TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: What's the actual fallout been from the Cloudflare bug?

248 pointsby anon456about 8 years ago
So I understand what happened with the Cloudflare bug, that https POST request content was leaked into HTML documents on the same or other servers and some of it was cached by search engines or malicious foreign powers. Whenever something like this happens the HN community whips up into a frenzy with people coming out of the woodwork that appear to be experts saying that &quot;this is the end&quot; and &quot;this is so bad, we&#x27;re f*cked&quot;.<p>Meanwhile - none of my friends in the &quot;real world&quot; (outside the HN bubble) seem to be affected by this at all. I have a client that&#x27;s a Cloudflare customer and they got an email saying they just weren&#x27;t affected. And I haven&#x27;t seen any huge leaks or items in the press about some terrible hack or theft that has brought someone or a corporate &quot;down&quot;.<p>Should we always take news like this with a grain of salt? When can we tell when an attack like this is a fundamental undermining of the entire internet infrastructure, an attack that will cripple a few major companies, or just an issue that revealed some data but was mostly just overblown? Would love to hear some opinions!

24 comments

perlgeekabout 8 years ago
The trouble with this sort of bug is that we&#x27;ll likely never know.<p>Some people&#x27;s accounts will be compromised, and nobody will know if it&#x27;s been due to fishing, insecure passwords, or an information leak such as the Cloudflare bug, or an undisclosed or undiscovered breach somewhere.<p>The more responsible Cloudflare customers have invalidated existing sessions; that&#x27;s much less hassle than forcing a password reset, and since session tokens are transmitted in every request, a leaked token is much more likely than a leaked password.
评论 #13802340 未加载
tgragnatoabout 8 years ago
An information leak is an information leak : we still fail to realise that it&#x27;s something that&#x27;s happening daily. There&#x27;s no drama in it.<p>Criminals are taking advantage of opportunities like this every day, still no one cares too much about it (HN bubble &amp; friends excluded).<p>Things like this may have a strong impact or not in the press&#x2F;popularity circus, but in this particular case it seems they promptly monitored the situation (thanks to their competent staff).<p>What most surprises me is that their highly competent staff is thoughtlessly violating one of the security principles in sw : SECURITY BY ISOLATION .<p>No one (no matter how able you are) can write absolutely bug-free algorithms : even when dealing with formal verified software you can still attack the assumptions.<p>Security by correctness is a laudable effort, but computing customers data with a single process is not sane. I&#x27;m aware they&#x27;re doing this for performance reasons, but a well implemented isolation layer would have prevented this (even while dealing with a bug like that).<p>Their architecture is vulnerable.
评论 #13799026 未加载
评论 #13802392 未加载
ScottBursonabout 8 years ago
As I understand it -- somebody please correct me if I have this wrong -- the thing about Cloudbleed is that there isn&#x27;t necessarily any relationship between the site whose page is cached and the site whose credentials appear in that cached page. So the only way to know that a particular site didn&#x27;t have credentials leaked is to search all the caches of all the search engines on the Internet.<p>So, as perlgeek says, we&#x27;ll probably never know specifically what the impact was.
评论 #13799477 未加载
评论 #13798465 未加载
i336_about 8 years ago
I think Google freaked out to the Nth degree because it&#x27;s quite likely that cached data is probably stored in a system that doesn&#x27;t have [m]any security restrictions attached to it, and... well, there are &gt;72k people. You&#x27;re <i>going</i> to find well-meaning &quot;what happens if I... OOPS&quot; types (for any definition of &quot;OOPS&quot;), along with (ostensibly equally well-meaning) &quot;hey, an OAuth token that actually works! Let&#x27;s see <i>just how far</i> we can take this...&quot; people... and then some that aren&#x27;t just interested in fun engineering challenges, if you get what I mean.<p>I have no idea what Google employees have access to. I&#x27;ve always wondered whether they can hand-code their own MapReduce syntax over Google&#x27;s actual Web index (I could find SO MANY THINGS if that were possible!). I wouldn&#x27;t be surprised if the cache data &lt;-&gt; index were accessible to everyone who&#x27;s been around for &gt;6 months, so they can tinker with it.<p>But I guess the only reason I&#x27;m able to type this is that I haven&#x27;t signed The Large Book Of NDAs (I presume it&#x27;s large).
评论 #13799143 未加载
评论 #13802008 未加载
bostikabout 8 years ago
For a remarkably level-headed take on the fallout, I recommend listening to the latest episode of Risky Business [0]. The interview with Troy Hunt gives a calm, informed and above all well reasoned baseline for response.<p>0: <a href="https:&#x2F;&#x2F;risky.biz&#x2F;RB445" rel="nofollow">https:&#x2F;&#x2F;risky.biz&#x2F;RB445</a>
ufmaceabout 8 years ago
I think part of the disconnect is that this issue is a big deal for tech professionals, but barely noticeable for everyone else.<p>By the nature of the bug, the likelihood of any particular individual having any meaningful exploitable information exposed to somebody in a position to exploit it is astronomically low. So most ordinary people are ignoring it, and justifiably so.<p>If you&#x27;re responsible for security for a site that sends traffic through CloudFare, then it&#x27;s a very big deal for you. You&#x27;d better be quick on the trigger to see and react to this stuff, and you&#x27;ll have to mass-reset sessions at the very least, and possibly reconsider whether you really want to be terminating SSL at CloudFare. Exactly because, while not much has probably been exposed, you will never be able to be sure what was exposed to anyone from random hackers to the whole world, via search engine caches. So a broad reaction is justified.<p>And of course people who like tech but aren&#x27;t actually responsible for any sites being served through CloudFare tend to react the most. Even though it&#x27;s not a big deal if you&#x27;re already doing all of the standard security precautions, like different passwords everywhere and 2-factor authentication on anything important.
smilesndabout 8 years ago
Old saying don&#x27;t believe everything you hear, and only believe half what you read. Most news and blog outlets are horrible for information. Either they redigest someone else information, spin it to be more interesting, or just jump on the hype train. Their are few blogs and news outlets that actually have experts worth listening to. When the news&#x2F;blog outlets heard whatsapp had a technique flaw by a security expert they jump on it like a fresh piece of meat. Whatsapp didn&#x27;t have any security flaws or implementation flaws, but that didn&#x27;t matter. The news&#x2F;blogs didn&#x27;t even understand it they were just jacked for some revenue from ads for this fresh piece of meat. It did so much harm to the people that use it for security reasons and to the company. But that didn&#x27;t matter it is all about getting you to download a piece of javascript to tell some company you may have notice there ad that was place on someones website. News is dead. Bloggers only care about traffic. Experts are either paid to be used and abused or don&#x27;t have a big enough audience to be heard.
rini17about 8 years ago
I would welcome if this incident shone light on possible Cloudflare alternatives. For example, it should be technically doable for DDoS protection service to only initially verify user is not a bot, and then merely tunnel unchanged SSL traffic directly between server and client. Does anyone do this?
评论 #13801486 未加载
评论 #13800649 未加载
jacquesmabout 8 years ago
Cloudflare should count its blessings. If not for Google the fall-out would have been a <i>lot</i> larger.<p>So even if the sky didn&#x27;t fall that&#x27;s no reason to pretend this wasn&#x27;t a big deal.
dedalusabout 8 years ago
The way you know it&#x27;s real is when you call up cloudflare&#x27;s top customers and ask if they would switch to the competition the answer was a resounding yes. That&#x27;s how I know it&#x27;s not based on a HN bubble
评论 #13799527 未加载
_pmf_about 8 years ago
&gt; &quot;this is the end&quot; and &quot;this is so bad, we&#x27;re f*cked&quot;<p>End of what? It will just give rise to slightly more secure, improved services (maybe be the same providers, maybe by competitors, but definitely financed and implemented by the same people).<p>&gt; And I haven&#x27;t seen any huge leaks or items in the press about some terrible hack or theft that has brought someone or a corporate &quot;down&quot;.<p>Look at the Sony&#x2F;PSN breach; there has been zero accountability, and it has not hurt the PS4 launch at all. Consumers just don&#x27;t give a shit.
cookiecaperabout 8 years ago
I think you&#x27;re misinterpreting the comments about the scale of the leak. The risk that a concrete compromise would occur as a result was always pretty small.<p>The bigger thing was the grandiose scale, the impact on administrators in having to rotate a significant number of credentials, and the hit to CloudFlare&#x27;s reputation. A bug where you randomly dump random data without regard to its sensitivity or origin (i.e., data from completely unrelated sites could&#x27;ve been included in the dump), and have no way to tell what actually leaked, is the worst kind of privacy bug there is, precisely <i>because</i> it&#x27;s impossible to triage. No one can ever know everything that actually got out.<p>CloudFlare is now a major piece of internet infrastructure. It&#x27;s impossible to know that <i>anything</i> sent through a CloudFlare server between Sept 2016 and Feb 2017 wasn&#x27;t accidentally publicly leaked, and worse, non-trivial quantities of this data were being accidentally saved permanently in search indexes. Surely some bad actors have saved such results in their own private indexes as well.<p>When CloudFlare says &quot;your site was probably unaffected&quot;, they&#x27;re making a guess, because they have no way to actually tell. They&#x27;re just assuming that based on the volume of requests your CloudFlare endpoint receives and the volume of requests made to endpoints that exhibited this bug, content from your site <i>probably</i> didn&#x27;t get out. But there&#x27;s no way to know.<p>If we take that seriously, it requires us to consider <i>everything</i> that went through a CloudFlare server as potentially publicized and preserved in the public record (including usually-transparent unique identifiers like session cookies&#x2F;tokens). We then have to assume that an adversary obtained any and all such data, and respond as best as we can to preclude the possibility of that adversary exploiting the leaked secrets to harm our and&#x2F;or our company&#x27;s interests.<p>Of course, the flip side of the sheer scale of this, and the fact that the bug was relatively rare and that there was no way to control what content it dumped, is that it&#x27;s very unlikely any of <i>your data specifically</i> actually got leaked.<p>If you and&#x2F;or your company are OK with crossing your fingers and hoping this won&#x27;t affect you, there is probably a 99.something-something-something% chance you&#x27;d be right. Most people have responded by resetting tokens&#x2F;passwords for anything that uses CloudFlare, since that&#x27;s relatively low-impact and most people were probably overdue for a credential recycle anyway, and have left it at that.<p>This does clearly illustrate that the internet has a few <i>de-facto</i> junction points, which would be very high-value for an attacker. That&#x27;s worth keeping in mind.
m348e912about 8 years ago
Aside from being a black eye on Cloudflare, I don&#x27;t see this issue being of much consequence. I have yet to see one real-world example of a screenshot or link to a cache of data of leaked data (sensitive or not). If anyone has an example, please share. As others have mentioned, the real fear is of what could have leaked, not what did leak.
评论 #13802972 未加载
JumpCrisscrossabout 8 years ago
I deleted my subscription and account with 23andme. I have a few friends and colleagues who acted similarly with other sites.
评论 #13801174 未加载
评论 #13800977 未加载
tgsovlerkhgselabout 8 years ago
My guess: For criminals, the cost of finding the needle in the haystack is just not worth it - it&#x27;s easier to phish fresh credentials than to hope that you&#x27;ll find some in some hard-to-crawl archived data set. So we won&#x27;t see anything there.<p>Realistically, this will probably only be exploited by intelligence agencies who have the means of collecting all the data and motivation to do so, and maybe not even them (because they have better ways too). If they do exploit it, the nature of intelligence agencies, of course, means that you typically won&#x27;t notice any direct impact.<p>The reason why this caused such a big panic is that while the likelihood of your password being compromised is small, it could have hit anything, and by conventional wisdom, any password&#x2F;key that _may_ have been exposed, even if the likelihood is small, needs to be considered compromised. Hence, &quot;OMG everything is compromised&quot;.<p>Another reason was probably that it was a really scary wake-up call demonstrating the risks of centralized services. Cloudflare is a Single Point of Failure for a lot of security, but that is easy to push aside until you see it failing.<p>Realistically (and I&#x27;m going to get a lot of flak for saying this) the correct way to handle it is to rotate extremely high-value credentials (think Bitcoin exchangs, administrative access to major services, ...), reset sessions if you&#x27;re hosting your website on Cloudflare (since session tokens are much more likely to leak than passwords, and the cost of forcing users to re-auth is small especially if your sessions expire regularly anyways), and then call it a day.<p>In particular, keep in mind that for high-value services, you&#x27;re hopefully already using 2FA, so even if an attacker did get your password through this, they probably don&#x27;t have your 2FA token (although Kraken, a Bitcoin exchange, pointed out to their customers that they should re-setup 2FA if originally set up during the vulnerable timeframe, since the key used to derive the 2FA could be compromised).
mrmondoabout 8 years ago
On the non technical side - A LOT of multiple people&#x27;s time inside our small NFP org inspecting logs, rolling passwords, keys etc, expiring sessions and communicating with clients.
lmmabout 8 years ago
Sometimes those of us who live in the pure, mathematical world of software forget that the real world is more resillient than that.<p>People&#x27;s passwords, identities, and bank and credit card details will have been leaked. Identity theft and other fraud will happen as a result of this. But we have systems in place for dealing with it, and ultimately life will go on. I&#x27;ve had fraudulent charges on my bank account; it was a serious inconvenience at the time, but it wasn&#x27;t life-changingly bad.
nodesocketabout 8 years ago
This won&#x27;t necessarily be a popular opinion, but I remember when everyday there were negative blog posts and stories about Apple and the new MacBook Pros. It seemed like every developer got on their Medium and wrote a blistering post. It you just read the internet and HN you&#x27;d think the world at Apple was crumbling down.<p>Yet since $AAPL released the new MacBook Pro (Oct 27th &#x27;16), their stock is up 24%, with a breakout record Q1. Let&#x27;s not forget that the entire market has been in an epic bull run since Trump took office, so perhaps that is a factor.<p>Source ($AAPL vs Dow Jones and S&amp;P since Oct 27th): <a href="https:&#x2F;&#x2F;www.google.com&#x2F;finance?chdnp=0&amp;chdd=0&amp;chds=1&amp;chdv=0&amp;chvs=Linear&amp;chdeh=0&amp;chfdeh=0&amp;chdet=1488770247096&amp;chddm=34017&amp;chls=IntervalBasedLine&amp;cmpto=INDEXSP:.INX;INDEXDJX:.DJI&amp;cmptdms=0;0&amp;q=NASDAQ:AAPL&amp;&amp;fct=big&amp;ei=xdS8WNmON4L-jAHth67oBw" rel="nofollow">https:&#x2F;&#x2F;www.google.com&#x2F;finance?chdnp=0&amp;chdd=0&amp;chds=1&amp;chdv=0&amp;...</a><p>Don&#x27;t believe what you see on HN all the time. People here are incredibly intelligent for the most part, but there is frankly lots of disconnect from reality. In my opinion lots of conspiracy theorists, purest, and some social justice warriors pushing agendas.<p>My opinion... But I think we can bundle GitLab, CloudFlare, and Uber into categories of will be just fine.
评论 #13800565 未加载
评论 #13800438 未加载
评论 #13800476 未加载
blibbleabout 8 years ago
namecheap use cloudflare, and didn&#x27;t email their customers (including me) telling them that they may want to change their password...<p>I have now transferred every single one of my domains away from namecheap<p>I also installed the following extension, and now watch what I put into cloudflare pages: <a href="https:&#x2F;&#x2F;chrome.google.com&#x2F;webstore&#x2F;detail&#x2F;claire&#x2F;fgbpcgddpmjmamlibbaobboigaijnmkl" rel="nofollow">https:&#x2F;&#x2F;chrome.google.com&#x2F;webstore&#x2F;detail&#x2F;claire&#x2F;fgbpcgddpmj...</a>
评论 #13800643 未加载
评论 #13800561 未加载
davind3rabout 8 years ago
Netki sent me an email that they think they might be affected, so they strongly recommend to change password.
overcastabout 8 years ago
Well for me, the fallout has been the pain in the ass task of changing all my passwords.
simplehumanabout 8 years ago
Does anyone here (startup) use ddos protection ?
评论 #13799296 未加载
quirkafleegabout 8 years ago
Hopefully the fallout is that Cloudflare gets its act together.<p>Even if your friends know 100% that they can&#x27;t possibly have been negatively affected by tons of private information being dumped all over the internet, I&#x27;m not sure how such anecdotal evidence is any more instructive than a HN &quot;bubble&quot;.<p>Even if nobody at all ended up negatively affected in any serious way, I don&#x27;t see why people shouldn&#x27;t remark on the potential effects of such a fiasco when it happens. Was anyone really predicting &quot;the end&quot;?
评论 #13799799 未加载
aaron695about 8 years ago
&gt; Should we always take news like this with a grain of salt?<p>Yes.<p>Except this fear is part of our income source like the TSA, except they are more like 100% IT is a bit less.