Skip to main content


blog.cloudflare.com/password-r…

the only way for cloudflare to have this data is if it is inside the ssl channel, analyzing traffic to their customers who are logging in.

ssssoooooooo i guess this makes the cloudflare logs a massive target for nation states now?

in reply to Viss

okay so several people have responded to this thread, pointing at me and figuratively waving off this as "well, duh. cloudflare terminates ssl. theres no surprise here"

so i feel like i have to point this out to the non-security folks.

the part where they, without consent, intercept the traffic (ESPECIALLY FUCKING AUTHENTICATION), imbibe it into a research context, and perform password analysis on it?

Thats a crime
its the same as MITMing someone from their corp workstation and stealing creds

in reply to Viss

which incidentally is exactly how all the corpo "security" tools work. Nextgen firewalls, zero trust clients, the lot. Check your certs when assuming you're connecting to a "secure" site and you'll see.
in reply to Viss

i would further argue, that if that in of itself doesn't straight up smack, to you, of 'crimes', or 'gross violations of privacy', then perhaps its time for your to revisit your moral compass.

because on this planet, when you steal fucking credentials from people who havent given you authorization to have those credentials

thats CFAA.
Thats a felony.
Thats crimes. Lots of them.
the fact they blogged about it is icing on the cake, and an admission of guilt/complicity.

in reply to Viss

"free plan" once again proving that if it's free, you are the product, and you have no way of knowing what's being done with your data.
in reply to Viss

They have always been, I've never understood why it has never been raised more vocally that this service performs TLS interception on a wide scale.
There was even an entire website devoted to it, crimeflare or something like that. All I have when I look it up now is a research tool...
in reply to Viss

Not gonna lie the convenience of CF can't be overstated, but there's this saying, if it's convenient, it's not secure...
in reply to Viss

I suppose they just often do SSL-Termination for their customers mainly for performance reasons.
in reply to Viss

The other way is to analyse sites still using unencrypted http that they then present as https to the user.
@dan
in reply to Viss

Cloudflare proxies the SSL traffic. That's how it works. Nothing new there.
in reply to Viss

now? You just figured this out?
Sorry about being toxic, but if ssl is terminated by any other then you, you are compromised!
This entry was edited (2 weeks ago)
in reply to Viss

Cloudflare can also generate SSL certificates for any domain without any authority to do so.
in reply to Viss

I don’t see this as particularly egregious in isolation - it’s basically a WAF tool being implemented by the site owner.

**However**, AFAICT it’s on by default and there doesn’t seem to be a way to turn it off with the free plan, which is gross. Having to pay to opt out of this is quite icky.

in reply to Viss

"Cloudflare’s free plan, which includes leaked credentials detection as a built-in feature..."

Presumably "non-leaked credentials detection" is a paid extra?

in reply to Viss

#CloudFlare is a #RogueISP known to offer Services in #Russia and to #CyberCriminals...

#ClownFlare is also a #ValueRemoving #rentseeker who's core product / service is essentially a #Racketeering Scheme and should not exist as any competent hoster offers #DDoS protection free of charge...

in reply to Viss

now


It always has been. A service like #Cloudflare has always been a massive security and privacy issue. Just because its more obvious now doesn't mean it hasn't always been true.

If you care even the tiniest bit about your users, stop using Cloudflare.