Most active commenters
  • (13)
  • ghxst(8)
  • progmetaldev(7)
  • shwouchk(7)
  • pc86(7)
  • Hold-And-Modify(7)
  • doctor_radium(6)
  • inetknght(6)
  • dragontamer(5)
  • johnmaguire(5)

1343 points Hold-And-Modify | 538 comments | | HN request time: 5.428s | source | bottom

Hello.

Cloudflare's Browser Intergrity Check/Verification/Challenge feature used by many websites, is denying access to users of non-mainstream browsers like Pale Moon.

Users reports began on January 31:

https://forum.palemoon.org/viewtopic.php?f=3&t=32045

This situation occurs at least once a year, and there is no easy way to contact Cloudflare. Their "Submit feedback" tool yields no results. A Cloudflare Community topic was flagged as "spam" by members of that community and was promptly locked with no real solution, and no official response from Cloudflare:

https://community.cloudflare.com/t/access-denied-to-pale-moo...

Partial list of other browsers that are being denied access:

Falkon, SeaMonkey, IceCat, Basilisk.

Hacker News 2022 post about the same issue, which brought attention and had Cloudflare quickly patching the issue:

https://news.ycombinator.com/item?id=31317886

A Cloudflare product manager declared back then: "...we do not want to be in the business of saying one browser is more legitimate than another."

As of now, there is no official response from Cloudflare. Internet access is still denied by their tool.

1. nickburns ◴[] No.42953683[source]
Not helpful to an otherwise worthwhile discussion.
replies(1): >>42955347 #
2. hexagonwin ◴[] No.42953791[source]
Same issue. I haven't been able to visit any websites powered by Cloudflare on my SeaMonkey browser recently.
3. zlagen ◴[] No.42953898[source]
I'm using chrome on linux and noticed that this year cloudflare is very agressive in showing the "Verify you are a human" box. Now a lot of sites that use cloudflare show it and once you solve the challenge it shows it again after 30 minutes!

What are you protecting cloudflare?

Also they show those captchas when going to robots.txt... unbelievable.

replies(17): >>42954054 #>>42954451 #>>42954784 #>>42954904 #>>42955172 #>>42955240 #>>42955949 #>>42956893 #>>42957248 #>>42957383 #>>42957406 #>>42957408 #>>42957698 #>>42957738 #>>42957782 #>>42958180 #>>42960458 #
4. nonrandomstring ◴[] No.42953911[source]
I use w3m which makes me about as popular as a fart in a spacesuit. No Cloudflare things for me.
5. viraptor ◴[] No.42954054[source]
The captcha on robots is a misconfiguration in the website. CF has lots of issues, but this one is on their costumer. Also they detect Google and other bots, so those may be going through anyway.
replies(2): >>42954579 #>>42955526 #
6. reify ◴[] No.42954118[source]
I use Librewolf and Zen Browser

If I am met with the dreaded cloudflare "Verify you are a human" box, which is very rare for me, I dont bother and just close the tab.

replies(1): >>42982962 #
7. ai-christianson ◴[] No.42954365[source]
How many of you all are running bare metal hooked right up to the internet? Is DDoS or any of that actually a super common problem?

I know it happens, but also I've run plenty of servers hooked directly to the internet (with standard *nix security precautions and hosting provider DDoS protection) and haven't had it actually be an issue.

So why run absolutely everything through Cloudflare?

replies(20): >>42954540 #>>42954566 #>>42954576 #>>42954719 #>>42954753 #>>42954770 #>>42954846 #>>42954917 #>>42954977 #>>42955107 #>>42955135 #>>42955479 #>>42956166 #>>42956201 #>>42956652 #>>42957837 #>>42958038 #>>42958248 #>>42963387 #>>42964892 #
8. fcq ◴[] No.42954451[source]
I have Firefox and Brave set to always clear cookies and everything when I close the browser... it is a nightmare when I come back the amount of captchas everywhere....

It is either that or keep sending data back to the Meta and Co. overlords despite me not being a Facebook, Instagram, Whatsapp user...

replies(2): >>42956668 #>>42957101 #
9. arielcostas ◴[] No.42954482[source]
A lot of people are failing to conceive the danger that poses to the open web the fact that a lot of traffic runs through/to a few bunch of providers (namely, CloudFlare, AWS, Azure, Google Cloud, and "smaller" ones like Fastly or Akamai) who can take this kind of measures without (many) website owners knowing or giving a crap about.

Google itself tried to push crap like Web Environment Integrity (WEI) so websites could verify "authentic" browsers. We got them to stop it (for now) but there was already code in the Chromium sources. What makes CloudFlare MITMing and blocking/punishing genuine users from visiting websites?

Why are we trusting CloudFlare to be a "good citizen" and not block unfairly/annoy certain people for whatever reason? Or even worse, serve modified content instead of what the actual origin is serving? I mean in the cases where CloudFlare re-encrypts the data, instead of only being a DNS provider. How can we trust that not third party has infiltrated their systems and compromised them? Except "just trust me bro", of course

replies(5): >>42954587 #>>42954636 #>>42954799 #>>42954869 #>>42959969 #
10. uniformlyrandom ◴[] No.42954540[source]
Most exploits target the software, not the hardware. CF is a good reverse proxy.
11. raffraffraff ◴[] No.42954566[source]
They make it easy to delegate a DNS zone to them and use their API to create records (eg: install external-dns on kubernetes and key it create records automatically for ingresses)
12. ◴[] No.42954579{3}[source]
13. raffraffraff ◴[] No.42954587[source]
I don't think people aren't aware that it's bad. They just don't care enough. And they think "I could keep all this money safely in my mattress or I could put it into one of those three big banks!" ... Or something like that.
14. graemep ◴[] No.42954591[source]
Most of the sites mentioned in the forum work for me with PaleMoon.

I do get a "your browser is unsupported" message from the forums.

15. SpicyLemonZest ◴[] No.42954636[source]
I can easily conceive the danger. But I can directly observe the danger that's causing traffic to be so centralized - if you don't have one of those providers on your side, any adversary with a couple hundred dollars to burn can take down your website on demand. That seems like a bigger practical problem for the open web, and I don't know what the alternative solution would be. How can I know, without incurring any nontrivial computation cost, that a weird-looking request coming from a weird browser I don't recognize is not a botnet trying to DDOS me?
replies(2): >>42954765 #>>42955600 #
16. codexon ◴[] No.42954719[source]
It is common once your website hits a certain threshold in popularity.

If you are just a small startup or a blog, you'll probably never see an attack.

Even if you don't host anything offensive you can be targeted by competitors, blackmailed for money, or just randomly selected by a hacker to test the power of their botnet.

17. fishgoesblub ◴[] No.42954738[source]
Since 2024 to now I've had to constantly verify that I'm human just to visit certain sites due to Cloudflare. Now it's even worse since (sometimes) cdnjs.cloudflare.com loads infinitely unless I turn on my VPN. Infuriating that I have to use a service known for potential spam, to get another service that blocks spam to bloody work.
18. randunel ◴[] No.42954747[source]
Chromium on linux is also frequently blocked by cloudflare. I can't use tools such as HIBP.
replies(2): >>42954790 #>>42954981 #
19. juped ◴[] No.42954752[source]
Things like "using Linux" or "having an adblocker at all" get you sent to captcha hell. Anything where you're in the minority of traffic. It's not going to change; why would it?
replies(4): >>42954823 #>>42954997 #>>42955129 #>>42955738 #
20. progmetaldev ◴[] No.42954753[source]
Web scraping without any kind of sleeping in between requests (usually firing many threads at once), as well as heavy exploit scanning is a near constant for most websites. With AI technology, it's only getting worse, as vendors attempt to bring in content from all over the web without regard for resource usage. Depending on the industry, DDoS can be very common from competitors that aren't afraid to rent out botnets to boost their business and tear down those they compete against.
21. juped ◴[] No.42954765{3}[source]
how do you know a normal-looking request coming from google chrome is not a botnet trying to ddos you?
replies(1): >>42955084 #
22. rpgwaiter ◴[] No.42954770[source]
It’s free unless you’re rolling in traffic, it’s extremely easy to setup, and CF can handle pretty much all of your infra with tools way better than AWS.

Also you can buy a cheaper ipv6 only VPS and run it thru free CF proxy to allow ipv4 traffic to your site

replies(1): >>42955517 #
23. progmetaldev ◴[] No.42954784[source]
Whoever configures the Cloudflare rules should be turning off the firewall for things like robots.txt and sitemap.xml. You can still use caching for those resources to prevent them becoming a front door to DDoS.
replies(1): >>42956791 #
24. martinbaun ◴[] No.42954790[source]
Same here. I just gave up on most of these websites. When I absolutely need to use a website such as for flights, I have a clean chrome browser I spin up.
25. Retr0id ◴[] No.42954799[source]
> Or even worse, serve modified content instead of what the actual origin is serving?

I witnessed this! Last time I checked, in the default config, the connection between cloudflare and the origin server does not do strict TLS cert validation. Which for an active-MITM attacker is as good as no TLS cert validation at all.

A few years ago an Indian ISP decided that https://overthewire.org should be banned for hosting "hacking" content (iirc). For many Indian users, the page showed a "content blocked" page. But the error page had a padlock icon in the URL bar and a valid TLS cert - said ISP was injecting it between Cloudflare and the origin server using a self-signed cert, and Cloudflare was re-encrypting it with a legit cert. In this case it was very conspicuous, but if the tampering was less obvious there'd be no way for an end-user to detect the MITM.

I don't have any evidence on-hand, but iirc there were people reporting this issue on Twitter - somewhere between 2019 and 2021, maybe.

replies(1): >>42954884 #
26. DoctorOW ◴[] No.42954823[source]
I have multiple blockers (Ublock Origin, Privacy Badger, Facebook Container) in Firefox and have not experienced this issue.
replies(1): >>42955654 #
27. grishka ◴[] No.42954846[source]
> How many of you all are running bare metal hooked right up to the internet?

I do. Many people I know do. In my risk model, DDoS is something purely theoretical. Yes it can happen, but you have to seriously upset someone for it to maybe happen.

replies(1): >>42955467 #
28. jmbwell ◴[] No.42954854[source]
I'm still in the habit of granting Cloudflare a presumption of good faith. Developers frequently make assumptions about things like browsers that can cause problems like this. Something somewhere gets over-optimized, or someone somewhere does some 80/20 calculation, or something gets copy-pasted or (these days) produced by an LLM. There are plenty of reasons why this might be entirely unintentional, or that the severity of the impacts of a change were underestimated.

I agree that this exposes the risk of relying overmuch on handful of large, opaque, unaccountable companies. And as long as Cloudflare's customers are web operators (rather than users), there isn't a lot of incentive for them to be concerned about the user if their customers aren't.

One idea might be to approach web site operators who use Cloudflare and whose sites trigger these captchas more than you'd like. Explain the situation to the web site operator. If the web site operator cares enough about you, they might complain to Cloudflare. And if not, well, you have your answer.

replies(1): >>42966804 #
29. progmetaldev ◴[] No.42954869[source]
Maybe it's the customers I deal with, or my own ignorance, but what alternatives are there to a service like Cloudflare? It is very easy to setup, and my clients don't want to pay a lot of money for hosting. With Cloudflare, I can turn on DDoS and bot protection to prevent heavy resource usage, as well as turn on caching to keep resource usage down. I built a plugin for the CMS I use (Umbraco - runs on .NET) to clear the cache for specific pages, or all pages (such as when a change is made to a global element like the header). I am able to run a website on Azure with less than the minimum recommended memory and CPU for Umbraco, due to lots of performance analyzing and enhancements over the years, but also because I have Cloudflare in front of the website.

If there were an alternative that would provide the same benefits at roughly the same cost, I would definitely be willing to take a look, even if it meant I needed to spend some time learning a different way to configure the service from the way I configure Cloudflare.

replies(2): >>42955695 #>>42956106 #
30. progmetaldev ◴[] No.42954884{3}[source]
Cloudflare recently started detecting whether strict TLS cert validation works with the origin server, and if it does, it enables strict validation automatically.
31. potus_kushner ◴[] No.42954904[source]
using palemoon, i don't even get a captcha that i could solve. just a spinning wheel, and the site reloads over and over. this makes it impossible to use e.g. anything hosted on sourceforge.net, as they're behind the clownflare "Great Firewall of the West" too.
replies(1): >>42960053 #
32. jmclnx ◴[] No.42954905[source]
I just went to a site that I think uses cloudflare via seamonkey. I was able to get to the site. This is on OpenBSD.

But if someone has a site that is failing, feel free to post it and I will give it a try.

replies(1): >>42955369 #
33. lofaszvanitt ◴[] No.42954915[source]
Cloudflare is slowly but surely turning the web into a walled garden.
replies(2): >>42954986 #>>42957933 #
34. nijave ◴[] No.42954917[source]
Small/medium SaaS. Had ~8 hours of 100k reqs/sec last year when we usually see 100-150 reqs/sec. Moved everything behind a Cloudflare Enterprise setup and ditched AWS Client Access VPN (OpenVPN) for Cloudflare WARP

I've only been here 1.5 years but sounds like we usually see 1 decent sized DDoS a year plus a handful of other "DoS" usually AI crawler extensions or 3rd parties calling too aggressively

There are some extensions/products that create a "personal AI knowledge base" and they'll use the customers login credentials and scrape every link once an hour. Some links are really really resource intensive data or report requests that are very rare in real usage

replies(1): >>42955030 #
35. matt_heimer ◴[] No.42954977[source]
Yes, [D]DoS is a problem. Its not uncommon for a single person with residential fiber to have more bandwidth than your small site hosted on a 1u box or VPS. Either your bandwidth is rate limited and they can denial of service your site or your bandwidth is greater but they can still cause you to go over your allocation and cause massive charges.

In the past you could ban IPs but that's not very useful anymore.

The distributed attacks tend to be AI companies that assume every site has infinite bandwidth and their crawlers tend to run out of different regions.

Even if you aren't dealing with attacks or outages, Cloudflare's caching features can save you a ton of money.

If you haven't used Cloudflare, most sites only need their free tier offering.

It's hard to say no to a free service that provides feature you need.

Source: I went over a decade hosting a site without a CDN before it became too difficult to deal with. Basically I spent 3 days straight banning ips at the hosting company level, tuning various rate limiting web server modules and even scaling the hardware to double the capacity. None of it could keep the site online 100% of the time. Within 30 mins of trying Cloudflare it was working perfectly.

replies(2): >>42955258 #>>42959421 #
36. wkat4242 ◴[] No.42954981[source]
Yeah and Firefox on Linux too. I do have the user agent set to one from Edge because otherwise Microsoft blocks many features in Office 365. Once it thinks it's Edge it suddenly does work just fine. But it doesn't completely fix all the cloudflare blocks and captchas.
replies(1): >>42958789 #
37. thomassmith65 ◴[] No.42954986[source]
Pretty soon the internet will just be a vestigial thing that people use to connect to the cloudflare.
38. linuxftw ◴[] No.42954997[source]
I have been using Fedora + Firefox for years. I sometimes get a captcha from Cloudflare, but not frequently. Works just fine.

I have not tried less mainstream browsers, just FF and Chrome.

39. gamegod ◴[] No.42955030{3}[source]
Did you put rate limiting rules on your webserver?

Why was that not enough to mitigate the DDoS?

replies(4): >>42955331 #>>42955430 #>>42955462 #>>42957537 #
40. rollcat ◴[] No.42955039[source]
On one hand, this is a scummy move from CloudFlare. All this has ever done is make browsers spoof their UAs. Mozilla/4.0 anyone?

On the other, Pale Moon is an ancient (pre-quantum) volunteer-supported fork of Firefox, with boatloads of known and unfixed security bugs - some fixes might be getting merged from upstream, but for real, the codebases diverged almost a decade ago. You might as well be using IE 11.

replies(2): >>42958173 #>>42970269 #
41. SpicyLemonZest ◴[] No.42955084{4}[source]
You deploy complex proprietary heuristics to identify whether incoming requests look more like an attack or more like something a user would legitimately send. If you find a new heuristic and try to deploy it, you'll immediately notice if it throws a bunch of false positives for Chrome, but you might not notice so quickly for Pale Moon or other non-mainstream browsers.

(And if I were doing this on my own, rather than trusting Cloudflare to do it, I would almost surely decide that I don't care enough about Pale Moon users to fix an otherwise good rule that's blocking them as a side effect.)

42. motiejus ◴[] No.42955107[source]
I've been running jakstys.lt (and subdomains like git.jakstys.lt) from my closet, a simple residential connection with a small monthly price for a static IP.

The only time I had a problem was when gitea started caching git bundles of my Linux kernel mirror, which bots kept downloading (things like a full targz of every commit since 2005). Server promptly went out of disk space. I fixed gitea settings to not cache those. That was it.

Not ever ddos. Or I (and uptimerobot) did not notice it. :)

43. jeroenhd ◴[] No.42955129[source]
Things are going to chance. Unfortunately, things are only getting worse.

CAPTCHAs are barely sufficient against bots these days. I expect the first sites to start implementing Apple/Cloudflare's remote attestation as a CAPTCHA replacement any day now, and after that it's going to get harder and harder to use the web without Official(tm) Software(tm).

Using Linux isn't what's getting you blocked. I use Linux, and I'm not getting blocked. These blocks are the results of a whole range of data points, including things like IP addresses.

44. Puts ◴[] No.42955135[source]
Most (D)DOS attacks are just either UDP floods or SYN floods that iptables will handle without any problem. Sometimes what people think are DDOS is just their application DDOSing themself because they are doing recursive calls to some back-end micro-service.

If it was actually a traffic based DDOS someone still needs to pay for that bandwidth which would be too expansive for most companies anyway - even if it kept your site running.

But you can sell a lot of services to incompetent people.

replies(2): >>42955503 #>>42956007 #
45. likeabatterycar ◴[] No.42955172[source]
I run a honeypot and I can say with reasonable confidence many (most?) bots and scrapers use a Chrome on Linux user-agent. It's a fairly good indication of malicious traffic. In fact I would say it probably outweighs legitimate traffic with that user agent.

It's also a pretty safe assumption that Cloudflare is not run by morons, and they have access to more data than we do, by virtue of being the strip club bouncer for half the Internet.

replies(3): >>42955338 #>>42955460 #>>42957699 #
46. out-of-ideas ◴[] No.42955173[source]
at this point, im honestly surprised that all non-mainstream browsers dont emulate the same user-agent and ssl fingerprint order of a mainstream browser - or add a flag to change behavior per "tab" (or if cli per some call or other scope) - coupled with a javascript-operating-system which also aligns with those
replies(1): >>42975983 #
47. tibbar ◴[] No.42955200[source]
This echoes the user agent checking that was prevalent in past times. Websites would limit features and sometimes refuse to render for the "wrong" browser, even if that browser had the ability to display the website just fine. So browsers started pretending to be other browsers in their user agents. Case in point - my Chrome browser, running on an M3 mac, has the following user agent:

"'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36'"

That means my browser is pretending to be Firefox AND Safari on an Intel chip.

I don't know what features Cloudflare uses to determine what browser you're on, or if perhaps it's sophisticated enough to get past the user agent spoofing, but it's all rather funny and reminiscent just the same.

replies(7): >>42955304 #>>42955320 #>>42956442 #>>42959877 #>>42961242 #>>42963248 #>>42965661 #
48. stainablesteel ◴[] No.42955208[source]
is spoofing not a simple solution to this?
replies(1): >>42962300 #
49. zb3 ◴[] No.42955229[source]
Do these browsers employ any additional tracking protections? "Browser integrity checks" are browser-specific and they might rely on the "entropy" those tracking vectors provide.
replies(1): >>42955273 #
50. slothsarecool ◴[] No.42955234[source]
Cloudflare is actually pretty upfront about which browsers they support. You can find the whole list right in their developer docs. This isn't some secret they're trying to hide from website owners or users - it's right here https://developers.cloudflare.com/waf/reference/cloudflare-c... - My guess is that there is no response because not one of the browsers you listed is supported.

Think about it this way: when a framework (many modern websites) or CAPTCHA/Challenge doesn't support an older or less common browser, it's not because someone's sitting there trying to keep people out. It's more likely they are trying to balance the maintenance costs and the hassle involved in allowing or working with whatever other many platforms there are (browsers in this case). At what point is a browser relevant? 1 user? 2 users? 100? Can you blame a company that accommodates for probably >99% of the traffic they usually see? I don't think so, but that's just me.

At the end, site owners can always look at their specific situation and decide how they want to handle it - stick with the default security settings or open things up through firewall rules. It's really up to them to figure out what works best for their users.

replies(3): >>42955422 #>>42956415 #>>42966774 #
51. rurp ◴[] No.42955240[source]
Cloudflare has been even worse for me on Linux + Firefox. On a number of sites I get the "Verify" challenge and after solving it immediately get a message saying "You have been blocked" every time. Clearing cookies, disabling UBO, and other changes make no difference. Reporting the issue to them does nothing.

This hostility to normal browsing behavior makes me extremely reluctant to ever use Cloudflare on any projects.

replies(11): >>42955435 #>>42955476 #>>42955584 #>>42956165 #>>42956734 #>>42956862 #>>42957307 #>>42957578 #>>42957641 #>>42958547 #>>42958853 #
52. johnmaguire ◴[] No.42955258{3}[source]
> It's hard to say no to a free service that provides feature you need.

Very true! Though you still see people who are surprised to learn that CF DDOS protection acts as a MITM proxy and can read your traffic plaintext. This is of course by design, to inspect the traffic. But admittedly, CF is not very clear about this in the Admin Panel or docs.

Places one might expect to learn this, but won't:

- https://developers.cloudflare.com/dns/manage-dns-records/ref...

- https://developers.cloudflare.com/fundamentals/concepts/how-...

- https://imgur.com/a/zGegZ00

replies(1): >>42955969 #
53. Hold-And-Modify ◴[] No.42955259[source]
Forgot to clarify: this is not about an increased amount of captchas, or an annoyance issue.

The Cloudflare tool does not complete its verifications, resulting in an endless "Verifying..." loop and thus none of the websites in question can be accessed. All you get to see is Cloudflare.

replies(3): >>42957559 #>>42963098 #>>42963848 #
54. picafrost ◴[] No.42955268[source]
Companies like Google and Cloudflare make great tools. They give them away for free. They have different reasons for this, but these tools provide a lot of value to a lot of people. I’m sure that in the abstract their devs mean well and take pride in making the internet more robust, as they should.

Is it worth giving the internet to them? Is something so fundamentally wrong with the architecture of the internet that we need megacorps to patch the holes?

replies(1): >>42955889 #
55. zb3 ◴[] No.42955273[source]
So this would only be "bad" move by cloudflare if you could get around it by recompiling the browser with spoofed UA/strings. Otherwise they'd have to support every possible engine which is infeasible. That saying, the "open web" is indeed dead.
replies(1): >>42976559 #
56. ZeWaka ◴[] No.42955304[source]
> if perhaps it's sophisticated enough to get past the user agent spoofing

As a part of some browser fingerprinting I have access to at work, there's both commercial and free solutions to determine the actual browser being used.

It's quite easy even if you're just going off of the browser-exposed properties. You just check the values against a prepopulated table. You can see some of such values here: https://amiunique.org/fingerprint

Edit: To follow up, one of the leading fingerprinting libraries just ignores useragent and uses functionality testing as well: https://github.com/fingerprintjs/fingerprintjs/blob/master/s...

57. johnmaguire ◴[] No.42955320[source]
As a counterpoint, I asked Claude to write a script to fetch Claude usage and expose it as a Prometheus metric. As no public API exists, Claude suggested I grab the request from the Network tab. I copied it as cURL, and attempted to run it, and was denied with a 403 from CF.

I forgot the script open, polling for about 20 minutes, and suddenly it started working.

So even sending all the same headers as Firefox, but with cURL, CF seemed to detect automated access, and then eventually allowed it through anyway after it saw I was only polling once a minute. I found this rather impressive. Are they using subtle timings? Does cURL have an easy-to-spot fingerprint outside of its headers?

Reminded me of this attack, where they can detect when a script is running under "curl | sh" and serve alternate code versus when it is read in the browser: https://news.ycombinator.com/item?id=17636032

replies(2): >>42955749 #>>42961243 #
58. danielheath ◴[] No.42955331{4}[source]
Not the same poster, but the first "D" in "DDoS" is why rate-limiting doesn't work - attackers these days usually have a _huge_ (tens of thousands) pool of residential ip4 addresses to work with.
replies(2): >>42958273 #>>42960174 #
59. rurp ◴[] No.42955338{3}[source]
User-agent might be a useful signal but treating it as an absolute flag is sloppy. For one thing it's trivial for malicious actors to change their user-agent. Cloudflare could use many other signals to drastically cut down on false positives that block normal users, but it seems like they don't care enough to be bothered. If they cared more about technical and privacy-conscious users they would do better.
replies(2): >>42955394 #>>42955627 #
60. scblock ◴[] No.42955347{3}[source]
The rest of this comment section is the same sentiment mixed in with trying to make excuses for Cloudflare. So... it is helpful. Stop allowing a private company to control and MITM the entire internet.
61. kordlessagain ◴[] No.42955365[source]
Cloudflare's proxy model solved immediate security and reliability problems but created a lasting tension between service stability and user choice. Like old telecom networks that restricted equipment, Cloudflare's approach favors their paying customers' needs over end-user freedom, particularly in browser choice. While this ensures predictable revenue and service quality, it echoes historical patterns where infrastructure standardization both enables and constrains.
62. matt_heimer ◴[] No.42955369[source]
I tested palemoon on Win with one of my Cloudflare sites and didn't see any problem either.

It's probably dependent on the security settings the site owner has choosen. I'm guessing bot fight mode might cause the issue.

63. likeabatterycar ◴[] No.42955394{4}[source]
> For one thing it's trivial for malicious actors to change their user-agent.

Absolutely true. But the programmers of these bots are lazy and often don't. So if Cloudflare has access to other data that can positively identify bots, and there is a high correlation with a particular user agent, well then it's a good first-pass indication despite collateral damage from false positives.

replies(3): >>42955717 #>>42956111 #>>42956816 #
64. Hold-And-Modify ◴[] No.42955422[source]
Not exactly. They say:

"Challenges are not supported by Microsoft Internet Explorer."

Nowhere is it mentioned that internet access will be denied to visitors not using "major" browsers, as defined by Cloudflare presumably. That wouldn't sound too legal, honestly.

Below that: "Visitors must enable JavaScript and cookies on their browser to be able to pass any type of challenge."

These conditions are met.

replies(2): >>42955634 #>>42959835 #
65. ◴[] No.42955430{4}[source]
66. nbernard ◴[] No.42955435{3}[source]
Check that you are allowing webworker scripts, that did the trick for me. I still have issues on slower computers (Raspberry pies and the like) as they seem to be to slow to do whatever Cloudflare wants as a verification in the allotted time, however.
67. buyucu ◴[] No.42955449[source]
Welcome to the modern world. Any deviation from the average will get you flagged as a suspicious deviant. It's not just browsers. It's everything.
68. windsignaling ◴[] No.42955454[source]
As a website owner and VPN user I see both sides of this.

On one hand, I get the annoying "Verify" box every time I use ChatGPT (and now due its popularity, DeepSeek as well).

On the other hand, without Cloudflare I'd be seeing thousands of junk requests and hacking attempts everyday, people attempting credit card fraud, etc.

I honestly don't know what the solution is.

replies(15): >>42955722 #>>42955733 #>>42956022 #>>42956059 #>>42956088 #>>42956502 #>>42957016 #>>42957235 #>>42959074 #>>42959436 #>>42959515 #>>42959590 #>>42963545 #>>42963562 #>>42966987 #
69. lta ◴[] No.42955460{3}[source]
Sure, but does that means that we, Linux users, can't go on the web anymore ? It's way easier for spammers and bots to move to another user agent/system than for legitimate users. So whatever causes this is not a great solution to this problem. You can do better CF
replies(1): >>42955650 #
70. hombre_fatal ◴[] No.42955462{4}[source]
That might have been good for preventing someone from spamming your HotScripts guestbook in 2005, but not much else.
71. maples37 ◴[] No.42955467{3}[source]
From my experience, if you tick off the wrong person, the threshold for them starting a DDoS is surprisingly low.

A while ago, my company was hiring and conducting interviews, and after one candidate was rejected, one of our sites got hit by a DDoS. I wasn't in the room when people were dealing with it, but in the post-incident review, they said "we're 99% sure we know exactly who this came from".

replies(1): >>42961885 #
72. lta ◴[] No.42955476{3}[source]
Yeah, same here. I've avoided it for a most of my customers for that very reason already
73. buyucu ◴[] No.42955479[source]
DDoS is a problem, but for most ordinary problems it's not as bad as people make it out to be. Even something very simple like fail2ban will go a long way.
74. hombre_fatal ◴[] No.42955503{3}[source]
You need an answer to someone buying $10 of booter time and sending a volumetric attack your way. If any of the traffic is even reaching your server, you've already lost, so iptables isn't going to help you because your link is saturated.

Cloudflare offers protection for free.

75. zelphirkalt ◴[] No.42955517{3}[source]
Easy to set up, easy to screw up user experience. Easy-peasy.
76. jasonjayr ◴[] No.42955526{3}[source]
Sure; but sensible defaults ought to be in place. There are certain "well known" urls that are intended for machine consuption. CF should permit (and perhaps rate limit?) those by default, unless the user overrides them.
replies(1): >>42963114 #
77. lopkeny12ko ◴[] No.42955536[source]
Cloudflare has been blocking "mainstream" browsers too, if you are generous enough to consider Firefox "mainstream." The "verify you are a human" sequence gets stuck in a perpetual never-ending loop where clicking the checkbox only refreshes the page and presents the same challenge. Certain websites (most notably archive.is) have been completely inaccessible for me for years for this reason.
replies(3): >>42956131 #>>42957274 #>>42961378 #
78. indigodaddy ◴[] No.42955549[source]
This is totally fucked if true
79. sleepybrett ◴[] No.42955584{3}[source]
Yeah, Lego and Etsy are two sites I can now only visit with safari. It sucks. Firefox on the same machine it claims I'm a bot or a crawler. (not even on linux, on a mac)
80. hombre_fatal ◴[] No.42955600{3}[source]
Exactly. If you're going to bemoan centralization, which is fine, you also need to address the reason why we're going in that direction. And that's probably going to involve rethinking the naive foundational aspects of the internet.
81. sleepybrett ◴[] No.42955627{4}[source]
I mean, do we need to replace user agent with some kind of 'browser signing'?
replies(1): >>42974078 #
82. slothsarecool ◴[] No.42955634{3}[source]
> * If your visitors are using an up-to-date version of a major browser * > * they will receive the challenge correctly. *

I'm unsure what part of this isn't clear, major browsers, as long as they are up to date, are supported and should always pass challenges. Palemoon isn't a major browser, neither are the other browsers mentioned on the thread.

> * Nowhere is it mentioned that internet access will be denied to visitors not using "major" browsers *

Challenge pages is what your browser is struggling to pass, you aren't seeing a block page or a straight up denying of the connection, instead, the challenge isn't passing because whatever update CF has done, has clearly broken the compatibility with Palemoon, I seriously doubt this was on purpose. Regarding those annoying challenge pages, these aren't meant to be used 24/7 as they are genuinely annoying, if you are seeing challenge pages more often than you are on chrome, its likely that the site owner is actively is flagging your session to be challenged, they can undo this by adjusting their firewall rules.

If a site owner decides to enable challenge pages for every visitor, you should shift the blame on the site owners lack of interest in properly tunning their firewall.

replies(2): >>42955782 #>>42956561 #
83. garspin ◴[] No.42955643[source]
I use minbrowser.org/ Some sites disallow it... min suggests changing the user-agent setting to something like - Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/121.0
84. pndy ◴[] No.42955649[source]
I don't have any issues so far under Librewolf, Waterfox and Ungoogled Chromium.
replies(1): >>42957954 #
85. zamadatix ◴[] No.42955650{4}[source]
I'm a Linux user as well but I'm not sure what Cloudflare is supposed to be doing here that makes everybody happy. Removing the most obvious signals of botting because there are some real users that look like that too may be better for that individual user but that doesn't make it a good answer for legitimate users as a whole. SPAM, DoS, phishing, credential stuffing, scraping, click fraud, API abuse, and more are problems which impact real users just as extra checks and false positive blocks do.

If you really do have a better way to make all legitimate users of sites happy with bot protections then by all means there is a massive market for this. Unfortunately you're probably more like me, stuck between a rock and a hard place of being in a situation where we have no good solution and just annoyance with the way things are.

replies(1): >>42957512 #
86. maples37 ◴[] No.42955654{3}[source]
For what it's worth, this has been my experience as well. I've seen maybe a handful of full-page Cloudflare walls over the past year, and none have gotten me stuck in any kind of loop
87. ◴[] No.42955695{3}[source]
88. ok_dad ◴[] No.42955717{5}[source]
I would hope Cloudflare would be way, way beyond a “first pass” at this stuff. That’s logic you use for a ten person startup, not the company who’s managed to capture the fucking internet under their network.
89. gjsman-1000 ◴[] No.42955722[source]
Simple: We need to acknowledge that the vision of a decentralized internet as it was implemented was a complete failure, is dying, and will probably never return.

Robots went out of control, whether malicious or the AI scrapers or the Clearview surveillance kind; users learned to not trust random websites; SEO spam ruined search, the only thing that made a decentralized internet navigable; nation state attacks became a common occurrence; people prefer a few websites that do everything (Facebook becoming an eBay competitor). Even if it were possible to set rules banning Clearview or AI training, no nation outside of your own will follow them; an issue which even becomes a national security problem (are you sure, Taiwan, that China hasn't profiled everyone on your social media platforms by now?)

There is no solution. The dream itself was not sustainable. The only solution is either a global moratorium of understanding which everyone respectfully follows (wishful thinking, never happening); or splinternetting into national internets with different rules and strong firewalls (which is a deal with the devil, and still admitting the vision failed).

replies(4): >>42956285 #>>42956514 #>>42956574 #>>42956590 #
90. inetknght ◴[] No.42955733[source]
> On the other hand, without Cloudflare I'd be seeing thousands of junk requests and hacking attempts everyday, people attempting credit card fraud, etc.

Yup!

> I honestly don't know what the solution is.

Force law enforcement to enforce the laws.

Or else, block the countries that don't combat fraud. That means... China? Hey isn't there a "trade war" being "started"? It sure would be fortunate if China (and certain other fraud-friendly countries around Asia/Pacific) were blocked from the rest of the Internet until/unless they provide enforcement and/or compensation their fraudulent use of technology.

replies(4): >>42955875 #>>42956042 #>>42956211 #>>42956314 #
91. flyinghamster ◴[] No.42955738[source]
For me, captcha hell is very random, and when it happens, it's things like "pick all squares with stairs" where I have to decide if that little corner of a stairway counts (and it never seems to) or "pick all squares with motorcycles" where the camera seemed to have a vision problem.

What usually works for me is to close the browser, reload, and try again.

92. schroeding ◴[] No.42955749{3}[source]
> Does cURL have an easy-to-spot fingerprint outside of its headers?

If it's a https URL: Yes, the TLS handshake. There are curl builds[1] which try (and succeed) to imitate the TLS handshake (and settings for HTTP/2) of a normal browser, though.

[1] https://github.com/lwthiker/curl-impersonate

replies(1): >>42956762 #
93. ricardobeat ◴[] No.42955782{4}[source]
So.. no new browsers should ever be created? Or only created by people with enough money to get CloudFlare onboard from the start? Nothing new will ever become major if they're denied access to half the web.
replies(1): >>42955932 #
94. marginalia_nu ◴[] No.42955875{3}[source]
A lot of this traffic is bouncing all over the world before it reaches your server. Almost always via at least one botnet. Finding the source of the traffic is pretty hopeless.
replies(1): >>42955979 #
95. zamadatix ◴[] No.42955889[source]
Whether something is "wrong" is often more a matter of opinion than a matter of fact for something as large and complex as the internet. The root of problems like this on the internet is connections don't have an innate user identity associated at the lower layers. By the time you get to an identity for a user session you've already driven past many attack points. There isn't really a "happy" way to remove that from the equation, at least for most people.
96. slothsarecool ◴[] No.42955932{5}[source]
You can create a new browser, there are plenty of modern new browsers that aren't considered major and work just fine because they run on top of recent releases of chromium.

There are actually hundreds of smaller chromium forks that add small features, such as built-in adblock and have no issues with neither Cloudflare nor other captchas.

replies(1): >>42955944 #
97. lapcat ◴[] No.42955938[source]
The worst is Cloudflare challenges on RSS feeds. I just have to unsubscribe from those feeds, because there's nothing I can do.
replies(1): >>42956696 #
98. ricardobeat ◴[] No.42955944{6}[source]
I think it's pretty clear this is about browser engines. If your view holds then Servo (currently #3 story in front page) will never make it.
99. nerdralph ◴[] No.42955949[source]
I don't bother with sites that have cloudflare turnstyle. Web developers supposedly know the importance of page load time, but even worse than a slow loading page is waiting for cloudflare's gatekeeper before I can even see the page.
replies(1): >>42956532 #
100. sophacles ◴[] No.42955969{4}[source]
How would you do DDoS protection without having something in path?
replies(2): >>42956173 #>>42962295 #
101. patrick451 ◴[] No.42955979{4}[source]
When the government actually cares, they're able to track these things down. But they don't except in high profile cases.
replies(1): >>42961110 #
102. sophacles ◴[] No.42956007{3}[source]
What's the iptables invocation that will let my 10Gbps connection drop a a 100Gbps syn flood while also serving good traffic?
replies(2): >>42958858 #>>42964522 #
103. markisus ◴[] No.42956022[source]
If I were hosting a web page, I would want it to be able to reach as many people as possible. So in choosing between CDNs, I would choose the one that provides greater browser compatibility, all other things equal. So in principle, the incentives are there for Cloudflare to fix the issue. But the size of the incentive may be the problem. Not too many customers are complaining about these non-mainstream browsers.
replies(2): >>42958004 #>>42959403 #
104. RIMR ◴[] No.42956042{3}[source]
A wild take only possible if you don't understand how the Internet works.
replies(1): >>42957040 #
105. rozap ◴[] No.42956059[source]
What is a "junk" request? Is it hammering an expensive endpoint 5000 times per second, or just somebody using your website in a way you don't like? I've also been on both sides of it (on-call at 3am getting dos'd is no fun), but I think the danger here is that we've gotten to a point where a new google can't realistically be created.

The thing is that these tools are generally used to further entrench power that monopolies, duopolies, and cartels already have. Example: I've built an app that compares grocery prices as you make a shopping list, and you would not believe the extent that grocers go to to make price comparison difficult. This thing doesn't make thousands or even hundreds of requests - maybe a few dozen over the course of a day. What I thought would be a quick little project has turned out to be wildly adversarial. But now spite driven development is a factor so I will press on.

It will always be a cat and mouse game, but we're at a point where the cat has a 46 billion dollar market cap and handles a huge portion of traffic on the internet.

replies(6): >>42956167 #>>42956187 #>>42957017 #>>42957174 #>>42957266 #>>42964848 #
106. boomboomsubban ◴[] No.42956088[source]
>On one hand, I get the annoying "Verify" box every time I use ChatGPT (and now due its popularity, DeepSeek as well).

Though annoying, it's tolerable. It seemed like a fair solution. Blocking doesn't.

107. jeroenhd ◴[] No.42956104[source]
I just downloaded Palemoon to check and it seems the CAPTCHA straight up crashes. Once it crashes, reloading the page no longer shows the CAPTCHA so it did pass something at least. I tried another Cloudflare turnstile but the entire browser crashed on a segfault, and ever since the CAPTCHAs don't seem to come up again.

ChatGPT.com is normally quite useful for generating Cloudflare prompts, but that page doesn't seem to work in Palemoon regardless of prompts. What version browser engine does it use these days? Is it still based on Firefox?

For reference I grabbed the latest main branch of Ladybird and ran that, but Cloudflare isn't showing me any prompts for that either.

replies(4): >>42956203 #>>42959178 #>>42959627 #>>42961908 #
108. nerdralph ◴[] No.42956106{3}[source]
What's the cost of annoying people trying to browse to your sites, some to the point where they'll just not bother?
replies(2): >>42957079 #>>42957280 #
109. sangnoir ◴[] No.42956111{5}[source]
> So if Cloudflare has access to other data that can positively identify bots

They do not - not definitively [1]. This cat-and-mouse game is stochastic at higher levels, with bots doing their best to blend in with regular traffic, and the defense trying to pick up signals barely above the noise floor. There are diminishing returns to battling bots that are indistinguishable from regular users.

1. A few weeks ago, the HN frontpage had a browser-based project that claimed to be undetectable

replies(1): >>42956546 #
110. boomboomsubban ◴[] No.42956131[source]
Do you have something that blocks some amount of scripts? I need to allow third party scripts from either Google or Cloudflare to get a lot of the web to function.
111. mmh0000 ◴[] No.42956165{3}[source]
At least you can get past the challenge. For me, every-single-time it is an endless loop of "select all bikes/cars/trains". I've given up even trying to solve the challenge anymore and just close the page when it shows up.
replies(1): >>42957863 #
112. professorsnep ◴[] No.42956166[source]
I run a Mediawiki instance for an online community on a fairly cheap box (not a ton of traffic) but had a few instances of AI bots like Amazon's crawling a lot of expensive API pages thousands of times an hour (despite robots.txt preventing those). Turned on Cloudflare's bot blocking and 50% of total traffic instantly went away. Even now, blocked bot requests make up 25% of total requests to the site. Without blocking I would have needed to upgrade quite a bit or play a tiring game of whack a mole blocking any new IP ranges for the dozens of bots.
replies(3): >>42957695 #>>42960667 #>>42971791 #
113. makeitdouble ◴[] No.42956167{3}[source]
> somebody using your website in a way you don't like?

This usually includes people making a near-realtime updated perfect copy of your site and serving that copy for either scam or middle-manning transactions or straight fraud.

Having a clear category of "good bots" from either a verified or accepted companies would help for these cases. Cloudflare has such a system I think, but then a new search engine would have to go to each and every platform provider to make deals and that also sounds impossible.

replies(1): >>42960779 #
114. johnmaguire ◴[] No.42956173{5}[source]
I hoped it was apparent from my comment that "this is of course by design, to inspect the traffic" meant I understood they are doing it to detect DDoS traffic and separate it from legitimate traffic. But many Cloudflare users are not so technical. I would simply advocate for being more upfront about this behavior.

That said, their Magic Transit and Spectrum offerings (paid) provide L3/L4 DDoS protection without payload inspection.

replies(1): >>42956565 #
115. jeroenhd ◴[] No.42956187{3}[source]
I've such bots on my server. Some Chinese Huawei bot as well as an American one.

They ignored robots.txt (claimed not to, but I blacklisted them there and they didn't stop) and started randomly generating image paths. At some point /img/123.png became /img/123.png?a=123 or whatever, and they just kept adding parameters and subpaths for no good reason. Nginx dutifully ignored the extra parameters and kept sending the same images files over and over again, wasting everyone's time and bandwidth.

I was able to block these bots by just blocking the entire IP range at the firewall level (for Huawei I had to block all of China Telecom and later a huge range owned by Tencent for similar reasons).

I have lost all faith in scrapers. I've written my own scrapers too, but almost all of the scrapers I've come across are nefarious. Some scour the internet searching for personal data to sell, some look for websites to send hack attempts at to brute force bug bounty programs, others are just scraping for more AI content. Until the scraping industry starts behaving, I can't feel bad for people blocking these things even if they hurt small search engines.

replies(3): >>42956660 #>>42960711 #>>42961964 #
116. blablabla123 ◴[] No.42956201[source]
The biggest problems I see with DDoS is metered traffic and availability. The largest Cloud providers all meter their traffic.

The availability part on the other hand is maybe something that's not so business critical for many but for targeted long-term attacks it probably is.

So I think for some websites, especially smaller ones it's totally feasible to not use Cloudflare but involves planning the hosting really carefully.

117. LeoPanthera ◴[] No.42956204[source]
Blocking Falkon is especially egregious if they're not also blocking Gnome Web. Those are the default browsers for Plasma and Gnome respectively, and some of the few browsers left that are "just browsers", with no phoning home or any kind of cloud integration.
118. Hold-And-Modify ◴[] No.42956203[source]
This crash is an even newer Cloudflare issue (as of yesterday, I believe). It is not related to the one discussed here, and will be solved in the next browser update:

https://forum.palemoon.org/viewtopic.php?f=3&t=32064

119. jeroenhd ◴[] No.42956211{3}[source]
A lot of the fake browser traffic I'm seeing is coming from American data centres. China plays a major part, but if we're going by bot traffic, America will end up on the ban list pretty quickly.
replies(1): >>42957032 #
120. stevenAthompson ◴[] No.42956285{3}[source]
I hate that you're right.

To make matters worse, I suspect that not even a splinternet can save it. It needs a new foundation, preferably one that wasn't largely designed before security was a thing.

Federation is probably a good start, but it should be federated well below the application layer.

replies(2): >>42956721 #>>42956782 #
121. jacobr1 ◴[] No.42956314{3}[source]
Slightly more complicated because a ton of the abuse comes from IPs located western countries, explicitly to evade fraud and abuse detection. Now you can go after the western owners of those systems (and all the big ones do have have large abuse teams to handle reports) but enforcement has a much higher latency. To be effective you would need a much more aggressive system. Stronger KYC. Changes in laws to allow for less due-process and more "guilty by default" type systems that you then need to prove innocence to rebut.
replies(1): >>42964788 #
122. megous ◴[] No.42956415[source]
They do not support major browsers. They support "major browsers in default configuration without any extensions" (which is of course ridiculous proposition), forcing people to either abandon any privacy/security preserving measures they use, or to abandon the websites covered by CF.

I use uptodate Firefox, and was blocked from using company gitlab for months on end simply because I disabled some useless new web API in about:config way before CF started silently requiring it without any feature testing or meningful error message for the user. Just a redirect loop. Gitlab support forum was completely useless for this, just blaming the user.

So we dropped gitlab at the company and went with basic git over https hosting + cgit, rather than pay some company that will happily block us via some user hostile intermediary without any resolution. I figured out what was "wrong" (lack of feature testing for web API features CF uses, and lack of meaningful error message feedback to the user) after the move.

replies(1): >>42957056 #
123. wongarsu ◴[] No.42956442[source]
They are pretending to be an ancient Mozilla version from the time after Netscape but before Firefox, KHTML (which was forked to webkit), Firefox (Gecko engine), Chrome and Safari. The only piece of browser history it's missing is somehow pretending to be IE.
replies(2): >>42957582 #>>42959047 #
124. chr15m ◴[] No.42956459[source]
When one of my nodejs based sites experienced DoS, I installed & configured "express-slow-down" as middleware and it resolved the issue.
replies(1): >>42959670 #
125. lynndotpy ◴[] No.42956502[source]
> On the other hand, without Cloudflare I'd be seeing thousands of junk requests and hacking attempts everyday, people attempting credit card fraud, etc. > > I honestly don't know what the solution is.

The solution is good security-- Cloudflare only cuts down on the noise. I'm looking at junk requests and hacking attempts flow through to my sites as we speak.

replies(2): >>42963467 #>>42964184 #
126. Aeolun ◴[] No.42956514{3}[source]
The great firewall, but in reverse.
replies(1): >>42956566 #
127. fbrchps ◴[] No.42956532{3}[source]
That's not turnstile, that's a Managed Challenge.

Turnstile is the in-page captcha option, which you're right, does affect page load. But they force a defer on the loading of that JS as best they can.

Also, turnstile is a Proof of Work check, and is meant to slow down & verify would-be attack vectors. Turnstile should only be used on things like Login, email change, "place order", etc.

replies(1): >>42958280 #
128. fbrchps ◴[] No.42956546{6}[source]
> a browser-based project that claimed to be undetectable

For now

replies(1): >>42956973 #
129. Hold-And-Modify ◴[] No.42956561{4}[source]
Fair enough, but... if Cloudflare's challenge bugs out who is going to fix it? Aren't they responsible for their own critical tools?

Because in the end, the result is connection denial. I don't want to connect to Cloudflare, I want to connect to the website.

I read that part. They still do not indicate what may happen, or what is their responsibility -if any- for visitors with non-major browsers.

Not claiming this is "on purpose" or a conspiracy, but if these legitimate protests keep getting ignored then yes, it becomes discrimination. If they can't be bothered, they should clearly state that their tool is only compatible with X browsers. Who is to blame for "an incorrectly received challenge"? The website? The user who chooses a secure, but "wrong" browser not on their whitelist?

Cloudflare is there for security, not "major browser approval pass". They have the resources to increase response times, provide better support and deal with these incompatibility issues. But do they want to? Until now, they did.

replies(2): >>42956829 #>>42959830 #
130. sophacles ◴[] No.42956565{6}[source]
Honestly, I was confused because both pages you link are full of the word proxy, have links to deeper discussions of what a proxy does (including explicit mentions of decryption/re-encryption), and are literally developer docs. Additionally Cloudflare's blog explaining these things in depth are high in search results, and also make the front page here on the regular.

I incorrectly interpreted your comment as one of the multitude of comments claiming nefarious reasons for proxying without any thought for how an alternative would work.

Magic Transit is interesting - hard to imagine how it would scale down to a small site though, they apparently advertise whole prefixes over BGP, and most sites don't even have a dedicated IP, let alone a whole /24 to throw around.

replies(1): >>42956659 #
131. gjsman-1000 ◴[] No.42956566{4}[source]
What other choice do we have?

Countries, whether it be Ukraine or Taiwan, can't risk other countries harvesting their social media platforms for the mother of all purges. I never assume that anything that happened historically can never happen again - no Polish Jew would have survived the Nazis with this kind of information theft. Add AI into the mix, and wiping out any population is as easy as baking pie.

Countries are tired of bad behavior. Just ask my grandmother, who has had her designs stolen and mass produced from China. Not just companies - many free and open source companies cannot survive with such reckless competition. Can Prusa survive a world where China takes, but never gives? How many grandmothers does it take being scammed? How many educational systems containing data on minors need to be stolen? The MPAA and RIAA has been whining for years about the copyright problem, and while we laugh at them, never underestimate them. The list goes on and on.

Startups are tired of paying Cloudflare or AWS protection money, and trying to evade the endless sea of SEO spam. How can a startup compete with Google with so much trash and no recourse? Who can build a new web browser, and be widely accepted as being a friendly visitor? Who can build a new social media platform, without the experience and scale to know who is friend or foe?

Now we have AI, gasoline and soon to be dynamite on the fire. For the first time ever, a malicious country can VPN into the internet of a friendly nation, track down all critics on their social media, and destroy their lives in a real world attack (physical or virtual). We are only beginning to see this in Ukraine - are we delusional enough to believe that the world is past warfare? For the first time, anyone in the world could make nudes of women and share them online, from a location where they'll probably never be taken down. If a Russian company offered nudes as a service to American customers with cryptocurrency payments and a slick website that went viral, do you think tolerance is a winning political position?

replies(2): >>42958831 #>>42960760 #
132. supportengineer ◴[] No.42956574{3}[source]
A walled garden where each a real, vetted human being is responsible for each network device. It wouldn't scale but it could work locally.
133. benatkin ◴[] No.42956590{3}[source]
Luckily the decentralization community has always been decentralized. There are plenty of decentralized networks to support.
134. megous ◴[] No.42956652[source]
I also rely on hosting provider DDoS protection and don't use very intrusive protection like Cloudflare.

Only issues I had to deal with are when someone finds some slow endpoint, and manages to overload the server with it, and my go to approach is to optimize it to max <10-20ms response time, while blocking the source of traffic if it keeps being too annoying after optimization.

And this happened like 2-3 times over 20 years of hosting the eshop.

Much better than exposing users to CF or likes of it.

135. johnmaguire ◴[] No.42956659{7}[source]
I understand your sentiment, as I reacted similarly the first time someone brought this to my attention. However, after logging into my Cloudflare account, viewing the DNS record page, and attempting to find any mention of SSL decryption, and then clicking on related docs pages (and links from them!) I was still unable to find this information.

You're right that Cloudflare has written many high-quality blog posts on the workings of the Internet, and the inner workings at Cloudflare. Amusingly, they even at times criticize HTTPS interception (not their use of it) and offer a tool to detect: https://blog.cloudflare.com/monsters-in-the-middleboxes/

I still believe that this information should be displayed to the relevant user configuring the service.

There are many types of proxies, and MITM decryption is not an inherent part of a proxy. The linked page from the Admin Panel is https://developers.cloudflare.com/dns/manage-dns-records/ref... and links to pages like "How Cloudflare works" (https://developers.cloudflare.com/fundamentals/concepts/how-...) which still do not mention HTTPS interception. It sounds like you found a link I didn't. In the past someone argued that I should've looked here: https://developers.cloudflare.com/data-localization/faq/#are...

But if you look closer, those are docs for the Data Localization Suite, an Enterprise-only paid addon.

replies(1): >>42957731 #
136. x3haloed ◴[] No.42956660{4}[source]
Honestly, it should just come down to rate limiting and what you’re willing to serve and to whom. If you’re a free information idealist like me, I’m OK with bots accessing public web-serving servers, but not OK with allowing them to consume all my bandwidth and compute cycles. Furthermore, I’m also not OK with legitimate users consuming all my resources. So I should employ strategies that prevent individual clients or groups of clients from endlessly submitting requests, whether the format of the requests make sense or are “junk.”
replies(1): >>42956823 #
137. ezfe ◴[] No.42956668{3}[source]
You don't need to clear cookies to avoid sending that data back. Just use a browser that properly isolates third party/Facebook cookies.
replies(1): >>42956808 #
138. sylware ◴[] No.42956694[source]
Oh, and a few weeks ago, google search started to block all new noscript/basic (x)html browsers...
139. ezfe ◴[] No.42956696[source]
That's misconfiguration on the web developers side.
replies(1): >>42956983 #
140. ToucanLoucan ◴[] No.42956721{4}[source]
I mean, it wasn't even that security wasn't a thing: the earliest incarnations of the Internet were defense projects, and after that, connections between university networks. Abuse was nonexistent because you knew everyone on your given network. Bob up the hall wouldn't try to steal your credit card or whatever, because you'd call the police.

I think a decent idea is, we need to bring personal accountability back into the equation. That's how an open-trust network works, and we know that, because that's how society works. You don't "trust" that someone walking by your car won't take a shit in your open window: they could. But there are consequences for that. We need rock solid data security policies that apply to anyone who does business, hosts content, handles user data online, and people need to use their actual names, actual addresses, actual phone numbers, etc. etc. in order to interact with it. I get that there are many boons to be had with the anonymity the Internet offers, but it also enables all of the horseshit we all hate. A spammer can spam explicitly because their ISP doesn't care that they do, email servers don't have their actual information, and in the odd event they are caught and are penalized, it's fucking trivial to circumvent it. Buy a new AWS instance, run a script to setup your spam box, upload your database of potential victims, and boom, you're off.

A lot of tech is already drifting this way. What is HTTPS at it's core if not a way to verify you are visiting the real Chase.com? How many social networking sites now demand all kinds of information, up to and including a photo of your driver's license? Why are we basically forbidden now by good practice from opening links in texts and emails? Because too many people online are anonymous, can't be trusted, and are acting maliciously. Imagine how much BETTER the Internet would be if when you fucked around, you could be banned entirely? No more ban evasion, ever.

I get that this is a controversial opinion, but fundamentally, I don't think the Internet can function for much longer while being this free. It's too free, and we have too many opportunistic assholes in it for it to remain so.

replies(1): >>42969359 #
141. a_imho ◴[] No.42956734{3}[source]
I'm a Cloudflare customer, even their own dashboard does not work with linux+slightly older firefox. I mean one click and it is ooops, please report the error to dev null
142. bennyg ◴[] No.42956762{4}[source]
To echo further, they may be leaning on something like the [ja4 fingerprint](https://www.google.com/url?sa=t&source=web&rct=j&opi=8997844...) (which you'd need to rebuild curl to emulate that chromium version to try and trick).
replies(1): >>42959483 #
143. benatkin ◴[] No.42956782{4}[source]
Me too.

Federation is indeed a good start, but DeFi helps spur adoption by having a broader scope.

144. kevincox ◴[] No.42956791{3}[source]
It seems like common cases like this should be handled correctly by default. These are cachable requests intended for robots. Sure, it would be nice if webmasters configure it but I suspect a tiny minority does.

For example even Cloudflare hasn't configure their official blog's RSS feed properly. My feed reader (running in a DigitalOcean datacenter) hasn't been able to access it since 2021 (403 every time even though backed off to checking weekly). This is a cachable endpoint with public data intended for robots. If they can't configure their own product correctly for their official blog how can they expect other sites to?

replies(1): >>42957386 #
145. nacs ◴[] No.42956808{4}[source]
You don't even need to use a different browser - Firefox has an official "Multi-account containers" extension that lets you assign certain sites to open in their own sandbox so you can have a sandbox for Google, another for Facebook, etc.
replies(2): >>42957890 #>>42958859 #
146. plaguuuuuu ◴[] No.42956816{5}[source]
The programmers of these bots are not lazy - this space is a thriving industry with a bunch of commercial bots, the abiluty of whcih to evade cloudflare/etc is the literal metric that determines their commercial viability
replies(1): >>42957514 #
147. makeitdouble ◴[] No.42956823{5}[source]
Rate limiting doesn't help if the requests are split under hundreds of sessions. Especially if your account creation process was also bot friendly.

Fundamentally it's adversarial, so expecting a single simple concept to properly cover even half of the problematic requests is unrealistic.

replies(3): >>42959582 #>>42959598 #>>42959697 #
148. slothsarecool ◴[] No.42956829{5}[source]
I think the issue is that Cloudflare tends to be a toggle-and-forget, it's very easy to use and it works for most people.

The problem with this setup, is that it sacrifices on both security (because it needs to keep false positives at a minimum, even if that means allowing some known bots) and user experience (because situations like the one you have will occur from time to time). When you enable a challenge page on CF, it will work as-is and you have no ruling over it, the most you can do is skip the page for the browsers having false positives.

If CF gave site owners a clearer view of what they are blocking and let them choose which rules to enforce (within the challenge page), it would be much easier to simply say that the customer running CF doesn't want you visiting their page/doesn't care about few false positives.

149. ponector ◴[] No.42956862{3}[source]
Sounds like my experience browsing internet while connected to the VPN provided by my employer: tons of captcha and everything is defaulted to German (IP is from Frankfurt).
150. benbristow ◴[] No.42956893[source]
They usually protect the whole DNS record so it makes sense it would cover robots.txt as well, even if it's a bit silly.
replies(1): >>42957060 #
151. sangnoir ◴[] No.42956973{7}[source]
That's just part of the game. Sometimes you're ahead, sometimes you're behind, but there's never a decisive winner.
152. kevincox ◴[] No.42956983{3}[source]
Yes, developers such as those that run Cloudflare's own official blog.

Maybe there should be some better defaults if they can't even use their own product correctly.

BTW a work around for this is to proxy the feed via https://feedburner.google.com/ which seems to be whitelisted by Cloudflare.

153. kobalsky ◴[] No.42957016[source]
> people attempting credit card fraud

this is wrong.

if someone can use your site they can use stolen cards, and bots doing this will not be stopped by them.

cloudflare only raises the cost of doing it, it may make scrapping a million of product pages unprofitable but that doesn't apply to cc fraud yet.

replies(3): >>42957627 #>>42957679 #>>42957739 #
154. to11mtm ◴[] No.42957017{3}[source]
I'll give a fun example from the past.

I used to work at a company that did auto inspections. (e.x. if you turned a lease in, did a trade in on a used car, private party, etc.)

Because of that, we had a server that contained 'condition reports', as well as the images that went through those condition reports.

Mind you, sometimes condition reports had to be revised. Maybe a photo was bad, maybe the photos were in the wrong order, etc.

It was a perfect storm:

- The Image caching was all inmem

- If an image didn't exist, the server would error with a 500

- IIS was set up such that too many errors caused a recycle

- Some scraper was working off a dataset (that ironically was 'corrected' in an hour or so) but contained an image that did not exist.

- The scraper, instead of eventually 'moving on' would keep retrying the URL.

It was the only time that org had an 'anyone who thinks they can help solve please attend' meeting at the IT level.

> and you would not believe the extent that grocers go to to make price comparison difficult. This thing doesn't make thousands or even hundreds of requests - maybe a few dozen over the course of a day.

Very true. I'm reminded of Oren Eini's tale of building an app to compare grocery prices in Israel, where apparently mandated supermarket chains to publish prices [0]. On top of even the government mandate for data sharing appearing to hit the wrong over/under for formatting, There's the constant issue of 'incomparabilities'.

And it's weird, because it immediately triggered memories of how 20-ish years ago, one of the most accessible Best Buy's was across the street from a Circuit City, but good luck price matching because the stores all happened to sell barely different laptops/desktops (e.x. up the storage but use a lower grade CPU) so that nobody really had to price match.

[0] - https://ayende.com/blog/170978/the-business-process-of-compa...

replies(1): >>42964421 #
155. inetknght ◴[] No.42957032{4}[source]
America does have laws against this kind of thing.

So instead of banning America, report the IP addresses to their American hosts for spam and malicious intent. If the host refuses to do anything, report it to law enforcement. If law enforcement doesn't do anything... then you're proving my point.

replies(2): >>42957421 #>>42960274 #
156. inetknght ◴[] No.42957040{4}[source]
A wild opinion only valid if you have a defeatist attitude.
157. zzo38computer ◴[] No.42957056{3}[source]
Although I sometimes have problems with Cloudflare, it does not seem to affect GitHub nor Gitlab for me, although they have other problems, which I have been able to work around.

Some things that I had found helpful when working with Gitlab is to add ".patch" on the end of commit URLs, and changing "blob" to "raw" in file URLs. (This works on GitHub as well.) It is also possible to use API, and sometimes the data can be found within the HTML the server sends to you without needing any additional requests (this seems to work on GitHub more reliably than on Gitlab though).

You could also clone the repository into your own computer in order to see the files (and then use the git command line to send any changes you make to the server), but that does not include issue tracker etc, and you might not want all of the files anyways, if the repository has a lot of files.

replies(2): >>42957808 #>>42966292 #
158. alexjplant ◴[] No.42957060{3}[source]
They run their own DNS infra so that when you set the SOA for your zone to their servers they can decide what to resolve to. If you have protection set on a specific record then it resolves to a fleet of nginx servers with a bunch of special sauce that does the reverse proxying that allows for WAF, caching, anti-DDoS, etc. It's entirely feasible for them to exempt specific requests like this one since they aren't "protect[ing] the whole DNS" so much as using it to facilitate control of the entire HTTP request/response.
159. delduca ◴[] No.42957074[source]
The most ironic thing is that they can’t protect against bots; I even wrote some that bypassed their protection.
160. zinekeller ◴[] No.42957079{4}[source]
This is rather blunt, but if it is between 98% (CF-protected) versus near-0% (heavily-DDoSed site), then you hopefully you now see the dilemma that other people faced.
replies(1): >>42966906 #
161. ATechGuy ◴[] No.42957101{3}[source]
I wonder if browsers have a future.
162. trod1234 ◴[] No.42957127[source]
This situation has been repeatedly happening multiple times a year. Its an ongoing battle where Cloudflare exploits their monopoly on the web to break the web for any unfavored browser.

The fact that its regressed and repeated so many times now that clearly it indicates a trend and pattern of abuse by malicious intention. Change management isn't hard, unit tests are not hard, consistently breaking only certain browsers seems targeted.

Notably there are mainstream browsers that have this problem as well. Mozilla Firefox for example. Their Challenge has broken large swathes of the web many times to the point where companies hosting apps and websites have simply said they will not support any browser other than Google Chrome/Edge.

Anytime the market gets sieved and pushed to only one single solution, its because someone is doing it for their benefit to everyone elses loss.

Cloudflare should be broken up in antitrust as a monopoly, as should Google.

163. ohcmon ◴[] No.42957174{3}[source]
Actually, I think creating google alternative has never been as doable as it is today.
164. jillyboel ◴[] No.42957235[source]
accept reality and design your api so it's not a problem
165. idlephysicist ◴[] No.42957248[source]
> What are you protecting cloudflare?

A cheeky response is "their profit margins", but I don't think that quite right considering that their earnings per share is $-0.28.

I've not looked into Cloudflare much, I've never needed their services, so I'm not totally sure on what all their revenue streams are. I have heard that small websites are not paying much if anything at all [1]. With that preface out of the way–I think that we see challenges on sites that perhaps don't need them as a form of advertising, to ensure that their name is ever-present. Maybe they don't need this form of advertising, or maybe they do.

[1] https://www.cloudflare.com/en-gb/plans/

replies(1): >>42958238 #
166. lurker919 ◴[] No.42957261[source]
Should cloudflare ever be the target of an attempted takeover by Musk and co (like Twitter or the ongoing NIH/USAID saga) you can be sure you won't be able to access any 'inclusive' websites anymore...
167. OptionOfT ◴[] No.42957266{3}[source]
> and you would not believe the extent that grocers go to to make price comparison difficult. This thing doesn't make thousands or even hundreds of requests - maybe a few dozen over the course of a day.

It's gonna get even worse. Walmart & Kroger are implementing digital price tags, so whatever you see on the website will probably (purposefully?) be out of date by the time you get to the store.

Stores don't want you to compare.

replies(2): >>42957609 #>>42959323 #
168. BenjiWiebe ◴[] No.42957274[source]
I think the archive.is/Cloudflare issue is a known problem separate from the rest.
169. progmetaldev ◴[] No.42957280{4}[source]
For companies that are just built around a marketing funnel to provide enough info to get you to fill out their contact form to sell you something, my guess is that Cloudflare is well worth the cost over increased hosting fees. I know it's not the answer anyone wants to hear, but I don't deal with too many companies selling anything more than around 5 or 6 figures, with products that you don't necessarily need very often.

I would like to know if there are alternatives somewhere close to the same cost, where I don't need to use Cloudflare. I don't enjoy annoying customers, or even dealing with sales and marketing, but I have built lots of software where I get to control the technology, and can get a new website up and running in 3 hours, with a ton of built-in functionality. I've spent about 12 years reducing the amount of memory the Umbraco CMS uses, compared to normal installs, and I love that aspect of my career. If I could get my clients to pay more and not use Cloudflare, I would happily go that route, believe me!

170. Springtime ◴[] No.42957307{3}[source]
I run a few Linux desktop VMs and Cloudflare's Turnstile verification (their auto/non-input based verification) fails for the couple sites I've tried that use it for logins, on latest Chromium and Firefox browsers. Doesn't matter that I'm even connecting from the same IP.

I'd presumed it was just the VM they're heuristically detecting but sounds like some are experiencing issues on Linux in general.

replies(1): >>42958329 #
171. GGByron ◴[] No.42957383[source]
Excuse my ignorance, but what exactly are these stupid checkboxes supposed to accomplish? Surely they do not represent a serious obstacle.
172. progmetaldev ◴[] No.42957386{4}[source]
I agree, but I also somewhat understand. Some people will actually pay more per month for Cloudflare than their own hosting. The Cloudflare Pro plan is $20/month USD. Some sites wouldn't be able to handle the constant requests for robots.txt, just because bots don't necessarily respect cache headers (if they are even configured for robots.txt), and the sheer number of bots that look at robots.txt and will ignore a caching header are too numerous.

If you are writing some kind of malicious crawler that doesn't care about rate-limiting, and wants to scan as many sites as possible for the most vulnerable to get a list together to hack, you will scan robots.txt because that is the file that tells robots NOT to index these pages. I never use a robots.txt for some kind of security through obscurity. I've only ever bothered with robots.txt to make SEO easier when you can control a virtual subdirectory of a site, to block things like repeated content with alternative layouts (to avoid duplicate content issues), or to get a section of a website to drop out of SERPs for discontinued sections of a site.

replies(1): >>42957422 #
173. glandium ◴[] No.42957406[source]
The best part is when you get the "box" on a XHR request. Of course no site handles that properly, and just breaks. Happens regularly on ChatGPT.
174. shwouchk ◴[] No.42957408[source]
I usually notice an increase in those when connecting to sites over vpn and especially tor. could that be it?
175. portaouflop ◴[] No.42957421{5}[source]
How are you gonna force law enforcement to enforce the laws?
replies(1): >>42958550 #
176. kevincox ◴[] No.42957422{5}[source]
> sheer number of bots that look at robots.txt and will ignore a caching header

This is not relevant because Cloudflare will cache it so it never hits your origin. Unless they are adding random URL parameters (which you can teach Cloudflare to ignore but I don't think that should be a default configuration).

replies(1): >>42957503 #
177. progmetaldev ◴[] No.42957503{6}[source]
The thing is, it won't do that by default. You have to enable caching currently, when creating a new account. I use a service that detects if a website is still running, and it does this by using a certain URL parameter to bypass the cache.

Again, I think you are correct with more sane defaults, but I don't know if you've ever dealt with a network admin or web administrator that hasn't dealt with server-side caching vs. browser caching, but it most definitely would end up with Cloudflare losing sales because people misunderstood how things work. Maybe I'm jaded, at 45, but I feel like most people don't even know to look at headers by default when they feel they hit a caching issue. I don't think it's based on age, I think it's based on being interested in the technology and wanting to learn all about it. Mostly developers that got into it for the love of technology, versus those that got into it because it was high paying and they understood Excel, or learned to build a simple website early in life, so everyone told them to get into software.

178. oneshtein ◴[] No.42957512{5}[source]
What CF does when bots use "Chrome on Windows" browser agent string?
replies(1): >>42958575 #
179. likeabatterycar ◴[] No.42957514{6}[source]
My data says otherwise and you have provided nothing to back up your claim other than saying we have an industry full of dirty money paying programmers to write unethical code. I'm sure it inspires them to do their best work.

Half these imbeciles don't even change the user-agent from the scraper they downloaded off GitHub.

I employ lots of filtering so it's possible the data is skewed towards those that sneak through the sieve - but they've already been caught, so it's meaningless.

180. nijave ◴[] No.42957537{4}[source]
We had rate limiting with Istio/Envoy but Envoy was using 4-8x normal memory processing that much traffic and crashing.

The attacker was using residential proxies and making about 8 requests before cycling to a new IP.

Challenges work much better since they use cookies or other metadata to establish a client is trusted then let requests pass. This stops bad clients at the first request but you need something more sophisticated than a webserver with basic rate limiting.

replies(1): >>42959462 #
181. zeroimpl ◴[] No.42957559[source]
I ran into exactly this the other day trying to browse a website from a browser app on an android-powered TV. Just couldn't get to the website.
182. neodymiumphish ◴[] No.42957578{3}[source]
Does it still apply if you change the UA to something more common (Chrome on Windows or something)?
replies(1): >>42957997 #
183. mh- ◴[] No.42957582{3}[source]
> The only piece of browser history it's missing is somehow pretending to be IE.

They're kinda covered because IE also sent Mozilla/5.0 (or 4.0, 2.0, [..]).

184. selcuka ◴[] No.42957599[source]
CloudFlare sometimes attempts to verify that I'm a human when requesting a JSON resource [1] on Australia Post's web site, which breaks parcel tracking feature without any visible captcha. The problem can only be diagnosed by using the browser's inspector tool.

Even worse, I get the blanket "You have been blocked" message when I try to manually open the URL and solve the captcha.

[1] https://digitalapi.auspost.com.au/shipments-gateway/v1/watch...

replies(1): >>42959449 #
185. rozap ◴[] No.42957609{4}[source]
Originally I was excited to see that kroger had an API, until just about the first thing that the ToS said was "you can't use this for price comparison".

And yea, I imagine dynamic pricing will make things even more complicated.

That being said, that's why this feature isn't built into the billion shopping list apps that are out there. Because it's a pain.

replies(1): >>42959726 #
186. hecanjog ◴[] No.42957627{3}[source]
They might be talking about people who are trying to automate the testing hundreds of stolen credit cards with small purchases to see if they are still working. This is basically why we ended up using cloudflare at work.
187. greggh ◴[] No.42957646[source]
It's blocking Qutebrowser also.
188. ◴[] No.42957679{3}[source]
189. CGamesPlay ◴[] No.42957695{3}[source]
How do you feel, knowing that some portion of the 25% “detected bot traffic” are actually people in this comment thread?
190. scarab92 ◴[] No.42957698[source]
Cloudflare is security theatre.

I scrape hundreds of cloudflare protected sites every 15 minutes, without ever having any issues, using a simple headless browser and mobile connection, meanwhile real users get interstitial pages.

It's almost like Cloudflare is deliberately showing the challenge to real users just to show that they exist and are doing "something".

191. johnklos ◴[] No.42957699{3}[source]
Many / most bots use Chrome on Linux user agent, so you think it's OK to block Chrome on Linux user agents. That's very broken thinking.

So it's OK for them to do shitty things without explaining themselves because they "have access to more data than we do"? Big companies can be mysterious and non-transparent because they're big?

What a take!

replies(1): >>42957925 #
192. EfficientDude ◴[] No.42957718[source]
All by design. The idea is to keep older devices, ones with perhaps no government backdoors, and unauthorized software, off the Internet completely. Same reason there's a big push to kill X11 - it runs great on computers from before hardware backdoors were common. With the Trumpenreich looming, these devices will become very useful. IF they are allowed on the Internet.
replies(2): >>42959265 #>>42977029 #
193. shwouchk ◴[] No.42957731{8}[source]
cloudflare is primarily a caching proxy. in order to perform any caching, they would have to have the unencrypted objects. check, mate.

It is sad that in this day and age, when you buy a car you need to sign a legal exclaimer that you understand it requires gasoline to run.

replies(1): >>42958361 #
194. selfhoster ◴[] No.42957738[source]
We're on Chrome on Linux, mostly we don't see those.
195. bragr ◴[] No.42957739{3}[source]
>that doesn't apply to cc fraud yet

It stops "card testing" where someone has bought or stolen a large number of cards and need verify which are still good. The usual technique is to cycle through all the cards on a smaller site selling something cheap (a $3 ebook for example). The problem is that the high volume of fraud in a short time span will often get the merchant account or payment gateway account shut down, cutting off legitimate sales.

As a consumer, you should also be suspicious of a mysterious low value charge on your card because it could be the prelude to much larger charges.

replies(1): >>42959369 #
196. chiefalchemist ◴[] No.42957782[source]
Just wanted to mention that the time between challenges is set by the site, not CF. Perhaps if you mention it, the site(s) will update the setting?
197. keepamovin ◴[] No.42957803[source]
I see an opportunity for scraper-publishers - who use legitimate access corridors to obtain desired content and publish it without human gatewalls.

I'm sure if this becomes more of an issue the market will provide for that.

198. megous ◴[] No.42957808{4}[source]
I think they protect only the login page.
replies(1): >>42959827 #
199. johnklos ◴[] No.42957837[source]
I've been hosting web sites on my own bare metal in colo for more than 25 years. In all that time I've dealt with one DDoS that was big enough to bring everything down, and that was because of a specific person being pissed at another specific person. The attacker did jail time for DDoS activities.

Every other attempt at DDoS has been ineffective, has been form abuse and credential stuffing, has been generally amateurish enough to not take anything down.

I host (web, email, shells) lots of people including kids (young adults) who're learning about the Internet, about security, et cetera, who do dumb things like talk shit on irc. You'd think I'd've had more DDoS attacks than that rather famous one.

So when people assert with confidence that the Internet would fall over if companies like Cloudflare weren't there to "protect" them, I have to wonder how Cloudflare marketed so well that these people believe this BS with no experience. Sure, it could be something else, like someone running Wordpress with a default admin URL left open who makes a huge deal about how they're getting "hacked", but that wouldn't explain all the Cloudflare apologists.

Cloudflare wants to be a monopoly. They've shown they have no care in the world for marginalized people, whether they're people who don't live in a western country or people who simply prefer to not run mainstream OSes and browsers. They protect scammers because they make money from scammers. So why would people want to use them? That's a very good question.

replies(2): >>42958872 #>>42962313 #
200. radicaldreamer ◴[] No.42957856[source]
I'm seeing this all the time recently using standard Safari on MacOS
201. theamk ◴[] No.42957863{4}[source]
that's not Cloudflare, they stopped doing pictures years ago. You can tell because Cloudflare always puths their brand name on their page.

Cloudflare just blocks you without recourse nowdays.

replies(2): >>42957935 #>>42960468 #
202. onemoresoop ◴[] No.42957890{5}[source]
Great idea, I wasn’t even aware and got resigned to the idea tracing is inescapable, but I really need to take that back, even stop using a lot of hostile services. On smartphones it’s even worse.
203. wakawaka28 ◴[] No.42957925{4}[source]
Can't the user agent be spoofed anyway?
replies(1): >>42958010 #
204. airhangerf15 ◴[] No.42957933[source]
Slowly? Have you not watched the pot boil around you for the past decade? There are zero good search engines. Everything returns propaganda.

This is all as it was intended.

replies(2): >>42961396 #>>42970609 #
205. jcelerier ◴[] No.42957935{5}[source]
> Cloudflare just blocks you without recourse nowdays.

looks like someone is due for a class action

206. lwid1 ◴[] No.42957954[source]
I have the problem with LibreWolf on Linux, and have to fall back to Ungoogled Chromium.

Edited to add: without adblock

replies(2): >>42957961 #>>42960874 #
207. ◴[] No.42957961{3}[source]
208. mattatobin ◴[] No.42957994[source]
Ok kids.. This is Tobin.. but without the Paradigm.

First off.. Gee I wish we had all come together about a decade ago or so and found solutions for what was plainly coming and spelled out by my self and others.

Second before it happens.. Pale Moon is not "old and insecure" It is being mismanaged had has no vision or prospects for future expansion.. It is just whatever XUL they can keep working while chugging away at the modern web features..

Pale Moon is often TOO security patched btw, which have been regularly disclosed and specially noted in the release notes since I convinced Moonchild he should do that for exactly the kind of old and insecure falsehood.

Moonchild's issue as a developer is he will always choose the seemingly simplest path of least resistance and will blindly merge patches without actually testing them. Many security patches are only security patches and not just.. patches because Mozilla redefined the level of security they want their codebase to provide.. But all known Mozilla vulnerabilities and many that would only become vulnerable if surrounding code is changed are patched.. Pale Moon and UXP has become more secure over time and that is an objective fact when you consider the nature of privileged access within a XUL platform which has its own safegaurds as well that persist into Firefox today though less encountered.

Now no one hates that furry bastard more than me (and I challenge you to try) but I will never call out good work as anything other than good work. Besides, there are a MILLION other plainly visible faults with the Pale Moon project and its personnel and my past behavior without having to make stuff up or perpetuate a false mantra like "old and insecure".

Finally, isn't Cloudflare being very unfair to every project save the modern firefox rebuilds listed on thereisonlyxul.org? Like SeaMonkey? Why does seamonkey deserve any hate from anyone.. or systematic discrimination.. What have they ever done but try and have an internet application suite.. Why are they old and insecure despite being patched and progressing a patch queue for Mozilla patches just landed selectively to preserve the bulk of XUL functionality its users adore?

In conclusion, what will be the final cost and how many will burn for trying to going against it.. I know my fate for trying.. how many will join me knowing that?

replies(1): >>42959864 #
209. beepbooptheory ◴[] No.42957997{4}[source]
Fwiw, I was getting cloudflare blocked for a long time on Firefox+Linux and the only thing that fixed it was completely disabling the UA adjuster browser extension I had installed.
210. porty ◴[] No.42958004{3}[source]
In that case you can turn off / not turn on the WAF feature(s) of Cloudflare - it's optional and configured by the webmaster.
replies(1): >>42970781 #
211. sumanthvepa ◴[] No.42958010{5}[source]
I think they also fingerprint the browser. So changing user agent alone won't help.
212. porty ◴[] No.42958038[source]
I would feel pretty safe running my own hand-written services against the raw Internet, but if I was to host Wordpress or other large/complicated/legacy codebases I'd start to get worried. Also the CDN aspect is useful - having lived in Australia you like connections that don't have to traverse continents for every request.
213. RandyOrion ◴[] No.42958172[source]
A very random note.

I try to check the forum post and found out that I was blocked by https://forum.palemoon.org , e.g., https://offline.palemoon.org/blocked/index.html . Don't know and haven't visited this site before.

https://www.palemoon.org works though.

replies(1): >>42961930 #
214. pkkkzip ◴[] No.42958173[source]
I'm not sure why people are mad at Cloudflare. They are not obligated to support browsers outside the general marketshare nor should you expect to.

Cloudflare not supporting Pale Moon has no impact on the rest of us. Matter of fact today is the first time I'm hearing of this browser I will never end up using.

replies(1): >>42984235 #
215. kylecazar ◴[] No.42958180[source]
Same. I'm consistently getting a captcha and some nonsense about a Ray ID multiple times a day.
216. tempest_ ◴[] No.42958238{3}[source]
If you log in to the CF dashboard every 3 months or so you will see pretty clearly they are slowly trying to be a cloud provider like Azure or AWS. Every time I log in there is a who new slew of services that have equivalent on the other cloud providers. They are using the CDN portion of the business as a loss leader.
217. itomato ◴[] No.42958248[source]
Check your logs, you might be surprised.
218. chillfox ◴[] No.42958273{5}[source]
They were talking about logged in accounts, so you would group by accounts for the rate limiting and not by ip addresses.
replies(1): >>42964556 #
219. supriyo-biswas ◴[] No.42958280{4}[source]
Managed challenges actually come from the same "challenges" platform, which includes Turnstile; the only difference being that Turnstile is something that you can embed yourself on a webpage, and managed challenge is Cloudflare serving the same "challenge" on an interstitial web page.

Also, Turnstile is definitely not a simple proof of work check, and performs browser fingerprinting and checks for web APIs. You can easily check this by changing your browser's user-agent at the header level and leave it as-is at the header level; this puts Turnstile into an infinite loop.

220. abirch ◴[] No.42958329{4}[source]
I guess it’s time to update our user agent strings like I did with konquerer 20 years ago.

Looks like there’s a plugin for that https://chromewebstore.google.com/detail/user-agent-switcher...

221. johnmaguire ◴[] No.42958361{9}[source]
Cloudflare's CDN capabilities are separate from DDOS protection and indeed many requests cannot be cached due to the resources being sensitive (i.e. authenticated requests.)

Again, there are many forms of proxies and DDOS protection that do not rely on TLS interception, just as there are cars that do not rely on gasoline. Cloudflare has many less technical home users who use their service to avoid sharing their IP online, avoid DDOS, or access home resources. I do not think the average Internet user is familiar with these concepts. There are many examples of surprised users on subreddits like /r/homelab.

replies(1): >>42958449 #
222. shwouchk ◴[] No.42958449{10}[source]
how would they know what to cache? the response headers from the server are encrypted. there is maybe the high end l3 protection available if you have the resources. the free tier has caching bundled.

Also, how would their certificates work if they don’t see content?

replies(1): >>42959705 #
223. ranger_danger ◴[] No.42958547{3}[source]
The problem is that you are not performing "normal browsing behavior". The vast majority of the population (at least ~70% don't use ad-blockers) have no extensions and change no settings, so they are 100% fingerprintable every time, which lets them through immediately.
224. inetknght ◴[] No.42958550{6}[source]
Thanks for finding my point!
225. zamadatix ◴[] No.42958575{6}[source]
The method is the same, it just looks different when n=1. I.e. the method is "wait until you see something particularly anomalous occuring, probe, see if the reaction is human like". The more times you say "well you can't count that as anomalous, an actual person can look like that too and a bot could try to fake that!" the less effective it becomes at blocking bots.

This approach clearly blocks bots so it's not enough to say "just don't ever do things which have false positives" and it's a bit silly to say "just don't ever do the things which have false positives, but for my specific false positives only - leave the other methods please!"

226. ◴[] No.42958729[source]
227. maxk42 ◴[] No.42958789{3}[source]
+1 for Firefox on Linux. Several other services (like Instagram) now also accuse me of being a bot every time I legitimately log in with Firefox on Linux.
replies(1): >>42960964 #
228. rat87 ◴[] No.42958831{5}[source]
> no Polish Jew would have survived the Nazis with this kind of information theft.

I'm not sure this is a good is a good example. I believe a majority of Polish Jewish survivors were those who fled into parts of soviet union not occupied by nazis(some were sent to gulags but this was still much better chance to survive then those who stayed in Poland). Another large portion were in concentration camps and hadn't been killed yet. And I believe 60,000 or less are estimated to have hid in Poland through the war. It's unlikely many remained in their pre war identities and simply concealed their Jewishness and managed to survive.

229. globalnode ◴[] No.42958853{3}[source]
linux + firefox. not sure what happened to me yesterday but the challange/response thing was borked and when i finally got through it all, it said i was a robot anyway. this was while trying to sign up for a skype acct, could have been a ms issue though and not necessarily cloudflare. i think the solution is to just not use obstructive software. thanks to this issue i discovered jitsi and that seems more than enough for my purposes.
230. truetraveller ◴[] No.42958858{4}[source]
xdp
231. opello ◴[] No.42958859{5}[source]
So, what's a good strategy for managing containers? I've used this extension for years, and in the past I was a bit more conservative with my containers (personal, work, google, facebook, twitter, banking, etc.) and now I've gone a bit more ... "ham" as they say ... and I have 29. One example is travel, to keep fare searches from pervading news story ads. But I'm sure there's a way to strike a balance that I've just not yet found.
232. mvdtnz ◴[] No.42958872{3}[source]
I'm sorry but lumping in people who prefer to use a weird browser with "marginalised people" does not help your credibility.
replies(2): >>42959455 #>>42966194 #
233. tibbar ◴[] No.42959047{3}[source]
Amusingly, I also just realized that even the operating system is spoofed here! I'm on macOS 14, yet the user agent claims "Mac OS X" 10.15. It's a pretty funny situation, and clearly for the sole benefit of very old websites and libraries performing dubious checks.
replies(1): >>42959773 #
234. notpushkin ◴[] No.42959066[source]
Yeah, this is ridiculous. Even if their heuristics fail badly for Pale Moon, they could easily fall back to POW.
235. grayhatter ◴[] No.42959074[source]
> I honestly don't know what the solution is.

well, for starters, if you're using cloudflare to block otherwise benign traffic, just because you're worried about some made... up....

> On the other hand, without Cloudflare I'd be seeing thousands of junk requests and hacking attempts everyday, people attempting credit card fraud, etc.

well damn, if you're using it because otherwise you'd be exposing your users to active credit card fraud... I guess the original suggestion to only ban traffic once you find it to be abusive, and then only by subnet, doesn't really apply for you.

I wanna suggest using this as an excuse to learn how not to be a twat (the direction cf is moving towards more and more), where for most sites 20% of the work will get you 80% of the results... but dealing with cc fraud, you're adversaries are already on the more advanced side, and that becomes a lot harder to prevent... rather than catch and stop after the fact.

Balancing the pervasive fear mongering with sensible rules is hard. Not because it's actually hard, but because that's the point of the FUD. To create the perception of a problem where there isn't one. With a few exceptions, a WAF doesn't provide meaningful benefits. It only serves to lower the number of log entries, it rarely ever reduces the actual risk.

replies(1): >>42959547 #
236. willywanker ◴[] No.42959178[source]
It uses a hard fork of Firefox's Gecko engine called Goanna, and is independently developed other than a few security patches from upstream. It has considerably diverged from contemporary Firefox so is not comparable.
replies(1): >>42964144 #
237. willywanker ◴[] No.42959265[source]
>With the Trumpenreich looming

Weren't they useful the last time around, when 'literally Hitler' totally murdered freedom of speech until Biden the hero restored it?

238. nikkwong ◴[] No.42959315[source]
Yesterday I was attempting to buy a product on a small retailer's website—as soon as I hit the "add to cart" button I got a message from Cloudflare: "Sorry, you have been blocked". My only recourse was to message the owner of the domain asking them to unblock me. Of course, I didn't, and decided to buy the product elsewhere. I wasn't doing anything suspicious.. using Arc on a M1 MBP; normal browsing habits.

Not sure if this problem is common but; I would be pretty upset if I implemented Cloudflare and it started to inadvertently hurt my sales figures. I would hope the cost to retailers is trivial in this case, I guess the upside of blocking automated traffic can be quite great.

Just checked again and I'm still blocked on the website. Hopefully this kind of thing gets sorted out.

replies(13): >>42959473 #>>42959512 #>>42960071 #>>42960395 #>>42960397 #>>42961792 #>>42961906 #>>42964337 #>>42964617 #>>42965068 #>>42965688 #>>42965889 #>>42970070 #
239. _blk ◴[] No.42959323{4}[source]
So you put something in your cart and by the time you reach the cashier the price doubled? Sounds like someone is about to patent price locking when you add an item to your pysical shopping cart.
240. Aachen ◴[] No.42959369{4}[source]
Someone who steals money from thousands of individuals for a living won't hesitate to use a botnet either. Cloudflare isn't a payment provider (*shudders* yet), they can't verify transactions, they can only guess at who's "honest". I'm at the losing end of this guess so often as someone who frequently visits friends and family in the neighbouring country they come from, and someone who doesn't have tracking cookies anymore that were set only a few minutes ago, who uses a "non-standard" browser (Mozilla's Firefox), I don't feel like Cloudflare does a very good job at detecting when I'm trying to honestly use the site. At the same time, doing security testing as my job: the customer having Cloudflare enabled usually doesn't matter for us being able to reach and exploit vulnerable pages, it just decides to block you randomly the same way that it does in private time when I'm not trying to break anything. It doesn't properly do the job and it blocks legitimate people based on a gut feeling, and you have no recourse, you can suck it up. Whatcha gonna do, take Cloudflare to court for blocking your access to your bank? Under what law is that illegal? There is nothing you can do; your bank's customer support isn't going to disable Cloudflare for you.

Anyway, no, this guessing game isn't the solution to stolen bank details, the solution is for the payment provider to authenticate the account holder beyond merely entering a public number, especially if they suddenly see a flood of transactions from this one merchant as you describe. They can decide to ask for a second factor: send the person an SMS/email, ask to generate an authenticator code, whatever it is they've got on file beyond your card/account number. Anything else is just guesswork

replies(2): >>42959614 #>>42970748 #
241. Aachen ◴[] No.42959403{3}[source]
> If I were hosting a web page, I would want it to be able to reach as many people as possible. So in choosing between CDNs

I host many webpages and this is exactly it. Anyone is welcome to use the websites I host. There is no CDN, your TLS session terminates at the endpoint (end to end encryption). May be a bit slower for the pages having static assets if you're coming from outside of Europe, but the pages are light anyway (no 2 MB JavaScript blobs)

242. Aachen ◴[] No.42959421{3}[source]
> not uncommon for a single person with residential fiber to have more bandwidth than your small site hosted on a 1u box or VPS.

Then self host from your connection at home, don't pay for the VPS :). That's what I've been doing for over a decade now and still never saw a (D)DoS attack

50 mbps has been enough to host various websites, including one site that allows several gigabytes of file upload unauthenticated for most of the time that I self host. Must say that 100 mbps is nicer though, even if not strictly necessary. Well, more is always nicer but returns really diminish after 100 (in 2025, for my use case). Probably it's different if you host videos, a Tor relay, etc. I'm just talking normal websites

replies(1): >>42961052 #
243. ◴[] No.42959436[source]
244. zzo38computer ◴[] No.42959449[source]
I got a HTML with a error message first, but then I tried adding ".json" on the end of the URL and got a JSON with a error message (that the URL is wrong), and then I removed ".json" from the end of te URL and then I got what seems to be the proper JSON response.
245. Aachen ◴[] No.42959455{4}[source]
What bit do you mean specifically? As a fellow web hoster, who also hosted kids before (from a game making forum), I can fully corroborate what they're saying
replies(1): >>42959764 #
246. Aachen ◴[] No.42959462{5}[source]
> The attacker was using residential proxies and making about 8 requests before cycling to a new IP.

So how is Cloudflare supposed to distinguish legitimate new visitors from new attack IPs if you can't?

Because it matches my experience as a cloudflare user perfectly if the answer were "they can't"

replies(1): >>42964552 #
247. ghxst ◴[] No.42959473[source]
Try clearing your cookies and disabling all extensions, if that still results in a block you can try a mobile hotspot. You're either failing some server side check (IP, TCP fingerprint, JA3 etc.) or a client side check of your browser integrity (generally this is tampered with by privacy focused extensions, anti-fingerprint settings etc.). It's not a "fix" but can at least give you an indication of why it is happening.
replies(3): >>42959789 #>>42959948 #>>42960346 #
248. ghxst ◴[] No.42959483{5}[source]
Curl-impersonate does this https://github.com/lwthiker/curl-impersonate
249. lightedman ◴[] No.42959484[source]
Yep, this bug blocked me from being able to respond to a few job postings on Indeed.com today.

Needless to say I want to throttle every CF employee for screwing with my efforts to further enrich my life through legal means.

250. kcrwfrd_ ◴[] No.42959512[source]
Were you on a VPN?
replies(2): >>42959541 #>>42959944 #
251. EVa5I7bHFq9mnYK ◴[] No.42959515[source]
Credit card fraud exists because credit card companies can't (or won't) implement elementary security measures. There should be a requirement to confirm every online payment, but many sites today require just a cc number+date+code+zip, with no additional confirmation, can't call it other than complicity in the crime.
replies(1): >>42960226 #
252. nikkwong ◴[] No.42959541{3}[source]
Nope, no VPN, making it all the stranger.
253. ludjer ◴[] No.42959547{3}[source]
I used to work one of the top 1000 visited websites, and we have massive bot issues where 60% of our traffic was bots and had to implement solutions similar to cloudflare to reduce the bots. Also, with the raise of ai, it's become even more important since a lot of ai data scraping companies do not respect robots.
254. amatecha ◴[] No.42959550[source]
This happens to me with Firefox as I run it on OpenBSD and enable Strict Privacy and the "resist fingerprinting" feature -- or at least in that config I've had inexplicable 403 Forbidden errors from CloudFlare and fired up Chromium or whatever and could load the page just fine (or Firefox on another computer).
255. amatecha ◴[] No.42959582{6}[source]
Rate limiting could help when an automated process is scanning arbitrary, generated URLs, inevitably generating a shitton of 404 errors -- something your rate limiting logic can easily check for (depending on server/proxy software of course). Normal users or even normal bots won't generate excessive 404's in a short time frame, so that's potentially a pretty simple metric by which apply a rate limit. Just an idea though, I've not done that myself...
replies(1): >>42960013 #
256. BytesAndGears ◴[] No.42959590[source]
Something like iDeal, which is a payment processing system in the Netherlands.

It works so well and is very secure. You get to the checkout page on a website, click a link. If you’re on your phone, it hotlinks to open your banking app. If you’re on desktop, it shows a QR code which does the same.

When your bank app opens, it says “would you like to make this €28 payment to Business X?” And you click either yes or no on the app. You never even need to enter a card in the website!

You can also send money to other people instantly the same way, so it’s perfect for something like buying a used item from someone else.

Plus the whole IBAN system which makes it all possible!

replies(1): >>42964146 #
257. ◴[] No.42959598{6}[source]
258. lmz ◴[] No.42959614{5}[source]
It depends what they're selling. If they're selling something people want - the only answer is enforcing things like 3DS. If they are e.g. a charity receiving donations via card - they may still use it for card testing. Making card testing unprofitable is the point.
259. YoshiRulz ◴[] No.42959627[source]
I believe the problem in Ladybird's case is missing JS APIs https://github.com/LadybirdBrowser/ladybird/issues/226
260. EVa5I7bHFq9mnYK ◴[] No.42959670[source]
What Cloudflare does that can't possibly be implemented locally by a site owner?
replies(1): >>42961362 #
261. ghxst ◴[] No.42959697{6}[source]
Rate limiting based on IP, blocking obvious datacenter ASNs and blocking identifiable JA3 fingerprints is quite simple and surprisingly effective in stopping most scrapers and can be done entirely server side, I wouldn't be surprised if this catches more than half of problematic requests to the average website. But I agree that if you have a website "worth" scraping there will probably be some individuals motivated enough to bypass those restrictions.
replies(1): >>42960252 #
262. Dylan16807 ◴[] No.42959705{11}[source]
> how would they know what to cache?

That's a weird question to ask to someone that went out of their way to describe a non-caching situation.

> Also, how would their certificates work if they don’t see content?

Can you be more specific? I'm not sure which feature you're asking about or how it uses certificates.

But the answer is likely "that feature isn't necessary to provide DDOS protection".

replies(1): >>42959936 #
263. unethical_ban ◴[] No.42959726{5}[source]
Price comparison should be required by law. In fact, I think it would be interesting for a city to require its major grocers to feed pricing information to a public database.
264. mvdtnz ◴[] No.42959764{5}[source]
Clearly you didn't even read his post (or mine) if you're asking. I'm obviously referring to

> Cloudflare wants to be a monopoly. They've shown they have no care in the world for marginalized people, whether they're people who don't live in a western country or people who simply prefer to not run mainstream OSes and browsers.

265. zerocrates ◴[] No.42959773{4}[source]
I don't know if they still do it, but the Apple Silicon Macs also lied about their architecture and said they're Intel. Truth is not the guiding principle of the User-Agent (or all the JS navigator properties, or anything else easy to use to check this kind of thing).
266. underdeserver ◴[] No.42959789{3}[source]
That's quite a lot to ask. Not OP, but I'm not doing all that just because sometime else misconfigured their anti-DDoS, unless I really need to.
replies(1): >>42960127 #
267. Dalewyn ◴[] No.42959864[source]
For context, this is presumably the Tobin who caused significant tangible damage to the Pale Moon project on his way out.

https://forum.palemoon.org/viewtopic.php?t=28265

replies(2): >>42962464 #>>42962913 #
268. gloosx ◴[] No.42959877[source]
I'm still using Mozilla/5.0 (iPhone; CPU iPhone OS 6_0 like Mac OS X) AppleWebKit/536.26 (KHTML, like Gecko) Version/6.0 Mobile/10A5376e Safari/8536.25 on my desktop.

The internet is so much better like this! There is a 2010 lightweight mobile version of Google, and m.youtube with obviously cleaner and better UI and not a single ad (apparently it's not worth to show you ads if you still appear to be using iphone 6)

replies(3): >>42966197 #>>42967040 #>>42974990 #
269. shwouchk ◴[] No.42959936{12}[source]
Sorry, they did not go much out of their way, to simply claim “solutions exist”. Sure, you could invent other ways of protecting your traffic but what CF offers in the free tier always includes SSL termination with their own certificates (if you enable ssl), and always includes caching.
replies(1): >>42960530 #
270. whilenot-dev ◴[] No.42959944{3}[source]
Some vendors are just weird... I'm always getting blocked by Etsy with Firefox after the first navigation on their site. It shows me a puzzle to solve and then, after solving the puzzle correctly (read "Success"), redirects me to "You have been blocked". It works with Chrome-based browsers though, but that doesn't make me want to use the website at all.

No VPN, just good privacy settings in my case.

replies(3): >>42960184 #>>42960194 #>>42966387 #
271. RestartKernel ◴[] No.42959948{3}[source]
I believe their point was that they have no desire to fix the issue if they can just look elsewhere, making it detrimental to the vendor more so than the end-user.
replies(1): >>42960163 #
272. bux93 ◴[] No.42959969[source]
Of course we're trusting CloudFlare to be a good citizen. If they were not, they would be banned - unless they sold their business to a sovereign wealth fund.
replies(1): >>42960260 #
273. ku1ik ◴[] No.42960013{7}[source]
I did that and it works great.

Specifically, I use fail2ban to count the 404s and ban the IP temporarily when certain threshold is exceeded in a given time frame. Every time I check fail2ban stats it has hundreds of IPs blocked.

replies(1): >>42961837 #
274. inemesitaffia ◴[] No.42960053{3}[source]
See if changing user agent to Chrome/Firefox helps
275. taurknaut ◴[] No.42960071[source]
> using Arc on a M1 MBP; normal browsing habits.

Well i've certainly never heard of this browser before and it still seems pretty young. I'd guess it's the same issue.

replies(4): >>42960105 #>>42960119 #>>42960456 #>>42961276 #
276. yurishimo ◴[] No.42960105{3}[source]
Arc is almost 3 (4?) years old and was the darling child of dev influencers for the better part of 2 years. It's not a niche browser, especially amongst devs that are likely to work at Cloudflare.
replies(2): >>42960283 #>>42965256 #
277. Elfener ◴[] No.42960119{3}[source]
I think it's also EOL/not getting updates now?

I mean I never used it, their only selling point seem to have been hype.

replies(1): >>42960404 #
278. ghxst ◴[] No.42960127{4}[source]
My intention was to explain how to identify what could be causing the issue, not to give any indication that I think this is acceptable. Unfortunately like you point out, sometimes you _really_ do have to deal with a website behind an over sensitive WAF, in which case the steps I provided can be helpful.
replies(1): >>42960318 #
279. ghxst ◴[] No.42960163{4}[source]
That's totally understandable and I don't blame them. However since they did state they hoped it would be resolved I thought they (or anyone in a similar situation) might at least want to know how to diagnose any potential cause that you have some control over.
280. rixed ◴[] No.42960174{5}[source]
Is ten of thousands a big number again?
replies(1): >>42978827 #
281. ghxst ◴[] No.42960184{4}[source]
Do you have the "resist fingerprinting" setting enabled in Firefox? (You can check in about:config)
replies(1): >>42960230 #
282. Symbiote ◴[] No.42960194{4}[source]
While looking at a flight price on sas.dk I had to disable Firefox's built-in enhanced tracking protection.

It seems excessive to not allow at least a single query in this situation.

I had the same with a newspaper which I subscribe to. They shouldn't be tracking me, and don't show adverts to subscribers. In this case I wrote to their support person, who told me not to block the tracking.

283. il-b ◴[] No.42960226{3}[source]
Lost sales due to 2fa are greater than losses due to refunds
replies(1): >>42960358 #
284. whilenot-dev ◴[] No.42960230{5}[source]
"privacy.resistFingerprinting" is "true", yes, and it'll stay that way. Why let me solve a puzzle just to block me afterwards anyway?
replies(4): >>42960368 #>>42963023 #>>42964290 #>>42965454 #
285. dmantis ◴[] No.42960252{7}[source]
> blocking obvious datacenter ASNs

You block all VPN users then, and currently many countries have some kind of censorship, please don't do that. I use a personal VPN for over 5 years and that's annoying.

I understand the other side and captcha/POW captchas/additional checks is okay. But give people a choice to be private/non-censorable.

Enabling/disabling a VPN each minute to access the non-censored local site which blocks datacenters IPs, then bringing it back again for the general surfing is a bit of a hell.

replies(1): >>42960453 #
286. arielcostas ◴[] No.42960260{3}[source]
I don't get if this is sarcasm (perhaps a reference to TikTok?), but in my case (european) it's a foreign third-party for me
287. dmantis ◴[] No.42960274{5}[source]
So you are saying that if 95% of world population, including Chinese, Russians, etc reports American bot farm to American police, somebody would really review that and go after Americans?

BTW, how they should report it, if they are a small business/physical person without lawyers? Does US police have some kind of online hotline to report US criminals for foreigners or smth?

replies(1): >>42961400 #
288. littlestymaar ◴[] No.42960283{4}[source]
It's definitely a niche browser. I think I heard of it once on HN over the past few years, and I'd be surprised if there was actually more than a few thousands of people using it.
replies(2): >>42960423 #>>42960454 #
289. Moru ◴[] No.42960318{5}[source]
My problem is that I help a lot of people set up their computers because they want to get rid of ads and tracking. They don't know how to fix this. Or more likely don't even realise there is a problem and will just close it down and continue with their day. So I guess it's not my problem but it is someones problem.
290. erinaceousjones ◴[] No.42960346{3}[source]
I think it's unfair this comment has been flagged or downvoted or whatever. It's pragmatic information!

The mobile hotspot thing... I have to do that to do anything involving Okta.

For some frustrating reason my IPv4 address, which I pay extra to my ISP to have, has been blocklisted by Okta. A login flow failure in one of the apps work uses triggered my address getting banned indefinitely is my best guess. My works Okta admins don't really understand how to unblock me on their Okta tenancy, and Okta support just directs me back to my local admins (even though it's any okta-using org I'm banned from logging into).

I get that misuse/abuse detection has to do its thing but it's so frustrating when there's basically zero way of a legitimate user from an IP of undoing a ban. My only recourse is to do all my using of okta from another IP.... If I was a legit spammer I wouldn't think twice about switching to another IP from my big pool, probably.

replies(1): >>42960548 #
291. xrisk ◴[] No.42960358{4}[source]
Why would 2FA cause lose sales? One would imagine it’s because people are being auto charged for shit they don’t want but haven’t noticed or forgot to cancel.
replies(4): >>42960443 #>>42960457 #>>42960502 #>>42962495 #
292. Lanolderen ◴[] No.42960368{6}[source]
To let you know who wears the pants in the relationship :)
293. cess11 ◴[] No.42960380[source]
Oligopolies are nasty. In lack of regulation, don't take business to actors like Cloudflare and talk to your local politicians.

There's also another reason, Cloudflare is under the CLOUD Act, can't be trusted to touch the PII of EU citizens for legal reasons or anyone for moral reasons.

294. Xelbair ◴[] No.42960395[source]
To access any site protected by cloudflare captcha i have to change browsers from firefox to chrome. and i have basically default suite of addons (ublock is the only one affecting the pages themselves).

VPN doesn't matter, i probably share IP with someone "flagged" via ISP.

Every site, that is except their cloudlfare dashboard.

replies(2): >>42961212 #>>42961502 #
295. jen729w ◴[] No.42960397[source]
Vendors who block iCloud Relay are the worst. I'm sure they don't even know they're doing it. But some significant percentage of Apple users -- and you'd have to think it's only gonna grow -- comes from those IP address ranges.

Bad business, guys. You gotta find another way. Blocking IP addresses is o-ver.

replies(6): >>42960506 #>>42962582 #>>42962962 #>>42963465 #>>42963466 #>>42963720 #
296. lijok ◴[] No.42960404{4}[source]
Definitely not EOL; https://resources.arc.net/hc/en-us/articles/20498293324823-A...
replies(1): >>42961407 #
297. InsideOutSanta ◴[] No.42960423{5}[source]
Its subreddit has 52k members. There are probably hundreds of thousands of users. Still a niche browser, but it's pretty commonly used on Macs.
replies(1): >>42970428 #
298. ◴[] No.42960443{5}[source]
299. ghxst ◴[] No.42960453{8}[source]
That's a fair point, probably the best approach would be to do a client side challenge where the server side challenge fails but at that point it's no longer as simple of a setup. Toggling a VPN is definitely annoying but a captcha or something like POW do come with an impact to user experience as well and in my experience are easier (and cheaper) to deal with for bots, a good quality residential proxy where you pay per GB quickly becomes a lot more expensive than a captcha solver service or the compute for a POW challenge.
replies(1): >>42960498 #
300. oneeyedpigeon ◴[] No.42960454{5}[source]
I would be surprised if it were that low; the arcbrowser sub Reddit has 50 thousand members. Still, regardless of the actual figure, I think there's a broader point which avoids the need to agree on an absolute threshold: should cloudflare block access to websites using a blacklist or should it grant access using a whitelist? Especially since it's trivial to spoof your user agent.
replies(1): >>42960962 #
301. chrisandchris ◴[] No.42960456{3}[source]
I'm still not sure how some random browser should result in a block by the provider. I don't think there's any security risk for the provider of the site by using an outdated browser. Blocking malicious IPs yes/maybe, blocking suspicious acitivity maybe. But because you have browser X - please not.

This is going to lead two a two-class internet where new technologies will not emerge and big players will win because the gate the high is so absurdly high and random that people stop to invent.

replies(1): >>42961108 #
302. EVa5I7bHFq9mnYK ◴[] No.42960457{5}[source]
Because it's more work? Also 2fa often fails for the rightful card owner. And Cloudflare overzealous "security" is one of the reasons for failure.
replies(1): >>42960801 #
303. trinix912 ◴[] No.42960458[source]
It's not just Linux, I'm using Chrome on my macOS Catalina MBP and I can't even get past the "Verify you are a human" box. It just shows another captcha, and another, and yet another... No amount of clearing cookies/disabling adblockers/connecting from a different WiFi does it. And that's on most random sites (like ones from HN links), I also don't recall ever doing anything "suspicious" (web scraping etc.) on that device/IP.

Somehow, Safari passes it the first time. WTF?

304. trinix912 ◴[] No.42960468{5}[source]
It is Cloudflare, I see it too. It's a Cloudflare page, with all branding, the spinning circle, then a captcha pops up on the same Cloudflare-branded page.
replies(1): >>42966342 #
305. dmantis ◴[] No.42960498{9}[source]
Yes, but you can use captcha/POW challenges based on IP reputation, which leaves usual users intact. I don't mind captchas too much, that's my choice to use the VPN.

What I mean is that it's better to give VPN users the choice to solve captchas instead of being banned completely.

306. ◴[] No.42960502{5}[source]
307. cprecioso ◴[] No.42960506{3}[source]
This would be weird, esp. given that Cloudflare is one of the vendors who act as exit nodes for iCloud Relay.
replies(2): >>42960816 #>>42962833 #
308. Dylan16807 ◴[] No.42960530{13}[source]
> invent other ways

Just turning off some features gets them just about there. It wouldn't take rearchitecting things. Those features being bundled by default means very little for the difficulty.

replies(1): >>42966532 #
309. ghxst ◴[] No.42960548{4}[source]
Thank you, I'm a bit surprised people took issue with my comment but I suppose I could have worded it better.

As for your case, I wonder if Okta is relying on an external service like IPQS to get a score, that could explain why they don't really have any control over it.

replies(1): >>43025574 #
310. mrweasel ◴[] No.42960667{3}[source]
AI bots are a huge issue for a lot of sites. Just putting intentional DDoS attacks aside, AI scrapers can frequently tip over a site because many of them don't know how to back off. Google is an exception really, their experience with creating GoogleBot as ensured that they are never a problem.

Many of the AI scrapers don't identify themselves, they live on AWS, Azure, Alibaba Cloud, and Tencent Cloud, so you can't really block them and rate limiting also have limited effect as they just jump to new IPs. As a site owner, you can't really contact AWS and ask them to terminate their customers service in order for you to recover.

311. tushar-r ◴[] No.42960672[source]
Badly configured bot protection. It'll look at user agent headers and try to fingerprint the browser (some form of fpjs2 or similar,) and then decide. Very error prone.
312. DocTomoe ◴[] No.42960711{4}[source]
Sounds like a problem easily solved with fail2ban. Which keeps legitimate folks in, and offenders out - and also unbans after a set amount of time, to avoid dynamic IPs screwing over legitimate users permanently.
313. DocTomoe ◴[] No.42960760{5}[source]
> Can Prusa survive a world where China takes, but never gives?

Can Prusa survive in a world where they only may operate in CzechNet, with the rest of the customer base being firewall off?

replies(1): >>42963102 #
314. Terr_ ◴[] No.42960779{4}[source]
I'd settle for some kind of "proof of investment" in a bot-identity, so that I know blocking that identity is impactful, and it's not just one of a billion tiny throwaways.

In other words, knowing who someone is isn't strictly necessary, provided they have "skin the game" to encourage proper behavior.

315. simplyinfinity ◴[] No.42960801{6}[source]
in europe 2fa is mandatory for all (or almost all) online purchases, especially first time purchase from a merchant when your card hasn't been authorized. Sites using stripes' link get away with no 2fa most of the time, but not all the time. Make it mandatory on visa/mastercards level, and you won't loose much sales, as all transactions would require it and people will have to 2fa everywhere.
replies(2): >>42961963 #>>42969339 #
316. latexr ◴[] No.42960816{4}[source]
I believe your parent comment means when the target website blocks, not Cloudflare.

YouTube is a perfect example. Using iCloud Private Relay can now frequently label you as a bot, which stops you from watching videos until you login.

replies(2): >>42961119 #>>42961696 #
317. pndy ◴[] No.42960874{3}[source]
No problem under Linux whatsoever with tracking and ad blocking extensions in each browser
318. littlestymaar ◴[] No.42960962{6}[source]
I'm not defending Cloudflare on any way, blocking niche browsers is sad. I'm just saying that it doesn't make sense to say it's not a niche browser.
replies(1): >>42961218 #
319. wkat4242 ◴[] No.42960964{4}[source]
Yeah with Instagram I wouldn't be surprised if they just do this to annoy to into using their app. Where they can force timed ads (you have to watch an ad now for a few seconds before it continues).

I noticed another platform (wallapop, a kind of ebay/craigslist here in Spain) that does the same. It never works well in a browser, even in chrome. I think they're just trying to bully their users to their app, which has 30+ trackers in it.

320. lucumo ◴[] No.42961052{4}[source]
> 50 mbps has been enough to host various websites,

Bandwidth hasn't been a limiting factor for years for me.

But generating dynamic pages can bring just enough load for it to get painful. Just this week I had to blacklist Meta's ridiculously overactive bot sending me more requests per second than all my real users do in an hour. Meta and ClaudeBot have been causing intermittent overloads for weeks now.

They now get 403s because I'm done trying to slow them down.

321. taurknaut ◴[] No.42961108{4}[source]
I presume this was not intentional.
replies(1): >>42963008 #
322. marginalia_nu ◴[] No.42961110{5}[source]
Well sometimes at least.

When the government really cares, it can put all its resources to solve any particular problem. Though obviously that comes at the cost of reassigning resources from other tasks. Sadly it's impossible to assign all resources to solve every problem all at once.

323. lloeki ◴[] No.42961119{5}[source]
Happened to me.

Interestingly enough I checked on another non-Private Relay device (it worked), disabled Private Relay, refreshed the page, which still blocked me, and it resulted in the ban instantly extending to my other non-Private Relay devices.

I presume some fingerprinting/evercookie was in place which led to a flagging/ban extension to my home IP.

324. benhurmarcel ◴[] No.42961212{3}[source]
I have come across several websites on which Cloudflare blocks my devices, whatever I use. No Captcha, just blocked. I tried a stock iPhone (Safari, no blockers, no VPN, no iCloud relay, both on wifi or 4G), and a Windows PC with Firefox, Chrome, or Edge, no luck. That includes a website of a local business so that can't be the country either.

I have no idea why.

325. oneeyedpigeon ◴[] No.42961218{7}[source]
That's fair. I'm sure it's not as well-used/known as Chrome, Firefox, Edge, or Safari. Probably not even Opera, although I'd be interested to see their respective "new users" numbers. I think it's in the same ballpark as Brave — definitely known, just not one of the big 5.
326. christophilus ◴[] No.42961242[source]
Slack was doing this with their huddle feature for the longest time (still were last I checked). Drives me crazy.
replies(1): >>42967409 #
327. areyourllySorry ◴[] No.42961243{3}[source]
it's possible there was an attack that stopped which led to more lenient antibot
328. tyzoid ◴[] No.42961276{3}[source]
It's a chromium derivative.
329. switch007 ◴[] No.42961303[source]
The silence from CloudFlare staff is rather deafening, especially as they commented on the (newer) outage post.
330. areyourllySorry ◴[] No.42961362{3}[source]
handle terabytes per second of bot traffic
replies(2): >>42961939 #>>42966864 #
331. areyourllySorry ◴[] No.42961378[source]
archive.is does not use cloudflare for bot protection.
332. eitland ◴[] No.42961396{3}[source]
> There are zero good search engines. Everything returns propaganda.

Kagi exists and has been production quality and better than Google for over two years already. (At this point I think it is even better than old google.)

333. inetknght ◴[] No.42961400{6}[source]
It's almost as if there should be an international body of laws which covers fraud...
replies(1): >>42974330 #
334. swiftcoder ◴[] No.42961407{5}[source]
I assume they are talking about the company moving on to develop a new browser: https://www.theverge.com/2024/10/24/24279020/browser-company...
335. KomoD ◴[] No.42961502{3}[source]
Maybe you have anti-fingerprinting protection on? I've heard it can cause issues.
replies(1): >>42971553 #
336. Havoc ◴[] No.42961523[source]
Worst part of this is Firefox struggling. Real risk of a monoculture that is functionally google-controlled. (Yes, yes chromium but we saw with manifest who sets direction).
337. tessela ◴[] No.42961696{5}[source]
It happens to me a lot, I just created a small automation to use https://cobalt.tools to download the content. Their loss, not mine.
replies(3): >>42961813 #>>42962483 #>>42963798 #
338. raxxorraxor ◴[] No.42961792[source]
I think this is on Cloudflare. Perhaps there is a demand for such a service, but it is another to implement it. And this is very bad for a free and therefore safe net.

I don't even know which attack vectors an integrity check for a browser could help against. Against infected clients? It is in any way evidently not effective.

replies(1): >>42962264 #
339. egberts1 ◴[] No.42961813{6}[source]
Nice tool.
340. zepearl ◴[] No.42961837{8}[source]
Same here - fail2ban then adds the IP to my nftables fw
341. Loughla ◴[] No.42961885{4}[source]
What the hell is wrong with people? Honestly the lack of substantive human interaction in a lot of folks' lives, except via the Internet, is a real problem.

Take that story for instance. Here's how that goes in the physical world, just to show how unbelievably ridiculous it is.

So you didn't get the job? What's your next step?

I'll stop by their office and keep people from entering the front doors by running around in front of them. That'll show those bastards.

replies(1): >>42964886 #
342. scooke ◴[] No.42961886[source]
I avoid and refuse to use Cloud flare for these sorts of reasons. Join me.
343. dvtkrlbs ◴[] No.42961908[source]
Kinda funny and ironic thing is their forum just don't allow me to see the contents of their website from my hetzner box that I use as an exit node. More ironically if this site was using cloudflare I could at least solve a challenge and browse the forum instead of getting hit with a giant 403
344. dvtkrlbs ◴[] No.42961930[source]
I also get a 403 on the same page since they apparently block the entire Hetzner range (i had this IP for like 3 years and it is never used for abuse) (I sometimes use my machine as a shitty VPN since Turkish Goverment does site block with DPI). If they were using Cloudflare I could at least solve a Captcha and see the website
345. ◴[] No.42961939{4}[source]
346. EVa5I7bHFq9mnYK ◴[] No.42961963{7}[source]
An hour ago paid to Contabo cloud service provider, headquartered in Munich. No 2fa.
347. MatthiasPortzel ◴[] No.42961964{4}[source]
Why not just ignore the bots? I have a Linode VPS, cheapest tier, and I get 1TB of network transfer a month. The bots that you're concerned about use a tiny fraction of that (<1%). I'm not behind a CDN and I've never put effort into banning at the IP level or setting up fail2ban.

I get that there might be some feeling of righteous justice that comes from removing these entries from your Nginx logs, but it also seems like there's a lot of self-induced stress that comes from monitoring failed Nginx and ssh logs.

348. wvh ◴[] No.42962264{3}[source]
There is some political-philosophical irony that the Chinese prefer their government to do the blocking and take away their freedom, while the US prefers their monopolistic capitalistic corporate world to do it. A rose by any other name. Chose your friends carefully.
replies(1): >>42963941 #
349. 1oooqooq ◴[] No.42962295{5}[source]
many ways but they are not plug and play so they would lose a few clients... but that is irrelevant as snooping trafic is their real businnes model.
replies(1): >>42965403 #
350. Hold-And-Modify ◴[] No.42962300[source]
Unfortunately not. Cloudflare verification goes deeper into browser 'mechanics' than that. Not to mention it could flag you as malicious if you dare attempt bypassing it.
351. systems_glitch ◴[] No.42962313{3}[source]
Same basic experience. The colo ISP soaks up most actual DDoS. We had a couple mid-sized ones when we were hosting irc.binrev.net from salty b& users. No real effect other than the colo did let us know it was happening and that it was "not a significant amount of DDoS by our standards."
352. mattatobin ◴[] No.42962464{3}[source]
Yeah except that's not the way it happened. My crimes are taking my ball and going home after being all but forced out for the second time just weeks after my father passed away from cancer and 2 months after I moved across the country.

It isn't like half the Pale Moon userbase ever wanted me there to begin with despite giving them not just an Add-ons Site and a developer wiki/doc site, the Pale Moon for Linux website, but a fully functional XUL platform that survives my involvement and a Pale Moon that is STILL Pale Moon when Moonchild as early as Pale Moon 27 was going to go the cyberfox route of Australis with CTR. So context of a decade of selfless unpaid work of 10-16 hour days every day, forum drama, bad decisions and behavior on my part in response to the response of my selfless work, and relentless attacks such as these no matter if I pop my head out or not?

If you want the full story of the end look it up on Kiwifarms (This was all before them being removed from clearnet so before the stuff you are thinking of) where I was maneuvered towards by 4chan anon people because that was the ONLY venue I had afterwards. For some reason they engaged then moved on.. Left me intact. I don't know why. But it is all there.. A cleaner version is codified in Interlink release notes on the internet archive. I encourage you to learn what actually happened and when and then make your judgement.. If you do that I will accept it even if I disagree with it because I disagree with a lot about my self these days.

Doesn't matter anyway. There are much larger issues now in the world than years old drama that still in the end.. Created the Unified XUL Platform (Take 2, the one that worked) and helps give hope to those otherwise subsumbed by the monoculture. Not that Pale Moon culture is much better but the fact it persists means more than one thing can. I can do better.. and so can we all.. Let's do that while we still can.

-nsITobin

353. latexr ◴[] No.42962483{6}[source]
I do something similar. Over 90% of my YouTube consumption is with Alfred workflows which use mpv and yt-dlp under the hood. I just press a keyboard shortcut and the frontmost tab closes in the browser and starts playing in mpv.

The remaining percentage is still annoying, as it happens from the phone.

354. crazygringo ◴[] No.42962495{5}[source]
Because it just doesn't work with shocking frequency.

Maybe 10% of the time I make a purchase online, it shows me a screen where it says it's waiting for my bank to verify, I'll have to input a code or accept a notification or something.

A solid half the time it fails. Either the site decides the transaction was rejected before I even get a chance to respond (within seconds), or I just don't get any notification or code or anything, or I do authorize it and it still gets rejected.

replies(1): >>42966216 #
355. rthomas6 ◴[] No.42962582{3}[source]
Wait, this comment made me aware of the existence of iCloud Relay. Apple built their own Tor only for Apple users? Why would they do that? Why not use Tor???
replies(3): >>42962630 #>>42962848 #>>42963304 #
356. guipsp ◴[] No.42962630{4}[source]
Because it is 1. Not Tor and 2. Fast
357. jrootabega ◴[] No.42962833{4}[source]
I don't think that's weird. That's what I would want from an honest vendor who is involved in both services - block anonymization/obfuscation users if I'm paying you to block them. Apple/Cloudflare don't sell/support iCloud Relay as a service that is guaranteed to get you treated nicely by the parties on the other end, so they're not being deceptive with that part either.

What I'd worry about is Cloudflare using their knowledge of their VPN clients to allow services behind their attack protection to treat those clients better, because maybe they're leaking client info to the protected services.

Not that I think Cloudflare/Apple/etc. are supremely noble/honest/moral, or that it's good that semi-anonymous connections are treated so badly by default; this juxtaposition just doesn't seem like a problem to me.

EDIT: OK, I back off of this position somewhat. Apple's marketing of iCloud Relay might allow users to believe it's more prestigious and reputable than a VPN/Tor. They do have fine print explaining that you might be treated badly by the remote services, but it's, you know, fine print, and Apple knows that they have a reputation for class and legitimacy.

replies(1): >>42965773 #
358. dewey ◴[] No.42962848{4}[source]
You can use iCloud Relay without even noticing that you are using it, this is not true with Tor as you'll spend most of your time waiting for reconnecting circuits.
replies(1): >>42967543 #
359. mattatobin ◴[] No.42962913{3}[source]
For additional context it might be wise to include links that can't be edited by the author or webmaster.. While I didn't include links looking BinOC up on the IA isn't difficult to do and I am sure if you want to read the posts of events AS they happened you can look up the other thread.

This cited version is the revised version. Moonchild has revised his version of events multiple times in the nine months after. Pfft that isn't even the latest version lol. There are many now hidden threads on the Pale Moon forum that also showed events as they happened or as told when they happened.. All gone now.. Some of them contradict the later retellings.. I simply refer to events as they happened at the time and the Interlink release notes summery there of.

Can't wait to see if it changes anything...

replies(1): >>42964228 #
360. oremolten ◴[] No.42962962{3}[source]
Well its primarily because the security vendors for say WAFs and other tools list these IPs in the "Anonymizers" or "VPN" category and most typically these are blocked as seldom do you see legitimate traffic originating to your store front or accounts pages from these. Another vendor we use lists these under "hacking tools" So your option as a security professional is to express to your risk management team we allow "hacking tools" or lose iCloud Relay customers. Which way do you think they steer? In alternative cases a site may use a vendor for their cart/checkout page and don't even have control over these blocks as they are also blocking "hacking tools" or "anonymizers" from hitting their checkout pages.
replies(3): >>42962999 #>>42963660 #>>42964139 #
361. oremolten ◴[] No.42962999{4}[source]
Wait till you see how M365 does management around iCloud relay makes it real fun troubleshooting suspicious login parameters...
362. anonym29 ◴[] No.42963008{5}[source]
One cannot assume a problem is minor, rare, unimportant, or easy to fix purely on the basis of it being unintentional.

Consider automobile accidents.

363. brudgers ◴[] No.42963023{6}[source]
I use multiple profiles with Firefox to sandbox cookies etc. My profiles are based on activity. HN, Facebook, and infrequently used sites…sometimes I use Linkedin but I dont want it following me around the web.

I would prefer the web was different, but it is not.

364. randunel ◴[] No.42963098[source]
Is this the behaviour you're observing? (my recording of HIBP) https://imgur.com/a/cloudflare-makes-have-i-been-pwned-unusa...
365. gjsman-1000 ◴[] No.42963102{6}[source]
You’re assuming we couldn’t have mutually agreed upon interoperability treaties.
366. JimDabell ◴[] No.42963114{4}[source]
Putting a CAPTCHA in front of robots.txt in particular is harmful. If a web crawler fetches robots.txt and receives an HTML response that isn’t a valid robots.txt file, then it will continue to crawl the website when the real robots.txt might’ve forbidden it from doing so.
367. Avamander ◴[] No.42963248[source]
> I don't know what features Cloudflare uses to determine what browser you're on, or if perhaps it's sophisticated enough to get past the user agent spoofing, but it's all rather funny and reminiscent just the same.

Yes, it is, both your TLS and TCP stacks are unique enough that such spoofing can be detected. But there are a lot of other things that can be fingerprinted as well.

368. echoangle ◴[] No.42963304{4}[source]
It’s more like a VPN instead of Tor
replies(1): >>42963411 #
369. betaby ◴[] No.42963387[source]
Other comments say that DDoS are common, not my experience though. I run a couple of API/SAAS sites and DDoSes are rare. Sites are in Canada and Brazil if that matters, although I won't disclose what data-centers. Most strange thing is that no one demanded any ransom during those DDoS attacks ever. Just some flooding for 1-2 days. Most of the times I did't even care - servers are on 10G ports and I pay 95% percentile for the traffic with a cap on final bill. Sites are geo-fenced by nftables rules, only countries of interest are allowed.
370. hedora ◴[] No.42963411{5}[source]
Actually, it’s closer to Tor, but hardcoded to two hops, and hop 1 and 2 are always different (audited) organizations.

I wish they’d just used Tor though.

replies(2): >>42963517 #>>42966211 #
371. hedora ◴[] No.42963465{3}[source]
I’ve noticed wifi at coffee shops, etc have started blocking it too.

I need to disable it for one of my internal networks (because I have DNS overrides that go to 192.168.0.x), or I’d wish they’d just make it mandatory for iPhones and put and end to such shenanigans.

Apple could make it a bit more configurable for power users, and then flip the “always on” nuclear option switch.

Either that, or they could add a “workaround oppressive regimes” toggle that’d probably be disabled in China, but hey, I’m in the US, so whatever.

Edit: I also agree that blocking / geolocating IP addresses is a big anti-pattern these days. Many ISPs use CGNAT. For instance, all starlink traffic from the south half of the west coast appears to come from LA.

As a result, some apps have started hell-banning my phone every time I drive to work because they see me teleport hundreds of miles in 10 minutes every morning. (And both of my two IPs probably have 100’s of concurrent users at any given time. I’m sure some of them are doing something naughty).

372. jillyboel ◴[] No.42963466{3}[source]
If you use a weird proxy you're gonna get blocked. Facts of life.
373. lynndotpy ◴[] No.42963467{3}[source]
Whoops-- this was a draft I didn't intend to post in this state. I must have fatfingered the "reply" button somehow. Alas, too late to edit or delete now.

Cloudflare cuts down on the noise, but also helps does the work of preventing scrapers, people who re-sell your site wholesale, and cutting down on the noise also means cutting down on the cost of network requests.

It also can help where security is lax. You should have measures against credential stuffing, but if you don't, Cloudflare might prevent (some) of your users from being hacked. Which isn't good enough, but is better than no mitigation at all.

I don't use Cloudflare personally, but I won't dismiss it wholesale. I understand why people use it.

374. echoangle ◴[] No.42963517{6}[source]
Isn’t hop 1 always apple and only the external IP is a secondary provider?
375. buyucu ◴[] No.42963545[source]
My VPN/Fileserver VPS is not behind Cloudflare, and I haven't had any trouble for years. Only the SSH port is accessible from outside (which is probably not even necessary), with password login disabled. I use fail2ban and a few other extra layers of security.
376. buyucu ◴[] No.42963562[source]
Credit cards are an ancient insecure technology that needs to go away. There are systems in Europe like iDEAL that are much more 21st century appropriate.
377. grayhatter ◴[] No.42963660{4}[source]
> So your option as a security professional is to express to your risk management team we allow "hacking tools" or lose iCloud Relay customers

a professional would explain how the vendor is being lazy and making a mistake there because they don't understand your business.

depending on the flavor of security professional (hacker) they might also subtly suggest that this vendor is dumb and should be embarrassed they've made this mistake, thus creating the implication that if you still want to block these users you would also have to be an idiot

under so circumstance is what I ever allow anyone to get the mistaken impression that some vendor understands my job better than I do. As a "security professional" it's literally your job to identify hostile traffic, better than a vendor could.

378. grayhatter ◴[] No.42963720{3}[source]
> Bad business, guys. You gotta find another way. Blocking IP addresses is o-ver.

no, it's still the front line. And likely always will be. It's the only client identifier bots can't lie about. (or nearly the only)

At $OLDJOB, ASN reputation was the single best predictor of traffic hostility. We were usually smart enough to know which we can, or can't block outright. But it's an insane take to say network based blocking is over... especially on a thread about some vendor blocking benign users because of the user-agent.

replies(3): >>42964083 #>>42964426 #>>42974802 #
379. ir77 ◴[] No.42963798{6}[source]
why is your tool so hard to use on ios? the website instructions say you need a companion siri shortcut, but no where is there actually a shortcut listed.

combing and coming through searches and reddit all comes up with non-working siri shortcuts that complain that the url is not found.

380. PokestarFan ◴[] No.42963848[source]
I was on Brave in iOS. I had to turn off Brave Shield.
381. Ray20 ◴[] No.42963941{4}[source]
To trivialize totalitarian regimes that carry out terror against their own citizens, that can outright kill you and whole your family, by comparing them to capitalistic corporate world where, in the worst case, you can simply choose another, less fancy option, is the height of madness.
replies(4): >>42964842 #>>42964845 #>>42965670 #>>42999625 #
382. weare138 ◴[] No.42964083{4}[source]
I don't use iCloud Relay but it seems Apple's ASN would be 'reputable'.
replies(3): >>42964177 #>>42964390 #>>42965142 #
383. Yeul ◴[] No.42964139{4}[source]
Oh I think we all know that the Endgame is only allowing the approved webbrowser from the approved hardware. And getting on those lists will be made very expensive indeed...
384. ec109685 ◴[] No.42964144{3}[source]
Seems seriously risky to be running a browser without access to mainstream security patches.

Perhaps it’s secure enough for now due to its obscurity.

replies(1): >>42970307 #
385. carlosjobim ◴[] No.42964146{3}[source]
What kind of fraud protection does iDeal have for customers?
replies(1): >>42965634 #
386. maratc ◴[] No.42964177{5}[source]
It would appear to be, but only until the bad guys looking to come from reputable ASNs find out about this.
replies(1): >>42964481 #
387. carlosjobim ◴[] No.42964184{3}[source]
>Cloudflare only cuts down on the noise.

That sounds like the solution, that sounds like good security.

388. Dalewyn ◴[] No.42964228{4}[source]
Honestly, I couldn't care less. It's one man shouting against another, it's pointless to try finding facts out of that.

But as a simple Pale Moon user, I can say you caused a big enough disruption to the project that even a user who doesn't really pay attention also noticed.

Now you're here again sidetracking the subject at hand with past dramallamas and seemingly getting your pantaloons moist at having stories besides your own also provided. No thanks.

replies(1): >>42966286 #
389. recursive ◴[] No.42964290{6}[source]
Maybe the performance of the puzzle also has some undeclared side channels.
390. LeifCarrotson ◴[] No.42964337[source]
> I would be pretty upset if I implemented Cloudflare and it started to inadvertently hurt my sales figures.

The problem is that all these Cloudflare forensics-based throttling and blocking efforts don't hurt sales figures.

The number of legitimate users running Arc is a rounding error. Arc browser users often come to Cloudflare without third-party tracking and without cookies, which is weird and therefore suspicious - you look an awful lot like a freshly instantiated headless browser, in contrast to the vast majority of legitimate users who are carrying around a ton of tracking data. And by blocking cookies and ads, you wouldn't even be attributable in most of the stats if they did let you in.

It would be like kicking anyone wearing dark sunglasses out of a physical store: sure, burglars are likely to want to hide their eyes. Retail shrink is something like 1.5% of inventory, while blind users are <0.5% of the population. It would violate the ADA (and basic ethics) to prohibit out all blind shoppers, so in the real world we've decided that it's not legal to discriminate on this basis even if it would be a net positive for your financials.

The web is a nearly unregulated open ocean, Cloudflare can effectively block anyone for any reason and they don't have much incentive to show compassion to legitimate users that end up as bycatch in their trawl nets.

replies(4): >>42964656 #>>42965053 #>>42966257 #>>42967049 #
391. guluarte ◴[] No.42964368[source]
I had the same problem using minbrowser, changing the UA fixes the problem
392. Terretta ◴[] No.42964390{5}[source]
Pretty sure the box with the "shield" icon on it, the ASN the web site would see, is, not coincidentally, CloudFlare?

https://support.apple.com/en-us/102602

"As mentioned above, Cloudflare functions as a second relay in the iCloud Private Relay system. We’re well suited to the task — Cloudflare operates one of the largest, fastest networks in the world. Our infrastructure makes sure traffic reaches every network in the world quickly and reliably, no matter where in the world a user is connecting from."

https://blog.cloudflare.com/icloud-private-relay/

393. _factor ◴[] No.42964421{4}[source]
Best Buy will also sell identical hardware with a slightly modified SKU and negligible changes to avoid comparison.

It’s difficult to compare when BB is the “only” company that sells a particular item.

394. ◴[] No.42964426{4}[source]
395. IggleSniggle ◴[] No.42964481{6}[source]
Oh they have. It's been a big problem for my company. I assume Apple must work on this from their end, but any success would seem to undermine the privacy guarantee of the service.

"Bad guys" using Private Relay is one reason these IPs get blocked: one abuser can cause an entire block of people to get flagged as a single malicious user; and a big enough group of users can also look like a single malicious user to many blocklisting strategies, because they all share the same IP.

396. Puts ◴[] No.42964522{4}[source]
The point with a syn flood is to try to saturate the OS limit for open sockets. From an attackers perspective the whole point of a syn flood is to do a DOS without needing much bandwidth.

My experience form 15 years working in the hosting industry is that volumetric attacks are extremely rare but customers that turn to Cloudflare as a solution are more often than not DDOS-ing them self because of bad configured systems, but their junior developers lack any networking troubleshooting skills.

397. nijave ◴[] No.42964552{6}[source]
Captcha/challenges and tracking users/IP rep across the web

They also do IP and request risk scores using massive piles of data they've collected

398. nijave ◴[] No.42964556{6}[source]
They were unauthenticated requests making GETs to the login page
399. justinpombrio ◴[] No.42964617[source]
> Of course, I didn't, and decided to buy the product elsewhere

Consider messaging the owner to tell them you were trying to buy a product on their site and the site wouldn't let you. There's a chance that they'll care and be able to do something about it. But no chance if they don't know about the problem!

400. RobotToaster ◴[] No.42964656{3}[source]
I wonder if cloudflare blocks like these affect screen reader users, in which case they may violate the ADA.
replies(2): >>42964968 #>>42973781 #
401. warkdarrior ◴[] No.42964788{4}[source]
And that assumes that the Western owners of those systems have any reason to listen to you, the one raising the complaint. How would they check that you are not lying?
402. tremon ◴[] No.42964842{5}[source]
Your snide comment might have had some weight if there had been zero instances of the US government [0] or US corporations [1] killing people.

[0] https://en.wikipedia.org/wiki/List_of_assassinations_by_the_...

[1] https://en.wikipedia.org/wiki/List_of_worker_deaths_in_Unite...

403. imaginarypedro ◴[] No.42964845{5}[source]
https://apnews.com/article/wisconsin-asthma-medicine-lawsuit...
404. tempodox ◴[] No.42964848{3}[source]
+1 for spite-driven development.
405. throwaway48476 ◴[] No.42964869[source]
Its disgusting how we've accepted 1 company MITMing the whole internet. Cloudflare hosts DDoS provides while selling DDoS mitigation. It's a mafia racket.
406. ◴[] No.42964886{5}[source]
407. tombert ◴[] No.42964892[source]
I run my "server" [1] straight to my home internet, and maybe I should count my blessings but I haven't had any issues with DDoS in the years I've done this.

I have relatively fast internet, so maybe it's fast enough to absorb a lot of the problems, but I've had good enough luck with some basic Nginx settings and fail2ban.

[1] a small little mini gaming PC running NixOS.

408. dragontamer ◴[] No.42964968{4}[source]
And if they did violate the ADA, do you seriously expect this administration's anti-DEI Department of Justice to pursue legal action?
replies(3): >>42965202 #>>42965622 #>>42966268 #
409. graemep ◴[] No.42965053{3}[source]
What about all false positives in aggregate?

The problem is site owners do not know - it just adds to the number of blocked threats in cloudflare's reassuring emails.

replies(1): >>42967770 #
410. potus_kushner ◴[] No.42965068[source]
if the purpose of cloudflare is to block bots and allow humans in, then they fail miserably at their job. what they're doing instead can be summarized in one word: DISCRIMINATION. welcome to the age of internet apartheid.
replies(1): >>42965249 #
411. burnte ◴[] No.42965142{5}[source]
Only because without consumers using their IPs, they're a well established company with predictable uses. Once people use it for everything, then the reputation will drop.
412. bdhcuidbebe ◴[] No.42965207[source]
Yea, sucks. Cloudflare is also blocking my web scrapers ;-)
replies(1): >>42975672 #
413. bdhcuidbebe ◴[] No.42965249{3}[source]
They are so successful in blocking noob scrapers that an entire industry is blooming around professional web scraping services.
414. bdhcuidbebe ◴[] No.42965256{4}[source]
It is a niche browser with no hype going for it.
415. sophacles ◴[] No.42965403{6}[source]
What are those many ways? Help me understand - I've been doing this shit a long time and I can't think of many ways to provide what Cloudflare does in a way that is cheap, easy, and scalable without working at the HTTP layer. So please help me learn something new, what are those ways?
replies(1): >>42971608 #
416. michaelt ◴[] No.42965454{6}[source]
Businesses that scrape websites for a living hire people in third-world countries to solve captchas 24/7 to keep the scraping bots running.

So when I successfully solve a captcha, that doesn't make me 100% trusted not-a-scraping-bot. Instead it's an input into a statistical model, along with all the other identifying information they can hoover up, and that statistical model may still say no.

417. BytesAndGears ◴[] No.42965634{4}[source]
I’m not actually sure since I never had issues, but I’ve heard it’s not much since they’re basically just an API for transferring money between banks. Each bank app still needs to integrate with the network separately. [1]

I guess you get some security since each party that you transfer to must have their identity verified with a bank, so you could always get the police involved fairly easily

The iDeal website page on security [2] is in Dutch, but it translates to roughly:

> Before you make a purchase, make sure that the webshop or business is a reliable party. For example, you can read experiences of other consumers about webshops on comparison sites. Or you can use a Google search to check what is said (in reviews) about a webshop on the internet. Also check the overview of the police with known rogue trading parties and the page check seller data. Before making a purchase, always use the following rule of thumb: if something is too good to be true, don't do it.

[1] https://en.m.wikipedia.org/wiki/IDEAL

[2] https://www.ideal.nl/veiligheid

replies(1): >>42966857 #
418. createaccount99 ◴[] No.42965661[source]
> That means my browser is pretending to be Firefox AND Safari on an Intel chip.

That's not the case, that ua is Chrome on MacOS. The rest is backward compatibility garbage

replies(1): >>42987826 #
419. gosub100 ◴[] No.42965670{5}[source]
I'd feel a lot safer walking the streets of any city in China late at night than I would in any blue states "zero tolerance" "gun free" zone.
420. throitallaway ◴[] No.42965688[source]
Same thing with Captchas. If I'm placing a food order or something and I'm presented with a Captcha 9 times out of 10 I just say "screw it."
421. snuxoll ◴[] No.42965773{5}[source]
> Apple/Cloudflare don't sell/support iCloud Relay as a service that is guaranteed to get you treated nicely by the parties on the other end, so they're not being deceptive with that part either.

They really do, actually. The fine print on their page only states:

iCloud Private Relay is not available in all countries or regions. Without access to your IP address, some websites may require extra steps to sign in or access content.

And they have documentation linked on that same page for website owners: https://developer.apple.com/icloud/prepare-your-network-for-... which even goes a step further and encourages website operators to use Privacy Pass to allow iCloud Private Relay users skip CAPTCHA challenges.

And really, this checks out, because iCloud Private Relay has a unique combination of circumstances compared to other commercial VPN users and Tor because:

* It isn't explicitly designed as a bypass tool of any form like commercial VPN's, your options for IP location are "same general location" or "same country and time zone" - content providers have no reason to block it for allowing out of region access

* Private relay is backed by iCloud authentication of both the device and the user, you can be beyond reasonably sure that traffic coming from an iCloud Private Relay endpoint is a paying iCloud+ user, browsing with safari, using their iPhone/iPad/Mac.

* It is backed by one of the most recognizable brands in the world, with a user base who is more likely to send you nasty messages for blocking this service.

On particular note of the last one, there's no "exception list" or anything available for end-users in Safari to bypass Private Relay for specific sites. My work one day decided to add the entire "Anonymizers" category to the blocklist in Okta, and I was suddenly unable to access any work applications on my iPhone which is enrolled in our enterprise MDM solution because I have Private Relay enabled. Enough people complained that the change was rolled back the same day it was implemented, because the solution was "turn it off" and that was unacceptable to many of our users.

422. gslin ◴[] No.42965838[source]
The latest deployment seems using Service Worker API, which causes broken on "old" browsers because the API is not supported on these browsers.

Some people like me who block Service Worker API all the time are also affected, like https://chromewebstore.google.com/detail/no-service-worker/m... this.

423. Analemma_ ◴[] No.42965845{6}[source]
I can find you literally hundreds of posts from people insisting that ADA is nothing but a small-business-killing shakedown, that it's makework for lawyers, that it's doing nothing to help the disabled, and that it's just as bad if not worse than DEI. What makes your claim better than theirs?
replies(3): >>42966224 #>>42966878 #>>42967204 #
424. wraptile ◴[] No.42965889[source]
Cloudflare doesn't report this to the site admins so they're just sitting there losing sales and thinking Cloudflare is doing a good job.
425. pmdr ◴[] No.42966164[source]
Cloudflare has essentially broken the internet. Blocking or restricting access of even residential IPs running in a real, common browser is evil. And just like that, we handed over the internet to a handful of companies, like it was never ours to begin with.
426. johnklos ◴[] No.42966194{4}[source]
You're focusing on the wrong kind of pedantry.

"Marginalized" has a specific connotation, sure, but people can be marginalized for reasons other than, or in addition to, those that fit the connotation.

427. leafmeal ◴[] No.42966197{3}[source]
I tried this just for fun and youtube said to update my browser :(
replies(1): >>42969697 #
428. kube-system ◴[] No.42966211{6}[source]
There's no way they'd use Tor, because it has major UX problems.
429. xrisk ◴[] No.42966216{6}[source]
idk here in India, we have 2FA for everything. I would say it very rarely fails, speaking from personal experience.
replies(1): >>42966332 #
430. pc86 ◴[] No.42966219[source]
The whole "browser integrity check" thing is bullshit.
431. gosub100 ◴[] No.42966224{7}[source]
I call your bluff. Do it.
replies(1): >>42966480 #
432. TheRealPomax ◴[] No.42966257{3}[source]
The number of legitimate users on "not chrome, edge, safari, or firefox" is about 10% of the browser market. I don't know about you, but if I'm running a shop, and the whole point of my website is to make sales, but my front door is preventing 10% of those sales? That door is getting replaced.
replies(5): >>42966408 #>>42966448 #>>42966602 #>>42967069 #>>42967080 #
433. pc86 ◴[] No.42966268{5}[source]
Yes because accessibility and DEI are different despite partisans' attempts to make "DEIA" a real thing.
replies(3): >>42966400 #>>42967223 #>>42972977 #
434. mattatobin ◴[] No.42966286{5}[source]
You started this shit by bringing up the past dude. If this story is gonna rise to a broader appeal it would be fuckin bullshit for it to die because oh it's just Pale Moon and/or SeaMonkey.

Cloudflare staff have a real hateboner for non-mainstream browsers and tell yourself what you like but I still actually care about the well being of this unmitigated disaster we call the Internet and the "Open Web".. Not to mention the lives and well being of users and contributors out there in the world..

Go be small minded on the Pale Moon forum, I'm busy.

replies(1): >>42969638 #
435. RobGR ◴[] No.42966292{4}[source]
I think this is the same issue as is being discussed here: https://gitlab.com/gitlab-org/gitlab/-/issues/421396

It sometimes blocks me on fairly major browsers, such as google chrome ( but on an older Ubuntu ).

436. RobGR ◴[] No.42966298[source]
To add another link, I think this is the same issue: https://gitlab.com/gitlab-org/gitlab/-/issues/421396
437. johnklos ◴[] No.42966318[source]
Cloudflare is discriminatory. They, and their fanbois, will likely claim that they can't publicly discuss their criteria for who they block, so some mysterious magic is going on in the background, and we're supposed to just trust them because they're big.

That in mind, I'd love even the most fawning of the fanbois to come up with rationalization for why for a very common browser (Safari on modern macOS), most links through Cloudflare work, but trying to get past the are-you-human checkbox on Cloudflare's abuse reporting page doesn't work half the time.

Obviously that shouldn't be on an abuse reporting page at all, but Cloudflare has been making abuse reporting extremely difficult for years. Adding rate limiting (a human can easily hit it) and prove-you're-human verification on their abuse page just unambiguously proves this.

438. crazygringo ◴[] No.42966332{7}[source]
I think a lot of other countries have it much more standardized. Or it's just more common so the bugs get fixed.

But in the US there are so many credit card providers, each one seems to do it differently, and the UX flows just break. And it seems difficult for a site to even test, and how will you even figure out if it's the provider or network or merchant or notification that's failing?

439. theamk ◴[] No.42966342{6}[source]
Interesting! Do you have have a URL I could look at?
440. worik ◴[] No.42966387{4}[source]
> just good privacy settings in my case.

You are blocking the trackers and damaging the revenue model.

441. dragontamer ◴[] No.42966389{6}[source]
You seriously think this administration gives a care about the disabled? They're already firing accessibility people in the government.

https://www.aclu.org/news/racial-justice/trumps-executive-or...

Right there in the executive orders. They're literally rolling back accessibility and making this a policy.

Read the EO yourself.

https://www.whitehouse.gov/presidential-actions/2025/01/endi...

replies(1): >>42967341 #
442. dragontamer ◴[] No.42966400{6}[source]
Trump's team is rolling back DEIA already.

Did you read the executive order? It's not the left calling it DEIA. Its Trump.

> Sec. 2. Implementation. (a) The Director of the Office of Management and Budget (OMB), assisted by the Attorney General and the Director of the Office of Personnel Management (OPM), shall coordinate the termination of all discriminatory programs, including illegal DEI and “diversity, equity, inclusion, and accessibility” (DEIA) mandates, policies, programs, preferences, and activities in the Federal Government, under whatever name they appear.

https://www.whitehouse.gov/presidential-actions/2025/01/endi...

replies(1): >>42973449 #
443. supernovae ◴[] No.42966408{4}[source]
If you were running a shop, you would realize that nearly 100% of the fraud is "not chrome, edge, safari, or firefox"

It's unfortunate yes but that's what drives the threat signatures

replies(1): >>42967518 #
444. agoodusername63 ◴[] No.42966448{4}[source]
Why would you assume that the 10% of non standard browsers are going to buy anything?

Demographic is important here. If I was running a shop that sold software for Linux users, sure. If I'm running a store that sells pretty much anything else? I'm not caring.

replies(1): >>42967171 #
445. vscapitalx ◴[] No.42966480{8}[source]
https://www.forbes.com/sites/gusalexiou/2023/06/30/website-a...

https://www.the215guys.com/blog/ada-lawsuits-targeting-websi...

replies(1): >>42967482 #
446. shwouchk ◴[] No.42966532{14}[source]
So you too, are saying “its possible” as proof of your argument.

Which itself shifted from complaining that you aren’t warned that coffee is hot, to - after implicitly agreeing that it should be obvious it’s hot - complaining that it they didn’t have to make it as hot.

Great! Offer an alternative! Everyone would be more than happy.

replies(1): >>42968339 #
447. zelon88 ◴[] No.42966579[source]
Can't you set your user agent to something else? Like Firefox or Chrome.
replies(1): >>42967826 #
448. lotsofpulp ◴[] No.42966602{4}[source]
You don't think the people actually running the shops, whose income depends on the shop, have thought of that and thus there exists a downside that more than offsets the upside?
replies(2): >>42967179 #>>42998712 #
449. chaoskitty ◴[] No.42966774[source]
So you're saying that which browsers are supported on the Internet should be determined by a single, for-profit company? That's a very interesting and shorthsighted take.

I love how so many of these apologists talk about stuff like "maintenance costs", as though it's impossible to write code that's clean and works consistently across platforms / browsers. "Oh, no! Who'll think of the profits?!?"

If you had any technical knowledge, you'd know that "maintenance costs" are only a thing when you code shittily or intentionally target specific cases. A well written, cross-browser, cross-platform CAPTCHA shouldn't have so many browser specific edge cases that it needs constant "maintenance".

In other words, imagine you're arguing that a web page with a picture doesn't load on a browser because nobody bothered to test with that browser. Now imagine you're making the case for that browser being so obscure that nobody would expend the time and money. Instead, why aren't you pondering why any web site with a picture wouldn't be general enough to just work? What does that say about your agenda, and about the fact that you want to make excuses for this huge, striving-to-be-a-monopoly, for-profit company?

replies(2): >>43019938 #>>43027896 #
450. chaoskitty ◴[] No.42966804[source]
How many times do they have to do the same thing before we modify our presumtion?
451. carlosjobim ◴[] No.42966857{5}[source]
Thank you for the explanation. Then I think credit/Debit cards are a better option for the customer, considering they have fraud protection.
452. chaoskitty ◴[] No.42966864{4}[source]
...which happens to the average site owner how often...?
453. lcnPylGDnU4H9OF ◴[] No.42966878{7}[source]
> What makes your claim better than theirs?

Well, for starters it's not so absolute:

> it's doing nothing to help the disabled

It's obviously doing something for the disabled. Reserved disabled parking spots and wheelchair-accessible building entrances are requirements of the ADA. It seems reasonable to think it "improves people's lives". A whole bunch of contrary opinions are not necessarily reasons for disagreement as much as they are simply disagreement.

replies(2): >>42967289 #>>42980507 #
454. chaoskitty ◴[] No.42966906{5}[source]
There's absolutely no data to back up the suggestion that sites regularly suffer from DDoS.

It's like talking about getting murdered - it happens, and there are statistics, but if you're literally expecting everyone to change their whole lives based on the fact that some people are murdered, with zero consideration for the where, why and how, you're doing it wrong.

replies(1): >>42979823 #
455. chaoskitty ◴[] No.42966987[source]
Simple: Don't look at the logs.

Bots are a fact of life. Secure your site properly, follow good practices, set up notifications for important things, log stuff, but don't look at the logs unless you have a reason to look at the logs.

Having run web servers forever, this is simply normal. What's not normal is blindly trusting a megacorporation to make my logs quiet. What're they doing? Who are they blocking? What guidelines do they use? Nobody, except them, knows.

It's why I self-host email. Sure, you might feel safe because most people use Gmail or Outlook, and therefore if there are problems, you can point the finger at them, but what if you want to discuss spam? Or have technical discussions about Trojans and viruses? Or you need to be 100% absolutely certain that email related to specific events is delivered, with no exceptions? You can't do that with Gmail / Outlook, because they have filters that you can't see and you can't control.

456. hexagonwin ◴[] No.42967040{3}[source]
This is iOS 6 and not iPhone 6, btw.
replies(1): >>42969719 #
457. azemetre ◴[] No.42967049{3}[source]
Something tells me that if you asked the store owner that the poster tried to give money to, they'd be furious at cloudflare for stopping the transaction.
replies(1): >>42967534 #
458. NoMoreNicksLeft ◴[] No.42967069{4}[source]
>That door is getting replaced.

Sure. If there was another place to buy a better door at. But if that door manufacturer's the only one that makes doors, if the door installer and door technicians all tell you that they can't or won't make another door for you, then you just deal. Maybe crank up the prices a bit to try to mitigate your 10% shortfalls.

The place where a business looks at that problem and sees money being left on the table that it can't live without and that it has no other way of making up for... that is a very narrow stretch, and only very marginal businesses live there.

459. Aldo_MX ◴[] No.42967080{4}[source]
Then you get burglars in your shop instead of legitimate customers.

User Agents look the way they do because this is a recurring issue.

A browser without network effects gets blocked, they look for a way to bypass the blocking, then they become mainstream and now the de-facto UA is larger than before.

replies(1): >>42974094 #
460. fsckboy ◴[] No.42967165[source]
Adjacent topic: does anybody (US) use Chase Bank from linux? it won't let me use Chromium* or Brave (it used to; it doesn't tell me I can't, it just won't send me TFA confirmation codes to my phone or "recognize" when I log into the phone app. Phone app works, but doesn't have all the features of the web portal. I can use it from macbook but I prefer linux.

*I have not tried downloading Google Chrome or IE or Edge if that still exists for linux

461. handoflixue ◴[] No.42967171{5}[source]
Why would you expect people using non-standard browsers don't buy things? Presumably they still eat food, wear clothing, and enjoy hobbies.

I'd think that a non-standard browser also strongly suggests that they're a financially-comfortable middle-class individual, and quite possibly a whale with FAANG income.

replies(1): >>42980521 #
462. handoflixue ◴[] No.42967179{5}[source]
The people running the shops aren't the people making the decision - Cloudflare is. The shop's only real decision is "use Cloudflare" or "die to all the attacks Cloudflare exists to prevent"
463. 1shooner ◴[] No.42967204{7}[source]
>it's doing nothing to help the disabled

I make you a deal: Instead of hundreds of posts from random people, find me just 50 posts from disabled people that agree with this.

464. fsckboy ◴[] No.42967223{6}[source]
I'm not expert on this, but it appears that the Dept of Justice rolls DEI and A into one DEIA, which makes some sort of sense since any litigation would be similar. Not sure about other federal agencies

https://www.justice.gov/archives/jmd/diversity-equity-inclus...

465. fsckboy ◴[] No.42967289{8}[source]
I've no problem with the govt making sure that disabled people get accommodation so they can participate in civic life. I do have a problem with the govt requiring private individuals to pay for it, "handle the load", etc. even engaged in public accommodation: because it's obvious that a 20,000 sq ft publicly trade Delaware class C corp retailer has room for ramps and generous allocations of space around swinging doors, bathrooms etc. But if I rent a 500 sq foot postage stamp shop in NYC to open my dream counter service juice store which is a step up from the sidewalk, it's just too much of a burden for a new business of which 9 out of 10 fail anyway. You think juice store owners have anything against disabled people? they don't.

We all need to pay for it, not pass feel good legislation that shoves it down the throats of sole proprieter LLCs.

466. 6031769 ◴[] No.42967409{3}[source]
Doesn't drive me crazy - gives me a "Get Out of Huddles Free" card.
467. gosub100 ◴[] No.42967482{9}[source]
the first link had one comment in support of the move, and a single, dissenting (yet reasonable) reply.2nd article had no comments whatsoever. Remember, the claim I'm responding to was "literally hundreds of posts from people insisting that ADA is nothing but a small-business-killing shakedown, that it's makework for lawyers, that it's doing nothing to help the disabled"
468. crtasm ◴[] No.42967518{5}[source]
Why would fraudsters use a browser that's likely to be blocked? They'll be using the standard browsers like (mostly) everyone else.

edit: it's noted downthread that automated testing of card details to find valid ones is a reason.

469. Liskni_si ◴[] No.42967534{4}[source]
Yeah maybe if you somehow managed to email them without their email provider stopping that email from reaching them…
470. crtasm ◴[] No.42967543{5}[source]
That doesn't line up with my experience at all.

You will still notice when some sites completely block you, of course.

471. edelbitter ◴[] No.42967770{4}[source]
It is difficult to gauge the size of the Cloudflare effect.. if the usage statistics the site owner is collecting.. are also not collected for those undesirables.
472. edelbitter ◴[] No.42967826[source]
They flat out refuse to show what the origin server sent, unless you run some Javascript. Which is sufficient to no longer care about what the browser states in the request headers.
473. socrateslee ◴[] No.42967976[source]
May be the case is that filtering user by browser UA is no longer a feasible solution(new browsers and alike are growing), and neither running javascript(headless chrome everywhere).

For local physical store, geo-location is a naturally filter for customers as long as beaming a person from a spaceship to earth is not invented. For web, a equally effective solution is very hard to find.

474. Dylan16807 ◴[] No.42968339{15}[source]
Not that it's "possible", that it requires them to add nothing new.

That is a much much easier to reach bar.

It's like if a restaurant sells cheeseburgers, and I want a hamburger. "How do they figure out ~~what~to~cache~~ the cheese to ketchup ratio without adding cheese?" They can just skip that part. I'm not asking for sushi and supporting that by saying "sushi is possible".

replies(1): >>42976224 #
475. BrenBarn ◴[] No.42969339{7}[source]
Yeah, and this is actually a huge pain for visitors. I was in Europe a couple months ago and couldn't buy stuff like train tickets online. Why? Because everything wants to verify with a text, and I couldn't do that because I had gotten a European SIM card because my US plan doesn't do international roaming.

There are several colliding problems there (cheap cell phone plan, 2fa being via text, online purchases requiring 2fa) but it still illustrates to me the pain of doing simple stuff in the modern tech space. I wish the powers that be would work harder on solutions that don't require extra work from the people doing small, normal stuff. It would be better to have a lot more fraud occur but a lot more of the perpetrators pursued and caught. A lot of anti-fraud measures seem to be largely about passing the buck to someone else instead of actually eliminating the humans who are driving the fraud.

replies(1): >>42972794 #
476. BrenBarn ◴[] No.42969359{5}[source]
> It's too free, and we have too many opportunistic assholes in it for it to remain so.

There's some truth in this, but I think there is a lot of room for improving things as far as making life much more painful for opportunistic assholes in general.

477. Dalewyn ◴[] No.42969638{6}[source]
You started it first, my dude:

>This is Tobin.. but without the Paradigm.

>Now no one hates that furry bastard more than me (and I challenge you to try)

>I know my fate for trying.. how many will join me knowing that?

478. gloosx ◴[] No.42969697{4}[source]
When you click OK it lets you in regardless ;)
479. gloosx ◴[] No.42969719{4}[source]
Whoa, really. So it is even back to 3GS/4 days then.
480. SLJ7 ◴[] No.42970070[source]
You should really take the few minutes to email them and let them know that's happening. It's not their fault Cloudflare is awful.
481. mimasama ◴[] No.42970269[source]
> known and unfixed security bugs

Which are..?

482. mimasama ◴[] No.42970307{4}[source]
> without access to mainstream security patches

They do have access to them. The lead developer and project owner has sec bug access in bugzilla.

But vulnerabilities in newer Mozilla have over time become less and less relevant in Pale Moon's codebase, which led to the latter dropping the tracking of how many Mozilla security patches have been applied in the release notes (starting with 33.0.1).

483. littlestymaar ◴[] No.42970428{6}[source]
> Its subreddit has 52k members. There are probably hundreds of thousands of users.

I don't get your reasoning here, you shouldn't even expect more than a fraction of the reddit users to have even installed and tried the browser, let alone using it regularly.

replies(1): >>42984903 #
484. lofaszvanitt ◴[] No.42970609{3}[source]
since the invention of llms it's not that much of a deal that search engines are useless
485. doctor_radium ◴[] No.42970748{5}[source]
> Whatcha gonna do, take Cloudflare to court for blocking your access to your bank? Under what law is that illegal?

In the USA, I think it would be worth trying to sue Cloudflare for either "free speech" or "public nuisance" violations. Gonna reach out to the ACLU and EFF in the coming days.

486. anacrolix ◴[] No.42970749[source]
CloudFlare has become the problem. It's high time users banded together in their best interests: no ads, tracking, blocking, geo restrictions etc.
487. doctor_radium ◴[] No.42970781{4}[source]
On one hand, I'm okay with that. If Cloudflare or some other self-appointed Internet cop blocks me from a site, I just go somewhere else, and I hope the site goes out of business as a result...which happens to businesses everyday for a variety of reasons. But given Cloudflare's sheer size, having so many businesses crank the shields to maximum actually affects using the web, and that's where I draw the line.
488. Xelbair ◴[] No.42971553{4}[source]
No, only thing i have is dns-over-https.

But i should turn that on.

489. 1oooqooq ◴[] No.42971608{7}[source]
offer a l2 load balancer that act as a queue. if the site decides its a dos/bad request it sends either a dowgraded response the load balancer can read or a side channel comms. then the load balancer drop everything from that ip or other identifiable patterns based only on l2 info.

there are many others. just buy a book for industries that value privacy or pay someone.

490. account42 ◴[] No.42971791{3}[source]
You don't need buttflare's mistery juice to rate-limit or block bad users.
491. TsiCClawOfLight ◴[] No.42972794{8}[source]
2FA for our cards is not via text, but via app. It's your credit card provider that doesn't implement 3D secure properly.
492. RockRobotRock ◴[] No.42972833[source]
Doesn't work for me at all on Firefox. Disabled all the privacy preserving extensions and still nada. Fuck off Cloudflare.
replies(1): >>43029108 #
493. TRiG_Ireland ◴[] No.42972977{6}[source]
So why is the Trump administration also removing accessibility features from government websites, and firing ASL interpreters?
replies(1): >>42973464 #
494. pc86 ◴[] No.42973449{7}[source]
Because it's a pretty simple legal maneuver to say "no this EO isn't requiring us to shut down this program because we call it 'DEIA' instead of 'DEI' so it's different."

The EO is using the language of the programs to ensure that they're shut down.

Accessibility has been around forever. One of the major proponents of it was a Republican nominee for President. It has broad bipartisan support.

DEI has been around for 45 minutes and is racism disguised as anti-racism.

495. pc86 ◴[] No.42973464{7}[source]
Because the administration is thousands of people and it's possible for them to do both good things and boneheaded stupid things simultaneously?
replies(1): >>42973522 #
496. dragontamer ◴[] No.42973522{8}[source]
The head of the administration, Trump, literally issued an order. An order that's being carried out right now.

And that order is messing with disability programs and other accessibility issues. Directly.

replies(1): >>42974875 #
497. samspot ◴[] No.42973781{4}[source]
In my experience, screen reader users stick to the mainstream browsers to preserve compatibility. https://webaim.org/projects/screenreadersurvey10/
498. doctor_radium ◴[] No.42974078{5}[source]
If you're thinking of Google's WEI, I'm thankful that went down in flames:

"Google is adding code to Chrome that will send tamper-proof information about your operating system and other software, and share it with websites. Google says this will reduce ad fraud. In practice, it reduces your control over your own computer, and is likely to mean that some websites will block access for everyone who's not using an "approved" operating system and browser."

https://www.eff.org/deeplinks/2023/08/your-computer-should-s...

499. TheRealPomax ◴[] No.42974094{5}[source]
Fun fact: you can't steal paid software by faking a user agent, because that's not how sales work. But you can lose sales by blocking user agents.

And use your brain for a hot second will you? Bad actors don't use a rare user agent, they use the same Chrome user agent that everyone else uses.

500. dmantis ◴[] No.42974330{7}[source]
That's not feasible for bots, crawling, IP laws, etc.

Strict fraud could be handled, but everything above is really different per jurisdiction by obvious reasons. There is nothing clearly good or bad in bots, or e.g. pirates, it depends on particular cultural perception. And if one nation thinks that the action is not a crime, it doesn't make sense to them to prosecute such actions for foreign requests.

replies(1): >>42979033 #
501. jidar ◴[] No.42974802{4}[source]
Blocking based on ASN has never and should never be the frontline. It's the illusion of increased security with little actual impact. The bad guys are everywhere and if blocking an ASN has an improvement on your actual breaches then your security is total crap and always will be until you start doing the right things.
502. pc86 ◴[] No.42974875{9}[source]
A sibling comment quoted it as well but the relevant thing is here:

> Sec. 2. Implementation. (a) The Director of the Office of Management and Budget (OMB), assisted by the Attorney General and the Director of the Office of Personnel Management (OPM), shall coordinate the termination of all discriminatory programs, including illegal DEI and “diversity, equity, inclusion, and accessibility” (DEIA) mandates, policies, programs, preferences, and activities in the Federal Government, under whatever name they appear.

IMO this is a crystal clear example of why you don't lump unrelated programs in together. You lump accessibility with DEI because accessibility is largely favored and DEI is largely not. Their hands are likely tied by the text of this EO because the previous administration didn't keep DEI separate from accessibility. As I stated elsewhere accessibility is a decades-old cause while DEI has been around barely the past couple years in government circles and wider press.

If the previous administration had left them separated and stopped hamfisting DEI into DEIA I don't think this OE would have mentioned accessibility at all. But since it does, if you're a federal employee you don't really have a choice unless you want to try to make the argument that accessibility on its own is not DEIA and therefore it can stay but that's likely a losing battle.

replies(2): >>42979396 #>>42995200 #
503. anticensor ◴[] No.42974990{3}[source]
> (apparently it's not worth to show you ads if you still appear to be using iphone 6)

Why not adwall the user instead, showing only ads until they upgrade the device or buy premium?

504. zoezoezoezoe ◴[] No.42975337[source]
> So sick of Cloudflare

A sentiment I cannot agree with more.

505. randunel ◴[] No.42975672[source]
But not mine..
506. Hold-And-Modify ◴[] No.42975961[source]
After almost ten days of deafening silence and broken Internet access, I guess we have to paraphrase Adam Martinetti, the Cloudflare Product Manager from 2022 and conclude that in 2025:

Cloudflare DOES want to be in the business of saying one browser is more legitimate than another.

507. doctor_radium ◴[] No.42975983[source]
In concept that's a good idea, but the fingerprinting potential is VAST: user-agent, TLS, JavaScript quirks, CSS, Canvas, proprietary features like Chrome's Topics, maybe WebGL, WebUSB, etc. In practice it's very hard to do.
508. shwouchk ◴[] No.42976224{16}[source]
So you agree that your argument has shifted from complaining about inadequate disclosure that coffee contains caffeine, to complaints about lack of decaf offerings.

It would also be trivial for google and facebook to turn off all ads and logging of your activity. They would need to do strictly less than they do now. It would benefit all users too!

In CF case they would have to build a completely different infrastructure to detect bots using different technology to what they have now, including different ways around false positives for legitimate users. While perhaps nothing new in the sense that you claim “this is possible”, i see no one else offering this mythical “possible” product.

I would be the first in line to your offering of free cheeseless hamburgers. Where do i sign up?

replies(1): >>42976357 #
509. Dylan16807 ◴[] No.42976357{17}[source]
> So you agree that your argument has shifted from complaining about inadequate disclosure that coffee contains caffeine, to complaints about lack of decaf offerings.

My argument has never shifted.

But the reason the argument shifted was because someone specifically asked about how you'd do DDoS protection without those downsides.

And you continued asking how it could be done.

> It would also be trivial for google and facebook to turn off all ads and logging of your activity. They would need to do strictly less than they do now. It would benefit all users too!

Isn't cloudflare supposedly not tracking private information in the websites they proxy...? If you think they make money off it, that's pretty bad...

> In CF case they would have to build a completely different infrastructure to detect bots using different technology to what they have now, including different ways around false positives for legitimate users.

I disagree.

> I would be the first in line to your offering of free cheeseless hamburgers. Where do i sign up?

First you need to put me into a situation where my business can compete with cloudflare while doing exactly the same things they do. Then I will be happy to comply with that request.

The hard part of this situation is not the effect of that tiny change on profitability, it's getting into a position where I can make that change.

replies(1): >>42978587 #
510. doctor_radium ◴[] No.42976559{3}[source]
> Otherwise they'd have to support every possible engine which is infeasible.

If I understand correctly, this is why I've said on previous Cloudflare threads that they've managed to design a game they can never win. They project a certain omniscience, but then all this sh*t happens. We need to persuade them to stop playing.

511. anticensor ◴[] No.42977029[source]
Can be explained with fewer assumptions.
512. doctor_radium ◴[] No.42977383[source]
In the past a Cloudflare representative typically appears in these threads, and if that's happened, I missed it. Not to mention the MVP's comment in the locked Cloudflare thread that

"You should use an up to date major browser. Old Firefox forks are not supported and expected to have problems."

It's all incredibly telling, that they've given up trying to be impartial. When "they" start picking browser winners and losers, are OS's next?

In a way Cloudflare missed an opportunity, because a try()/catch() around the bit of failing JavaScript would have been perfect fingerprinting. Having said that, I don't expect it will take the Pale Moon team very long to patch the problem.

But where to go from here? Is there anybody besides the ACLU and EFF with enough resources to mount a "public nuisance" lawsuit? And what would constitute winning? A court-appointed overseer to make sure Cloudflare is regularly educating its staff on the variety of browsers in use today, and providing near 24–hour turnaround times when issues like this occur? It would be a start.

Personally I wonder if this whole style of security is a fool's errand and any blocking should be server-based and look at behavior, not at arbitrary support of this or that feature. I think it would also be helpful if anybody who finds themselves blocked would be given at least a sliver of why they were blocked, so they could try rectifying the problem with their ISP (bad IP), some blocklist, etc.

513. shwouchk ◴[] No.42978587{18}[source]
> Isn't cloudflare supposedly not tracking private information in the websites they proxy...?

They are at the very least tracking the users and using that tracking as part of the heuristics they use in their product.

Whether they sell the data for marketing, i don’t know, hopefully not but conceivably, yes.

To which, > I disagree.

Yes, we’ve established that you disagree and explicitly claim “it’s possible to offer ddos protection without mitm”

and now further that “dropping the extra feature of caching” would not adversely affect their technology or their business”

Great, claims though entirely unsupported and in the latter case obviously false if you know anything about how it works.

In particular, they would need to sponsor the free accounts via much poorer economies of scale due to not being able to cache anything, and would not help at all with a “legitimate ddos” such as being on the front page here

replies(1): >>42978989 #
514. danielheath ◴[] No.42978827{6}[source]
Depends. Ten thousand what?

I work on a "pretty large" site (was on the alexa top 10k sites, back when that was a thing), and we see about 1500 requests per second. That's well over 10k concurrent users.

Adding 10k requests per second would almost certainly require a human to respond in some fashion.

Each IP making one request per second is low enough that if we banned IPs which exceeded it, we'd be blocking home users who opened a couple of tabs at once. However, since eg universities / hospitals / big corporations typically use a single egress IP for an entire facility, we actually need the thresholds to be more like 100 requests per second to avoid blocking real users.

10k IP addresses making 100 requests per second (1 million req/s) would overwhelm all but the highest-scale systems.

515. Dylan16807 ◴[] No.42978989{19}[source]
> They are at the very least tracking the users and using that tracking as part of the heuristics they use in their product.

They can do that without seeing the proxied contents. So your analogy to asking facebook or google to stop ads and tracking is completely broken.

> and now further that “dropping the extra feature of caching” would not adversely affect their technology or their business”

Yes. (Well, it was stated much earlier but I guess you didn't notice until now?) You're the one saying it would be a problem, do you have anything to back that up?

> in the latter case obviously false if you know anything about how it works.

Caching costs a bunch of resources and still uses lots of bandwidth, what's so obvious about it? And cloudflare users can already cache-bust at will, so it's not exactly something they're worried about.

https://developers.cloudflare.com/cache/how-to/cache-rules/s...

> would not help at all with a “legitimate ddos” such as being on the front page here

Which is not the scenario people were worrying about.

And an average web server can handle that.

516. inetknght ◴[] No.42979033{8}[source]
One problem at a time. A lot of the malicious activity of bots/crawling/etc hide behind plain fraud.

Combat fraud first so you can start to really identify the other more troublesome troublemakers.

Bots? Declare the owner. Lie about the owner? Fraud.

Crawling? Bots.

Intellectual property? That's an entire whole other industry.

517. dragontamer ◴[] No.42979396{10}[source]
I quoted it and irrelevant.

Trump signed the order like that. If he wanted to change the order, he would have written it differently.

In any case, President Elon is pissed at accessibility folks harassing him over Twitter firings (including the firing of Twitters accessibility teams). This is stuff well within their politics and is 100% what they want.

replies(1): >>43001287 #
518. zinekeller ◴[] No.42979823{6}[source]
> There's absolutely no data to back up the suggestion that sites regularly suffer from DDoS.

For a random site from the internet, sure, because a random blog is probably too small to be noticed.

Forums, even relatively niche ones, unfortunately do suffer DDoS from their disgruntled users. (Or competitors of the same fandom. Or from the disgruntled part of a rivaling fandom.)

> It's like talking about getting murdered - it happens, and there are statistics, but if you're literally expecting everyone to change their whole lives based on the fact that some people are murdered, with zero consideration for the where, why and how, you're doing it wrong.

All analogies fail somewhere, but this is probably one of those which easily falls apart. Injuries are probably better. In a random population, there are a relatively small proportion of injuries, but some jobs (like construction) tend to have a significantly higher number of injuries compared to a mean person, in the same manner that a DDoS on a random website is unlikely but certain types of websites are DDoS magnets.

519. what ◴[] No.42980507{8}[source]
>reserved disabled parking spots

I’ve never seen an actually disabled person use one. They’re always occupied by cars with placards but the people are pretty clearly abled or able enough to walk across the parking lot.

520. what ◴[] No.42980521{6}[source]
It strongly suggest they’re a neet.
521. molticrystal ◴[] No.42982962[source]
To have cloudflare work on Librewolf I had to enable web workers.

Why does it need web workers, when it worked fined without them on Waterfox Classic firefox 56 fork that hasn't been updated in water?

522. rollcat ◴[] No.42984235{3}[source]
This is not about supporting or not, this is outright blocking/gatekeeping; you can just let pass, but they chose to block. It's completely different from e.g. no longer releasing builds for PPC Macs.
523. InsideOutSanta ◴[] No.42984903{7}[source]
Why would you join a subreddit for an obscure browser if you never even bothered to run it?
replies(1): >>42989610 #
524. tibbar ◴[] No.42987826{3}[source]
This is the user agent on Chrome, but the reason for all the references to other browsers (and an old OS and architecture), the backward compatibility garbage, is to pretend to be those browsers for the sake of old websites that are doing string matching on the user agents.
525. littlestymaar ◴[] No.42989610{8}[source]
You vastly underestimate how many “just curious” lurkers there are on any subreddits !
replies(1): >>43003066 #
526. samedev ◴[] No.42991254[source]
Is there any cloudflare alternatives?
527. TRiG_Ireland ◴[] No.42995200{10}[source]
Fascists always despise disabled people. This is entirely on brand.
replies(1): >>43001336 #
528. mft_ ◴[] No.42998712{5}[source]
Yes. I suspect that many people who run online shops don’t think about this issue and, mostly, don’t even know there is an issue.
529. wvh ◴[] No.42999625{5}[source]
Many roads can lead to that hell. It's not because you take the scenic route that you shouldn't have some sense of awareness about where you might be headed. There is no us and them, just human nature.
530. pc86 ◴[] No.43001287{11}[source]
It's not irrelevant because as I said earlier if you run a "DEIA" office and an EO says to dismantle DEI, it's a pretty easy legal maneuver to at least argue that they're different and that you don't need to shut the DEI stuff down because your office does other things too and they're all interrelated. Not saying it would work but this cuts it off at the pass. "DEIA" is a Democratic invention and that language is necessary to shut down DEI.

> President Elon

Oh I'm sorry I was under the mistaken impression you were trying to have a good faith discussion about the merits of what's happening.

The federal government is comprised of millions of unelected bureaucrats (I don't mean that pejoratively that's literally what they are). There is nothing particularly earth shattering about what Elon is doing. He's given a task by the president and he's carrying it out, which is what every single unelected executive branch employee does at one level or another.

531. pc86 ◴[] No.43001336{11}[source]
Give me a break the fascism nonsense is completely played out. Get another false ad hominem there are better ones to pick from.
replies(1): >>43020826 #
532. InsideOutSanta ◴[] No.43003066{9}[source]
You're asserting that they are curious enough about a free browser to join a subreddit, but not curious enough to download it?
533. slothsarecool ◴[] No.43019938{3}[source]
I think it's pretty clear you have never worked on fraud protections or bot detections, otherwise you'd understand the struggles of supporting many environments with a single solution, you already have an opinion on this and by the way your messages are typed, it doesn't seem like any rational will change your ideas.

This is the internet and everybody is a field expert the moment they want to win an argument, best of luck with that.

534. TRiG_Ireland ◴[] No.43020826{12}[source]
He's following the fascist playbook to the T. There's no need to sugarcoat it.
535. erinaceousjones ◴[] No.43025574{5}[source]
Thankyou! I checked with IPQS and my residential IP had been flagged for being "a proxy". I routinely SSH VPN (sshuttle) into my home network to do things so maybe that's why.
536. usere9364382 ◴[] No.43027896{3}[source]
Indeed. Software can be written like math. 1 + 1 = 2, holds true for now and for all time, past and present.
537. RockRobotRock ◴[] No.43029108[source]
this turned out to be related to an extension I was using please disregard