Föderation EN Mo 17.03.2025 17:14:38 So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use. Let me put the important words in uppercase. So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use. [Edit with H/T: https://benjojo.co.uk/u/benjojo/h/cR4dJWj3KZltPv3rqX] https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/ |
Föderation EN Mo 17.03.2025 17:17:52 |
Föderation EN Mo 17.03.2025 17:19:59 @malanalysis it makes sense since they function as a global reverse proxy and do MItM decryption of traffic for optimization purposes. But them calling it in such a way is creepy, and also now the cybersecurity community needs to rekon with something we technically knew was going on before but didn't consciously consider a threat, until now. |
Föderation EN Mo 17.03.2025 18:01:49 @0xF21D wrote: "[...] something we technically knew was going on before but didn't consciously consider a threat, until now." I've been warning for CDN's like Cloudflare and Fastly (and cloud providers in general) for a long time. Here's a recent toot (in Dutch, the "translate" button should do the job): https://infosec.exchange/@ErikvanStraten/114042082778156313. If you trust Google to translate it (guaranteed NOT error-free, it *may* work in other browsers than Chrome): https://infosec-exchange.translate.goog/@ErikvanStraten/114042082778156313?_x_tr_sl=nl&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp P.S. Fastly knows your https://infosec.exchange login credentials. |
Föderation EN Mo 17.03.2025 20:12:30 But it's okay because it's just our Cloudflare free accounts! As usual, if you're using a company's services for free, you're not the customer, you're the product being sold.
|
Föderation EN Mo 17.03.2025 20:55:48 (Medien: 1) |
Föderation EN Mo 17.03.2025 17:18:31 @0xF21D So, CloudFlare, IS the Mos Eisley of the internet providers. |
Föderation EN Mo 17.03.2025 18:34:35 |
Föderation EN Mo 17.03.2025 17:20:23 @0xF21D I may have a suggested edit for them, for brevity's sake:
|
Föderation NL Mo 17.03.2025 17:20:33 @0xF21D good reminder that I still need to move a couple of things away from there… |
Föderation EN Mo 17.03.2025 17:21:37 @0xF21D When you employ a middleman, he will be the mitm. |
Föderation EN Mo 17.03.2025 17:22:51 @0xF21D |
Föderation EN Mo 17.03.2025 18:05:43 |
Föderation EN Mo 17.03.2025 20:34:34 @cygnathreadbare @pgreer @0xF21D Are they tho? I thought they had a very inconsistent approach to this. I remember they're C.E.O. kicked off the Daily Stormer years ago, after first tolerating them for a bit, which doesn't sound like the action of a nazi free speech absolutist to me and nothing compared with Xitter. Have they been hosting or defending more nazi shit recently? |
Föderation EN Mo 17.03.2025 20:24:44 |
Föderation EN Mo 17.03.2025 17:31:29 |
Föderation EN Mo 17.03.2025 17:32:47 @0xF21D why are websites still using custom login forms with plaintext credentials? Should all be using browser-computed SCRAM in standard http authentication. |
Föderation EN Mo 17.03.2025 18:07:58 @hyc with cloudflare, anything is possible. :( |
Föderation EN Mo 17.03.2025 17:34:12 @0xF21D I will assume that this is only on the cloudflare WAF feature where they automatically check against known leaked credentials. The website owner can request this feature to be able to inform the user they should use a different password. If they would analyse all traffic without explicit consent from the site owner it would be dubious at best. |
Föderation EN Mo 17.03.2025 17:36:37 @Erwinvb sites using cloudflare's free plan. Looks like it's a feature they automatically opted sites in to. (Medien: 1) |
Föderation EN Mo 17.03.2025 17:53:56 @0xF21D it's long known that the cloudflare proxy in the free tier will terminate SSL at their servers and re-encrypt it on the way to your host. They can basically analyze everything sent through the proxy. So I'm honestly not surprised at all that they do, in fact, analyze the data users willingly throw at them. Personally I am using* CF for my domain and DNS as well, but without proxy because of that. *Because sadly, they are the only ones having a proper API to get letsencrypt certs via DNS auth. |
Föderation EN Mo 17.03.2025 17:58:26 @hannsr DNS verification for Let's Encrypt can be hard to automate for sure. While note surprising, it begs the quesiton, how deep are we willing to go with unfettered data collection up to and including passwords/credentials. |
Föderation EN Mo 17.03.2025 18:27:22 @0xF21D @hannsr My traefik instance does DNS Auth with INWX just fine? Also there is this wonderful project: https://github.com/joohoi/acme-dns |
Föderation EN Mo 17.03.2025 18:28:24 @scatty_hannah @hannsr thnaks! I'll check that out. |
Föderation EN Mo 17.03.2025 18:17:27 @hannsr I thought people already know all about that. To be fair, I find it really strange that people don't know that, even TLS and password hashing algos, servers (including intermediate passwords, like reverse proxies such as Cloudflare's) have access to user passwords. Those often don't have access to the passwords in plain text in storage (hopefully, I saw my share of bad password storage and it's horrifying), but most have during authentication. WebAuthn should fix that using cryptographic keys, but is hard to use (AFAIK it require tokens, which can be expensive for some people), the extension of it with Passkeys should make it simpler for people (but it never worked for me, so I can't even test it) and TLS-SRP never gained any popularity. Don't get me started on JS-based SRP... |
Föderation EN Mo 17.03.2025 18:29:23 |
Föderation EN Mo 17.03.2025 18:40:25 @hannsr, you might want to check out https://desec.io/. According to https://desec.readthedocs.io/en/latest/integrations/lets-encrypt.html they fully support Let's Encrypt via DNS. |
Föderation EN Mo 17.03.2025 17:59:10 @0xF21D Your one stop compromise shop! Four out of five police states recommend their victims use it. |
Föderation EN Mo 17.03.2025 17:59:18 @0xF21D "Are you afraid of MitM between you and our website? Don't worry, we paid an enterprise to do it for us the best way 👍" |
Föderation EN Mo 17.03.2025 18:03:03 So cloudflare knows everyone's passwords and what sites they visit? |
Föderation EN Mo 17.03.2025 18:07:09 @BuckRogers1965 at this point I think it is safe to assume the answer has been "yes, for sites that transit through cloudflare (cloudflare's customers)." |
Föderation EN Mo 17.03.2025 18:21:22 @0xF21D @BuckRogers1965 how Does cloudstrike use their CA key for this purpose? Can any government or doge-like IT just ask a CA to snoop SSL? |
Föderation EN Mo 17.03.2025 18:31:09 @clusterfcku @0xF21D @BuckRogers1965 how would they know what cached URL you requested if they didn't? They need to be able to read the request, both for providing caching and for many DOS preventions. (to be clear I think this is a TERRIBLE tradeoff... but it's not new or anything. every CDN can do this too, which is part of why you often see CDN resources under a different domain, but not everyone does that) |
Föderation EN Mo 17.03.2025 18:49:40 But the web site could be designed to not use the cdn for the authentication portion of the web site. So this is also a web design issue. |
Föderation EN Mo 17.03.2025 18:51:22 Yes, they can just ask with a letter that says the CA can never speak about the request. Then DOGE will have the password to all your accounts. |
Föderation EN Mo 17.03.2025 19:13:49 @clusterfcku @0xF21D @BuckRogers1965 If you want to use a proxy like CF you need to upload your cert's private key to the proxy. They don't need special key - site owners send their own. |
Föderation EN Mo 17.03.2025 22:53:31 Yeah, I get that, but you can put the authentication page on your own servers so the proxy service can't see the passwords in the web requests, the authentication page, the login page could be on the companies own servers and that would stop the CND from reading passwords and other identifying information. |
Föderation EN Mo 17.03.2025 19:45:18 @clusterfcku @0xF21D @BuckRogers1965 And browsers just trust all of them. Which is why I for years have considered the http encryption to be more secure than https. At least the "rot-zero" of http doesn't give a false sense of security |
Föderation EN Mo 17.03.2025 18:12:46 @0xF21D |
Föderation CS Mo 17.03.2025 18:14:55 @0xF21D wtf, carl! Damn pirates. |
Föderation EN Mo 17.03.2025 18:20:16 @0xF21D if i understand the docs, it's an optional feature you can enable. |
Föderation EN Mo 17.03.2025 18:45:53 @0xF21D HTTP only, opt-in. “Once enabled, leaked credentials detection will scan incoming HTTP requests for known authentication patterns…” |
Föderation FR Mo 17.03.2025 20:07:26 |
Föderation EN Mo 17.03.2025 18:46:29 @0xF21D all your data belong to US big tech companies for profit you dumb europeans |
Föderation EN Mo 17.03.2025 18:48:37 @0xF21D come again? 😂 |
Föderation EN Mo 17.03.2025 18:53:34 @0xF21D |
Föderation EN Mo 17.03.2025 18:55:33 @0xF21D to be clear, the blog post states they got their data from a feature you need to enable and configure. So this shouldn't be a surprise to most cloudflare customers. https://developers.cloudflare.com/waf/detections/leaked-credentials/ https://developers.cloudflare.com/waf/managed-rules/check-for-exposed-credentials/ |
Föderation EN Mo 17.03.2025 20:43:24 |
Föderation EN Mo 17.03.2025 21:36:48 @adamsaidsomething @0xF21D I spoke with a few people on the CloudFlare discord about this. Bear in mind this is a community manager, not necessarily a cloudflare employee! "if you use Cloudflare and proxy traffic, they can read your traffic because they're doing TLS termination" They said it's well defined in the privacy policy since you generally are using them as a proxy and/or firewall so they'd be able to read your traffic. But they agreed that the docs could add some additional clarification about the feature's reach. (Medien: 1) |
Föderation EN Mo 17.03.2025 18:55:47 @0xF21D all your kiwifarms passwords belong to us |
Föderation EN Mo 17.03.2025 18:56:13 @0xF21D As bad as the optics are on this one, they're doing the moral equivalent of https://github.com/DivineOmega/password_exposed They aren't storing people's passwords for their analysis, they queried the HIBP API with the first 5 hexits from the SHA1 hash of the user's password then check if the full SHA1 hash is returned. If it is, they report that it's compromised. If it isn't, they report that it isn't. Is it alarming that they're in a position to do this for all the websites they protect? Oh, absolutely. But CloudFlare was always MitM as a Service (the Service being "DDoS mitigation"). That's one reason why it's so actively distrusted. |
Föderation EN Mo 17.03.2025 19:04:15 @0xF21D my iPhone does this and it’s creepy AF. It will tell me if other people use similar passwords or if mine would be easy to guess. But it will also tell me if my password has been in a data breach which has been helpful because half of these data breaches I only find out about by seeing the notation in my iPhone password area. Then google tries to force me to set up a “passkey” which won’t help me login to Google Voice on my computer to do two factor authentication if I ever lose my phone, so I’m not real sure how I would get back to any of these things if I misplaced my phone. I can’t transfer the phone number attached to my phone to a new phone if I can’t get into the email, and I can’t get into the email if I can’t give them a code from the phone, which is why I wanted to use a Google Voice number for that stuff, but if I lose my phone I can’t get into the Google Voice. It all just feels like a huge scam. Yesterday I tried to file a Small Claims Court case and it only gave me two court options so I chose the one closest to me. This morning they told me my filing was rejected because I chose the wrong jurisdiction, when I got someone on the phone they told me the right one should be there, and low and behold it was today. But as I was going through refiling this morning all I could think about was this is how they lock us out of this stuff. You can only e-file small claims cases, and if I don’t have the option to choose the correct court when I e-file I can’t file. And when it gets to the point that no one is there to answer the phone to help us there will be no help to be had. And at this point I think I have drifted far off topic and I apologize, but it’s possible I have circled right back around to the topic at hand because this is all the same problem at its core. |
Föderation EN Mo 17.03.2025 19:07:40 @0xF21D this toot is a bit misleading imo. Saying it like like you did sounds like CloudFlare keeps a database of passwords people use on websites in order to conpare them. However cloudflare only compares them to previously leaked password (through haveibeenpwned and other sources). This could theoretically be done without cloudflare ever having the password. I don't know how they do it though. It doesn't change the fact that CloudFlare is an actual MitM and therefore a huge security risk. |
Föderation EN Mo 17.03.2025 19:14:46 @0xF21D In addition, remember that Cloudflare offers DNS resolvers at the 1.1.1.1 IPv4 anycast address. Being in the position of the a users DNS resolver opens up all kinds of possibilities for manipulation of the returned resource records. (It's been a many years since I played with DNSSEC, so I am not sure whether DNSSEC could provide protection.) |
Föderation EN Mo 17.03.2025 19:17:22 I wonder why anyone thinks they are the good guys? (Medien: 1) |
Föderation EN Mo 17.03.2025 19:22:10 Let me put further important words in uppercase: @0xF21D wrote: Let me put the important words in uppercase. So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use. https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/ |
Föderation EN Mo 17.03.2025 19:28:07 @0xF21D It's almost like Cloudflare is in fact this huge vulnerability that is in a position to intercept and analyze a huge percentage of the web's overall traffic...and we're just trusting them not to be evil. |
Föderation EN Mo 17.03.2025 20:06:01 @Infoseepage or pretending like they can’t be compelled to turn over information that the current regime determine to be in the interest of national security. |
Föderation EN Mo 17.03.2025 21:39:33 @0xF21D The whole threat surface of computing has VASTLY increased with the previously unthinkable now thinkable. I've been harping on it for while, but nation states need to be treating US based computing ANYTHING as a huge risk and acting with great urgency to eliminate US dependencies. |
Föderation DE Mo 17.03.2025 19:45:05 @0xF21D Still any questions? Don't usw this shit! |
Föderation EN Mo 17.03.2025 19:58:13 @0xF21D One day I would love to have the balls to do that and then write a blog with the headline "Keeping user accounts safe with Cloudflare" |
Föderation EN Mo 17.03.2025 20:01:38 (Medien: 1) |
Föderation EN Mo 17.03.2025 20:06:48 @0xF21D What software is that guy using? It looks like people are repyling from mastodon. Is this a write.as? I didn't think it had that feature actually. Anyway, this is nuts, and one person there saying he's fine with it because it's free: said the same thing when I joined gmail what, two decades ago? Really regret that now. We should care more about privacy. _I_ didn't sign up for this. I'm American though. Used to it. |
Föderation EN Mo 17.03.2025 20:17:23 @0xF21D global MITM machine MITMs *sigh* |
Föderation EN Mo 17.03.2025 20:27:11 @0xF21D and? |
Föderation EN Mo 17.03.2025 20:31:47 |
Föderation EN Mo 17.03.2025 20:38:02 @0xF21D So if you give your private key and certificate to a third party to MITM you, or you let them request their own certificate, they can MITM you?! Who saw that coming?! |
Föderation EN Mo 17.03.2025 20:57:10 |
Föderation · Mo 17.03.2025 21:22:07 @0xF21D@infosec.exchange that moment when your supply chain risk is the largest protection service in the world, and they just do crimes without being arrested because they're a company and wrote a cute blog to call it "data analysis" when they sniff login credentials lol |
Föderation EN Mo 17.03.2025 21:24:59 |
Föderation EN Mo 17.03.2025 21:42:38 @0xF21D@infosec.exchange you are implying they are MitMing plaintext passwords and thats just actively spreading misinfo at that point. |
Föderation EN Mo 17.03.2025 21:43:56 @0xF21D netwatch |
Föderation EN Mo 17.03.2025 21:49:21 @0xF21D I'm surprised that anyone is surprised by this. CDNs are an awful idea. Putting way too many eggs in way too few baskets. Trusting a bunch of oversized corps to do The Right Thing. |
Föderation · Mo 17.03.2025 22:28:32 @0xF21D@infosec.exchange |
Föderation EN Mo 17.03.2025 22:44:53 @0xF21D WTAF! |