[wp-meta] [Making WordPress.org] #7792: TOR + VPN usage results in Too Many "429 Too Many Requests" Errors

Making WordPress.org noreply at wordpress.org
Mon Jan 6 21:33:33 UTC 2025


#7792: TOR + VPN usage results in Too Many "429 Too Many Requests" Errors
--------------------------+-----------------------
 Reporter:  maltfield     |       Owner:  (none)
     Type:  defect (bug)  |      Status:  reopened
 Priority:  normal        |   Milestone:
Component:  General       |  Resolution:
 Keywords:                |
--------------------------+-----------------------
Changes (by maltfield):

 * status:  closed => reopened
 * resolution:  reported-upstream =>


Comment:

 Great, I'm glad you recognize that your systems are harming at-risk users.
 These false-positives *are* the bug that this ticket is attempting to
 address.

 > This isn't my decision

 Can you please bring the relevant person into this ticket so we can
 discuss how to fix this bug?

 > the extreme minority of legitimate traffic is
 > not enough to warrant me arguing for it.

 This smells like misinformation. Have you actually tried to investigate
 how many of your Tor visitors are benign vs malicious?

 Tor traffic roughly mirrors the rest of Internet traffic; it's mostly
 users browsing social media (eg facebook), reading the news, watching
 videos, etc. But there is a higher percent of Tor users who are at-risk --
 such as journalists, activists, human rights workers, whistleblowers,
 refugees, domestic abuse survivors, etc [1]

 > The usage of certain anonymisation platforms (TOR is the most prolific
 > one) results in little manner to differentiate legitimate and
 illegitimate
 > traffic, by design of those platforms, which results in the experience

 Sorry, this is not true. And I'm glad we're able to have this discussion
 in this bug report to correct such confusion.

 For example, it's very, very, very easy for you to differentiate between
 benign GET requests and POST requests.

 A simple GET request of a well-cached documentation page or other static
 asset (eg js or css file) is not a threat and should not be blocked.

 Additionally, any request coming from an authenticated user can be tied to
 that user's account -- even if they use a security-hardend operating
 system like TAILS to protect themselves. Requests coming browser sessions
 with a logged-in user account (in good-standing) should not be subject to
 such IP-based blocks (that are currently rife with false-positives).

 Please bring the relevant person who made this decision into this ticket.
 Let's examine the actual threats and see how the current misconfiguration
 can be fixed while still addressing your legitimate risks.


 [1] https://community.torproject.org/user-research/personas/

-- 
Ticket URL: <https://meta.trac.wordpress.org/ticket/7792#comment:9>
Making WordPress.org <https://meta.trac.wordpress.org/>
Making WordPress.org


More information about the wp-meta mailing list