TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cloudflare “Flexible” SSL Misleading

3 pointsby boomer918over 3 years ago
Cloudflare Flexible SSL mode encrypts traffic between the client and Cloudflare but it forwards that data to the origin server unencrypted over the public internet.<p>Isn&#x27;t this misleading? The client thinks their traffic is safe, but it ends up being exposed? Doesn&#x27;t this defeat the purpose of SSL and browser certificate validation?

2 comments

josephcsibleover 3 years ago
Flexible SSL is basically equivalent to visiting a totally insecure site over a VPN instead of directly. There&#x27;s a few advantages to it. Off the top of my head:<p>1. It protects the privacy of the client still. Nobody can tell which page a given IP address is looking at on a site, since once the traffic is decrypted, it&#x27;s no longer associated with the originator.<p>2. Most snooping and MITM attacks happen towards the client end of the connection, which this would protect from.<p>It&#x27;s definitely not appropriate for sending sensitive data like credit card numbers, though.
评论 #29363878 未加载
phillipseamoreover 3 years ago
This isn&#x27;t specific to Cloudflare. Many (most?) services only terminate TLS on their client facing servers and any request&#x2F;response is in the clear to any backend servers (which might be located on other networks).<p>Regarding CF, traffic to an origin server that&#x27;s set as flexible might still go through a secured tunnel (e.g. Argo).