Some thoughts on how useful Anubis really is. Combined with comments I read elsewhere about scrapers starting to solve the challenges, I’m afraid Anubis will be outdated soon and we need something else.

  • mobotsar@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    4
    ·
    16 hours ago

    Is there a reason other than avoiding infrastructure centralization not to put a web server behind cloudflare?

    • poVoq@slrpnk.net
      link
      fedilink
      English
      arrow-up
      17
      ·
      14 hours ago

      Yes, because Cloudflare routinely blocks entire IP ranges and puts people into endless captcha loops. And it snoops on all traffic and collects a lot of metadata about all your site visitors. And if you let them terminate TLS they will even analyse the passwords that people use to log into the services you run. It’s basically a huge survelliance dragnet and probably a front for the NSA.

    • Björn Tantau@swg-empire.de
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      1
      ·
      16 hours ago

      Cloudflare would need https keys so they could read all the content you worked so hard to encrypt. If I wanted to do bad shit I would apply at Cloudflare.

      • mobotsar@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        15 hours ago

        Maybe I’m misunderstanding what “behind cloudflare” means in this context, but I have a couple of my sites proxied through cloudflare, and they definitely don’t have my keys.

        I wouldn’t think using a cloudflare captcha would require such a thing either.

        • StarkZarn@infosec.pub
          link
          fedilink
          English
          arrow-up
          10
          ·
          13 hours ago

          That’s because they just terminate TLS at their end. Your DNS record is “poisoned” by the orange cloud and their infrastructure answers for you. They happen to have a trusted root CA so they just present one of their own certificates with a SAN that matches your domain and your browser trusts it. Bingo, TLS termination at CF servers. They have it in cleartext then and just re-encrypt it with your origin server if you enforce TLS, but at that point it’s meaningless.

        • Björn Tantau@swg-empire.de
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          12 hours ago

          Hmm, I should look up how that works.

          Edit: https://developers.cloudflare.com/ssl/origin-configuration/ssl-modes/#custom-ssltls

          They don’t need your keys because they have their own CA. No way I’d use them.

          Edit 2: And with their own DNS they could easily route any address through their own servers if they wanted to, without anyone noticing. They are entirely too powerful. Is there some way to prevent this?