 years ago
I like to respond with 418 as the catch all response code for mock web services for requests that dont match any installed expected requests. The reasoning is sometimes 404 is a valid mock response for some test cases, so I needed the "404 for mocks" that would never appear on any legit service. Very clearly highlights when something is going wrong on a test.
duxup · 2 years ago
It’s still in my production code, usually in places where i don’t expect code to ever lead to.

It’s just my general “something particularly odd has happened” response.

wyldfire · 2 years ago
I've never worked on a webserver but doesn't 500 seem better suited for that condition?
ozfive · 2 years ago
I do this too for the same reason, but also for the next person that looks at my code to give the joy of laughter.
JimDabell · 2 years ago
Why not respond with an error message saying that there’s a missing CSRF token?
eyelidlessness · 2 years ago
A teapot isn’t precluded from delivering an error message per spec
scoofy · 2 years ago
abort(418) is just quick and easy and gets the job done… even if I wasn’t the one reviewing the code it would throw up enough confusion to get attention.

It also works perfectly in case it accidentally gets pushed to production.

derbOac · 2 years ago
I felt compelled to verify httpcats has it covered and it does:

https://httpcats.com/

noman-land · 2 years ago
That url is way too long. I prefer https://http.cat/.
steanne · 2 years ago
moffkalast · 2 years ago
> 218 This is fine

Is this the one that gets sent if the server temperature rises above 80 deg?

aledalgrande · 2 years ago
This is always my go to if I have to do fun custom error pages
spondyl · 2 years ago
Every time this pops up, I'm reminded of the day that the NPM registry started returning 418 responses for users accessing it via corporate HTTP proxies.

I remember being at a training course that day and my manager asking me what we could do to fix it because our CI was failing to pull dependencies from NPM.

Trying to explain that NPM was returning a status code intended as an April Fools joke and which was never meant to see the light of production was quite difficult

Perhaps I can fix a lot of things but debugging a response code that isn't meant to exist is not one of them.

https://github.com/npm/npm/issues/20791

portsnadaptors · 2 years ago
I remember that day. As a more junior developer I was very confused as to what I had surely done wrong.
perilunar · 2 years ago
I think there should be a "555 Bad Timer" error for when servers can't keep up or are running slow. Like a "429 Too Many Requests" error but it's the server's fault.
News-Dog · 2 years ago
;> 555 timer IC - Wikipedia : https://en.wikipedia.org/wiki/555_timer_IC

I'm looking forward to the extended protocol Sugar bowl.. A parody of 'I'm a Little Teapot' : https://en.wikipedia.org/wiki/I'm_a_Little_Teapot

'I'm a little teapot short and stout... here is my handle... here is my handle... Oh fv<k!, I'm a sugar bowl'

astrea · 2 years ago
I'm more amused by "A combined coffee/tea pot that is temporarily out of coffee should instead return 503 [Service Unavailable]".
dclowd9901 · 2 years ago
Kinda thought this should respond 404
tsimionescu · 2 years ago
A 404 would mean that the client should not expect to find coffee there at all, which in this case would actually be better replaced by 418. However, if coffee can be found, just not right now, then it's the server's fault, so a 5xx code is in order, and 503 fits the bill best.
deceptionatd · 2 years ago
On a related note, my favorite easter egg header:

http://www.gnuterrypratchett.com/