Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Cloudflare is a public CA. They can issue themselves a certificate for literally any domain, whether it is served by cloudflare or not.



Cloudflare are not a public CA (see bottom), they use public CAs just like the rest of us. I'm sure they have special enterprise arrangements with each of them.

Supported TLS certs via Cloudflare: https://developers.cloudflare.com/ssl/reference/certificate-...

Those public CAs have to verify domain ownership via the methods outlined in the CA/Browser Forum's baseline requirements. None of which Cloudflare would be able to follow (on behalf of these domains in question) if they did not use either of Cloudflare's authoritative nameservers or WAF/CDN.

Now, if Cloudflare were a public CA, they would still have to behave correctly and follow the baseline requirements otherwise they would be distrusted by clients.

Note that Cloudflare have a certificate authority called 'Origin CA' https://blog.cloudflare.com/cloudflare-ca-encryption-origin/, it is not publicly trusted though. It doesn't need to be, it's for website operators to install on their own web server, before it gets fronted by Cloudflare - rather than just running a self-signed cert or serving plaintext.

Trusted root certs:

Apple: https://support.apple.com/en-gb/121672

Mozilla: https://ccadb.my.salesforce-sites.com/mozilla/CAInformationR...

Microsoft: https://ccadb.my.salesforce-sites.com/microsoft/IncludedCACe...

Chrome: https://chromium.googlesource.com/chromium/src/+/main/net/da...


I'm pretty sure Cloudflare uses Let's Encrypt.

It doesn't look like they are a sponsor of Let's Encrypt though, so I doubt they have any kind of special arrangement with them.


Thanks for the explanation. Also, your username is very appropriate.


I tell it how it is :)


So they are the official man in the middle? If that is true then it is a complete mockery of the entire theater of https everywhere.


Cloudflare have only ever been able to do their job (on the reverse proxy CDN/WAF side), by doing full TLS interception. They see the session in plaintext.

The customer grants Cloudflare a TLS certificate for their site either by uploading a cert manually, or letting Cloudflare issue a cert via the ACME protocol. They use that to present the site to the world. Cloudflare connects back to the origin site, and the origin either uses HTTP (bad! but possible), HTTPS with a self signed cert, HTTPS with another publicly trusted cert, or a cert that Cloudflare issues with their own (not publicly trusted) CA called Origin CA.

As the visitor, you there's no big sign saying 'Cloudflare can read this content as well as the origin website'. They're trusted to not be malicious sure, but there's a massive risk with using any sort of service like this that you don't control.

One of those massive risks turned reality with Cloudbleed in 2016/2017: https://en.wikipedia.org/wiki/Cloudbleed

https://project-zero.issues.chromium.org/issues/42450151

https://blog.cloudflare.com/incident-report-on-memory-leak-c...

https://blog.cloudflare.com/quantifying-the-impact-of-cloudb...


> As the visitor, you there's no big sign saying 'Cloudflare can read this content as well as the origin website'. They're trusted to not be malicious sure, but there's a massive risk with using any sort of service like this that you don't control.

In that case there is no way that company is not hooked into the intelligence services. I am certain they do go through the ceremony of legality for many actions but it is unreasonable to think no intelligence service has attempted to critically penetrate it. Add the mix of ideology du jour of the SV "VC intelligentcia" and software youth brigades.

You are entirely correct to point out that it is our "trust" that is taken for granted. And granted to CloudFlare by SV, YCombinator, and of course HackerNews itself that dumps on any voices raising concerns over these obvious "massive risks" so that the unauthorized delegation of trust is done behind our backs by capital and other interested parties. DDoS prevention is kind of like kiddie porn prevention, a perfect pretext for openning the door to equally serious violations, of our trust and rights.


Now you get it.


> They can issue themselves a certificate for literally any domain, whether it is served by cloudflare or not.

They can but they're not allowed to, that's the entire point.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: