https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=37308

--- Comment #5 from Pedro Amorim <[email protected]> ---
(In reply to Katrin Fischer from comment #4)
> Can you explain a bit more about this bug and who might be affected?

Hi Katrin:
On one of our customers, for a specific SUSHI provider, whenever a 'test' or
'harvest' request was performed, that specific SUSHI provider returned the
following HTTP::Response message (shortened for brevity):

 '_content' => 'error code: 1010',
 '_request' => bless( {
                       ...
                        '_method' => 'GET',
                        ...
                      }, 'HTTP::Request' ),
 '_protocol' => 'HTTP/1.1',
 '_msg' => 'Forbidden',
 '_headers' => bless( {
                        ...
                        'server' => 'cloudflare',
                        ...
                      }, 'HTTP::Headers' ),
 '_rc' => '403',
 '_max_body_size' => undef
}, 'HTTP::Response' );

Investigating error CloudFlare's code 1010, we find the following:
"Error 1010: The owner of this website has banned your access based on your
browser's signature" is often encountered when web scraping using browser
automation tools like Puppetter, Playwright or Selenium."

A curl to the endpoint directly from the server worked, and accessing the URL
directly from the browser also worked. Only the request happening directly from
Koha's LWP::UserAgent returned Forbidden 403 with the above HTTP::Response. It
looked like that provider was considering a request from Koha to be a bot and
blocking it.
Everything works fine after applying the current patch.

-- 
You are receiving this mail because:
You are watching all bug changes.
_______________________________________________
Koha-bugs mailing list
[email protected]
https://lists.koha-community.org/cgi-bin/mailman/listinfo/koha-bugs
website : http://www.koha-community.org/
git : http://git.koha-community.org/
bugs : http://bugs.koha-community.org/

Reply via email to