Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Please note that using Cloudflare, even with free SSL, is not an increase to the security and privacy of your users. On the contrary, Cloudflare records information about your users (this cannot be disabled) and, by default, blocks users who attempt to view your site through privacy-enhancing software. I would suggest that people looking to install SSL on their website (this should be everybody) instead get their free SSL certificate from gandi.net or StartSSL, who do not spy on or block your users.


I assume you are referring to Tor? We love Tor and the specific things we block by default are resource consumption bots. If people enable. "I Am Under Attack" mode , I think there is some incidental interstitial challenge for Tor, but not blocked.

We don't comment on our customers unless they authorize us to, but based on the list of public ones, I would be pretty comfortable, even if I didn't work there.


Anyone here can test nilved's claim easily enough. Just visit Hacker News using Tor or a VPN, since the site uses Cloudflare.

Side note: Your announcement is really exciting.


No, (a) not all exit nodes and VPN IPs are effected (b) not all servers have that option enabled. I use Tor and am very frequently blocked from using reddit, imgur and other sites because of it.


Honestly the bot detection stuff in production today isn't the most awesome version of that feature possible, and improving it (especially to work with tor and vpns) is a priority, but not the highest. Cloudflare is paying for me to be at DefCon right now to launch an open source firewall / evasion tool (plug able transports to the next level) in 2 days, with the grugq, so it isn't like we are opposed to tor or anything.


So, you're saying that using HTTP instead of HTTPS doesn't increase the privacy of users? I'd say that it does "increase" the privacy, although nobody is saying that it fixes every hole in the boat...


Speaking strictly, you're right, but when you consider (a) Cloudflare's connection to your server is insecure (b) Cloudflare is listening in on every request (c) Cloudflare blocks VPN and Tor users, it doesn't seem like such an obvious decision. But that's a false dichotomy, since everybody should use HTTPS, nobody should use HTTP, and, most importantly, nobody should be okay with third-parties snooping on your users.


    Cloudflare's connection to your server is insecure
This isn't always the case. The connection can be secure.


Yeah, it can even be cert pinned, which is probably better than a non pinned end to end tls unless your attacker is local to you, due to the wonders of anycast. Also, like Google, we are constantly looking for malicious stuff like this on our IPs.


I had the same initial thought about (a), but the comments mentioned that CloudFlare issues a certificate you can install on your origin servers which will allow secure connections with CloudFlare.


I'm using a VPN (tunnelbear) and I can access my website that's behind cloudflare


Yes, it worries me that Cloudflare is proxying an ever larger number of websites I visit. It is not so easy to dump Cloudflare when you need it though. They mitigate DDoS attacks, handle large volume traffic. I think moot even said that he'd have to close 4chan if it wasn't for Cloudflare.


Cloudflare hosts and defends the sites of numerous DDoS-for-pay services and they refuse to take them down.

http://krebsonsecurity.com/2014/02/the-new-normal-200-400-gb...

"[The DDoS-for-pay] industry probably would destroy itself without Cloudflare’s protection, and furthermore ... some might perceive a credibility issue with a company that sells DDoS protection services providing safe haven to an entire cottage industry of DDoS-for-hire services."


That actually makes me trust them more. If they don't take down a site like that, then whatever site I run is certainly in the clear.



Glad you posted that, as I'm interested in seeing this discussion continued (re. my admittedly late post in that thread).


Gandi is free for a year and then expensive after - Namecheap may not be free but renewals and initial costs are much lower. StartSSL is free but revoke-ing costs money.


Revoking StartSSL is only $25. If you go 3 years without needing revocation then you're ahead of paying Namecheap or anyone else for basic domain validation.


Namecheap vs Gandi is like 6.5 vs 12 EUR. Yes is almost double, but I don't know if I would consider them as cheap and "expensive".


just checked now, Gandi is 40€/yr, not that expensive compared to big names like Verisign & co. I have used in the past RapidSSL, but it is same price, 50$/yr. I've just checked Namecheap and it's reselling other SSL like Comodo or Geotrust, but it looks less expensive, so yes, probably it's the best price.


At Gandi, a single-address standard SSL cert is $16/12€ per year. The $50/40€ applies to multi-address certs (3 addresses)

The full SSL price list is here: https://www.gandi.net/ssl/grid


you are right, I read the wrong line!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: