We want to provide an update on the recent [service outages][0] affecting our 
infrastructure. The Arch Linux Project is currently experiencing an ongoing 
denial of service attack that primarily impacts our main webpage, the Arch User 
Repository (AUR), and the Forums.

We are aware of the problems that this creates for our end users and will 
continue to actively work with our hosting provider to mitigate the attack. We 
are also evaluating DDoS protection providers while carefully considering 
factors including cost, security, and ethical standards.

To improve the communication around this issue we will provide regular updates 
on our [service status page](https://status.archlinux.org) going forward.

As a volunteer-driven project, we appreciate the community's patience as our 
DevOps team works to resolve these issues. Please bear with us and thank you 
for all the support you have shown so far.

## Workarounds during service disruption

- In the case of downtime for archlinux.org:
    - **Mirrors**: The mirror list endpoint used in tools like `reflector` is 
hosted on this site. Please default to the mirrors listed in the 
`pacman-mirrorlist` package during an outage.
    - **ISO**: Our installation image is available on a lot of the mirrors, for 
example the DevOps administered [geomirrors][1]. Please always verify its 
integrity as [described on the wiki][2] and confirm it is signed by 
`0x54449A5C` (or other trusted keys that may be used in the future).
- In the case of downtime for aur.archlinux.org:
    - **Packages**: We maintain a [mirror of AUR packages][3] on GitHub. You 
can retrieve a package using:
      `$ git clone --branch <package_name> --single-branch 
https://github.com/archlinux/aur.git <package_name>`

## Additional remarks

- Our services may send an initial connection reset due to the TCP SYN 
authentication performed by our hosting provider, but subsequent requests 
should work as expected.

- We are keeping technical details about the attack, its origin and our 
mitigation tactics internal while the attack is still ongoing.


[0]: 
https://lists.archlinux.org/archives/list/[email protected]/thread/EU4NXRX6DDJAACOWIRZNU4S5KVXEUI72/
[1]: https://geo.mirror.pkgbuild.com/iso/
[2]: https://wiki.archlinux.org/title/Installation_guide#Verify_signature
[3]: https://github.com/archlinux/aur

Attachment: signature.asc
Description: PGP signature

Reply via email to