hhmx.de

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 17:14:38

So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use.

Let me put the important words in uppercase.

So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use.

[Edit with H/T: benjojo.co.uk/u/benjojo/h/cR4d]

blog.cloudflare.com/password-r

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 17:19:59

@malanalysis it makes sense since they function as a global reverse proxy and do MItM decryption of traffic for optimization purposes. But them calling it in such a way is creepy, and also now the cybersecurity community needs to rekon with something we technically knew was going on before but didn't consciously consider a threat, until now.

Erik van Straten

Föderation EN Mo 17.03.2025 18:01:49

@0xF21D wrote: "[...] something we technically knew was going on before but didn't consciously consider a threat, until now."

I've been warning for CDN's like Cloudflare and Fastly (and cloud providers in general) for a long time.

Here's a recent toot (in Dutch, the "translate" button should do the job): infosec.exchange/@ErikvanStrat.

If you trust Google to translate it (guaranteed NOT error-free, it *may* work in other browsers than Chrome): infosec-exchange.translate.goo

P.S. Fastly knows your infosec.exchange login credentials.

@malanalysis

Jess👾

Föderation EN Mo 17.03.2025 20:12:30

But it's okay because it's just our Cloudflare free accounts!

As usual, if you're using a company's services for free, you're not the customer, you're the product being sold.

Scope of the analysis

Our data analysis focuses on traffic from Internet properties on Cloudflare’s free plan, which includes leaked credentials detection as a built-in feature. Leaked credentials refer to usernames and passwords exposed in known data breaches or credential dumps — for this analysis, our focus is specifically on leaked passwords. With 30 million Internet properties, comprising some 20% of the web, behind Cloudflare, this analysis provides significant insights. The data primarily reflects trends observed after the detection system was launched during Birthday Week in September 2024.

blog.cloudflare.com/password-r

@0xF21D @malanalysis

Krypt3ia

Föderation EN Mo 17.03.2025 17:18:31

@0xF21D So, CloudFlare, IS the Mos Eisley of the internet providers.

Trillium Jones Get MMR vax  🫂

Föderation EN Mo 17.03.2025 18:34:35

@krypt3ia @0xF21D

I'm glad I never used any cloud storage. Avoiding 'scum and villiany'.

cR0w :cascadia:

Föderation EN Mo 17.03.2025 17:20:23

@0xF21D I may have a suggested edit for them, for brevity's sake:

Keeping user accounts safe with Cloudflare

FUCKING BLOCK IT

Mark Koek

Föderation NL Mo 17.03.2025 17:20:33

@0xF21D good reminder that I still need to move a couple of things away from there…

Fisher

Föderation EN Mo 17.03.2025 17:21:37

@0xF21D When you employ a middleman, he will be the mitm.

Phil Greer

Föderation EN Mo 17.03.2025 17:22:51

@0xF21D
So cloudflare is the man in the middle attack we have always been warned about

Marta Threadbare

Föderation EN Mo 17.03.2025 18:05:43

@pgreer @0xF21D the "man in the middle" who also happens to be a ̶n̶a̶z̶i̶free speech absolutist

Adam

Föderation EN Mo 17.03.2025 20:34:34

@cygnathreadbare @pgreer @0xF21D

Are they tho? I thought they had a very inconsistent approach to this. I remember they're C.E.O. kicked off the Daily Stormer years ago, after first tolerating them for a bit, which doesn't sound like the action of a nazi free speech absolutist to me and nothing compared with Xitter. Have they been hosting or defending more nazi shit recently?

Adam

Föderation EN Mo 17.03.2025 20:24:44

@pgreer @0xF21D

Yes, Cloudflare "protecting" sites again with they're MITM-as-a-service offering

Faintdreams

Föderation EN Mo 17.03.2025 17:31:29

@0xF21D

👀

What with the WHO THE FUCK NOW ??

:: sheesh ::

Howard Chu @ Symas

Föderation EN Mo 17.03.2025 17:32:47

@0xF21D why are websites still using custom login forms with plaintext credentials? Should all be using browser-computed SCRAM in standard http authentication.

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 18:07:58

@hyc with cloudflare, anything is possible. :(

Erwin van Beinum

Föderation EN Mo 17.03.2025 17:34:12

@0xF21D I will assume that this is only on the cloudflare WAF feature where they automatically check against known leaked credentials. The website owner can request this feature to be able to inform the user they should use a different password. If they would analyse all traffic without explicit consent from the site owner it would be dubious at best.

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 17:36:37

@Erwinvb sites using cloudflare's free plan. Looks like it's a feature they automatically opted sites in to.

(Medien: 1)

Hannes

Föderation EN Mo 17.03.2025 17:53:56

@0xF21D it's long known that the cloudflare proxy in the free tier will terminate SSL at their servers and re-encrypt it on the way to your host. They can basically analyze everything sent through the proxy.

So I'm honestly not surprised at all that they do, in fact, analyze the data users willingly throw at them.

Personally I am using* CF for my domain and DNS as well, but without proxy because of that.

*Because sadly, they are the only ones having a proper API to get letsencrypt certs via DNS auth.

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 17:58:26

@hannsr DNS verification for Let's Encrypt can be hard to automate for sure.

While note surprising, it begs the quesiton, how deep are we willing to go with unfettered data collection up to and including passwords/credentials.

Hannah

Föderation EN Mo 17.03.2025 18:27:22

@0xF21D @hannsr My traefik instance does DNS Auth with INWX just fine?

Also there is this wonderful project: github.com/joohoi/acme-dns

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 18:28:24

@scatty_hannah @hannsr thnaks! I'll check that out.

Gustavo

Föderation EN Mo 17.03.2025 18:17:27

@hannsr I thought people already know all about that. To be fair, I find it really strange that people don't know that, even TLS and password hashing algos, servers (including intermediate passwords, like reverse proxies such as Cloudflare's) have access to user passwords. Those often don't have access to the passwords in plain text in storage (hopefully, I saw my share of bad password storage and it's horrifying), but most have during authentication. WebAuthn should fix that using cryptographic keys, but is hard to use (AFAIK it require tokens, which can be expensive for some people), the extension of it with Passkeys should make it simpler for people (but it never worked for me, so I can't even test it) and TLS-SRP never gained any popularity. Don't get me started on JS-based SRP...

da_andi

Föderation EN Mo 17.03.2025 18:29:23

@hannsr @0xF21D I also used cf only for DNS but recently I noticed they create cerrificates for my domains as well allthough technically not required. I'm taking back control.

Jens Bannmann

Föderation EN Mo 17.03.2025 18:40:25

@hannsr, you might want to check out desec.io/. According to desec.readthedocs.io/en/latest they fully support Let's Encrypt via DNS.

@0xF21D

Patrick Morris Miller

Föderation EN Mo 17.03.2025 17:59:10

@0xF21D Your one stop compromise shop! Four out of five police states recommend their victims use it.

Codimp

Föderation EN Mo 17.03.2025 17:59:18

@0xF21D "Are you afraid of MitM between you and our website? Don't worry, we paid an enterprise to do it for us the best way 👍​"

BuckRogers1965

Föderation EN Mo 17.03.2025 18:03:03

@0xF21D

So cloudflare knows everyone's passwords and what sites they visit?

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 18:07:09

@BuckRogers1965 at this point I think it is safe to assume the answer has been "yes, for sites that transit through cloudflare (cloudflare's customers)."

Cluster Fcku

Föderation EN Mo 17.03.2025 18:21:22

@0xF21D @BuckRogers1965 how Does cloudstrike use their CA key for this purpose? Can any government or doge-like IT just ask a CA to snoop SSL?

groxx

Föderation EN Mo 17.03.2025 18:31:09

@clusterfcku @0xF21D @BuckRogers1965 how would they know what cached URL you requested if they didn't? They need to be able to read the request, both for providing caching and for many DOS preventions.

(to be clear I think this is a TERRIBLE tradeoff... but it's not new or anything. every CDN can do this too, which is part of why you often see CDN resources under a different domain, but not everyone does that)

BuckRogers1965

Föderation EN Mo 17.03.2025 18:49:40

@groxx @clusterfcku @0xF21D

But the web site could be designed to not use the cdn for the authentication portion of the web site. So this is also a web design issue.

BuckRogers1965

Föderation EN Mo 17.03.2025 18:51:22

@clusterfcku @0xF21D

Yes, they can just ask with a letter that says the CA can never speak about the request. Then DOGE will have the password to all your accounts.

scott

Föderation EN Mo 17.03.2025 19:13:49

@clusterfcku @0xF21D @BuckRogers1965 If you want to use a proxy like CF you need to upload your cert's private key to the proxy. They don't need special key - site owners send their own.

BuckRogers1965

Föderation EN Mo 17.03.2025 22:53:31

@scott @clusterfcku @0xF21D

Yeah, I get that, but you can put the authentication page on your own servers so the proxy service can't see the passwords in the web requests, the authentication page, the login page could be on the companies own servers and that would stop the CND from reading passwords and other identifying information.

Leeloo

Föderation EN Mo 17.03.2025 19:45:18

@clusterfcku @0xF21D @BuckRogers1965
Most governments have their own CA. Maybe not officially, but then via e.g. the telephone monopoly or similar.

And browsers just trust all of them.

Which is why I for years have considered the http encryption to be more secure than https. At least the "rot-zero" of http doesn't give a false sense of security

radekcrlik

Föderation CS Mo 17.03.2025 18:14:55

@0xF21D wtf, carl! Damn pirates.

Robbert

Föderation EN Mo 17.03.2025 18:20:16

@0xF21D if i understand the docs, it's an optional feature you can enable.
not sure if that is using the monitoring, or enabling the monitoring

juddy

Föderation EN Mo 17.03.2025 18:45:53

@0xF21D HTTP only, opt-in.
You can (should) do this at home.

“Once enabled, leaked credentials detection will scan incoming HTTP requests for known authentication patterns…”

Arnaud

Föderation FR Mo 17.03.2025 20:07:26

@juddy @0xF21D Lowkey hate how nobody read the article and noticed that it's actually a feature you optin to

Koen 🇺🇦

Föderation EN Mo 17.03.2025 18:46:29

@0xF21D all your data belong to US big tech companies for profit you dumb europeans

7eace

Föderation EN Mo 17.03.2025 18:48:37

@0xF21D come again? 😂

sebsauvage

Föderation EN Mo 17.03.2025 18:53:34

@0xF21D
Thank you for pointing this out.

Ian

Föderation EN Mo 17.03.2025 18:55:33

@0xF21D to be clear, the blog post states they got their data from a feature you need to enable and configure. So this shouldn't be a surprise to most cloudflare customers.

developers.cloudflare.com/waf/

developers.cloudflare.com/waf/

Adam

Föderation EN Mo 17.03.2025 20:43:24

@soviut @0xF21D

They're blog post refers to a "built in" feature and does not mention the issue of consent at all, which sounds suspiciously like users were automatically opted in to this. The fact that they only ran this study on free tier users is also telling

Ian

Föderation EN Mo 17.03.2025 21:36:48

@adamsaidsomething @0xF21D I spoke with a few people on the CloudFlare discord about this. Bear in mind this is a community manager, not necessarily a cloudflare employee!

"if you use Cloudflare and proxy traffic, they can read your traffic because they're doing TLS termination"

They said it's well defined in the privacy policy since you generally are using them as a proxy and/or firewall so they'd be able to read your traffic.

But they agreed that the docs could add some additional clarification about the feature's reach.

(Medien: 1)

Freyja 🕯️:flag_transgender:🕯

Föderation EN Mo 17.03.2025 18:55:47

@0xF21D all your kiwifarms passwords belong to us

Soatok Dreamseeker

Föderation EN Mo 17.03.2025 18:56:13

@0xF21D As bad as the optics are on this one, they're doing the moral equivalent of github.com/DivineOmega/passwor

They aren't storing people's passwords for their analysis, they queried the HIBP API with the first 5 hexits from the SHA1 hash of the user's password then check if the full SHA1 hash is returned. If it is, they report that it's compromised. If it isn't, they report that it isn't.

Is it alarming that they're in a position to do this for all the websites they protect? Oh, absolutely.

But CloudFlare was always MitM as a Service (the Service being "DDoS mitigation"). That's one reason why it's so actively distrusted.

Maggie Maybe

Föderation EN Mo 17.03.2025 19:04:15

@0xF21D my iPhone does this and it’s creepy AF. It will tell me if other people use similar passwords or if mine would be easy to guess. But it will also tell me if my password has been in a data breach which has been helpful because half of these data breaches I only find out about by seeing the notation in my iPhone password area.

Then google tries to force me to set up a “passkey” which won’t help me login to Google Voice on my computer to do two factor authentication if I ever lose my phone, so I’m not real sure how I would get back to any of these things if I misplaced my phone. I can’t transfer the phone number attached to my phone to a new phone if I can’t get into the email, and I can’t get into the email if I can’t give them a code from the phone, which is why I wanted to use a Google Voice number for that stuff, but if I lose my phone I can’t get into the Google Voice.

It all just feels like a huge scam. Yesterday I tried to file a Small Claims Court case and it only gave me two court options so I chose the one closest to me. This morning they told me my filing was rejected because I chose the wrong jurisdiction, when I got someone on the phone they told me the right one should be there, and low and behold it was today.

But as I was going through refiling this morning all I could think about was this is how they lock us out of this stuff. You can only e-file small claims cases, and if I don’t have the option to choose the correct court when I e-file I can’t file. And when it gets to the point that no one is there to answer the phone to help us there will be no help to be had.

And at this point I think I have drifted far off topic and I apologize, but it’s possible I have circled right back around to the topic at hand because this is all the same problem at its core.

Zitrone 🍋 :nixos:

Föderation EN Mo 17.03.2025 19:07:40

@0xF21D this toot is a bit misleading imo.

Saying it like like you did sounds like CloudFlare keeps a database of passwords people use on websites in order to conpare them. However cloudflare only compares them to previously leaked password (through haveibeenpwned and other sources). This could theoretically be done without cloudflare ever having the password. I don't know how they do it though.

It doesn't change the fact that CloudFlare is an actual MitM and therefore a huge security risk.

Karl Auerbach

Föderation EN Mo 17.03.2025 19:14:46

@0xF21D In addition, remember that Cloudflare offers DNS resolvers at the 1.1.1.1 IPv4 anycast address.

Being in the position of the a users DNS resolver opens up all kinds of possibilities for manipulation of the returned resource records. (It's been a many years since I played with DNSSEC, so I am not sure whether DNSSEC could provide protection.)

Menel

Föderation EN Mo 17.03.2025 19:17:22

I wonder why anyone thinks they are the good guys?
They run half the internet all for free....
¯\(ツ)

Picture of a surprised Picachu.

(Medien: 1)

Isarblues

Föderation EN Mo 17.03.2025 19:22:10

Let me put further important words in uppercase:
One more reason why it's a REALLY GOOD IDEA to REALLY ASAP!

@0xF21D wrote:
So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use.

Let me put the important words in uppercase.

So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use.

blog.cloudflare.com/password-r

Infoseepage

Föderation EN Mo 17.03.2025 19:28:07

@0xF21D It's almost like Cloudflare is in fact this huge vulnerability that is in a position to intercept and analyze a huge percentage of the web's overall traffic...and we're just trusting them not to be evil.

Robert [KJ5ELX] :donor:

Föderation EN Mo 17.03.2025 20:06:01

@Infoseepage or pretending like they can’t be compelled to turn over information that the current regime determine to be in the interest of national security.

Infoseepage

Föderation EN Mo 17.03.2025 21:39:33

@0xF21D The whole threat surface of computing has VASTLY increased with the previously unthinkable now thinkable. I've been harping on it for while, but nation states need to be treating US based computing ANYTHING as a huge risk and acting with great urgency to eliminate US dependencies.

Django

Föderation DE Mo 17.03.2025 19:45:05

@0xF21D

Cloudflare + MITM = Bullshit

Still any questions? Don't usw this shit!

SkaveRat 🐀 :verified:

Föderation EN Mo 17.03.2025 19:58:13

@0xF21D One day I would love to have the balls to do that and then write a blog with the headline "Keeping user accounts safe with Cloudflare"

Daniel Neuman

Föderation EN Mo 17.03.2025 20:01:38

Monty Python meme:
On second thought, let’s not proxy through cloudflare, ’tis a silly cloud

(Medien: 1)

crazyeddie

Föderation EN Mo 17.03.2025 20:06:48

@0xF21D What software is that guy using? It looks like people are repyling from mastodon. Is this a write.as? I didn't think it had that feature actually.

Anyway, this is nuts, and one person there saying he's fine with it because it's free: said the same thing when I joined gmail what, two decades ago? Really regret that now. We should care more about privacy. _I_ didn't sign up for this.

I'm American though. Used to it.

helle 🐈 (stray cat girl(s))

Föderation EN Mo 17.03.2025 20:17:23

@0xF21D global MITM machine MITMs *sigh*

Peter Bindels

Föderation EN Mo 17.03.2025 20:38:02

@0xF21D So if you give your private key and certificate to a third party to MITM you, or you let them request their own certificate, they can MITM you?!

Who saw that coming?!

🇪🇺Grey08 🇩🇪🇬🇧

Föderation EN Mo 17.03.2025 20:57:10

@0xF21D @bsi Hey evtl. Auch interessant für euch und ob es dem Datenschutz etwas weh tut :)

CyberFrog

Föderation · Mo 17.03.2025 21:22:07

@0xF21D@infosec.exchange that moment when your supply chain risk is the largest protection service in the world, and they just do crimes without being arrested because they're a company and wrote a cute blog to call it "data analysis" when they sniff login credentials lol

m_on_stair

Föderation EN Mo 17.03.2025 21:42:38

@0xF21D@infosec.exchange you are implying they are MitMing plaintext passwords and thats just actively spreading misinfo at that point.

v

Föderation EN Mo 17.03.2025 21:43:56

@0xF21D netwatch

Elric

Föderation EN Mo 17.03.2025 21:49:21

@0xF21D I'm surprised that anyone is surprised by this. CDNs are an awful idea. Putting way too many eggs in way too few baskets. Trusting a bunch of oversized corps to do The Right Thing.

Herr TurTur

Föderation · Mo 17.03.2025 22:28:32

@0xF21D@infosec.exchange
Oh, they store passwords in clear text? Now that's ridiculous.