TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: What gives Cloudflare the right to takedown apps revealing site real IP?

35 pointsby 5ESSabout 3 years ago
I stumbled across an interesting app called “CrimeFlare” and what it does is reveal the real IP website’s using Cloudflare’s Ddos Mitigation Service.<p>CloudFlare had it taken down. <a href="https:&#x2F;&#x2F;github.com&#x2F;zidansec&#x2F;CrimeFlare" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zidansec&#x2F;CrimeFlare</a><p>I’m assuming it does this by scanning the public internet in it’s entirely, indexing the domains. (A household fiber connection can scan the entire IPv4 space in a mere matter of weeks)<p>This is obviously a huge threat to CloudFlare’s entire business model and it totally makes sense that they want to bury this.<p>I just fail to understand what grounds they have to take something like this down. Internet IPs are public knowledge and these websites are publicly accessible. Just because Cloudflare built a billion dollar buisness exploiting the fact that sites “real” IPs can be hidden through obscurity, doesn’t mean they should be able to censor&#x2F;takedown apps that expose the flaw in their business plan!<p>Anyways, I intend to create a new internet-wide scanning system in order to revive the functionality of CrimeFlare just to prove a point that security through obscurity is no security and all, and that CloudFlare doesn’t have the right to take something like this down!

17 comments

jgrahamcabout 3 years ago
&gt; CloudFlare had it taken down.<p>I&#x27;m not sure where the idea that we took this down came from, but I checked with legal and we didn&#x27;t. Such tools, services, etc. have existed forever. Just one reason why we encourage people to protect their public IP (<a href="https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;setup&#x2F;allow-cloudflare-ip-addresses&#x2F;#configure-origin-server" rel="nofollow">https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;s...</a>) and have Cloudflare Tunnel (<a href="https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;cloudflare-one&#x2F;connections&#x2F;connect-apps&#x2F;" rel="nofollow">https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;cloudflare-one&#x2F;connections...</a>).
评论 #31097660 未加载
评论 #31097820 未加载
CodesInChaosabout 3 years ago
&gt; This is obviously a huge threat to CloudFlare’s entire business model<p>I disagree. There are plenty of ways to hide your origin server, for example:<p>1. IPv6 only, since there are too many addresses to scan<p>2. Accepting connections only from cloudflare IPs (probably not enough on its own, since features like workers might allow an attacker to trigger requests from a cloudflare server)<p>3. Mutual TLS authentication<p>4. Authentication headers (since mTLS might be difficult to integrate in your application)<p>5. Responding only if the right host is requested, which could even be different from the public domain (not enough on its own, but prevents untargeted scans)<p>6. Using tunnels (as frizlab pointed out)<p>I think cloudflare already supports all of these out of the box. They just need to push their customers to apply such mitigations via documentation, displaying warnings if the origin server can be accessed directly, etc. So I consider this an inconvenience for cloudflare, but not a huge threat.
评论 #31096188 未加载
评论 #31096691 未加载
评论 #31096425 未加载
Nathanbaabout 3 years ago
Why on earth would you try to <i>help</i> DDOS&#x27;ers? I think you should really take a step back here and reevaluate what drives you here and what impact you have on other people.
评论 #31096368 未加载
评论 #31098928 未加载
评论 #31096009 未加载
评论 #31095948 未加载
评论 #31096631 未加载
kube-systemabout 3 years ago
Technically speaking, GitHub took the repo down. This is an important distinction, because voluntary takedowns and legally compelled takedowns are two entirely different things, and it’s not necessarily correct to assume the latter.
eliabout 3 years ago
&gt; <i>This is obviously a huge threat to CloudFlare’s entire business model and it totally makes sense that they want to bury this.</i><p>Protecting origin servers is hard. Nothing unique to CloudFlare about that. If you follow their set up documentation then this tool can&#x27;t harm you: <a href="https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;task-guides&#x2F;origin-health&#x2F;" rel="nofollow">https:&#x2F;&#x2F;developers.cloudflare.com&#x2F;fundamentals&#x2F;get-started&#x2F;t...</a>
mmcgahaabout 3 years ago
If folks are really concerned about getting exposed they can firewall off everyone except cloudflare.<p><a href="https:&#x2F;&#x2F;www.cloudflare.com&#x2F;ips&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.cloudflare.com&#x2F;ips&#x2F;</a>
评论 #31096406 未加载
jasodeabout 3 years ago
<i>&gt;, I intend to create a new internet-wide scanning system in order to revive the functionality of CrimeFlare just to prove a point that security through obscurity is no security and all,</i><p>I&#x27;m not familiar with CrimeFlare and its technical details but a cursory google search shows that security-through-obscurity is possible with Cloudflare <i>if one follows the correct sequence of steps</i> to hide the ip. Otherwise, a careless setup such as public MX mail record will inadvertently &quot;leak&quot; the ip. E.g. Stackoverflow Q&amp;A: <a href="https:&#x2F;&#x2F;stackoverflow.com&#x2F;questions&#x2F;58591448&#x2F;how-does-crimeflare-find-the-origin-ip-address-of-a-cloudflare-website" rel="nofollow">https:&#x2F;&#x2F;stackoverflow.com&#x2F;questions&#x2F;58591448&#x2F;how-does-crimef...</a><p><i>&gt;, I intend to create a new internet-wide scanning system</i><p>But the host systems at the receiving end of your scanning tool <i>still have to respond to your tool pinging them with network requests</i> and if your ip origin isn&#x27;t Cloudflare, the host server doesn&#x27;t have to reply with useful information. Or did you have another mass scanning technique we&#x27;re overlooking?
评论 #31096493 未加载
stairlaneabout 3 years ago
Scanning the internet and indexing domains? Isn&#x27;t that EXACTLY what binary edge and shodan do???
nickdothuttonabout 3 years ago
If you are going to use someone else to front your service, take care to make sure that that (1) it cant even be accessed except via that front, and (2) that you dont leak your origin IP address or network, even if traffic to that origin is dropped from sources other than the service fronting it.
true_religionabout 3 years ago
How can you index domains by scanning the public internet? Wouldn’t trying to match domain names with IP addresses get you blocked by the server after too many failures? Or at least it would be too many attempts to make that it would take more than weeks?
cftabout 3 years ago
&gt;by scanning the public internet in it’s entirely, indexing the domains<p>Can you explain this?
评论 #31095900 未加载
formerkrogempabout 3 years ago
The name might be infringement or the code might abuse their API. Or, GitHub could decide it&#x27;s not worth it. Why would you try to scan every IP address?
评论 #31095920 未加载
spacemanmattabout 3 years ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;zidansec&#x2F;CrimeFlare-1" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;zidansec&#x2F;CrimeFlare-1</a>
评论 #31095977 未加载
ushakovabout 3 years ago
as far as i remember when the backend times out, CloudFlare shows a screen where you can see the actual IP of the server
评论 #31096809 未加载
评论 #31096638 未加载
Teletioabout 3 years ago
Do you even know under which rule it gotten taken down?
rubyist5evaabout 3 years ago
Just another reason to add to the pile of why I hate that company.
jokethrowawayabout 3 years ago
They probably reported it as malware and M$ team didn&#x27;t check what it was