Serious Cloudflare bug exposed a potpourri of secret customer data

Jimmy Hess mysidia at gmail.com
Fri Mar 3 00:35:11 UTC 2017


On Thu, Mar 2, 2017 at 5:15 PM, Matt Palmer <mpalmer at hezmatt.org> wrote:
> On Sat, Feb 25, 2017 at 07:21:48AM +0000, Mike Goodwin wrote:
>> Useful information on potentially compromised sites due to this:
>> https://github.com/pirate/sites-using-cloudflare
> "This list contains all domains that use Cloudflare DNS"

> That's only marginally more useful than saying "any domain matching /^.*$/";

Iirc;  It's quite easy to use the Proxy service without the DNS
service, as long as
you are using a Paid  CF account for the domain and not a free account.

Also;  Querying after the fact is not very scientific,  Because there
may be domains
that _Were_  using  CF  proxy service  During the incident  which no longer use
CF DNS or Proxy servers,  for whatever reason.

If you're going to scrape DNS records to decide,  should probably be
scraping A records for www,
and then checking Reverse DNS or matching against possible CF IP
addresses,   not  NS records.

> - Matt
--
-JH



More information about the NANOG mailing list