this post was submitted on 27 May 2024
854 points (96.7% liked)

Programmer Humor

32710 readers
743 users here now

Post funny things about programming here! (Or just rant about your favourite programming language.)

Rules:

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 29 points 6 months ago* (last edited 6 months ago) (44 children)

What's the problem with CloudFlare? They're trying to make a profit, and so in the long run are the same as anybody, but every interaction I've had with them recently has left me impressed.

Edit: The answer is that the way their thing works nullifies HTTPS.

[–] [email protected] 44 points 6 months ago (2 children)

Remember when google was beloved by everyone back then when they're still have "don't be evil" motto? Cloudflare right now is like google back then: super useful, provides a lot of free services that would be expensive on other providers. But unlike google, if cloudflare go full evil in the future, the impact will be much larger because they're an mitm proxy capable of seeing unencrypted traffics across all websites under their wing. Right now they're serving ~30% of top 10,000 websites and growing.

[–] [email protected] 9 points 6 months ago (3 children)

Oh, okay, so I'm not wrong that they're good right now.

I'm a little unclear on how it works. Do they strip off HTTPS somehow? Otherwise, there's not too much unencrypted traffic around anymore.

[–] [email protected] 15 points 6 months ago* (last edited 6 months ago) (1 children)

Do they strip off HTTPS somehow?

Well yes, how else they can provide their services such as page caching, image optimizing, email address obfuscation, js minifications, ddos mitigation, etc unless they can see all data flowing between your server and your visitors in the clear?

Cloudflare is basically an MITM proxy. This blog post might be helpful if you want to know how mitm proxy works in general: https://vinodpattanshetti49.medium.com/how-the-mitm-proxy-works-8a329cc53fb

[–] [email protected] 2 points 6 months ago

Jesus Christ, I didn't realise.

[–] markstos 13 points 6 months ago (2 children)

One of the services they provide is free SSL certificates. As part of that, they have the private key to decrypt the traffic. They aren’t trying to hide that— this is true of any service that hosts the SSL cert for your site.

[–] [email protected] 2 points 6 months ago (2 children)

Does that mean it wouldn't be an issue if you bring an SSL cert from say ZeroSSL but use Cloudflare for DNS, caching, DDoS protection etc?

[–] SirQuackTheDuck 4 points 6 months ago

For DNS and DDoS protection that wouldn't directly be an issue.

For caching it would be breaking. You cannot cache what you cannot read (encrypted traffic can only be cached by the decrypting party).

[–] markstos 3 points 6 months ago

It’s not who issues the cert that matters, it is who hosts it. Hosting it includes having the private key. You always have to trust your website host, full stop.

[–] [email protected] 1 points 6 months ago (1 children)

Man, I thought we were done with this shit when HTTPS became standard.

[–] markstos 3 points 6 months ago (1 children)

With what? HTTPS has to terminate the encryption somewhere and that place has to have the private key to do so.

CloudFlare is providing the same service here as all other hosts of HTTPS websites do.

[–] [email protected] 0 points 6 months ago* (last edited 6 months ago) (1 children)

Well, depends. If it's hosted on AWS and HTTPS terminates there like it's supposed to, Amazon could look inside, but a human being would have to personally hack your container and extract the data, so that's a bit better. If it's something more like Wix, though, sure. (Is Wix still a thing?)

[–] markstos 3 points 6 months ago (1 children)

If you use the AWS load balancer product or their certificates, they have access to the private key, regardless of whether you forward traffic from the LB to the container over HTTPS or not.

If you terminate the SSL with your own certificate yourself, Amazon still installs the SSM agent by default on Linux boxes. That runs as root and they control it.

If you disable the SSM agent and terminate SSL within Linux boxes you control at AWS, then I don’t think they can access inside your host as long as you are using encrypted EBS volumes encrypted with your key.

[–] [email protected] 1 points 6 months ago (1 children)

Obviously, I've never actually done this. Good to know.

I'm starting to worry that HTTPS is entirely fake - in the sense that it's purely decorative encryption that protects an insignificant part of the transaction. Like, maybe by design. The NSA's been doing something all these years.

[–] markstos 1 points 6 months ago (1 children)
[–] [email protected] 1 points 6 months ago

When used as intended, yes. What I mean is that in practice it may have been weakened, by promotion of services that use it in ways far from best security practices.

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

You have no proof that they're "good right now". The big five corporations were forwarding data to the NSA for years before the surveillance leaks exposed them.

Your privacy default should not be to trust an MITM, ever.

[–] [email protected] 5 points 6 months ago (1 children)

There's no proof they aren't doing anything nefarious with that data right now, other than company statements saying, "trust us".

People default to trusting giant corporations first it seems.

[–] Crashumbc 1 points 6 months ago (1 children)

Their a corporation, at best they're baby Hitler...

[–] [email protected] 1 points 6 months ago

I'm not sure if this is ironic bc I've been exposed to too many irony-poisoned comments lately, but cloudflare exists to profit off your data. They're not there to help you, your data and its trends are the product.

load more comments (41 replies)