I’ve been reading this about Cloudflare and realized they require any site using their services to install their certificate to then proceed to fully sniff and analyze, and sometimes even modify https traffic. This is something I didn’t realize before. Here are the relevant screenshots:

  • ominous ocelot@leminal.space
    link
    fedilink
    arrow-up
    28
    ·
    edit-2
    4 days ago

    Yes. Reverse proxies need to own the private key which belongs to the FQDNs certificate for the TLS connection between rproxy and browser. Also, sometimes HTTP Headers need to be rewritten.

    As a result there is no end to end encryption between the server and the browser. You need to trust cloudflare as you need to trust your hoster.

    • WhatAmLemmy@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      ·
      edit-2
      4 days ago

      TLS isn’t really related to E2EE. E2EE data can be delivered securely over http without any transport encryption, as long as the secrets/passwords/keys themselves never leave the client unencrypted (the data is encrypted by the client before transport).

      A cloudflare hosted/protected site can still provide E2EE. You just have to trust that they aren’t going to conduct any sophisticated transport attacks to inject malicious code and surreptitiously obtain your secrets.

      • ominous ocelot@leminal.space
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        2 days ago

        TLS isn’t really related to E2EE.

        IMO it is. Is it not a solution which prevents everybody but the client’s browser and the web-server from taking part in the communication? Why?

        data can be delivered securely over http

        On top of HTTP? Nice. Is there a RFC or a framework which implements such a solution?