zlacker

Does Cloudflare’s 1.1.1.1 DNS Block Archive.is? (2019)

submitted by lolind+(OP) on 2023-08-02 13:36:45 | 246 points 172 comments
[view article] [source] [links] [go to bottom]
replies(29): >>wkat42+s8 >>lol768+Q8 >>7sovar+09 >>cj+J9 >>jeroen+za >>freedo+Ka >>hk1337+Pa >>diogoc+Db >>kalleb+4c >>electr+yd >>adithy+8e >>ChrisA+Ee >>stavro+if >>fastba+og >>mellos+Pg >>waithu+Rg >>reject+Vl >>Goz3rr+mm >>ishanj+qm >>babypu+6t >>therea+YB >>brirec+PC >>obitua+vI >>wnevet+zS >>msravi+UX >>8chanA+X21 >>below4+ob2 >>News-D+rs2 >>anuraa+Sa3
1. wkat42+s8[view] [source] 2023-08-02 14:17:12
>>lolind+(OP)
Maybe they need it to route the traffic to the right CDN? That kinda would make sense.

While I'm very privacy conscious, I don't really see the benefit to hiding my region in the DNS request. Because the very next step after the DNS is my browser making a request to their webserver, at which time they will have my actual complete IP anyway.

replies(3): >>philwe+p9 >>jrockw+Sa >>jeroen+Qc
2. lol768+Q8[view] [source] 2023-08-02 14:18:43
>>lolind+(OP)
Previous discussions:

Tell HN: Archive.is inaccessible via Cloudflare DNS (1.1.1.1) >>19828317

- This particular discussion includes a comment from Cloudflare's CEO, referenced in the article: >>19828702

Why does 1.1.1.1 not resolve archive.is? >>21155056

- StackExchange question, on the subject

Does Cloudflare's 1.1.1.1 DNS Block Archive.is? (2019) >>28495204

- Discussion of this blog post

replies(1): >>38+Ib
3. 7sovar+09[view] [source] 2023-08-02 14:19:30
>>lolind+(OP)
Hmm, no clue but if i ask 1.1.1.1 for the a record for archive.is i get 89.253.237.217

asking the office DNS the same question i get 51.38.69.52, asking 9.9.9.9 it gives me the same IP as the office DNS. Finaly asking google or 8.8.8.8 i also get 51.38.69.52

So i think their record is borked.

replies(2): >>bombca+S9 >>obitua+1G
◧◩
4. philwe+p9[view] [source] [discussion] 2023-08-02 14:21:33
>>wkat42+s8
This is actually addressed in the original HN comment the post links to (>>19828702 ):

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

replies(2): >>eastda+Lb >>wkat42+ld
5. cj+J9[view] [source] 2023-08-02 14:22:33
>>lolind+(OP)
Comment from Cloudflare CEO from 2019: >>19828702

Surfacing here for people who like to read comments before clicking through to the article.

TLDR: the site owner was returning wrong DNS responses for people using Cloudflare's 1.1.1.1 DNS service because the site owner doesn't like Cloudflare.

replies(3): >>lolind+da >>photon+Um >>flutas+dv
◧◩
6. bombca+S9[view] [source] [discussion] 2023-08-02 14:23:29
>>7sovar+09
Supposedly Cloudflare uses a feature of DNS archive.* doesn't like, or vice versa.

Nobody cares; the reality is if you use CF DNS, shit don't work.

replies(4): >>nuker+ha >>jeroen+5b >>joseph+Fb >>cesarb+AE
◧◩
7. lolind+da[view] [source] [discussion] 2023-08-02 14:25:05
>>cj+J9
They still are! I recently switched to Cloudflare DNS and noticed all the archive links people post on HN stopped working.
◧◩◪
8. nuker+ha[view] [source] [discussion] 2023-08-02 14:25:31
>>bombca+S9
Im using iCloud Private Relay, and it affects me.
replies(1): >>almost+Fa
9. jeroen+za[view] [source] 2023-08-02 14:26:53
>>lolind+(OP)
I don't know for sure what's going on with the DNS. I know the archive.* website messes with Cloudflare's DNS results because they don't know how to set up anycast, but when I use some external tool to look up the right address and hardcode that I still get either a TLS error or "hello world".

archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion still works fine if you don't want to share your geolocation information with every DNS server in the recursive resolver chain.

◧◩◪◨
10. almost+Fa[view] [source] [discussion] 2023-08-02 14:27:15
>>nuker+ha
I’m using iCloud Private Relay and it works fine.
replies(2): >>kalleb+le >>mdasen+gg
11. freedo+Ka[view] [source] 2023-08-02 14:27:31
>>lolind+(OP)
Cloudflare CEO Matthew Prince answered this directly on HN: >>19828702

Most relevant piece but the whole comment is worth a read:

> Archive.is’s authoritative DNS servers return bad results to 1.1.1.1 when we query them. I’ve proposed we just fix it on our end but our team, quite rightly, said that too would violate the integrity of DNS and the privacy and security promises we made to our users when we launched the service.

> The archive.is owner has explained that he returns bad results to us because we don’t pass along the EDNS subnet information. This information leaks information about a requester’s IP and, in turn, sacrifices the privacy of users.

Honestly it's that type of thing (the frankness, the presence on HN, willingness to participate, the principled stand on privacy) that got me into Cloudflare products. I now generate hundreds per month in revenue for them and that will likely be thousands in the next year or two. His time/effort on HN directly led to customer acquisition and revenue.

That said I do worry about the incentives Cloudflare has to their big customers. CF is a great tool for site owners, but like any tool has the potential to be a great evil (against the user) if the principles ever wane. It's already being used by a lot of sites to make life a living hell for people behind a VPN. As a site owner I absolutely get it: practically zero of my legitimate traffic comes from VPNs (our main demographic tend to skew older and much less technical than the average consumer), but all of the automated attacks against me do. Balancing freedom and rights is hard, but I deeply appreciate the thoughtfulness and principles that CF has displayed over the years.

replies(7): >>eastda+Wc >>lopken+1m >>deadal+iB >>throw0+MO >>johnkl+oS >>IggleS+nB2 >>Zuiii+wJ2
12. hk1337+Pa[view] [source] 2023-08-02 14:27:49
>>lolind+(OP)
Seems like a good reason not to be exclusive with a single DNS service.
replies(1): >>wkat42+Od
◧◩
13. jrockw+Sa[view] [source] [discussion] 2023-08-02 14:27:55
>>wkat42+s8
eastdakota's original comment covers this. The DNS request isn't encrypted, so anyone with control over the network (upstream ISPs via warrants) can use this information to figure out who is attempting to visit. ("Someone is resolving example.com" is less information than "someone in LA is resolving example.com") Meanwhile, the actual HTTPS connection leaks less information. If the website is hosted on a CDN or cloud provider, then someone monitoring the IP traffic only knows that you're visiting something hosted by that CDN. ("The target is visiting a Cloudflare-hosted site" is less information than "The target is visiting example.com") So, there is a slight information leak by sending the geolocation information.

On the other hand, it's possible this doesn't matter. The client might not encrypt the host it's trying to visit. Nation states can correlate packet timing. So if someone really wants to know, they'll probably figure it out. (This is always a risk with things like Tor. If the government is monitoring your connection and some target website's connection, and you are sending a lot of packets at the same time they're receiving a lot of packets, you can guess who is talking to who.)

replies(1): >>cortes+4I
◧◩◪
14. jeroen+5b[view] [source] [discussion] 2023-08-02 14:29:06
>>bombca+S9
It's not just Cloudflare, it's any DNS resolver that doesn't implement EDNS extensions. If you (or the company you work for) run a recursive resolver that doesn't submit such data, you'll run into the same issues.

I've switched to archive.org because archive.* is broken. For stuff that .org doesn't have, there's always the Tor version. The Tor address seems to be more responsive as well, so that's nice.

15. diogoc+Db[view] [source] 2023-08-02 14:31:28
>>lolind+(OP)
This is obviously not Cloudflare's fault, but I wonder why they don't just mask their identity (e.g. by using a random AWS IP address) when querying archive.is?

AFAICT this wouldn't "violate the integrity of DNS and the privacy and security promises we made to our users" and would solve a big pain point of using 1.1.1.1.

replies(2): >>freedo+Zc >>eastda+Id
◧◩◪
16. joseph+Fb[view] [source] [discussion] 2023-08-02 14:31:30
>>bombca+S9
> Nobody cares; the reality is if you use CF DNS, shit don't work.

This is super misleading because it ignores the fact that archive.* goes out of their way to make CF DNS not work.

replies(2): >>xnyant+Aj >>flutas+Iv
◧◩
17. 38+Ib[view] [source] [discussion] 2023-08-02 14:31:37
>>lol768+Q8
since your formatting is weird, here is the direct link to the stack exchange question:

https://webapps.stackexchange.com/questions/135222

◧◩◪
18. eastda+Lb[view] [source] [discussion] 2023-08-02 14:31:46
>>philwe+p9
And today it’s over 250. And the only site I’m aware of that objects to us protecting user privacy by making EDNS more private is this one. ¯\_(ツ)_/¯
replies(2): >>mikeco+Vm >>dmvdou+bA
19. kalleb+4c[view] [source] 2023-08-02 14:33:11
>>lolind+(OP)
Lately I've run into the issue that they're also blocking iCloud Private Relay. Although for some reason the block is only affecting me over IPv6, if I disable v6 it works, which led me to waste a bunch of time debugging. The seemingly anti-privacy blocks by archive and the fact that nobody knows who funds this extremely popular service has led me down conspiratorial thought patterns.
replies(1): >>TechBr+xf
◧◩
20. jeroen+Qc[view] [source] [discussion] 2023-08-02 14:36:23
>>wkat42+s8
I've talked to some people working for the .nl TLD. They collect logs on DNS requests for every .nl domain to mine data about phishing websites and online scams. They're not using the EDNS information as far as I know (that would be very very illegal) and I don't know what the introduction of the GDPR has done to their research, but TLDs not limited by privacy laws such as American companies can do whatever they want.

It's not just the website's DNS server that received your subnet information; it's every single location in the chain of DNS resolvers. That includes TLD servers run by data mining companies. Does Verisign need to know that 2001:2345:6789::abcd is looking for news.ycombinator.com?

With caching in place these methods of data gathering aren't all-encompassing, but if you visit some new or uncommon domains you'll be more likely to become part of the dataset.

replies(1): >>Arnavi+cL
◧◩
21. eastda+Wc[view] [source] [discussion] 2023-08-02 14:36:58
>>freedo+Ka
In this particular case we truncate EDNS to protect the privacy of users because we believe 1) privacy is a fundamental human right; and 2) the original sin of the Internet is that IP addresses are too closely tied to the identities of individuals and services. Truncating EDNS is trying to honor #1 and overcome #2. So is our work on protocols like Oblivious DNS. This work, frankly, upsets some of our customers or potential customers (like Archive.is). But it’s the right thing to do for the long term health of the Internet.
replies(11): >>freedo+te >>supriy+Ne >>nullin+qq >>tomp+9B >>adql+PF >>ninjag+sG >>pierat+jL >>btown+W51 >>jshier+P91 >>polski+fF2 >>Zuiii+kK2
◧◩
22. freedo+Zc[view] [source] [discussion] 2023-08-02 14:37:03
>>diogoc+Db
I'm not affiliated with CF at all, but if I were I would oppose that idea on a couple levels.

Philosophically I think that lacks respect for the site owner and it would be wrong to deceive them and go against their wishes.

Pragmatically that sounds like a giant maintenance pain in the ass to manage, and not worth the time/money to make somebody's site work who actively doesn't want it to work.

◧◩◪
23. wkat42+ld[view] [source] [discussion] 2023-08-02 14:37:58
>>philwe+p9
Yeah but if the site standardized on EDNS to get this information, it's rather difficult to do something different just for Cloudflare.
replies(1): >>p1mrx+jg
24. electr+yd[view] [source] 2023-08-02 14:39:01
>>lolind+(OP)
Intransigent maintainers are such an irritating problem. Any time a maintainer has some strongly-held beliefs or goals that supersede their desire to serve users, you've got a ticking time bomb. When the two clash, they'll decline to serve users in order to serve their strongly-held belief instead. We see it time and time again.
replies(2): >>ninjag+8J >>whoopd+3P
◧◩
25. eastda+Id[view] [source] [discussion] 2023-08-02 14:39:25
>>diogoc+Db
We’ve tried. The owner of Archive.is actively monitors and then returns bad results. This is true even if we recurse through another recursor. It’s a very odd hill to die on.
replies(3): >>datafl+ne >>diogoc+tg >>Fabric+5i
◧◩
26. wkat42+Od[view] [source] [discussion] 2023-08-02 14:39:50
>>hk1337+Pa
I don't think this will help. It still returns an IP, it's just wrong. Setting a second DNS won't help if the first one returns a response.
27. adithy+8e[view] [source] 2023-08-02 14:41:39
>>lolind+(OP)
Cloudflare is also hurting peering and ggc to Google on my ISP.

When I use google dns, opendns or even my isp's own dns, the ip I get for example, googlevideo.com resolves to my isp's cache. But with cloudflare it gives my a google ip and I get no cache benefits.

Also, anecdotal evidence, uploading and downloading large files to Google Drive and some other websites is significantly faster when I use google dns or opendns. I'm not sure how that works, but maybe the server's returning an ip my isp can't route to in a fast way? My isp is notorious for having bad routes.

◧◩◪◨⬒
28. kalleb+le[view] [source] [discussion] 2023-08-02 14:42:30
>>almost+Fa
I use iCloud Private Relay and it only affects me over IPv6. Disabling either private relay or ipv6 "fixes" it
◧◩◪
29. datafl+ne[view] [source] [discussion] 2023-08-02 14:42:35
>>eastda+Id
I think I'm missing something, but is there a way you can pass along some some sort of vague location info for caching purposes without revealing too much? From their tweet they mentioned even continent level information isn't available, which I can understand. Is there really no middle ground that works here?
replies(2): >>afavou+Sh >>xnyant+Ji
◧◩◪
30. freedo+te[view] [source] [discussion] 2023-08-02 14:43:00
>>eastda+Wc
More of a meta comment, but thank you for your willingess to upset some customers and potential customers. Having and standing by principles can be damn inconvenient at times, but the world is a much better place because of it.
replies(2): >>adql+fG >>nullin+PN
31. ChrisA+Ee[view] [source] 2023-08-02 14:43:52
>>lolind+(OP)
(2019)

Did this need to be posted again when it was discussed and answered already?

replies(1): >>Goz3rr+il
◧◩◪
32. supriy+Ne[view] [source] [discussion] 2023-08-02 14:44:50
>>eastda+Wc
Sure, we’re to believe that, given that you’re trying to lock out Linux users[1] (which still isn't resolved yet) and pushing for device attestation[2] to lock out rooted devices at the same time.

[1] >>36197401

[2] https://www.ietf.org/archive/id/draft-private-access-tokens-...

replies(4): >>afavou+xg >>pessim+Yg >>brooks+o41 >>ftaghn+c61
33. stavro+if[view] [source] 2023-08-02 14:46:40
>>lolind+(OP)
I talked to the maintainer of archive.is years ago, they said this (hopefully they won't mind me posting):

> There have been numerous attacks where people upload illegal content (childporn or isis propaganda) and immediately reported to the authorities near the IP of the archive. It resulted in ceased servers and downtimes. I just have no time to react. So I developed sort of CDN, with the only difference: DNS server returns not the closest IP to the request origin but the closest IP abroad, so any takedown procedure would require bureaucratic procedures so I am getting notified notified and have time to react.

> But CloudFlare DNS disrupts the scheme together with all other DNS-based CDNs Cloudflare is competing with and puts the archive existence on risk. I offered them to proxy those CloudFlare DNS's users via their CDN but they rejected. Registering my own autonomous system just to fix the issue with CloudFlare DNS is too expensive for me.

When I proposed using the DNS server's IP instead, they said:

> It did not work initially because they have global planetwide cache.

> 1. Someone resolves domain from Brazil.

> 2. Website's DNS get request from Cloudflare Brazil DC.

> 3. The result is replicated to other Cloudflare DCs

> 4. Some from Turkey resolves same domain and get the cached value

> It could be worked around by setting tiny TTL, which would slowly end up in consistent results, but... After "I’ve proposed we just fix it on our end .." all requests for 7 archive.* domains are sent from Symantec USA IP

replies(2): >>codetr+Ug >>flango+Ha2
◧◩
34. TechBr+xf[view] [source] [discussion] 2023-08-02 14:48:23
>>kalleb+4c
Cloudflare is one of the operators of egress nodes for iCloud Private Relay, along with Akamai and Fastly and maybe some others (IIRC). So you probably have issues with Archive.is when you're connected through Cloudflare. Although I'm not sure how DNS resolution works on private relay (since it's the DNS server rather than the egress proxy that causes the issue - but if the egress proxy is making the DNS requests then that would explain it).
replies(1): >>kalleb+3h
◧◩◪◨⬒
35. mdasen+gg[view] [source] [discussion] 2023-08-02 14:51:43
>>almost+Fa
iCloud Private Relay uses a variety of third parties for their network connectivity. If it's working fine, you might be going out via Fastly or someone else. The person who it's not working for is likely getting Cloudflare.

With iCloud Private Relay, it sometimes works for me and sometimes doesn't depending on which CDN's system I'm using at the time.

◧◩◪◨
36. p1mrx+jg[view] [source] [discussion] 2023-08-02 14:51:57
>>wkat42+ld
edns-client-subnet only provides an IP address; the receiving CDN still needs to geolocate it.

So the main difference is that Cloudflare's servers need to be present in the IP geolocation database. Given their prevalence, they're probably in most of them already.

37. fastba+og[view] [source] 2023-08-02 14:52:17
>>lolind+(OP)
I'm using 1.1.1.1 and I can go to archive.is – is this still relevant?
◧◩◪
38. diogoc+tg[view] [source] [discussion] 2023-08-02 14:52:33
>>eastda+Id
That's as annoying as it is impressive.
◧◩◪◨
39. afavou+xg[view] [source] [discussion] 2023-08-02 14:52:43
>>supriy+Ne
Your link for [1] shows that CF responsed, confirmed the bug and that they fixed it. If that’s not actually the case have you tried engaging with them again? They seemed very responsive the first time.
replies(1): >>supriy+Pi
40. mellos+Pg[view] [source] 2023-08-02 14:53:56
>>lolind+(OP)
Tangentially, various network providers (eg. some mobile networks) block access to some archive sites (particularly the Internet Archive as it's the most well known one) on the basis of them containing adult/pirated content.
41. waithu+Rg[view] [source] 2023-08-02 14:54:09
>>lolind+(OP)
While archive.is' reaction is questionable (and even then, its their own server and can do whatever they want with it) this blog post is throughout Cloudflare advertising. The CEO used the scenario to their advantage very cleverly, but this blog post could describe all of that without constantly reminding how wonderful CF is.
replies(1): >>pessim+ki
◧◩
42. codetr+Ug[view] [source] [discussion] 2023-08-02 14:55:30
>>stavro+if
This makes a lot of sense, and this comment should be higher.

The other comments that only present the Cloudflare side of the situation make it sound like the archive.is owner was being unreasonable, but as we see there is more to it!

I personally tried to use 1.1.1.1 as my resolver a couple of years ago but I use archive.is a lot.

Regardless of who is “at fault”, not being able to access archive.is is a dealbreaker for me so I quickly stopped using 1.1.1.1

But Cloudflare has a lot of other things that work well for me.

◧◩◪◨
43. pessim+Yg[view] [source] [discussion] 2023-08-02 14:55:47
>>supriy+Ne
I have huge problems with Cloudflare, but this comment is dishonest.

[1] "Hello, Benedikt from Cloudflare and the Turnstile Team here. Thanks you so much for the report. We looked into this report and identified that there was some false positive and cleared the signal. We have investigated this report and the issue should be fixed. Please reach out to me benedikt@cloudflare.com or at our Cloudflare Turnstile Discord, if you are still encountering problems."

[2]

> Servers commonly use passive and persistent identifiers associated with clients, such as IP addresses or device identifiers, for enforcing access and usage policies. For example, a server might limit the amount of content an IP address can access over a given time period (referred to as a "metered paywall"), or a server might rate-limit access from an IP address to prevent fraud and abuse. Servers also commonly use the client's IP address as a strong indicator of the client's geographic location to limit access to services or content to a specific geographic area (referred to as "geofencing").

> However, passive and persistent client identifiers can be used by any entity that has access to it without the client's express consent. A server can use a client's IP address or its device identifier to track client activity. A client's IP address, and therefore its location, is visible to all entities on the path between the client and the server. These entities can trivially track a client, its location, and servers that the client visits.

> A client that wishes to keep its IP address private can hide its IP address using a proxy service or a VPN. However, doing so severely limits the client's ability to access services and content, since servers might not be able to enforce their policies without a stable and unique client identifier.

> This document describes an architecture for Private Access Tokens (PATs), using RSA Blind Signatures as defined in [BLINDSIG], as an explicit replacement for these passive client identifiers. These tokens are privately issued to clients upon request and then redeemed by servers in such a way that the issuance and redemption events for a given token are unlinkable.

replies(1): >>supriy+7t
◧◩◪
44. kalleb+3h[view] [source] [discussion] 2023-08-02 14:56:00
>>TechBr+xf
Ah that would explain it!
replies(1): >>savefe+eR1
◧◩◪◨
45. afavou+Sh[view] [source] [discussion] 2023-08-02 14:59:38
>>datafl+ne
From another post the CEO made it sounds like they could do a bunch of things but don’t think they should. Which I understand. Once you start adding workarounds for specific domains I can imagine the whole thing spiralling quickly. The owner of archive.is doesn’t want the traffic, CF probably shouldn’t move heaven and earth in response.
replies(1): >>datafl+0l
◧◩◪
46. Fabric+5i[view] [source] [discussion] 2023-08-02 15:00:34
>>eastda+Id
Have you guys considered just having the resolver not return anything? Such that my system would fallback to another resolver (such as Google or Quad9) and I wouldn't have issues accessing the site?

I guess that still has the privacy implications.. but at least it would work!

replies(1): >>dreadl+5r
◧◩
47. pessim+ki[view] [source] [discussion] 2023-08-02 15:01:14
>>waithu+Rg
Or, they could do it while constantly reminding people how wonderful Cloudflare is, just because they want to. I'm not sure why supposed to be wrong to honestly advertise.
replies(1): >>tiltow+vr
◧◩◪◨
48. xnyant+Ji[view] [source] [discussion] 2023-08-02 15:02:59
>>datafl+ne
Continent-level information doesn't exist. EDNS Client Subnet doesn't send a location, it sends a subnet. Its "location" then has to be looked up in geolocation databases which may or may not be accurate. There's no subnet that will map to a continent.
replies(1): >>DanAtC+5x
◧◩◪◨⬒
49. supriy+Pi[view] [source] [discussion] 2023-08-02 15:03:30
>>afavou+xg
CF (like many other companies) are responsive only when the complaint is posted on HN. Regardless, the issue wasn't solved, it came back within a few hours.

I've tried raising this issue on their forum, where I've failed to get the attention of the engineering teams, and while posting the ray ID should be sufficient, all you'd really get is clueless, unpaid volunteers asking you questions in circles like "what website do you see this on" (everywhere), "are you using adblock" (no, and Adblock has never blocked their Turnstile scripts) and "what's your user agent?" (the default Chromium one).

If I had to hazard a guess, it's their bot management script seeing "Linux" in the user agent and detecting missing video codecs (which is par for the course for standard Chromium builds), and thinking it's a headless browser. Between the the fact that differences between the JS runtime of Chromium and Chromium headless are very small these days, and the ClientHello permutation has destroyed bot management vendors' ability to distinguish different browser builds, they decided blocking all Linux users using Chromium was fair enough.

replies(4): >>afavou+7j >>theamk+Rx >>obitua+UC >>NicoJu+cM
◧◩◪◨⬒⬓
50. afavou+7j[view] [source] [discussion] 2023-08-02 15:05:13
>>supriy+Pi
Are you sure this is a widespread, universal bug? Are you sure all Linux Chromium users are affected?

I get that it's a frustrating situation but you're viewing CF in the worst possible light ("trying to lock out Linux users" assumes an intent not on display) and I think it's counterproductive to success.

replies(1): >>freedo+vv
◧◩◪◨
51. xnyant+Aj[view] [source] [discussion] 2023-08-02 15:07:10
>>joseph+Fb
Doesn't really change anything for the end-user that wants to access the website and is bummed that it doesn't work. There might be politics in the way but all they care is that it doesn't work.
◧◩◪◨⬒
52. datafl+0l[view] [source] [discussion] 2023-08-02 15:14:09
>>afavou+Sh
I don't see what I proposed as a domain specific workaround, it should be done for all domains I think.
◧◩
53. Goz3rr+il[view] [source] [discussion] 2023-08-02 15:15:07
>>ChrisA+Ee
For me it worked for a while, and has broken again earlier this year.
54. reject+Vl[view] [source] 2023-08-02 15:17:26
>>lolind+(OP)
I switched to https://controld.com/free-dns

Can also do DNS adblock! :)

◧◩
55. lopken+1m[view] [source] [discussion] 2023-08-02 15:17:40
>>freedo+Ka
This is honestly such a tone-deaf answer. At the end of the day, users don't care about the purity of adherence to some far-down technical principles or details. As a product leader, you should task your team to solve real user problems and not spend literal years arguing about EDNS.

Truly, just imagine the user story:

"I can't access this website."

"No worries! That is by design, because the protocol response returned to CF is illegal, and the server simply propagates the error back to you. It would be impure for CF to modify the response in-flight to fix this for you."

"?? I do not care. I am talking to CF, why can't CF just fix the issue?"

replies(1): >>doglea+fo
56. Goz3rr+mm[view] [source] 2023-08-02 15:19:08
>>lolind+(OP)
If you're using a Pi-hole for your DNS (or anything else using dnsmasq I suppose), I worked around the issue by creating /etc/dnsmasq.d/02-archive.is.conf (with a Docker bind mount in my case) with the following content:

    server=/archive.today/8.8.8.8
    server=/archive.today/8.8.4.4
    server=/archive.ph/8.8.8.8
    server=/archive.ph/8.8.4.4
    server=/archive.is/8.8.8.8
    server=/archive.is/8.8.4.4
    server=/archive.li/8.8.8.8
    server=/archive.li/8.8.4.4
    server=/archive.vn/8.8.8.8
    server=/archive.vn/8.8.4.4
    server=/archive.fo/8.8.8.8
    server=/archive.fo/8.8.4.4
    server=/archive.md/8.8.8.8
    server=/archive.md/8.8.4.4
    server=/archive.to/8.8.8.8
    server=/archive.to/8.8.4.4
This way you use 1.1.1.1 for everything, except the domains listed above where it uses Google DNS instead.
replies(2): >>croes+Gw >>ninjag+GH
57. ishanj+qm[view] [source] 2023-08-02 15:19:31
>>lolind+(OP)
I am in India, using 1.1.1.1 over DoT and it appears to be working okay.

I am served IP addresses with relatively short TTLs (1-5minutes) that are in Moscow and North Holland.

◧◩
58. photon+Um[view] [source] [discussion] 2023-08-02 15:21:22
>>cj+J9
And the reason they do that is quite reasonable. CF is just being a pain
◧◩◪◨
59. mikeco+Vm[view] [source] [discussion] 2023-08-02 15:21:25
>>eastda+Lb
"Protecting user privacy", from the largest MITM attackers on the internet, is laughable.
replies(1): >>freedo+Uz
◧◩◪
60. doglea+fo[view] [source] [discussion] 2023-08-02 15:26:49
>>lopken+1m
As creators, it’s our job to care about these things for the benefit of users BECAUSE they’re laypeople.
◧◩◪
61. nullin+qq[view] [source] [discussion] 2023-08-02 15:36:01
>>eastda+Wc
I use Quad9 because of this reason. CF will also misdirect Exchange Online connections which can significantly impact client performance.

It would be great if CF offered a choice, like Quad9.

replies(1): >>rovr13+3K
◧◩◪◨
62. dreadl+5r[view] [source] [discussion] 2023-08-02 15:38:38
>>Fabric+5i
The whole point is that they don't want to break any core DNS functionality with a band aid fix just because one website doesn't like it.
◧◩◪
63. tiltow+vr[view] [source] [discussion] 2023-08-02 15:40:30
>>pessim+ki
Many people think any form of advertising is evil. Though incorrect, it's perhaps a predictable reaction to the pervasive and genuinely morally bankrupt advertising we're inundated with on a regular basis.
64. babypu+6t[view] [source] 2023-08-02 15:47:11
>>lolind+(OP)
If Archive.is doesn't want to respond to valid DNS requests then I don't see a reason to use or support them.
◧◩◪◨⬒
65. supriy+7t[view] [source] [discussion] 2023-08-02 15:47:14
>>pessim+Yg
Please see [1] regarding the concerns around attestations and PAT and [2] for what has happened outside HN, which a simple reading of that thread wouldn't otherwise suggest.

[1] >>36972051

[2] >>36971869

◧◩
66. flutas+dv[view] [source] [discussion] 2023-08-02 15:56:20
>>cj+J9
> the site owner was returning wrong DNS responses for people using Cloudflare's 1.1.1.1 DNS service because the site owner doesn't like Cloudflare.

Or you can try to not imagine everyone as hating everything and read the other comment in here posting the archive.* side of the story.

> There have been numerous attacks where people upload illegal content (childporn or isis propaganda) and immediately reported to the authorities near the IP of the archive. It resulted in ceased servers and downtimes. I just have no time to react. So I developed sort of CDN, with the only difference: DNS server returns not the closest IP to the request origin but the closest IP abroad, so any takedown procedure would require bureaucratic procedures so I am getting notified notified and have time to react.

> But CloudFlare DNS disrupts the scheme together with all other DNS-based CDNs Cloudflare is competing with and puts the archive existence on risk. I offered them to proxy those CloudFlare DNS's users via their CDN but they rejected. Registering my own autonomous system just to fix the issue with CloudFlare DNS is too expensive for me.

◧◩◪◨⬒⬓⬔
67. freedo+vv[view] [source] [discussion] 2023-08-02 15:57:33
>>afavou+7j
I am exclusively a Linux user and have multiple machines/distros/etc and can test. Can you post a link that loading will demonstrate the issue?
replies(1): >>arp242+mS
◧◩◪◨
68. flutas+Iv[view] [source] [discussion] 2023-08-02 15:58:22
>>joseph+Fb
> goes out of their way to make CF DNS not work.

No, they go out of their way to make a system that can handle people trying to abuse it. Cloudflare doesn't like that system and refuses to help them.

> There have been numerous attacks where people upload illegal content (childporn or isis propaganda) and immediately reported to the authorities near the IP of the archive. It resulted in ceased servers and downtimes. I just have no time to react. So I developed sort of CDN, with the only difference: DNS server returns not the closest IP to the request origin but the closest IP abroad, so any takedown procedure would require bureaucratic procedures so I am getting notified notified and have time to react.

> But CloudFlare DNS disrupts the scheme together with all other DNS-based CDNs Cloudflare is competing with and puts the archive existence on risk. I offered them to proxy those CloudFlare DNS's users via their CDN but they rejected. Registering my own autonomous system just to fix the issue with CloudFlare DNS is too expensive for me.

replies(1): >>joseph+xK
◧◩
69. croes+Gw[view] [source] [discussion] 2023-08-02 16:02:17
>>Goz3rr+mm
And you leak your location, don't you?
replies(5): >>therea+Pz >>ploxil+mC >>adql+UG >>adql+gI >>stock_+JY
◧◩◪◨⬒
70. DanAtC+5x[view] [source] [discussion] 2023-08-02 16:03:58
>>xnyant+Ji
Network blocks are issued by regional registries: https://upload.wikimedia.org/wikipedia/commons/9/95/Regional...
◧◩◪◨⬒⬓
71. theamk+Rx[view] [source] [discussion] 2023-08-02 16:07:09
>>supriy+Pi
Pretty sure you are wrong - I run Linux on both my desktop and laptops; and moreover everyone in our engineering team runs Linux as main OS as well. We haven't seen any Cloudfare-specific problems.

(I have no doubt ypu are seeing the problem on your PC; but generalizing a single point to all Linux users just screams "technical incompetence" and makes me want to ignorw the post)

◧◩◪
72. therea+Pz[view] [source] [discussion] 2023-08-02 16:15:21
>>croes+Gw
as does your IP. Where is the win?
◧◩◪◨⬒
73. freedo+Uz[view] [source] [discussion] 2023-08-02 16:15:37
>>mikeco+Vm
> from the largest MITM attackers

If that were true, there's a lot of really stupid people throwing away their money by paying CF to hack them.

◧◩◪◨
74. dmvdou+bA[view] [source] [discussion] 2023-08-02 16:16:28
>>eastda+Lb
Right, the site full of nerds who think archive.is and co. is a cool toy. Dilemma! ;)
◧◩◪
75. tomp+9B[view] [source] [discussion] 2023-08-02 16:20:29
>>eastda+Wc
> This work, frankly, upsets some of our customers or potential customers (like Archive.is).

That's a bit unfair, don't you think?

From what I remember of the saga, the original reason for Archive.is's block is that they run their own CDN, and by not knowing the location of the user, they can't determine the closest server to respond with.

edit: found source https://twitter.com/archiveis/status/1018691421182791680

So the alternative viewpoint is, that Cloudflare is being anti-competitive by technically preventing other CDN providers from working.

Disclosure: I'm a happy Cloudflare user, but all in all I think Archive.is service is far more fundamental for the internet (especially as it's 100% free!). So I would really appreciate if you could figure out a way of working together. Until then, 8.8.8.8 it is!

replies(2): >>yellow+eD >>meindn+Eh1
◧◩
76. deadal+iB[view] [source] [discussion] 2023-08-02 16:20:55
>>freedo+Ka
Cloudflare banned 8chan without a legal requirement to do so. They banned it based on moral reasons.
77. therea+YB[view] [source] 2023-08-02 16:23:42
>>lolind+(OP)
Any alternatives which support DoH, DoT, DoQ and do not think they need to reinvent (E)DNS ?

Google works but I want to keep a little distance from them. Also no big fan of Quad9. So what else to use and which is distributed World Wide?

replies(1): >>silisi+iB1
◧◩◪
78. ploxil+mC[view] [source] [discussion] 2023-08-02 16:24:45
>>croes+Gw
... less than when you connect to the archive.is servers for http requests
replies(1): >>akira2+9Y
79. brirec+PC[view] [source] 2023-08-02 16:26:37
>>lolind+(OP)
One way you can get around this and still use 1.1.1.1 for most sites would be to use a local recursive resolver that supports domain name-based upstream overrides such as dnsmasq, and setting that as your local resolver.

You can run dnsmasq on anything that can run arbitrary services e.g. on your local workstation, or on your router if it is open enough, or even on something like Termux probably.

◧◩◪◨⬒⬓
80. obitua+UC[view] [source] [discussion] 2023-08-02 16:27:28
>>supriy+Pi
You don't have to "hazard a guess", one of their engineers gave you their email address in that other thread. They also invited you to their discord. Have you tried talking to someone directly at the source?
◧◩◪◨
81. yellow+eD[view] [source] [discussion] 2023-08-02 16:29:12
>>tomp+9B
> they run their own CDN, and by not knowing the location of the user, they can't determine the closest server to respond with.

I feel like the more reasonable answer here is to just let the user take the latency hit. Surely requests being somewhat slower is preferable to requests being outright bitbucketed, right?

replies(3): >>adql+4F >>godels+aq1 >>dotBen+ty1
◧◩◪
82. cesarb+AE[view] [source] [discussion] 2023-08-02 16:34:49
>>bombca+S9
> Supposedly Cloudflare uses a feature of DNS archive.* doesn't like, or vice versa.

From what I understand, it's the opposite: Cloudflare doesn't use a relatively new feature of DNS (EDNS Client Subnet), and that site doesn't like the lack of that feature.

◧◩◪◨⬒
83. adql+4F[view] [source] [discussion] 2023-08-02 16:37:32
>>yellow+eD
Right but then working slow looks like archive.is issue but is ultimately caused by cloudflare.

CF is bascically saying "we can know your IP but not the site you are trying to resolve" (that will know your IP anyway once you navigate there).

replies(2): >>yellow+hc1 >>jrochk+Mvb
◧◩◪
84. adql+PF[view] [source] [discussion] 2023-08-02 16:41:04
>>eastda+Wc
User will navigate to the site and show their own IP anyway. You achieved basically zero increase in privacy while making any competitor have problems with any of their users that use 1.1.1.1

And any malicious client that tries to leak data via DNS can just ask for DNS record like my-ip-is-7.8.9.0.example.com and completely go around that privacy "enhancement".

Sorry but the "privacy" here looks like smokescreen to stifle competition.

replies(1): >>lolind+TO
◧◩
85. obitua+1G[view] [source] [discussion] 2023-08-02 16:42:05
>>7sovar+09
I get the same result when I query 1.1.1.1 or 1.0.0.1 for archive.is:

    ┌
    └─(12:32:59)──> nslookup archive.is 1.1.1.1 
                                            
    Server:  1.1.1.1
    Address: 1.1.1.1#53

    Non-authoritative answer:
    Name: archive.is
    Address: 89.253.237.217

    ┌
    └─(12:38:12)──> nslookup archive.is 1.0.0.1
                                            
    Server:  1.0.0.1
    Address: 1.0.0.1#53

    Non-authoritative answer:
    Name: archive.is
    Address: 89.253.237.217
Wonder why that is happening...
◧◩◪◨
86. adql+fG[view] [source] [discussion] 2023-08-02 16:43:08
>>freedo+te
It's entirely smokescreen. Yes your DNS doesn't "leak" your IP... but server will immediately get the IP of the client on first try of connecting it.
replies(1): >>djbusb+BK
◧◩◪
87. ninjag+sG[view] [source] [discussion] 2023-08-02 16:43:56
>>eastda+Wc
So Stavros [1] indicates that archive.is needs that EDNS data to protect themselves against CSAM/ISIS material based attacks, and they suggested solutions but CF refused to cooperate. Is this true?

[1] >>36971650

replies(1): >>Thiez+i82
◧◩◪
88. adql+UG[view] [source] [discussion] 2023-08-02 16:45:45
>>croes+Gw
Do you know how DNS works ?

You as for a record, you get answer. You ask for IP adddress of archive.today, you get that IP

Then you connect to that IP

If your DNS doesn't leak client IP, the browser connecting to server IP will leak it.

It's entirely irrelevant protection that does nothing but makes competing on cdn harder.

replies(2): >>ninjag+OI >>gnopgn+dX
◧◩
89. ninjag+GH[view] [source] [discussion] 2023-08-02 16:48:36
>>Goz3rr+mm
Or you could just not use 1.1.1.1. There are other players in this space, and unless you are querying DNS but not connecting to the server to get content, the server is going to know your ip.
replies(1): >>Goz3rr+la3
◧◩◪
90. cortes+4I[view] [source] [discussion] 2023-08-02 16:50:33
>>jrockw+Sa
> If the website is hosted on a CDN or cloud provider, then someone monitoring the IP traffic only knows that you're visiting something hosted by that CDN.

This isn't true, because the request leaks the hostname in the handshake via SNI:

https://en.wikipedia.org/wiki/Server_Name_Indication

replies(1): >>pigeon+ZN
◧◩◪
91. adql+gI[view] [source] [discussion] 2023-08-02 16:51:17
>>croes+Gw
As you do when you connect to any website ?
92. obitua+vI[view] [source] 2023-08-02 16:52:16
>>lolind+(OP)
Strangely, I get a Russian IP address for an answer when I query 1.1.1.1 for archive.is:

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:32:59)──> nslookup archive.is 1.1.1.1                                                                          ──(Wed,Aug02)─┘
    Server:        1.1.1.1
    Address:    1.1.1.1#53

    Non-authoritative answer:
    Name:    archive.is
    Address: 89.253.237.217

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:38:12)──> nslookup archive.is 1.0.0.1                                                                          ──(Wed,Aug02)─┘
    Server:        1.0.0.1
    Address:    1.0.0.1#53

    Non-authoritative answer:
    Name:    archive.is
    Address: 89.253.237.217

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:38:14)──> whois 89.253.237.217                                                                                 ──(Wed,Aug02)─┘
    % IANA WHOIS server
    % for more information on IANA, visit http://www.iana.org
    % This query returned 1 object

    refer:        whois.ripe.net

    inetnum:      89.0.0.0 - 89.255.255.255
    organisation: RIPE NCC
    status:       ALLOCATED

    whois:        whois.ripe.net

    changed:      2005-06
    source:       IANA

    # whois.ripe.net

    inetnum:        89.253.232.0 - 89.253.239.255
    org:            ORG-RL31-RIPE
    netname:        RU-RUSONYX-NET6
    descr:          Network for Rusonyx infrastructure
    country:        RU
    mnt-lower:      MNT-RUSONYX
    mnt-routes:     MNT-RUSONYX
    admin-c:        VZ1716-RIPE
    admin-c:        VZ1717-RIPE
    tech-c:         VZ1716-RIPE
    status:         ASSIGNED PA
    mnt-by:         MNT-RUSONYX
    created:        2018-10-10T09:53:33Z
    last-modified:  2018-10-16T12:37:40Z
    source:         RIPE # Filtered

    organisation:   ORG-RL31-RIPE
    org-name:       Rusonyx, Ltd.
    country:        RU
    org-type:       LIR
    address:        5th st. Yamskogo Polya, 9, office 19
    address:        125040
    address:        Moscow
    address:        RUSSIAN FEDERATION
    phone:          +74951370701
    fax-no:         +74951370701
    mnt-ref:        RIPE-NCC-HM-MNT
    mnt-ref:        MNT-RUSONYX
    mnt-by:         RIPE-NCC-HM-MNT
    mnt-by:         MNT-RUSONYX
    abuse-c:        AD11015-RIPE
    created:        2006-08-18T09:59:51Z
    last-modified:  2022-10-06T11:18:08Z
    source:         RIPE # Filtered

    person:         Viktor Zverkov
    address:        P.O. Box 19
    address:        127137, Moscow, Russia
    address:        Rusonyx ltd.
    phone:          +7 495 5089959
    nic-hdl:        VZ1716-RIPE
    mnt-by:         MNT-RUSONYX
    created:        2017-09-20T11:29:16Z
    last-modified:  2022-07-05T14:00:10Z
    source:         RIPE

    person:         Viktor Zaytsev
    address:        P.O. Box 19 , Russia
    address:        127137, Moscow
    address:        Rusonyx ltd.
    phone:          +7 495 5089959
    nic-hdl:        VZ1717-RIPE
    mnt-by:         MNT-RUSONYX
    mnt-by:         AM65535-MNT
    created:        2017-09-20T11:54:54Z
    last-modified:  2018-08-02T17:21:31Z
    source:         RIPE

    % Information related to '89.253.232.0/21AS41535'

    route:          89.253.232.0/21
    descr:          RUSONYX-RU
    origin:         AS41535
    mnt-by:         MNT-RUSONYX
    created:        2017-11-24T09:34:37Z
    last-modified:  2017-11-24T09:34:37Z
    source:         RIPE

    % This query was served by the RIPE Database Query Service version 1.107 (DEXTER)
Not sure why this would be happening (looks like at least one other person in the thread is seeing same result).
◧◩◪◨
93. ninjag+OI[view] [source] [discussion] 2023-08-02 16:53:49
>>adql+UG
I was willing to give CF the benefit of the doubt, until other posters (and you) pointed out that this is a red herring. Also given Stavros' note [1] on how archive.is needs the EDNS data to protect themselves from CSAM/ISIS material based attacks and that they suggested solutions but CF refused to cooperate, I'm unsure of the motives behind these posters claiming CF is protecting privacy. Matthew Prince's motives in his truth-but-not-full-truth response are obvious.

[1] >>36971650

replies(1): >>NicoJu+ZU
◧◩
94. ninjag+8J[view] [source] [discussion] 2023-08-02 16:55:00
>>electr+yd
This case might not be one of an intransigent maintainers. Check out Stavros' note [1]

>>36971650

replies(1): >>electr+MY1
◧◩◪◨
95. rovr13+3K[view] [source] [discussion] 2023-08-02 16:58:41
>>nullin+qq
misdirect? What's happening with them?
replies(1): >>nullin+IL
◧◩◪◨⬒
96. joseph+xK[view] [source] [discussion] 2023-08-02 17:00:55
>>flutas+Iv
Isn't the Internet full of major websites that need to be able to handle that kind of abuse? If what archive.* did were really necessary to do so, then why haven't any other websites needed to do the same thing?
replies(1): >>rnd0+QR
◧◩◪◨⬒
97. djbusb+BK[view] [source] [discussion] 2023-08-02 17:01:02
>>adql+fG
But the DNS won't. Many times the DNS and Webserver are different hosts. Eg: DNS in Route53 and Webserver in Linode
replies(1): >>jachee+Km1
◧◩◪
98. Arnavi+cL[view] [source] [discussion] 2023-08-02 17:03:47
>>jeroen+Qc
>Does Verisign need to know that 2001:2345:6789::abcd is looking for news.ycombinator.com?

Verizon wouldn't know that even with ECS, because ECS only needs to include the subnet prefix of the length that the client (Cloudflare's recursive resolver in this case) is willing to give out. There is no benefit and only harm to the client if it gives out the whole IP, and indeed it is called out as a bad idea in the ECS RFC.

◧◩◪
99. pierat+jL[view] [source] [discussion] 2023-08-02 17:04:36
>>eastda+Wc
> In this particular case we truncate EDNS to protect the privacy of users

In other words, you want the data, but prevent others from seeing your advantage?

This is what archive.is is doing, and you stomp your collective feet at.

> because we believe 1) privacy is a fundamental human right; and 2) the original sin of the Internet is that IP addresses are too closely tied to the identities of individuals and services.

If you cared about that, you wouldn't either block Tor or send us through captcha-hell just to pull a single webpage.

> Truncating EDNS is trying to honor #1 and overcome #2. So is our work on protocols like Oblivious DNS. This work, frankly, upsets some of our customers or potential customers (like Archive.is). But it’s the right thing to do for the long term health of the Internet.

'Upsets'? Wow. Talk about a "Rules for thee but not for me."

replies(1): >>cmeach+1i1
◧◩◪◨⬒
100. nullin+IL[view] [source] [discussion] 2023-08-02 17:06:34
>>rovr13+3K
Exchange Online determines the closest EXO front door by the location of resolver. Other M365 services do not use this method, it is an artifact from Exchange Server.

EDIT: This is outlined in [0], although it doesn't go into the depth I wish it did.

> By providing local Internet egress and by configuring internal DNS servers to provide local name resolution for Microsoft 365 endpoints, network traffic destined for Microsoft 365 can connect to Microsoft 365 front end servers as close as possible to the user.

[0] https://learn.microsoft.com/microsoft-365/enterprise/microso...

◧◩◪◨⬒⬓
101. NicoJu+cM[view] [source] [discussion] 2023-08-02 17:08:30
>>supriy+Pi
Had a one-time quick experience with cloudflare through the chat.

For an issue that pointed to cloudflare, but ultimately was our hoster having an issue with completing the TLS handshake...

After infra update ofc.

Tldr: had the opposite experience, for a technical issue :)

◧◩◪◨
102. nullin+PN[view] [source] [discussion] 2023-08-02 17:15:22
>>freedo+te
> thank you for your willingess to upset some customers and potential customers

Or, thank you for wasting your customers time attempting to figure out why one or more sites aren't responding appropriately on your network while they work on other networks.

Not everyone is clued into EDNS or why archive.is doesn't function with CF.

CF is wasting everyone's time.

replies(1): >>lolind+0S
◧◩◪◨
103. pigeon+ZN[view] [source] [discussion] 2023-08-02 17:16:09
>>cortes+4I
Encrypted SNI has been in the works for a long time: https://www.cloudflare.com/en-gb/learning/ssl/what-is-encryp...
replies(1): >>cortes+vA8
◧◩
104. throw0+MO[view] [source] [discussion] 2023-08-02 17:19:34
>>freedo+Ka
> Cloudflare CEO Matthew Prince answered this directly on HN: >>19828702

Archive.is' explanation is quoted in a comment below:

* >>36971650

◧◩◪◨
105. lolind+TO[view] [source] [discussion] 2023-08-02 17:20:02
>>adql+PF
The concern isn't that the website will know the IP, it's that every single entity on the network between Cloudflare and the authoritative DNS server (most or all of which will not be operated by the website) will know it.

It still may not be the right decision, but it's important to frame the trade-off correctly.

replies(1): >>sXgC6d+cu2
◧◩
106. whoopd+3P[view] [source] [discussion] 2023-08-02 17:20:52
>>electr+yd
Are you talking about Archive.is or Cloudflare?

Answer: "Yes."

replies(1): >>electr+IV1
◧◩◪◨⬒⬓
107. rnd0+QR[view] [source] [discussion] 2023-08-02 17:31:10
>>joseph+xK
>Isn't the Internet full of major websites that need to be able to handle that kind of abuse?

I don't know; since their whole reason for being is to act as (a temporary?) archive of websites that would make them more vulnerable to these attacks than someone like ebay I'd think?

replies(1): >>joseph+AS
◧◩◪◨⬒
108. lolind+0S[view] [source] [discussion] 2023-08-02 17:31:48
>>nullin+PN
I mean, it's archive.is that is intentionally serving an incorrect DNS record (pointing back at Cloudflare's IPs) when it gets a DNS query that every other resolver handles just fine. They may have legitimate grievances with the info being dropped, but in the end they're the ones breaking their own traffic.
replies(1): >>fragme+Pc1
◧◩◪◨⬒⬓⬔⧯
109. arp242+mS[view] [source] [discussion] 2023-08-02 17:33:32
>>freedo+vv
https://app.ahrefs.com/user/forgot-password is the link that was used in the "Tell HN" they posted last time.

Works for me on Linux in Firefox and Chromium.

◧◩
110. johnkl+oS[view] [source] [discussion] 2023-08-02 17:33:47
>>freedo+Ka
Cloudflare is in the wrong here. They want to "protect" people from their own ISPs, from nefarious web and DNS servers that'll "sacrifice the privacy of users" by - you guessed it - doing exactly the same thing themselves. They've given very little reason to trust them, while giving plenty of reasons to think they might be evil (like protecting known spammers / scammers / phishers).

If another company did what Cloudflare does and homogenized tons of requests behind them, you can bet Cloudflare's CAPTCHA systems would block them in a second.

I have zero respect for Cloudflare's inability to answer criticisms about what they do, about their constant deflections from simple, straightforward questions, and the fact that they do to others what they would never accept anyone else doing to them. It's hypocrisy in the service of trying to become a monopoly by re-centralizing the Internet.

Don't believe me? Go ahead and look for examples of Matthew Prince addressing concerns that much of the non-western world can't access Cloudflare fronted sites because of Cloudflare's "reasons". When you don't find any that have more than just vague platitudes and handwaving, imagine how you'd feel if you were one of those multiple billion people.

replies(1): >>tick_t+dT
111. wnevet+zS[view] [source] 2023-08-02 17:34:26
>>lolind+(OP)
Oh is that why archive.is links on HN will fail for me sometimes?
◧◩◪◨⬒⬓⬔
112. joseph+AS[view] [source] [discussion] 2023-08-02 17:34:28
>>rnd0+QR
But archive.org provides the same service as them, and it doesn't need to do that.
replies(1): >>brirec+zx1
◧◩◪
113. tick_t+dT[view] [source] [discussion] 2023-08-02 17:36:34
>>johnkl+oS
EDNS is OPTIONAL. archive.is is objectively in the wrong here.
replies(2): >>johnkl+lW >>nora-p+nZ
◧◩◪◨⬒
114. NicoJu+ZU[view] [source] [discussion] 2023-08-02 17:44:37
>>ninjag+OI
I'm still giving cf the benefit of the doubt, but I need more research.

I always found the funding of archive.is unknown. Who is behind it and why do they want this info. Why and how they can provide this for free is a big unknown to me.

I'm giving cf the benefit of the doubt against archive. At least I know cloudflare and this would be the first "doubt-moment"...

It's weird that others don't have this issue that much, I would have thought that CDN's would scream from everywhere for years already, if archive.is his statement is "complete".

Edit: cloudflare does not seem to block what's needed though.

>>19828702

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

◧◩◪◨
115. johnkl+lW[view] [source] [discussion] 2023-08-02 17:49:42
>>tick_t+dT
EDNS is in part how using one IP address across the world can work without tons of latency for everyone who isn't geographically local. In other words, 1.1.1.1 would be a lot shittier, and the DNS answers they provide would be much less geographically appropriate, if they didn't make use of information about the source of a query.

In other words, Cloudflare expects us to think they're so special that they should get to do what they explicitly don't want others doing.

It's bullshit, particularly for all the people who are victims of Cloudflare's manipulations such as the default use of Cloudflare DNS servers for DNS-over-https on Firefox, which users were never asked about before it was enabled for them (at least in the US).

replies(1): >>tick_t+Lz1
◧◩◪◨
116. gnopgn+dX[view] [source] [discussion] 2023-08-02 17:52:38
>>adql+UG
>If your DNS doesn't leak client IP, the browser connecting to server IP will leak it.

The issue isn't leaking your IP to archive.today. It's leaking your IP to any other dns servers along the way

Do you know how recursive DNS works?

117. msravi+UX[view] [source] 2023-08-02 17:55:08
>>lolind+(OP)
Nextdns: How we made DNS both fast and private with ECS[0]

Cloudflare sends the closest city from where the request was made which ought to be sufficient to optimize for a cdn I guess? Appears that archive.is doesn't have a locus standii in this debate...

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

0. https://medium.com/nextdns/how-we-made-dns-both-fast-and-pri...

replies(1): >>Arnavi+Ma1
◧◩◪◨
118. akira2+9Y[view] [source] [discussion] 2023-08-02 17:55:53
>>ploxil+mC
It's like a cab driver being overly concerned that when I arrive at my destination, they will be able to know who I am just by looking at me.

"Yea.. thanks dude. Just.. drive the car, will ya?"

replies(1): >>Goz3rr+Fb3
◧◩◪
119. stock_+JY[view] [source] [discussion] 2023-08-02 17:58:16
>>croes+Gw
In addition to what others mentioned, typically EDNS0 edns-client-subnet is truncated before forwarding.

For example in unbound the defaults, when EDNS0 is enabled (disabled by default), are:

  max-client-subnet-ipv6: 56
  max-client-subnet-ipv4: 24
Forwarding can also be conditionally enabled for specific clients, upstream servers, specific zones, etc.

ref: https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound...

◧◩◪◨
120. nora-p+nZ[view] [source] [discussion] 2023-08-02 18:00:48
>>tick_t+dT
"You ask me for an IP address, but you don't ask me with respect".

Respect is optional too. But it is important.

121. 8chanA+X21[view] [source] 2023-08-02 18:17:16
>>lolind+(OP)
Seems like this is no longer relevant. I just tried a DNS lookup via Cloudflare and I got 89.253.237.217.
replies(1): >>lolind+l41
◧◩
122. lolind+l41[view] [source] [discussion] 2023-08-02 18:23:18
>>8chanA+X21
I'm seeing that now too. It might have changed in the last 4 hours, or maybe the behavior is cyclical for some reason. I posted this article after running into it repeatedly over the last few weeks since switching to Cloudflare DNS.

I wonder if one party or the other actually made a change in response to this hitting the front page again?

replies(1): >>tredre+ma1
◧◩◪◨
123. brooks+o41[view] [source] [discussion] 2023-08-02 18:23:22
>>supriy+Ne
There’s a fair argument to make against device attention, but casting the exclusion of rooted devices as the goal of the policy rather than a side effect is a bit disingenuous.
◧◩◪
124. btown+W51[view] [source] [discussion] 2023-08-02 18:29:23
>>eastda+Wc
Have you thought about spoofing the EDNS to (a less truncated version of) the nearest Cloudflare edge node's IP? This would be no more of a privacy leak than traffic from your edge to origin servers, while providing generally enough geographic information to keep latency low on the source. This is at the very least compliant with the spirit of the RFC, no?

EDIT: another comment, though somewhat hearsay, suggests that Cloudflare's caching could make this difficult to implement: >>36971650

◧◩◪◨
125. ftaghn+c61[view] [source] [discussion] 2023-08-02 18:30:08
>>supriy+Ne
> given that you’re trying to lock out Linux users

I had that issue with cloudflare bot captcha when trying to access a web novel website. It would infinitely loop into the "please click the checkmark to confirm you're human" thingamagic.

Initially I thought it was because I was a linux user, but I tried to browse the same website on Google Chrome and the issue went away. They were not discriminating against linux, but against Firefox, which is just as bad, if not worse.

I tried everything on FF: deleting all cookies/storage/history, disabling addons etc. It would still do this on a pristine FF. Ultimately, I admit, not being able to access websites did manage to encourage me to uninstall FF, despite it not being FF's fault, I'm tired of dealing with this kind of cr*p.

◧◩◪
126. jshier+P91[view] [source] [discussion] 2023-08-02 18:44:41
>>eastda+Wc
This, and Warp's insistence on passing my origin IP to my destinations, are two things I wish I could customize when using Cloudflare. Before going corporate OpenDNS had something similar, and you could even set up custom behaviors per origin IP (for home and work), which I miss. These are good defaults, but I wish to change the defaults while also allowing particular domains to get my full EDNS info, like particular CDNs.

While I'm here, I'd also like to layer Zero Trust and Warp+ so I can toggle my internal network while staying on Warp+.

Also, the separation in Zero Trust and tunnels between routed DNS names and private IPs is very confusing. Why do I need both?

Custom DNS entries for Zero Trust DNS would be nice, so I could point internal domains to the external routing without having to have public DNS, or even have the domains match.

replies(1): >>doabel+m92
◧◩◪
127. tredre+ma1[view] [source] [discussion] 2023-08-02 18:46:46
>>lolind+l41
The behaviour is cyclical. It has been for years, really. It starts resolving every now and then, but rarely for long and I doubt this time is any different.

I don't think archive.is blocks CF based on their IPs, so they must have some heuristic in place to defect bogus EDNS. Perhaps sometimes that heuristics fails?

◧◩
128. Arnavi+Ma1[view] [source] [discussion] 2023-08-02 18:48:05
>>msravi+UX
>Cloudflare sends the closest city from where the request was made which ought to be sufficient to optimize for a cdn I guess? Appears that archive.is doesn't have a locus standii in this debate...

>>36973056

>>all requests for 7 archive.* domains are sent from Symantec USA IP

It might be that the archive.is only lies to that IP, which would explain why many users in this thread say that archive.is does resolve correctly for them with 1.1.1.1

◧◩◪◨⬒⬓
129. yellow+hc1[view] [source] [discussion] 2023-08-02 18:53:37
>>adql+4F
> Right but then working slow looks like archive.is issue but is ultimately caused by cloudflare.

Whereas not loading at all looks like archive.is issue but is ultimately caused by archive.is.

> CF is bascically saying "we can know your IP but not the site you are trying to resolve" (that will know your IP anyway once you navigate there).

Not necessarily. For example, the DNS query could go straight to CF while the eventual request to archive.is goes through a proxy or VPN.

replies(1): >>sXgC6d+et2
◧◩◪◨⬒⬓
130. fragme+Pc1[view] [source] [discussion] 2023-08-02 18:55:18
>>lolind+0S
That seems like your much stronger older brother hitting you with your own arm and asking "why are you hitting yourself" over and over again though. Cloudflare is standing their ground with their morals, and Archive is standing their ground with their morals. Which one is right is for you to decide.
replies(1): >>jachee+5n1
◧◩◪◨
131. meindn+Eh1[view] [source] [discussion] 2023-08-02 19:13:43
>>tomp+9B
So how do other companies cope with 1.1.1.1, that run their own CDN? E.g. Facebook? Google?
replies(1): >>nora-p+dw1
◧◩◪◨
132. cmeach+1i1[view] [source] [discussion] 2023-08-02 19:14:45
>>pierat+jL
What advantage? Is there reason to believe that 1.1.1.1 treats CloudFlare's CDN specially and forwards EDNS info or similar?
replies(1): >>nora-p+zy1
◧◩◪◨⬒⬓
133. jachee+Km1[view] [source] [discussion] 2023-08-02 19:31:57
>>djbusb+BK
Also, looking up DNS in one direction and browsing (say over a VPN) in another. The destination site doesn’t always get the same IP that the DNS request gets.
◧◩◪◨⬒⬓⬔
134. jachee+5n1[view] [source] [discussion] 2023-08-02 19:33:25
>>fragme+Pc1
Easy choice: the one that’s protecting me, rather than themselves.
replies(1): >>nullin+op1
◧◩◪◨⬒⬓⬔⧯
135. nullin+op1[view] [source] [discussion] 2023-08-02 19:41:28
>>jachee+5n1
Without protecting themselves, archive.is wouldn't exist.

And given it is the subnet number being sent, NOT the IP address that people here claim, the privacy concern is fairly low (CF knows your IP address in order to deliver the DNS answer back to you and archive.is knows your IP address when you request resources).

I'll take the performance improvement that EDNS client subnet can provide.

◧◩◪◨⬒
136. godels+aq1[view] [source] [discussion] 2023-08-02 19:44:20
>>yellow+eD
Forgive my naivety, but can you not just ping several servers and return the best? Could you not even guess first and then asynchronously perform this and then re-route or do so on the next user click? I am not an internet person so this may be a very dumb question.
replies(1): >>lxgr+g82
◧◩◪◨⬒
137. nora-p+dw1[view] [source] [discussion] 2023-08-02 20:06:18
>>meindn+Eh1
They have own Autonomous Systems with own anycast IP addresses.

It is quite expensive for an indie project. Not to mention legal support for compliance in every country of presence. To block 0.x% of visitors coming from CloudFlare is much cheaper for a small project than to go this road.

replies(1): >>growse+8O1
◧◩◪◨⬒⬓⬔⧯
138. brirec+zx1[view] [source] [discussion] 2023-08-02 20:11:05
>>joseph+AS
It’s not the same service, though.

As I understand it, the main reasons people use archive.is over archive.org are because archive.is is more of an immediate proxy/cache/cdn, rather than a long-term archival system that requires a bot to crawl based on schedule parameters. That, and also it includes features to help bypass paywalls by sanitizing some (all?) JavaScript.

On the other hand, Archive.org doesn’t remove or alter scripts or anything like that. And as far as I know you can’t just request them to crawl a site and then browse it there immediately, but you can on Archive.is

replies(1): >>joseph+jI1
◧◩◪◨⬒
139. dotBen+ty1[view] [source] [discussion] 2023-08-02 20:14:36
>>yellow+eD
You shouldn't assume the origin server is setup for direct traffic - either in terms of load management or security (access to origin might only be available to CDN IPs on their ACL)
replies(1): >>yellow+1Z1
◧◩◪◨⬒
140. nora-p+zy1[view] [source] [discussion] 2023-08-02 20:14:55
>>cmeach+1i1
EDNS absence does affect cheap DNS-based CDNs and has to effect on expensive AnyCast CDNs (one of them is CloudFlare CDN).
replies(1): >>supriy+HL2
◧◩◪◨⬒
141. tick_t+Lz1[view] [source] [discussion] 2023-08-02 20:19:55
>>johnkl+lW
Cloudflare is not special or unique tons of resolvers don't support EDNS. archive.is serves them all the same they only lie in their response if the source is Cloudflare.

It's actually really funny archive.is works from time to time on 1.1.1.1 which I'm assuming is when archive.is hasn't update their IP list / detection logic. I wonder how much time they spend maintaining that if they blocked everyone without EDNS it would be easy but since it's just Cloudflare....

◧◩
142. silisi+iB1[view] [source] [discussion] 2023-08-02 20:26:14
>>therea+YB
I use and pay for nextdns, and am a huge fan.
◧◩◪◨⬒⬓⬔⧯▣
143. joseph+jI1[view] [source] [discussion] 2023-08-02 20:56:24
>>brirec+zx1
> And as far as I know you can’t just request them to crawl a site and then browse it there immediately, but you can on Archive.is

Yes you can. After you put in the URL, you get a button to do so. I just did it for your comment: https://web.archive.org/web/20230802205505/https://news.ycom...

◧◩◪◨⬒⬓
144. growse+8O1[view] [source] [discussion] 2023-08-02 21:19:19
>>nora-p+dw1
> They have own Autonomous Systems with own anycast IP addresses.

> It is quite expensive for an indie project. Not to mention legal support for compliance in every country of presence. To block 0.x% of visitors coming from CloudFlare is much cheaper for a small project than to go this road.

I don't buy this. I'm running my own AS and anycast services for £10pm (my ISP are sponsoring my allocations from RIPE).

Also, it feels like Cloudflare's DNS service is more than just 0.x% of the internet....?

replies(1): >>ylere+bp2
◧◩◪◨
145. savefe+eR1[view] [source] [discussion] 2023-08-02 21:30:30
>>kalleb+3h
I have the same issue and just now found it was because of Private Relay. I did not connect the fact that I had no issues accessing archive.is when I had a VPN on - which disables Private Relay. Since they got a location, not my location but a location they were hunky dory....

I saw this post and tried it with and without Private Relay and sure enough, turning it on is the issue. Good to know....

Edit: I updated Private Relay to "Maintain general location" for IP Address Location Settings and archive.is loads fine.

Second Edit: Maybe not, it all works now and I think it is either session or cache. I got to play around with it

replies(1): >>TechBr+gS1
◧◩◪◨⬒
146. TechBr+gS1[view] [source] [discussion] 2023-08-02 21:34:50
>>savefe+eR1
Does enabling a VPN disable private relay or does it tunnel to the VPN through private relay? For some reason I have it in my head that it "double wraps" the traffic but I've never actually confirmed that for a fact.
◧◩◪
147. electr+IV1[view] [source] [discussion] 2023-08-02 21:49:13
>>whoopd+3P
I do believe both parties see the other this way.

Archive.is believes that Cloudflare can simply provide the full EDNS data, and they're technically right. But Cloudflare won't budge because they believe this is hostile to user privacy. I haven't heard a counterargument that Cloudflare is wrong about this.

Cloudflare believes that Archive.is can simply live without the EDNS data, and they're technically right. But Archive.is won't budge because they believe it prevents their abuse prevention techniques. They mention that owning their own AS would solve the problem but that's too expensive.[1]

Blame is in the eye of the beholder, but it seems to me that Archive.is should find alternative abuse prevention techniques like other websites do. Cloudflare has an argument based on privacy. Archive.is has an argument based on the proper solution being too expensive. The expense of running an AS is disputed in this HN thread.[2]

[1] >>36971650

[2] >>36977654

replies(1): >>nora-p+T72
◧◩◪
148. electr+MY1[view] [source] [discussion] 2023-08-02 22:02:43
>>ninjag+8J
Indeed, they mention that the proper solution is to get their own AS but that it's too expensive (this is what other major websites do). Cloudflare argues that they are protecting user privacy by truncating the EDNS responses, and I believe it's commonly agreed that they're right that this move does so. Archive.is says explicitly that they want this because it's cheaper than an alternative that is available to them. The cost of running an AS is disputed elsewhere in this HN thread. To me it seems clear that Cloudflare has the moral upper hand.
◧◩◪◨⬒⬓
149. yellow+1Z1[view] [source] [discussion] 2023-08-02 22:03:51
>>dotBen+ty1
> You shouldn't assume the origin server is setup for direct traffic

You don't need to make any such assumption; the above point stands even in the case of simply hitting the "wrong" (i.e. geographically suboptimal) CDN endpoint.

◧◩◪◨
150. nora-p+T72[view] [source] [discussion] 2023-08-02 22:46:57
>>electr+IV1
I don't think the "the proper solution" is possible in 2023, and it's not a matter of the size of the money pile.

Google and Facebook were examples of "the proper solutions".

The former is currently inaccessible from China, the latter from Russia.

Their "abuse prevention techniques" have failed.

Sacrificing only Cloudflare DNS users is a much lesser evil compared to outcome of "the proper solutions".

◧◩◪◨⬒⬓
151. lxgr+g82[view] [source] [discussion] 2023-08-02 22:48:33
>>godels+aq1
For a site with longer-lived sessions (e.g. video on demand, gaming etc.) which tolerate a bit of startup delay/inefficiency that can definitely be done.

But for a site that essentially tries to serve you static content as quickly as possible and mostly all at once, that would probably introduce more overhead than it's worth.

replies(1): >>godels+hc2
◧◩◪◨
152. Thiez+i82[view] [source] [discussion] 2023-08-02 22:48:37
>>ninjag+sG
This seems trivial to avoid now that this trick is public knowledge.
◧◩◪◨
153. doabel+m92[view] [source] [discussion] 2023-08-02 22:54:11
>>jshier+P91
> Warp's insistence on passing my origin IP to my destinations

IIRC WARP was only able to forward your origin IP to websites using Cloudflare. Then, as of Aug 2022, their FAQ[1] says your origin IP is hidden regardless of which website. Their IPs do reveal your geolocation though.

There was a bug[2] that revealed your IP to select websites; that seems to have been fixed by Nov 2022.

Disclaimer: I’m not knowledgeable enough to test every possible IP leak mechanism (like WebRTC), so I didn’t do that. I’m basically taking their word for it.

[1] https://developers.cloudflare.com/warp-client/known-issues-a...

[2] https://community.cloudflare.com/t/beware-cloudflare-warp-do...

◧◩
154. flango+Ha2[view] [source] [discussion] 2023-08-02 23:03:12
>>stavro+if
Wow. archive.is proposed a perfectly good solution and CF shot it down.
155. below4+ob2[view] [source] 2023-08-02 23:06:50
>>lolind+(OP)
https://archive.is/hpKIB
◧◩◪◨⬒⬓⬔
156. godels+hc2[view] [source] [discussion] 2023-08-02 23:11:09
>>lxgr+g82
In the latter case, that seems like it just wouldn't be such a big deal, right? Since the hit would only happen user side and be a small percentage of the user's time on the site?

I get that they don't want to "take the blame" but it seems like both parties are performing reasonable actions that butt heads but that one party resolves that by just not performing the service. To me that feels like a worse outcome than slow service, as it just looks like the site is down.

The next naive question I have is about the response of truncation. I understand Cloudflare is preserving privacy. Archive says that privacy is preserved because they truncate the PII. Is this truncation verifiable in the request from Cloudflare? If not, then this seems like an unreasonable expectation ("just trust me bro"). Again, personally I'd rather have the latency hit and I'm not sure I'm seeing a good argument against this.

replies(1): >>lxgr+ef4
◧◩◪◨⬒⬓⬔
157. ylere+bp2[view] [source] [discussion] 2023-08-03 00:54:44
>>growse+8O1
£10 GBP a month for a AS with an IPv4+IPv6 subnet + worldwide POPs that allow you to advertise your subnets over BGP? How did you pull that off? I've researched this a while ago and just the IPv4 subnet alone was at least 10x that amount if you are OK with leasing it from less reputable sources.
replies(1): >>growse+hX2
158. News-D+rs2[view] [source] 2023-08-03 01:19:28
>>lolind+(OP)
archive.today or archive.is : https://en.wikipedia.org/wiki/Archive.today

archive.today - FAQ : https://archive.md/faq

archive.today - wiki : https://wiki.archiveteam.org/index.php/Archive.today

archiveteam wiki : https://wiki.archiveteam.org/

Tumblr : https://archive-is.tumblr.com/

Twitter : https://twitter.com/archiveis

  archive.today

  archive.ph

  archive.is

  archive.li

  archive.vn

  archive.fo

  archive.md

  archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion
Launched May 16, 2012; 11 years ago
◧◩◪◨⬒⬓⬔
159. sXgC6d+et2[view] [source] [discussion] 2023-08-03 01:26:13
>>yellow+hc1
Ok, really? Who is using a proxy for HTTP but not DNS in 2023?
◧◩◪◨⬒
160. sXgC6d+cu2[view] [source] [discussion] 2023-08-03 01:33:51
>>lolind+TO
So just don't send ECS on any query except once you get to the public-suffix's NS...

Every element on the network between the user and the website will know it, too.

◧◩
161. IggleS+nB2[view] [source] [discussion] 2023-08-03 02:35:19
>>freedo+Ka
Your take is so on the money. I'm a staunch CF advocate, but so much rests on the trust they engender. Their power is a consequence in their presence as a trustable company working across the infrastructure of the Internet. There's so many pathways where the enforcers of good behavior eventually end up as the Pharaohs. I genuinely love Cloudflare while being simultaneously extremely wary of Cloudflare.
◧◩◪
162. polski+fF2[view] [source] [discussion] 2023-08-03 03:17:55
>>eastda+Wc
Why don't you just send fraudulent EDNS info?
◧◩
163. Zuiii+wJ2[view] [source] [discussion] 2023-08-03 04:01:16
>>freedo+Ka
It's the opposite for me. Cloudflare presents me with so many infinite "Are you human" check boxes when using Tor that I decided to never pay a single cent to that company unless we found ourselves in a situation were there was no other choice. Thankfully, there almost always choice, with most vendors now offering very good alternatives. I work in government IT procurement.
◧◩◪
164. Zuiii+kK2[view] [source] [discussion] 2023-08-03 04:11:08
>>eastda+Wc
> In this particular case we truncate EDNS to protect the privacy of users because we believe 1) privacy is a fundamental human right; and 2) the original sin of the Internet is that IP addresses are too closely tied to the identities of individuals and services.

Your beliefs certainly aren't reflected in how you treat users. It's been a good while since I've been able to visit any cloudflare protected site using Tor. Your broken systems keep presenting me with infinite checkboxes that do absolutely nothing.

If you want to block people who truly believe that privacy is a fundamental human right, at least have the decency to be honest. Tell Tor users that they are permanently blocked so that they don't waste their time clicking on pointless checkboxes.

◧◩◪◨⬒⬓
165. supriy+HL2[view] [source] [discussion] 2023-08-03 04:25:32
>>nora-p+zy1
Amazon’s Cloudfront is anything but cheap, but they too are based on DNS based routing.
◧◩◪◨⬒⬓⬔⧯
166. growse+hX2[view] [source] [discussion] 2023-08-03 06:17:16
>>ylere+bp2
I didn't say IPv4 :p

You're right, if you've got a legacy internet requirement then that adds another grand a year to your costs. But I disagree that it's "quite expensive for an indie project", especially one that's so popular it needs to run it's own CDN.

◧◩◪
167. Goz3rr+la3[view] [source] [discussion] 2023-08-03 08:20:38
>>ninjag+GH
It's not just about the server you're connecting to knowing your IP, that's a given. With ECS every recursive DNS server in the chain also knows which site you want to visit
168. anuraa+Sa3[view] [source] 2023-08-03 08:23:04
>>lolind+(OP)
Great post! I respect people's decisions regarding the focus on privacy but above all I just need the internet to work and this was always a mysterious issue. Finally fixed by switching to Google DNS, which for me personally is not a problem, escaping their net is better than not but not a requirement.
◧◩◪◨⬒
169. Goz3rr+Fb3[view] [source] [discussion] 2023-08-03 08:28:50
>>akira2+9Y
The problem is that there are more parties than you, your DNS server (the cab driver) and your destination (the website). The cab driver might have to ask a number of other people how to get to the destination.

Your DNS server probably doesn't have the exact record for you at the ready, but it does know another DNS server that gets you closer to an answer. That's how recursive DNS works and it might happen a few times before you actually get to a result. With ECS now every DNS server in this chain knows 12.45.56.x wanted to visit hacker news.

◧◩◪◨⬒⬓⬔⧯
170. lxgr+ef4[view] [source] [discussion] 2023-08-03 15:12:50
>>godels+hc2
> In the latter case, that seems like it just wouldn't be such a big deal, right? Since the hit would only happen user side and be a small percentage of the user's time on the site?

True, but it's still the difference between being able to load all embedded resources from a server close to the user or potentially having to haul all of that across an ocean, considering TCP congestion window scaling (which is sensitive to round trip times) etc.

All that said, based on a purported comment by the maintainer of archive.is, the aim of their CDN is actually not improving responsivity, but delaying legal/law enforcement responses: >>36971650

> Archive says that privacy is preserved because they truncate the PII.

Personally, I don't have a lot of sympathy for either party here:

I think, especially given the comment linked above, Archive's latency/efficiency concerns are just pretext for quite different concerns of their own (having to deal with law enforcement).

And on the other hand, while Cloudflare's EDNS subnet truncation might help user privacy in a few edge cases (as many have said here, the visited site will get the user's IP as soon as they connect to their servers!), it also makes it that much harder for CDNs other than Cloudflare to efficiently serve content using DNS-based routing and forces them to also use Anycast, which is much harder to do.

◧◩◪◨⬒
171. cortes+vA8[view] [source] [discussion] 2023-08-04 18:17:19
>>pigeon+ZN
Right, but it isn't standard yet still.
◧◩◪◨⬒⬓
172. jrochk+Mvb[view] [source] [discussion] 2023-08-05 18:24:53
>>adql+4F
The current situation seems to be that for these users it's not working at all (either timeout or infinite captch loop), and it looks like an archive.is issue, no explanation is given. So avoiding service disruption looking like an archive.is issue does not seem to be the goal.
[go to top]