Lemmy.world update: Downtime today / Cloudflare

Ruud@lemmy.worldmod to Lemmy.World Announcements@lemmy.world – 2311 points –

Today, like the past few days, we have had some downtime. Apparently some script kids are enjoying themselves by targeting our server (and others). Sorry for the inconvenience.

Most of these 'attacks' are targeted at the database, but some are more ddos-like and can be mitigated by using a CDN. Some other Lemmy servers are using Cloudflare, so we know that works. Therefore we have chosen Cloudflare as CDN / DDOS protection platform for now. We will look into other options, but we needed something to be implemented asap.

For the other attacks, we are using them to investigate and implement measures like rate limiting etc.

445

You are viewing a single comment

How does cloudflare work? Do you install the private SSL certificate there and so cloudflare can see all traffic, including passwords, in plain text or is the path from browser through to your server still encrypted?

Cloudflare decrypts to do the ddos protection, then reencrypts to the server.

If you are worried about security, cloudflare is provably more secure than any lemmy server.

But it still is a really bad idea to route big parts of the internet through one proprietary system. There have to be other ways to solve this.

Not if you want to provide a website accessible through modern web browsers.

If you want stable and distributed resources you need tech like bittorrent which survived everything the entertainment industry had to throw at it.

If you want a website, you need cloudflare.

Cloudflare is a proxy, so by its very nature it has to decrypt traffic. (I believe their enterprise plans may offer a way around this, but don't quote me.)

I wouldn't worry, however. If someone wanted to attack this site (or any site, really) they're almost certainly going to have an easier time going after the origin rather than trying to take on a juggernaut like Cloudflare.

Other posters are correct that cloudflare decrypts traffic. BUT it is highly unlikely that they will see your password in plaintext, since it is best practice to hash the password first on the front-end.