Giter VIP home page Giter VIP logo

sites-using-cloudflare's Introduction

List of Sites on Cloudflare DNS (archived)

This is an (archived) list of sites on Cloudflare DNS at the time of the CloudBleed HTTPS traffic leak announcement. Original vuln thread by Google Project Zero.

Cloudflare has posted a very detailed response, explaining exactly what the implications of this leak are. It thoroughly explains their language in earlier statements, and I highly recommend reading it before looking through this list for domains: https://blog.cloudflare.com/quantifying-the-impact-of-cloudbleed/

DISCLAIMER:

This list is archived and no longer under active maintenance. It may contain stale or inaccurate data that will not be corrected. Do not link to it from press releases, it is not intended for end-users. If people want to find it, they can Google it.

This list contains all domains that use Cloudflare DNS, not just the Cloudflare proxy (the affected service that leaked data). It's a broad sweeping list that includes everything. Just because a domain is on the list does not mean the site is compromised, and sites may be compromised that do not appear on this list.

Cloudflare has not provided an official list of affected domains, and likely will not due to privacy concerns. I've compiled an unofficial list here so you know where to start searching for sessions to reset and passwords to change.

See issue #127 and issue #87 for additional info about which sites are likely to be affected.

Impact

Between 2016-09-22 - 2017-02-18 session tokens, passwords, private messages, API keys, and other sensitive data were leaked by Cloudflare to random requesters. Data was cached by search engines, and may have been collected by random adversaries over the past few months.

Requests to sites with the HTML rewrite features enabled triggered a pointer math bug. Once the bug was triggered the response would include data from ANY other Cloudflare proxy customer that happened to be in memory at the time. Meaning a request for a page with one of those features could include data from Uber or one of the many other customers that didn't use those features. So the potential impact is every single one of the sites using Cloudflare's proxy services (including HTTP & HTTPS proxy).

"The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests), potential of 100k-200k paged with private data leaked every day" -- source

You can see some of the leaked data yourself in search engine caches: https://duckduckgo.com/?q=+%7B%22scheme%22%3A%22http%22%7D+CF-Host-Origin-IP&t=h_&ia=web (2/25/2017) DuckDuckGo has removed this data

Confirmed affected domains found in the wild: http://doma.io/2017/02/24/list-of-affected-cloudbleed-domains.html

What should I do?

The most important thing you can do is ask your vendors and sites to reset all their session tokens, as more response data was leaked than request data, and responses generally contain session tokens rather than passwords. If websites you use have a button to "log out all active sessions", use it. Since sites may be compromised this week due to data discovered in caches, it's best to also do this again in a week or two after everything settles down. If websites you use don't have an option to log out all active sessions, contact them and pressure them to rotate all their session tokens.

To be extra safe, you may want to check your password managers and change crucial passwords, especially those on these affected sites. Rotate API keys & secrets, and confirm you have 2-FA set up for important accounts. This might sound like fear-mongering, but the scope of this leak is truly massive, and due to the fact that all Cloudflare proxy customers were vulnerable to having data leaked, many of the extra cautious people out there would rather be safe than sorry.

Theoretically sites not in this list can also be affected (because an affected site could have made an API request to a non-affected one).

Methodology

This list was compiled from 3 large dumps of all Cloudflare customers provided by crimeflare.com/cfs.html, and several manually copy-pasted lists from stackshare.io and wappalyzer.com. Crimeflare collected their lists by doing NS DNS lookups on a large number of domains, and checking SSL certificate ownership.

I scraped the Alexa top 10,000 by using a simple loop over the list:

for domain in (cat ~/Desktop/alexa_10000.csv)
    if dig $domain NS | grep cloudflare
        echo $domain >> affected.txt
    end
end

The Alexa scrape, and the Crimeflare dumps were then combined in a single text file, and passed through sort | uniq. I've since accepted several PRs and issues to remove sites that were unaffected from the list.

Data sources:

I'd rather be safe than sorry so I've included any domain here that remotely touches Cloudflare. Don't point end-users to this list please, it has too many false positives to be useful for non-analytical purposes. I'm no longer accepting PRs to remove sites from the list, our previous process to remove sites was error-prone and labor intensive. The list is now in archive mode, consider it defunct. If you think for some reason this will greatly impact you or your users, DM me on twitter.

Full List

Download the full list.zip (22mb)

4,287,625 possibly affected domains. Download this file, unzip it, then run grep -x domaintocheck.com sorted_unique_cf.txt to see if a domain is present.

Also, a list of some iOS apps that may have been affected.

Search Tools

There are several tools out there to search the list, I wont endorse any here due to them having greatly varying degrees of accuracy. Please do not make user-facing tools to search the list or cross-reference it with browser history, this list has too many false positives to use for that purpose. You will make users lose trust in many sites, despite there being less than a 1 in a million chance of them having data leaked.

Notable Sites

Alexa Top 10,000 on Cloudflare DNS:

sites-using-cloudflare's People

Contributors

abalabahaha avatar asasine avatar basisbit avatar ben-atherton avatar coderobe avatar ddymko avatar digitalsparky avatar donlampert avatar dzogrim avatar enbyv avatar ledwards avatar moon-musick avatar nullpixel avatar pathmissing avatar phineas avatar pirate avatar rcoelho avatar ripper234 avatar robert-f avatar robn avatar securitysimon avatar simon-weber avatar sjasct avatar tonyztan avatar woodrow avatar xenthys avatar yogeshpadharia avatar youngj avatar zenexer avatar zostay avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sites-using-cloudflare's Issues

duplicate entries

% cat sorted_unique_cf.txt | tr '[A-Z]' '[a-z]' | sort | uniq -d | wc -l
    1213
%

this should return zero.

zip file

zip file has /Users/squash/Desktop/sorted_unique_cf.txt instead of just sorted_unique_cf.txt at the root, probably as a result of macos zip fuckery

Pastee

Paste.ee was affected

CloudFlare Site Owner Emails

Our site simplecast.com/fm is on the list of affected sites, but I'm wondering about the legitimacy of the email that CloudFlare sent to customers saying that their site wasn't affected? We received the email from them saying we were not affected, but it would appear from everything that I've read that this isn't true? Can anyone clarify this for me?

Emphasize that Cookies are not safe

If I understand the issue correctly, whole HTTP requests got leaked, including all headers. Those headers will also include Cookie.

I've seen people assume since they logged in into reddit for example via cookie for the past few months, they are safe. It's advisable to log out and log back in into websites using long-living cookies (just locally deleting cookies does not help obviously), and I suggest adding such a notice to the "Impact" and "What should I do" sections.

What specific features were affected?

If I use FULL ssl encryption from end to end is it possible that my websites 'were' affected? I have read in many places that it is only the Flexible SSL that was affected, is this true?

Business and enterprise customers can use branded nameservers

Business and enterprise can use branded nameservers. The branded nameserver IP addresses will match those the standard nameservers, so they're easy enough to find. Zone files typically include glue records for nameservers. Here are the first 10 in the com zone file:

NS1.STORMBLAZE A 173.245.58.51
NS1.GLOBO-CHEM A 173.245.58.51
NS1.BLACKSTONEHOSTING A 173.245.58.51
NS1.DBSDATA A 173.245.58.51
NS1.INALIAS A 173.245.58.51
NS1.IDEARTTE A 173.245.58.51
NS1.PHASE-7 A 173.245.59.142
NS1.HIPPERS A 173.245.58.51
NS1.FLASHSTOCKS A 173.245.58.51
NS1.TERA-KSA A 173.245.58.110

As such, using dig + grep is inadequate; many of Cloudflare's largest customers will go undetected.

Please remove Vigilante.pw

Please remove Vigilante.pw from the list. We do not store any user data and we don't store the breached databases that we report on, either. The website consists of a static page with a list of data breaches.

The same goes for DBDirectory.info and Disappear.today which are just mirrors of the site.

Please remove robxu9.com - static site.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Please remove robxu9.com since it's a static website using Github Pages - https://github.com/robxu9/robxu9.github.com
This is me: keybase.io/robxu9

I do use the TLS proxy but since it's a static site, no user data should be compromised.

Thanks!
-----BEGIN PGP SIGNATURE-----
Version: Keybase OpenPGP v2.0.64
Comment: https://keybase.io/crypto

wl4EABEKAAYFAliv2P4ACgkQAWAAgagK5W/uEAEApz/RmnZuIXQYmx05ZR9mA9lR
gYonmk+RlbBuIBiW5LUBAK8rtVNraTpOEiIwK9e6S7RsaQf7yo52/6fFF1tH/DPH
=YnEQ
-----END PGP SIGNATURE-----

Add LICENSE.md

Please add LICENSE.md specifying what people can do with the data from here.

Add: *.leagueoflegends.com

Looks like account.leagueoflegends.com is also using CloudFlare.

Can't fully confirm, that they use it for everything else, but I just received a message checking for my browser (DDoS prevention system).

Remove my site

The site '*********' is owned and operated by me and is so small and unused that the chance of it being affected is 1 in literally 10 trillion so please remove it from your zip file.

Add *.sageone.com

to add to list:

accounts-extra.sageone.com
app.sageone.com
eu-signon[1-6].sso.services.sage.com
signon[1-6].sso.services.sage.com

please remove sites

Please remove xxxxx.co.uk (wordpress blog, only one user, me) and xxxx.uk (static site hosted on github).

stackoverflow not affected

Per CloudFlare's report, earliest that a site could have been affected was 2016-09-22. I moved StackOverflow and related sites off of CloudFlare in June and July of 2016. As such, not possibly affected by this issue.

Expose more domains using their (shared) certificates

Their certificates, are used for multiple domains (alternative names). We can lookup all their certificates and expose the domains that are under that. E.g.:

https://www.ssllabs.com/ssltest/:

ssl381767.cloudflaressl.com 
Fingerprint SHA1: 6a151a7e38b1bffa5dabb8123e1d837c7fdcd714
Pin SHA256: I+iFnnQivyNnDgG0MKwVZmOogDRbZlwSmJitxplhX4w=

Common names	ssl381767.cloudflaressl.com
Alternative names	
ssl381767.cloudflaressl.com *.biomagnetichealingonline.com *.brutonsgrill.com *.bsccn.net *.bsvcn.net *.conwyguttercleaning.com *.falcon-paq.com *.francotaxes.com *.hermespopcorn.com *.ibsvirtual.net *.midtownfdl.com *.musictheorytutoringlab.com *.nankin238.org *.optimizehit.net *.paintoncanvas.info *.parkersoaps.com *.preparedpatriotreport.com *.presenterlab.com *.pureorganicsalonbyjon.com *.reagan.com *.rhianhansonharpist.com *.taxexpertswaco.com *.thegiantkillers.co.uk *.thesweeper.com *.trimyourbellyfat.com *.visionprotocol.com *.witwcanadianrally.com *.woolardhvacr.com biomagnetichealingonline.com brutonsgrill.com bsccn.net bsvcn.net conwyguttercleaning.com falcon-paq.com francotaxes.com hermespopcorn.com ibsvirtual.net midtownfdl.com musictheorytutoringlab.com nankin238.org optimizehit.net paintoncanvas.info parkersoaps.com preparedpatriotreport.com presenterlab.com pureorganicsalonbyjon.com reagan.com rhianhansonharpist.com taxexpertswaco.com thegiantkillers.c

Reddit not present

Doesn't reddit use cloud flare?, or have they confirmed that they are not affected, as I do not see reddit here, if not added, kindly add : https://reddit.com to the list as well.

Some sites may be using the CloudFlare SSL proxy without using CloudFlare DNS

"Also there are some sites that are using the CloudFlare SSL proxy without using CloudFlare DNS -- for example betterment.com is using Amazon Route 53 and is not in sorted_unique_cf.txt . Basically I think you just have to make HTTPS requests and look for the CF-Ray or Server: cloudflare-nginx header. It probably would be useful for someone to write a script to make requests to the domains in sorted_unique_cf.txt and update it to remove the ones that aren't using the SSL proxy." @youngj

Cloudflare DNS != Cloudflare Proxy

"It's a broad sweeping list that includes everything. Just because a domain is on the list does not mean the site is compromised."

You already know this, so what exactly is the purpose of this overly broad list?

Cloudflare's DNS service is basically free. It's massively popular. Centralization of DNS may be worth debating, but it's an aside. Here you're just lumping all of these customers, many of them totally unaffected, into a pile vaguely labeled "potentially affected". It's very likely only a small subset of these customers are using the SSL proxy service.

Please just stop posting this inaccurate list. Bring it back when you have a list of domains that are actually impacted. Checking the response headers seems like a much better approach.

Facebook App possible attack vector.

So not sure if this were a coincidence or otherwise, but the forbes app added itself to my facebook and tried posting things to my page, which resulted in Facebook locking my account down. My actual login for Facebook was not compromised though and Facebook just flagged the Forbes app as a malicious app, so I removed it. Forbes itself isn't on the list but Forbes.ru is. Thought I'd mention that in case you guys, who probably know more about this than I do, know of any way app permission for Facebook or Twitter could be compromised in a similar fashion. Thanks regardless for generating this list!

Please, do not create duplicate issues

DISCLAIMER:

This list contains all domains that use cloudflare DNS, not just the cloudflare SSL proxy (the affected service that leaked data).
It's a broad sweeping list that includes everything. Just because a domain is on the list does not mean the site is compromised.
This list will be narrowed down to the affected domains as I get more information.

HOW TO REMOVE YOUR SITE

  1. verify the site is static and contains no user data (I will remove it immediately once I confirm)
    OR
  2. Verify ownership, send me an email from @yourdomain.com, post a random nonce on the domain, or provide keybase proof
  3. Verify you are not using the Cloudflare proxy service

I will not remove sites that contain user data and are returning server:cloudflare-nginx in response headers, since they may have been affected.

many of the listed domains not affected

It looks like many of the listed domain don't or didn't use any of the affected cloudflare "features" (for example the reverse proxying) which had to be enabled for a website to possibly be affected. Please bear in mind this repository is referenced and mentioned all over the news now. Please make sure you correctly make assumptions, mark what is an assumption and then filter the list.

More sites

warbyparker.com
ramnode.com
clientarea.ramnode.com
ipsw.me
puush.me
freenode.net
trakt.tv

Alphabetical order?

You could make the list more human friendly if you alphabetize it. I would suggest just copying the list into a decent text editor and telling it to sort the lines. It's a quick and easy fix, but I feel like it would help a lot of people.

Removing domains

HOW TO REMOVE YOUR SITE

  1. verify the site is static and contains no user data (I will remove it immediately once I confirm)
    OR
  2. Verify ownership, send me an email from @yourdomain.com, post a random nonce on the domain, or provide keybase proof
  3. Verify you are not using the Cloudflare proxy service

I will not remove sites that contain user data and are returning server:cloudflare-nginx in response headers, since they may have been affected.

So how do we have domains removed which have been confirmed by Cloudflare that they have not been effected by the Cloudbleed bug? I understand the need for some verification but I have been told by Cloudflare that my sites were unaffected and they do return server:cloudflare-nginx. Either we need a better confirmation process for removal or if the domains are not safe, should Cloudflare be informing customers that their sites were unaffected?

Make disclaimer clearer and add methodology section

As one of the admins of a site listed in your zip file, I'd like to know how exactly you derived this information, since our site absolutely does not use Cloudflare's reverse proxy.

It does use Cloudflares DNS, but that's not the same thing and didn't expose any users to data leakage.

Remove sites not affected by this vuln

Several (currently listed) sites, including coderobe.net and rob1nn.pw which i'm the provable owner of were not affected by this vulnerability. This should:

  • Be stated in readme.md
    OR:
  • Removed from the zip entirely

Now that this repository is making the news, this could potentially hurt the reputation of many sites.

Procedure for getting your domains removed

Note: I am not an official contributor of this repository nor am I affiliated with the owner of it in any way. I am simply just a person attempting to help the owner of the repository

I am speaking based on what I have seen others comment on the issues of this list, and I will provide answer I've tried gathering based on what @pirate has stated in other issues and the main page. I will update this list as time goes on as I do my best to assist the owner of the repository to the best of my ability. If you feel a question or issue should be added, comment below and I will consider it based on other comments people have added on other issues and what @pirate has stated before.

  1. The list is incorrect. It involves sites that don't use / weren't / aren't affected by this.
    A: These sites, as the disclaimer on the front page states, have possibly been affected by this. Until these sites are confirmed as unaffected, the site will remain on the list as a precaution.

  2. My site is not affected. Please remove it from the list.
    A: Please provide proof that your site in question has not been affected by #cloudbleed. If you need further instruction on how to do this, ask Pirate, the owner of this repository, for assistance.

DNS-only customers are included in the list

Many of my domains, including critcola.com, are included in this list. We use Cloudflare only for DNS, which was never affected by Cloudbleed. All of our traffic is through CloudFront.

I will send a pull request with my domains removed, but this list should really be filtered to remove domains that do not use Cloudflare as a CDN or for front-end caching.

Remove: jkhub.org (DNS only)

jkhub.org was not affected, I've worked with the owner of the site and they confirmed they didn't use cloudflare's proxy service. They will probably email you to have it removed. However, I've also confirmed they aren't returning server:cloudflare-nginx in the header.

Tools for easily searching the list

It might be nice to have a searchable HTML site for the non-programmers that don't know how to use Github/grep. I am willing to throw one together early tomorrow afternoon (~13hrs from now), but if anyone wants to do it sooner, I wouldn't complain.

EDIT: Here's the list so far:
http://www.doesitusecloudflare.com/ (doesn't search the historical list, it's just current sites)
https://chrome.google.com/webstore/detail/cloudbleed-bookmark-check/egoobjhmbpflgogbgbihhdeibdfnedii - chrome plugin
http://cloudflarelistcheck.abal.moe/
https://talepicker.com/cloudbleed/
https://cloudbleed.ak5s.com/
https://thislooksfun.github.io/cloudbleed-search/ (mine - fully browser based)
http://pickarsch.xyz/
https://cloudbleedcheck.com/
https://github.com/Eonasdan/LeakyCloudChecker/ - windows app
https://bleed.cloud/index.html
https://chrome.google.com/webstore/detail/cloudbleed/gmbmbodfgolnnfhfanhjeodfambaoklj - chrome plugin
https://addons.mozilla.org/en-US/firefox/addon/cloudbleed/ - Firefox plugin
https://github.com/mikemrm/CloudFlare-HistoryChecker - Chrome / Firefox history checker

Remove PvPCraft.ca, ryke.xyz

Domains: pvpcraft.ca, ryke.xyz, both owned by me.

https://keybase.io/macdja38

ryke.xyz while not static does not store user data, it's a little experiment.
pvpcraft.ca uses cloudflare for DNS and while it does store user sessions the site is not proxied through cloudflare as services need to correct directly to the domain. The subdomain bot.pvpcraft.ca also stores sessions but uses oauth with another provider and all sessions from the vulnerable period have been cleared.

Duplicates

Lots of duplicates!

$ cat sorted_unique_cf.txt | wc -l
 7385121

$ cat sorted_unique_cf.txt | uniq |wc -l
 4287625

This is very unhelpful. This list is causing a great deal of confusion and stress. Cloudflare has notified all affected customers and they are dealing with it. Private SSL keys and passwords were not leaked.

Please, do not create duplicate issues

DISCLAIMER:

This list contains all domains that use cloudflare DNS, not just the cloudflare SSL proxy (the affected service that leaked data).
It's a broad sweeping list that includes everything. Just because a domain is on the list does not mean the site is compromised.
This list will be narrowed down to the affected domains as I get more information.

HOW TO REMOVE YOUR SITE

  1. verify the site is static and contains no user data (I will remove it immediately once I confirm)
    OR
  2. Verify ownership, send me an email from @yourdomain.com, post a random nonce on the domain, or provide keybase proof
  3. Verify you are not using the Cloudflare proxy service

I will not remove sites that contain user data and are returning server:cloudflare-nginx in response headers, since they may have been affected.

README.md instruction to grep is too loose, needs to do an exact match

Following the README.md instructions yields deceptive results.

e.g.

$ grep reddit.com sorted_unique_cf.txt
cometreddit.com
destinyreddit.com
notifierforreddit.com
reddit.com.ve
sexyreddit.com
telereddit.com
toreddit.com

When in fact reddit.com isn't even in the list to begin with.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.