by tbiehn on 9/14/19, 6:09 AM with 40 comments
by judge2020 on 9/14/19, 2:17 PM
Something I don't like is how Cloudflare themselves don't really suggest you firewall off connections that aren't from CF ips, as there's only a support article on whitelisting and not blocking[1]. This is an area I hope CF can improve since any competent, targeted DDOS attacker will know the IP the server had before the owner went to CF, and/or can use a tool like curryfinger to figure it out.
0: https://community.cloudflare.com/search?q=firewall%20cloudfl...
1: https://support.cloudflare.com/hc/en-us/articles/201897700-W...
by rdl on 9/14/19, 3:13 PM
Cloudflare also has (had? I haven’t kept up) some special accelerated serving products which would de facto protect from this. Doesn’t help if you just have https vs a full vps though.
It would be awesome to have some standardized containers/ami/etc which were set up for “concealed hosting” via cf, ipfs, tor, etc.
by tgtweak on 9/14/19, 12:35 PM
by benchess on 9/14/19, 5:12 PM
You can do this in nginx by making the fake cert the first server block.
by dalbotex on 9/14/19, 10:08 AM
* The traffic between server and CDN is encrypted using a valid certificate
* The server's firewall is not properly configured
Apparently there are indeed servers with this configuration, but I just find it odd how someone would go through the trouble of setting up HTTPS (instead of terminating it at the CDN) and then not bother to block traffic from anywhere but the CDN.
by simonw on 9/14/19, 2:24 PM
Is that still true given Python 3 asyncio? My understanding is that it's really well suited to writing things like network scanners, without needing to run them in multiple threads.
by ma2rten on 9/14/19, 4:45 PM
by Avamander on 9/14/19, 2:03 PM