TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Airtel is sniffing and censoring CloudFlare’s traffic in India

258 pointsby happymanalmost 9 years ago

14 comments

spikengineeralmost 9 years ago
Here is what is happening:<p>Cloudflare Indian datacentres are hosted on Airtel&#x27;s networks.<p>Airtel by default blocks and replaces(with a notice) Piratebay traffic all across it&#x27;s network due to multiple court orders.<p>Cloudflare India servers call the piratebay origin servers and ask for a master copy and Airtel instead gives the substitute page on all the http traffic from piratebay to cloudflare servers.<p>Cloudflare servers display the malformed page they received from Airtel to all clients(all ISP&#x27;s) asking for piratebay in India.
评论 #12093044 未加载
评论 #12092385 未加载
yoo1Ialmost 9 years ago
All I&#x27;m hearing is that Cloudflare allows their customers to configure client facing TLS without enforcing it upstream over the internet, providing a false sense of security. Thanks Cloudflare!<p>... and I&#x27;m pretty sure that their response will be &quot;We are just a proxy, we are not responsible for anything&quot;.
评论 #12092394 未加载
评论 #12092465 未加载
评论 #12092265 未加载
jakozauralmost 9 years ago
I see a lot of people bashing CloudFlare, but to be fair:<p>1. Thanks to them many sites got SSL and sniffing your local network&#x2F;ISP is source of majority of the problems.<p>2. Some SSL is better than no SSL, though it can also create illusion of full security.<p>3. You can configure encryption between CloudFlare and your origin. You probably should do that.<p>4. CloudFlare this year (May 2016) announce better tooling to encrypt between origin and their own CDN servers: <a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloudflare-ca-encryption-origin&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;cloudflare-ca-encryption-origin&#x2F;</a>
评论 #12093208 未加载
评论 #12092591 未加载
puranjayalmost 9 years ago
Not just &quot;an Indian ISP&quot;. It&#x27;s the largest ISP in the country, and one with an increasingly larger footprint in Africa. It had revenues of close to $15B last year
karthikb351almost 9 years ago
Hi, OP here.<p>There are basically two important points from this story.<p>&gt; CF can&#x27;t tell if it&#x27;s the actual website or the notice from Airtel, and neither can the user.<p>&gt; Airtel is implementing this block by looking at the Host: headers of ALL HTTP requests going out of CF, and since everyone in India will hit CF, they are now looking at the headers of all users in India, across ISPs.
hitralmost 9 years ago
In the article,testing the host header with different IP is done over http and not https.so i so it does not prove that Airtel is sniffing https traffic,isn&#x27;t it ?<p>&gt;curl -H &quot;Host: thepiratebay.org&quot; <a href="http:&#x2F;&#x2F;192.30.253.112&#x2F;" rel="nofollow">http:&#x2F;&#x2F;192.30.253.112&#x2F;</a><p>May be I missed something. Technically it is possible block the traffic by looking at SNI[1] or simply block the ipaddress if it belongs to the blocked site.I always thought that every ISPs had to follow this because all ISPS are asked to block a list of such sites by the Supreme Court .<p>[]1 <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Server_Name_Indication" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Server_Name_Indication</a>
评论 #12092423 未加载
评论 #12092412 未加载
评论 #12092797 未加载
snowyalmost 9 years ago
So is it reasonable to say?: piratebays fault for not enforcing SSL between their origin servers and cloud flare?
评论 #12092558 未加载
ishansharmaalmost 9 years ago
I know I&#x27;m being a bit cynical here but do we know that Cloudflare doesn&#x27;t know about it?<p>It&#x27;s entirely possible that they know about it. Considering their recent datacenter opening in India (again, not clear on laws but maybe they need to follow the blocking as ordered by DoT&#x2F;courts?)<p>They just started operations in China and partnered with an ISP there, so unless they say that they are not involved, I&#x27;m sceptical about this.
uber1geekalmost 9 years ago
Airtel is known for doing notorious things in the past. From injecting iframes to serving compressed images via their own cdn.
kekubalmost 9 years ago
Is there any way for cloudflare to detect wether or not their connection has been modified by a third party besides certificates? I could only think of loading the site from more than one location and comparing the responses. However that might not be a trivial task, as most websites will not be static enough.
cesarbalmost 9 years ago
In cases like this, where the upstream of some of Cloudflare&#x27;s servers is known to be non-transparent (dropping or modifying data going through it), couldn&#x27;t they tunnel everything to Cloudflare servers with a working upstream, and connect to the origin servers from there? They would still benefit from caching near the users, while avoiding the broken upstream.
评论 #12093876 未加载
runesoerensenalmost 9 years ago
I&#x27;ve never understood CloudFlare&#x27;s position on this issue&#x2F;feature. They generally do a great job at improving, caring and fighting for internet security, yet continue to offer a product (Flexible SSL) that they know is insecure:<p><i>This option is not recommended if you have any sensitive information on your website. It should only be used as a last resort if you are not able to setup SSL on your own web server, but it is less secure than any other option (even “Off”)</i> [1]<p>So by CF&#x27;s own admission this is less secure than having SSL disabled. That&#x27;s of course technically incorrect assuming the visitor is aware that SSL is terminated at CloudFlare, and insecure from there to the origin server. If the visitor is aware of this distinction (and know what it means, which includes knowing where the CF edge and origins are located) then it does add some security (the coffeeshop&#x27;s Wi-Fi etc).<p>However it&#x27;s probably fair to assume that most visitors of CloudFlare-protected sites are not aware of this distinction. They&#x27;re probably just aware that Green Lock + HTTPS = secure. So instead this product primarily gives a visitor a false sense of security, which in my opinion is much worse and potentially dangerous. I guess CloudFlare agrees with that; why else would they say it&#x27;s less secure than no SSL?<p>In the end, CloudFlare should clarify why they continue to offer a seemingly secure encryption product that they themselves consider less secure than no encryption. They say it should only be used &quot;as a last resort&quot;, but when is choosing &quot;Flexible SSL&quot; really the last resort? I mean, you can just disable SSL entirely or do it properly (and even get a free certificate from CF), both of which are more secure.<p>I don&#x27;t know, but here&#x27;s an idea: It might be a good product for CloudFlare customers, such as TBP, who don&#x27;t care enough to actually secure their visitors&#x27; traffic, but still want to give the appearance thereof. Which is exactly what the more prominent product page lists as the advantages of &quot;Flexible SSL&quot;[2]:<p>- <i>You do not need an SSL certificate on your server.</i><p>- <i>Visitors will see the SSL lock icon in their browser.</i><p>I might be missing something and I&#x27;d honestly appreciate if someone can shed some light on this. I respect CloudFlare a lot and appreciate their efforts to improve internet security. It&#x27;s just difficult to maintain a brand as a company on the forefront of the internet security battle, while also enabling customers to somewhat deceitfully give the appearance of security at the expense of their visitors&#x27; security and safety. It seems pretty clear that CF needs to discontinue this product before it hurt their brand as well as unassuming visitors.<p>[1] <a href="https:&#x2F;&#x2F;support.cloudflare.com&#x2F;hc&#x2F;en-us&#x2F;articles&#x2F;200170416-What-do-the-SSL-options-mean-" rel="nofollow">https:&#x2F;&#x2F;support.cloudflare.com&#x2F;hc&#x2F;en-us&#x2F;articles&#x2F;200170416-W...</a><p>[2] <a href="https:&#x2F;&#x2F;www.cloudflare.com&#x2F;ssl&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cloudflare.com&#x2F;ssl&#x2F;</a>
评论 #12092843 未加载
评论 #12094644 未加载
cvs268almost 9 years ago
Dear Airtel, sniff this...<p><a href="https:&#x2F;&#x2F;pbs.twimg.com&#x2F;media&#x2F;CnUlDy0UEAAvTz4.png" rel="nofollow">https:&#x2F;&#x2F;pbs.twimg.com&#x2F;media&#x2F;CnUlDy0UEAAvTz4.png</a>
fahrradfluchtalmost 9 years ago
Seems like it&#x27;s not just airtel:<p><a href="https:&#x2F;&#x2F;medium.com&#x2F;@sushubh&#x2F;when-you-said-they-do-not-even-know-it-i-thought-you-meant-airtel-was-quite-confusing-9954b7afc8ac" rel="nofollow">https:&#x2F;&#x2F;medium.com&#x2F;@sushubh&#x2F;when-you-said-they-do-not-even-k...</a>
评论 #12092156 未加载
评论 #12092354 未加载