• Björn@swg-empire.de
    link
    fedilink
    arrow-up
    5
    ·
    3 hours ago

    Even if you don’t use Cloudflare’s https they still need the private keys to work. So they can read all traffic either way.

    • Bilb!@lemmy.ml
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 hours ago

      That’s true if you’re proxying your traffic for DDoS protection, but you don’t need to do that to use them as a DNS, if you must.

    • chicken@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      1
      ·
      edit-2
      2 hours ago

      I’ll be more specific: if you set up a website on your own server, and use Cloudflare as a reverse proxy. If you do SSL yourself, on your own server, then the traffic is encrypted between the client and your server, and therefore Cloudflare cannot read it, they do not have the encryption keys, even though the traffic is passing through them. If you use Cloudflare’s https solution, Cloudflare provides the keys and decrypts the traffic before passing it on.

      The former is the more secure way to do it, but they encourage you to do it the way where they get to read all the traffic, which is pretty shady of them, because if a website has https people assume that means it is end to end encrypted to the website itself, but that assumption is being violated here and a user has no way to know.

      • Björn@swg-empire.de
        link
        fedilink
        arrow-up
        1
        ·
        21 minutes ago

        How can they act as a proxy if they can’t terminate the connection? Or what service does that offer?

        I guess they could filter out some connections based on IP addresses. But is that enough for some customers? Or am I overlooking something?