zlacker

Does Cloudflare’s 1.1.1.1 DNS Block Archive.is? (2019)

submitted by lolind+(OP) on 2023-08-02 13:36:45 | 246 points 172 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
2. lol768+Q8[view] [source] 2023-08-02 14:18:43
>>lolind+(OP)
Previous discussions:

Tell HN: Archive.is inaccessible via Cloudflare DNS (1.1.1.1) >>19828317

- This particular discussion includes a comment from Cloudflare's CEO, referenced in the article: >>19828702

Why does 1.1.1.1 not resolve archive.is? >>21155056

- StackExchange question, on the subject

Does Cloudflare's 1.1.1.1 DNS Block Archive.is? (2019) >>28495204

- Discussion of this blog post

◧◩
4. philwe+p9[view] [source] [discussion] 2023-08-02 14:21:33
>>wkat42+s8
This is actually addressed in the original HN comment the post links to (>>19828702 ):

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

5. cj+J9[view] [source] 2023-08-02 14:22:33
>>lolind+(OP)
Comment from Cloudflare CEO from 2019: >>19828702

Surfacing here for people who like to read comments before clicking through to the article.

TLDR: the site owner was returning wrong DNS responses for people using Cloudflare's 1.1.1.1 DNS service because the site owner doesn't like Cloudflare.

11. freedo+Ka[view] [source] 2023-08-02 14:27:31
>>lolind+(OP)
Cloudflare CEO Matthew Prince answered this directly on HN: >>19828702

Most relevant piece but the whole comment is worth a read:

> Archive.is’s authoritative DNS servers return bad results to 1.1.1.1 when we query them. I’ve proposed we just fix it on our end but our team, quite rightly, said that too would violate the integrity of DNS and the privacy and security promises we made to our users when we launched the service.

> The archive.is owner has explained that he returns bad results to us because we don’t pass along the EDNS subnet information. This information leaks information about a requester’s IP and, in turn, sacrifices the privacy of users.

Honestly it's that type of thing (the frankness, the presence on HN, willingness to participate, the principled stand on privacy) that got me into Cloudflare products. I now generate hundreds per month in revenue for them and that will likely be thousands in the next year or two. His time/effort on HN directly led to customer acquisition and revenue.

That said I do worry about the incentives Cloudflare has to their big customers. CF is a great tool for site owners, but like any tool has the potential to be a great evil (against the user) if the principles ever wane. It's already being used by a lot of sites to make life a living hell for people behind a VPN. As a site owner I absolutely get it: practically zero of my legitimate traffic comes from VPNs (our main demographic tend to skew older and much less technical than the average consumer), but all of the automated attacks against me do. Balancing freedom and rights is hard, but I deeply appreciate the thoughtfulness and principles that CF has displayed over the years.

◧◩
17. 38+Ib[view] [source] [discussion] 2023-08-02 14:31:37
>>lol768+Q8
since your formatting is weird, here is the direct link to the stack exchange question:

https://webapps.stackexchange.com/questions/135222

◧◩◪
32. supriy+Ne[view] [source] [discussion] 2023-08-02 14:44:50
>>eastda+Wc
Sure, we’re to believe that, given that you’re trying to lock out Linux users[1] (which still isn't resolved yet) and pushing for device attestation[2] to lock out rooted devices at the same time.

[1] >>36197401

[2] https://www.ietf.org/archive/id/draft-private-access-tokens-...

54. reject+Vl[view] [source] 2023-08-02 15:17:26
>>lolind+(OP)
I switched to https://controld.com/free-dns

Can also do DNS adblock! :)

◧◩◪◨⬒
65. supriy+7t[view] [source] [discussion] 2023-08-02 15:47:14
>>pessim+Yg
Please see [1] regarding the concerns around attestations and PAT and [2] for what has happened outside HN, which a simple reading of that thread wouldn't otherwise suggest.

[1] >>36972051

[2] >>36971869

◧◩◪◨⬒
70. DanAtC+5x[view] [source] [discussion] 2023-08-02 16:03:58
>>xnyant+Ji
Network blocks are issued by regional registries: https://upload.wikimedia.org/wikipedia/commons/9/95/Regional...
◧◩◪
75. tomp+9B[view] [source] [discussion] 2023-08-02 16:20:29
>>eastda+Wc
> This work, frankly, upsets some of our customers or potential customers (like Archive.is).

That's a bit unfair, don't you think?

From what I remember of the saga, the original reason for Archive.is's block is that they run their own CDN, and by not knowing the location of the user, they can't determine the closest server to respond with.

edit: found source https://twitter.com/archiveis/status/1018691421182791680

So the alternative viewpoint is, that Cloudflare is being anti-competitive by technically preventing other CDN providers from working.

Disclosure: I'm a happy Cloudflare user, but all in all I think Archive.is service is far more fundamental for the internet (especially as it's 100% free!). So I would really appreciate if you could figure out a way of working together. Until then, 8.8.8.8 it is!

◧◩◪
87. ninjag+sG[view] [source] [discussion] 2023-08-02 16:43:56
>>eastda+Wc
So Stavros [1] indicates that archive.is needs that EDNS data to protect themselves against CSAM/ISIS material based attacks, and they suggested solutions but CF refused to cooperate. Is this true?

[1] >>36971650

◧◩◪
90. cortes+4I[view] [source] [discussion] 2023-08-02 16:50:33
>>jrockw+Sa
> If the website is hosted on a CDN or cloud provider, then someone monitoring the IP traffic only knows that you're visiting something hosted by that CDN.

This isn't true, because the request leaks the hostname in the handshake via SNI:

https://en.wikipedia.org/wiki/Server_Name_Indication

92. obitua+vI[view] [source] 2023-08-02 16:52:16
>>lolind+(OP)
Strangely, I get a Russian IP address for an answer when I query 1.1.1.1 for archive.is:

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:32:59)──> nslookup archive.is 1.1.1.1                                                                          ──(Wed,Aug02)─┘
    Server:        1.1.1.1
    Address:    1.1.1.1#53

    Non-authoritative answer:
    Name:    archive.is
    Address: 89.253.237.217

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:38:12)──> nslookup archive.is 1.0.0.1                                                                          ──(Wed,Aug02)─┘
    Server:        1.0.0.1
    Address:    1.0.0.1#53

    Non-authoritative answer:
    Name:    archive.is
    Address: 89.253.237.217

    ┌─(~/Projects/malware/triangulation)(ruby-2.5.0)────────────────────────────────────────────────────────────────────(c@c:s001)─┐
    └─(12:38:14)──> whois 89.253.237.217                                                                                 ──(Wed,Aug02)─┘
    % IANA WHOIS server
    % for more information on IANA, visit http://www.iana.org
    % This query returned 1 object

    refer:        whois.ripe.net

    inetnum:      89.0.0.0 - 89.255.255.255
    organisation: RIPE NCC
    status:       ALLOCATED

    whois:        whois.ripe.net

    changed:      2005-06
    source:       IANA

    # whois.ripe.net

    inetnum:        89.253.232.0 - 89.253.239.255
    org:            ORG-RL31-RIPE
    netname:        RU-RUSONYX-NET6
    descr:          Network for Rusonyx infrastructure
    country:        RU
    mnt-lower:      MNT-RUSONYX
    mnt-routes:     MNT-RUSONYX
    admin-c:        VZ1716-RIPE
    admin-c:        VZ1717-RIPE
    tech-c:         VZ1716-RIPE
    status:         ASSIGNED PA
    mnt-by:         MNT-RUSONYX
    created:        2018-10-10T09:53:33Z
    last-modified:  2018-10-16T12:37:40Z
    source:         RIPE # Filtered

    organisation:   ORG-RL31-RIPE
    org-name:       Rusonyx, Ltd.
    country:        RU
    org-type:       LIR
    address:        5th st. Yamskogo Polya, 9, office 19
    address:        125040
    address:        Moscow
    address:        RUSSIAN FEDERATION
    phone:          +74951370701
    fax-no:         +74951370701
    mnt-ref:        RIPE-NCC-HM-MNT
    mnt-ref:        MNT-RUSONYX
    mnt-by:         RIPE-NCC-HM-MNT
    mnt-by:         MNT-RUSONYX
    abuse-c:        AD11015-RIPE
    created:        2006-08-18T09:59:51Z
    last-modified:  2022-10-06T11:18:08Z
    source:         RIPE # Filtered

    person:         Viktor Zverkov
    address:        P.O. Box 19
    address:        127137, Moscow, Russia
    address:        Rusonyx ltd.
    phone:          +7 495 5089959
    nic-hdl:        VZ1716-RIPE
    mnt-by:         MNT-RUSONYX
    created:        2017-09-20T11:29:16Z
    last-modified:  2022-07-05T14:00:10Z
    source:         RIPE

    person:         Viktor Zaytsev
    address:        P.O. Box 19 , Russia
    address:        127137, Moscow
    address:        Rusonyx ltd.
    phone:          +7 495 5089959
    nic-hdl:        VZ1717-RIPE
    mnt-by:         MNT-RUSONYX
    mnt-by:         AM65535-MNT
    created:        2017-09-20T11:54:54Z
    last-modified:  2018-08-02T17:21:31Z
    source:         RIPE

    % Information related to '89.253.232.0/21AS41535'

    route:          89.253.232.0/21
    descr:          RUSONYX-RU
    origin:         AS41535
    mnt-by:         MNT-RUSONYX
    created:        2017-11-24T09:34:37Z
    last-modified:  2017-11-24T09:34:37Z
    source:         RIPE

    % This query was served by the RIPE Database Query Service version 1.107 (DEXTER)
Not sure why this would be happening (looks like at least one other person in the thread is seeing same result).
◧◩◪◨
93. ninjag+OI[view] [source] [discussion] 2023-08-02 16:53:49
>>adql+UG
I was willing to give CF the benefit of the doubt, until other posters (and you) pointed out that this is a red herring. Also given Stavros' note [1] on how archive.is needs the EDNS data to protect themselves from CSAM/ISIS material based attacks and that they suggested solutions but CF refused to cooperate, I'm unsure of the motives behind these posters claiming CF is protecting privacy. Matthew Prince's motives in his truth-but-not-full-truth response are obvious.

[1] >>36971650

◧◩
94. ninjag+8J[view] [source] [discussion] 2023-08-02 16:55:00
>>electr+yd
This case might not be one of an intransigent maintainers. Check out Stavros' note [1]

>>36971650

◧◩◪◨⬒
100. nullin+IL[view] [source] [discussion] 2023-08-02 17:06:34
>>rovr13+3K
Exchange Online determines the closest EXO front door by the location of resolver. Other M365 services do not use this method, it is an artifact from Exchange Server.

EDIT: This is outlined in [0], although it doesn't go into the depth I wish it did.

> By providing local Internet egress and by configuring internal DNS servers to provide local name resolution for Microsoft 365 endpoints, network traffic destined for Microsoft 365 can connect to Microsoft 365 front end servers as close as possible to the user.

[0] https://learn.microsoft.com/microsoft-365/enterprise/microso...

◧◩◪◨
103. pigeon+ZN[view] [source] [discussion] 2023-08-02 17:16:09
>>cortes+4I
Encrypted SNI has been in the works for a long time: https://www.cloudflare.com/en-gb/learning/ssl/what-is-encryp...
◧◩
104. throw0+MO[view] [source] [discussion] 2023-08-02 17:19:34
>>freedo+Ka
> Cloudflare CEO Matthew Prince answered this directly on HN: >>19828702

Archive.is' explanation is quoted in a comment below:

* >>36971650

◧◩◪◨⬒⬓⬔⧯
109. arp242+mS[view] [source] [discussion] 2023-08-02 17:33:32
>>freedo+vv
https://app.ahrefs.com/user/forgot-password is the link that was used in the "Tell HN" they posted last time.

Works for me on Linux in Firefox and Chromium.

◧◩◪◨⬒
114. NicoJu+ZU[view] [source] [discussion] 2023-08-02 17:44:37
>>ninjag+OI
I'm still giving cf the benefit of the doubt, but I need more research.

I always found the funding of archive.is unknown. Who is behind it and why do they want this info. Why and how they can provide this for free is a big unknown to me.

I'm giving cf the benefit of the doubt against archive. At least I know cloudflare and this would be the first "doubt-moment"...

It's weird that others don't have this issue that much, I would have thought that CDN's would scream from everywhere for years already, if archive.is his statement is "complete".

Edit: cloudflare does not seem to block what's needed though.

>>19828702

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

117. msravi+UX[view] [source] 2023-08-02 17:55:08
>>lolind+(OP)
Nextdns: How we made DNS both fast and private with ECS[0]

Cloudflare sends the closest city from where the request was made which ought to be sufficient to optimize for a cdn I guess? Appears that archive.is doesn't have a locus standii in this debate...

> EDNS IP subsets can be used to better geolocate responses for services that use DNS-based load balancing. However, 1.1.1.1 is delivered across Cloudflare’s entire network that today spans 180 cities. We publish the geolocation information of the IPs that we query from. That allows any network with less density than we have to properly return DNS-targeted results.

0. https://medium.com/nextdns/how-we-made-dns-both-fast-and-pri...

◧◩◪
119. stock_+JY[view] [source] [discussion] 2023-08-02 17:58:16
>>croes+Gw
In addition to what others mentioned, typically EDNS0 edns-client-subnet is truncated before forwarding.

For example in unbound the defaults, when EDNS0 is enabled (disabled by default), are:

  max-client-subnet-ipv6: 56
  max-client-subnet-ipv4: 24
Forwarding can also be conditionally enabled for specific clients, upstream servers, specific zones, etc.

ref: https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound...

◧◩◪
124. btown+W51[view] [source] [discussion] 2023-08-02 18:29:23
>>eastda+Wc
Have you thought about spoofing the EDNS to (a less truncated version of) the nearest Cloudflare edge node's IP? This would be no more of a privacy leak than traffic from your edge to origin servers, while providing generally enough geographic information to keep latency low on the source. This is at the very least compliant with the spirit of the RFC, no?

EDIT: another comment, though somewhat hearsay, suggests that Cloudflare's caching could make this difficult to implement: >>36971650

◧◩
128. Arnavi+Ma1[view] [source] [discussion] 2023-08-02 18:48:05
>>msravi+UX
>Cloudflare sends the closest city from where the request was made which ought to be sufficient to optimize for a cdn I guess? Appears that archive.is doesn't have a locus standii in this debate...

>>36973056

>>all requests for 7 archive.* domains are sent from Symantec USA IP

It might be that the archive.is only lies to that IP, which would explain why many users in this thread say that archive.is does resolve correctly for them with 1.1.1.1

◧◩◪◨⬒⬓⬔⧯▣
143. joseph+jI1[view] [source] [discussion] 2023-08-02 20:56:24
>>brirec+zx1
> And as far as I know you can’t just request them to crawl a site and then browse it there immediately, but you can on Archive.is

Yes you can. After you put in the URL, you get a button to do so. I just did it for your comment: https://web.archive.org/web/20230802205505/https://news.ycom...

◧◩◪
147. electr+IV1[view] [source] [discussion] 2023-08-02 21:49:13
>>whoopd+3P
I do believe both parties see the other this way.

Archive.is believes that Cloudflare can simply provide the full EDNS data, and they're technically right. But Cloudflare won't budge because they believe this is hostile to user privacy. I haven't heard a counterargument that Cloudflare is wrong about this.

Cloudflare believes that Archive.is can simply live without the EDNS data, and they're technically right. But Archive.is won't budge because they believe it prevents their abuse prevention techniques. They mention that owning their own AS would solve the problem but that's too expensive.[1]

Blame is in the eye of the beholder, but it seems to me that Archive.is should find alternative abuse prevention techniques like other websites do. Cloudflare has an argument based on privacy. Archive.is has an argument based on the proper solution being too expensive. The expense of running an AS is disputed in this HN thread.[2]

[1] >>36971650

[2] >>36977654

◧◩◪◨
153. doabel+m92[view] [source] [discussion] 2023-08-02 22:54:11
>>jshier+P91
> Warp's insistence on passing my origin IP to my destinations

IIRC WARP was only able to forward your origin IP to websites using Cloudflare. Then, as of Aug 2022, their FAQ[1] says your origin IP is hidden regardless of which website. Their IPs do reveal your geolocation though.

There was a bug[2] that revealed your IP to select websites; that seems to have been fixed by Nov 2022.

Disclaimer: I’m not knowledgeable enough to test every possible IP leak mechanism (like WebRTC), so I didn’t do that. I’m basically taking their word for it.

[1] https://developers.cloudflare.com/warp-client/known-issues-a...

[2] https://community.cloudflare.com/t/beware-cloudflare-warp-do...

155. below4+ob2[view] [source] 2023-08-02 23:06:50
>>lolind+(OP)
https://archive.is/hpKIB
158. News-D+rs2[view] [source] 2023-08-03 01:19:28
>>lolind+(OP)
archive.today or archive.is : https://en.wikipedia.org/wiki/Archive.today

archive.today - FAQ : https://archive.md/faq

archive.today - wiki : https://wiki.archiveteam.org/index.php/Archive.today

archiveteam wiki : https://wiki.archiveteam.org/

Tumblr : https://archive-is.tumblr.com/

Twitter : https://twitter.com/archiveis

  archive.today

  archive.ph

  archive.is

  archive.li

  archive.vn

  archive.fo

  archive.md

  archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion
Launched May 16, 2012; 11 years ago
◧◩◪◨⬒⬓⬔⧯
170. lxgr+ef4[view] [source] [discussion] 2023-08-03 15:12:50
>>godels+hc2
> In the latter case, that seems like it just wouldn't be such a big deal, right? Since the hit would only happen user side and be a small percentage of the user's time on the site?

True, but it's still the difference between being able to load all embedded resources from a server close to the user or potentially having to haul all of that across an ocean, considering TCP congestion window scaling (which is sensitive to round trip times) etc.

All that said, based on a purported comment by the maintainer of archive.is, the aim of their CDN is actually not improving responsivity, but delaying legal/law enforcement responses: >>36971650

> Archive says that privacy is preserved because they truncate the PII.

Personally, I don't have a lot of sympathy for either party here:

I think, especially given the comment linked above, Archive's latency/efficiency concerns are just pretext for quite different concerns of their own (having to deal with law enforcement).

And on the other hand, while Cloudflare's EDNS subnet truncation might help user privacy in a few edge cases (as many have said here, the visited site will get the user's IP as soon as they connect to their servers!), it also makes it that much harder for CDNs other than Cloudflare to efficiently serve content using DNS-based routing and forces them to also use Anycast, which is much harder to do.

[go to top]