CloudFlare discussion thread

General project discussion.
Use this as a last resort if your topic does not fit in any of the other boards but it still on-topic.
Forum rules
This General Discussion board is meant for topics that are still relevant to Pale Moon, web browsers, browser tech, UXP applications, and related, but don't have a more fitting board available.

Please stick to the relevance of this forum here, which focuses on everything around the Pale Moon project and its user community. "Random" subjects don't belong here, and should be posted in the Off-Topic board.
BenFenner
Keeps coming back
Keeps coming back
Posts: 823
Joined: 2015-06-01, 12:52
Location: US Southeast

Re: CloudFlare discussion thread

Unread post by BenFenner » 2025-03-24, 17:52

mstremante wrote:
2025-03-24, 17:12
We're also spinning up a page with a Turnstile widget which has no special Pale Moon (and similar browsers) exceptions to make testing easier. Will provide more updates as soon as possible.
That will be nice to have. Thank you.

Any chance you could provide one as you describe, and then also one (or more) using the current CF implementation released to production (that does contain the exceptions)? So we don't have to use various web sites with unknown/unknowable/changing state of CF configuration at any given time for testing...

User avatar
Moonchild
Pale Moon guru
Pale Moon guru
Posts: 37639
Joined: 2011-08-28, 17:27
Location: Motala, SE

Re: CloudFlare discussion thread

Unread post by Moonchild » 2025-03-24, 22:38

mstremante wrote:
2025-03-24, 17:12
The exact syntax tripping up our logic here currently is "Firefox/128" as opposed to "Firefox/128.0".
perhaps the Basilisk general.useragent.compatMode.version is set incorrectly; that would explain the UA discrepancy. it should include the .0
"A dead end street is a place to turn around and go into a new direction" - Anonymous
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite

User avatar
Basilisk-Dev
Lunatic
Lunatic
Posts: 492
Joined: 2022-03-23, 16:41
Location: Chamber of Secrets

Re: CloudFlare discussion thread

Unread post by Basilisk-Dev » 2025-03-25, 13:06

mstremante wrote:
2025-03-24, 17:12
Build numbers aside, do different builds have different formats? The exact syntax tripping up our logic here currently is "Firefox/128" as opposed to "Firefox/128.0".
Confirming changing to 128.0 fixes it for me. I will make sure this is fixed in the next release of Basilisk.

That being said, both Pale Moon and Basilisk have the ability to remove the "Firefox/128.0" text from the user agent in each browser's config options. I would not rely on that text being there at all in the user agent. I tested removing the "Firefox/128.0" part of the User Agent by setting the general.useragent.compatMode.firefox config option to false, which causes the check to break again.

Thanks!
Moonchild wrote:
2025-03-24, 22:38
perhaps the Basilisk general.useragent.compatMode.version is set incorrectly; that would explain the UA discrepancy. it should include the .0
This was the issue
Basilisk Project Owner

viewtopic.php?f=61&p=230756

User avatar
Moonchild
Pale Moon guru
Pale Moon guru
Posts: 37639
Joined: 2011-08-28, 17:27
Location: Motala, SE

Re: CloudFlare discussion thread

Unread post by Moonchild » 2025-03-25, 13:27

Basilisk-Dev wrote:
2025-03-25, 13:06
That being said, both Pale Moon and Basilisk have the ability to remove the "Firefox/128.0" text from the user agent in each browser's config options. I would not rely on that text being there at all in the user agent. I tested removing the "Firefox/128.0" part of the User Agent by setting the general.useragent.compatMode.firefox config option to false, which causes the check to break again.
I'm really disappointed this was not picked up then. I very clearly indicated the three modes of operation of UXP browsers with regards to the user agent!
Firefox/nn.nn is only present in one of the three UA compatibility modes. So, this penny clearly hasn't dropped yet for the bot detection dev team.

@mstremante why haven't you picked up what I clearly explained multiple times now about our UA?
viewtopic.php?f=65&t=32190#p260780
viewtopic.php?f=24&t=28233
"A dead end street is a place to turn around and go into a new direction" - Anonymous
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite

User avatar
Basilisk-Dev
Lunatic
Lunatic
Posts: 492
Joined: 2022-03-23, 16:41
Location: Chamber of Secrets

Re: CloudFlare discussion thread

Unread post by Basilisk-Dev » 2025-03-25, 13:36

Moonchild wrote:
2025-03-25, 13:27
I'm really disappointed this was not picked up then. I very clearly indicated the three modes of operation of UXP browsers with regards to the user agent!
Firefox/nn.nn is only present in one of the three UA compatibility modes. So, this penny clearly hasn't dropped yet for the bot detection dev team.
To be clear, when I made that post I was referring to Basilisk. This issue only seems to affect Basilisk.

I tested removing the Firefox part of the user agent in Pale Moon just now and Pale Moon still passes the test even with general.useragent.compatMode.firefox set to false.

For future reference Michael, in the vast majority of instances if Moonchild says that Pale Moon behaves a certain way then Basilisk will likely behave in the same or a similar way. I'll let you know in situations where that's not the case.
Basilisk Project Owner

viewtopic.php?f=61&p=230756

User avatar
Moonchild
Pale Moon guru
Pale Moon guru
Posts: 37639
Joined: 2011-08-28, 17:27
Location: Motala, SE

Re: CloudFlare discussion thread

Unread post by Moonchild » 2025-03-25, 15:00

Ah okay I seem to have misunderstood what was impacted. sorry about that. But still:

To be clear: the useragent compatibility modes are a platform feature, and will be an option in all UXP-based browsers. i.e. you could somewhat generalize the user-agent FAQ post to read different names for "PaleMoon/nn.nn" in the UA. Unbranded builds will e.g. have "NewMoon/nn.nn". As explained before, common elements will be Goanna/* across all UXP-based browsers, and {AppName}/* differentiating various applications. Firefox/nn.nn will only be present in "Firefox compatibility mode".
"A dead end street is a place to turn around and go into a new direction" - Anonymous
"Seek wisdom, not knowledge. Knowledge is of the past; wisdom is of the future." -- Native American proverb
"Linux makes everything difficult." -- Lyceus Anubite

User avatar
mstremante
Moongazer
Moongazer
Posts: 8
Joined: 2025-03-04, 16:54

Re: CloudFlare discussion thread

Unread post by mstremante » 2025-03-28, 17:51

All: quick note that we are still working on this. I hope to have some updates (better testing setup, browser developer program update etc). next week.

User avatar
andyprough
Board Warrior
Board Warrior
Posts: 1115
Joined: 2020-05-31, 04:33

Re: CloudFlare discussion thread

Unread post by andyprough » 2025-03-28, 22:39

mstremante wrote:
2025-03-28, 17:51
All: quick note that we are still working on this. I hope to have some updates (better testing setup, browser developer program update etc). next week.
Excellent! Looking forward to this all coming together. I'd like to see the issues for SeaMonkey and Falkon get ironed out also. And within a year or so we should start seeing public releases of Ladybird.

Sessh
Fanatic
Fanatic
Posts: 207
Joined: 2018-01-11, 18:43

Re: CloudFlare discussion thread

Unread post by Sessh » 2025-03-29, 17:46

Yeah I hope this marks the end of Cloudflare conflicts with legitimate browsers. Wishing all the best with these efforts.

User avatar
honestduane
Newbie
Newbie
Posts: 5
Joined: 2025-03-28, 22:35
Location: Seattle, WA

Re: CloudFlare discussion thread

Unread post by honestduane » 2025-03-31, 18:24

mstremante wrote:
2025-03-28, 17:51
All: quick note that we are still working on this. I hope to have some updates (better testing setup, browser developer program update etc). next week.
Dear mstremante,

I hope this message finds you well. I would like to bring to your attention a critical security concern regarding Cloudflare's current approach to browser validation, That is very relevant in the moment, specifically Cloudflare's requirements for certain security vulnerabilities and features that enable canvas fingerprinting. This practice raises several significant issues that need to be addressed, particularly concerning potential security risks and privacy implications.

It appears that Cloudflare’s security checks rely on features that exploit known security vulnerabilities, such as canvas fingerprinting, which is increasingly regarded as a security defect. This creates a substantial issue because it forces browsers to incorporate a feature that is not only privacy-invasive but also recognized as a vector for malicious exploitation by bad actors in the wild. As a result, any browser that does not support this vulnerability is effectively blocked from passing your security checks, which raises a severely troubling question I must ask with all the respect possible:

- Is Cloudflare penalizing browsers for being too secure?

Perhaps it's better that this be a series of questions, so as a professional cybersecurity and software engineer working in the browser development space, I have several important questions I would like to pose based on the question above:

- Is it Cloudflare's intention to block browsers that do not support this security vulnerability from accessing the internet?

- Is an insecure browser engine, one that allows malicious or insecure canvas fingerprinting, now a stated requirement for passing Cloudflare’s security checks?

- If a browser like Pale Moon chooses to protect user privacy by blocking this fingerprinting, would Cloudflare still penalize it for not implementing the features that make it vulnerable as they have in the past?

- Does Cloudflare consider browsers that do not support this vulnerability to be illegitimate?

Many Chromium forks, including those that intentionally block canvas fingerprinting for its security implications, are currently experiencing issues with Cloudflare's security checks.

These forks, which prioritize user privacy and security, should NOT be penalized for opposing features that are widely regarded as SECURITY FLAWS. Many other browser engineers, including myself, believe this approach is unfair and should be reconsidered. Cloudflare, by enforcing such checks, appears to be advocating for INSECURE systems.

It is crucial to understand that requiring browsers to support features like canvas fingerprinting, which is widely viewed as a security vulnerability, does not align with industry best practices. By imposing such requirements, Cloudflare risks undermining user trust in the broader ecosystem and, frankly, damages its reputation as a security-focused service. Asking me to make a client system less secure as a prerequisite seems unwise, and as a cybersecurity professional, I have to wonder why your engineers are telling you that it doesn't work with secured clients. It makes me trust Cloudflare less, and it makes me want to advocate for my employers and my peers to advocate for not using your service.

Furthermore, are you aware that this could enable bad actors with malicious intent to exploit your protections in order to gain access to only insecure clients that have this security exploit possible?

Based only on the data I have now it seems like Cloudflare, by mandating a lack of security in browsers to pass its validation checks, is potentially hindering global internet security. The minimum requirement for passing your checks seems to be that browsers must allow or support known security flaws in their released software; I strongly urge you to reconsider the implications of this approach, and the long-term consequences it could have on internet security, as well as the security of your customers.

You claim to not want to be the company that decides which browser is legitimate or not... so may I respectfully ask, what is the bar? Because you can't say it's about support for specific apis when browsers that have those api's fully supported - they are full chromium forks - still can't pass your checks after they fix known security problems.

While I fully support Cloudflare’s efforts to combat bots - I personally dislike malicious bots, having been harmed by them myself - it is deeply concerning to me as a long time cybersecurity and software development professional to see your company requesting that open source projects add features that seem to only exist to specifically exploit known security defects in an effort to take away user privacy and security goals.

The fact that browsers that have closed security gaps, such as canvas fingerprinting, are being targeted by Cloudflare raises questions about the true nature of your security checks.
- Specifically, what is the actual threshold for passing Cloudflare's security validation?
- Is the goal to promote security, or to punish browsers that are considered "too secure"?
- Is PaleMoon being targeted simply because it is too secure by default?
- If PaleMoon decides not to support canvas fingerprinting, will Cloudflare still allow palemoon users free access to the Internet?
- Given that we know many chrome forks also experience these same issues but they are fully known to support the apis you requested, I would like to request further knowledge about your checks in order to fully understand all of the requirements needed by a browser to pass them, In the spirit of you wanting to not be the company that picks and chooses which browser is legitimate and which one is not. I can think of several chromium forks that have full support for the API's you've requested but are also having issues with Cloudflare, and I suspect it could be because they've explicitly decided to close security problems that perhaps Cloudflare is dependent on?

I sincerely hope that Cloudflare was unaware of these issues, but given that Cloudflare publicly claims to be a leader in internet security, I must assume that your team is well aware of these implications. If I can identify these issues, I trust your team has already recognized and, unfortunately, dismissed them. I hope we can work together on a fix, not just for Palemoon or Basilisk, all the same.

I am always open to constructive discussions made in good faith. I have also put significant effort into crafting this message in the most respectful and professional manner, while still highlighting the very real security concerns that Cloudflare's current approach poses to the broader internet ecosystem. It is vital that Cloudflare reassesses its approach to ensure that internet security is not continued to be compromised by Favoritism for browsers that can be exploited using known security defect that multiple vendors have decided to fix due to the risk it poses to their human customers.

BenFenner
Keeps coming back
Keeps coming back
Posts: 823
Joined: 2015-06-01, 12:52
Location: US Southeast

Re: CloudFlare discussion thread

Unread post by BenFenner » 2025-04-01, 19:39

honestduane, you keep conflating Cloudflare with the Internet.
honestduane wrote:
2025-03-31, 18:24
- Is it Cloudflare's intention to block browsers that do not support this security vulnerability from accessing the internet?
honestduane wrote:
2025-03-31, 18:24
- If PaleMoon decides not to support canvas fingerprinting, will Cloudflare still allow palemoon users free access to the Internet?
Mercifully, you are wrong.

The rest of your posts on this forum so far are that of an addlebrained lunatic. We would be best to ignore you. Even if well-meaning, your posts are indistinguishable from that of the Russian confuse/overload attack strategy.

I understand you've got a lot of pent-up discussion for CF and now seems to be your chance. Get to the browser developer round-table that Cloudflare is putting together and leave the Pale Moon forum folks out of whatever it is you're smoking.

User avatar
Mæstro
Astronaut
Astronaut
Posts: 539
Joined: 2019-08-13, 00:30
Location: Casumia

Re: CloudFlare discussion thread

Unread post by Mæstro » 2025-04-03, 01:03

I am happy to report that Fanbox, which had been shut behind Cloudflare since the problems began a month ago, is accessible again and one can pass Cloudflare captchas in both Pale Moon and my years-old version of Ungoogled Chromium as of today. :)
Off-topic:
How is Discord’s voice/video chat in Basilisk for Linux? I am considering replacing UC as a backup browser.
Browser: Pale Moon (official build, updated regularly)
Operating System: Linux Mint Debian Edition 4 (amd64)
※Receiving Debian 10 ELTS security upgrades
Hardware: HP Pavilion DV6-7010 (1400 MHz, 6 GB)
Ash is the best letter.

User avatar
andyprough
Board Warrior
Board Warrior
Posts: 1115
Joined: 2020-05-31, 04:33

Re: CloudFlare discussion thread

Unread post by andyprough » 2025-04-03, 02:16

Mæstro wrote:
2025-04-03, 01:03
my years-old version of Ungoogled Chromium as of today
Now that is interesting news. I wonder if Fanbox got enough complaints that they changed the cloudflare verification policies on their dashboard, or if there has been some further change by cloudflare to address the harm that was being done to other alternative browsers. I might go back and try SeaMonkey and Falkon and a few others again to see if any of them are now getting past verification.

BenFenner
Keeps coming back
Keeps coming back
Posts: 823
Joined: 2015-06-01, 12:52
Location: US Southeast

Re: CloudFlare discussion thread

Unread post by BenFenner » 2025-04-03, 12:02

It sure would be nice to have that dedicated turnstyle widget page discussed a week ago...

User avatar
frostknight
Astronaut
Astronaut
Posts: 572
Joined: 2022-08-10, 02:25

Re: CloudFlare discussion thread

Unread post by frostknight » 2025-04-04, 20:26

Off-topic:
Honestly, he is making more of an attempt right now then discourse is after I asked them to not discriminate against palemoon.

The irony is that the web browsers discourse supports, most of them are proprietary! security by obscurity never works well.
This being said, he is at least making an attempt.
Freedom is never more than one generation away from extinction. Feelings are not facts
If you wish to be humbled, try to exalt yourself long term If you wish to be exalted, try to humble yourself long term
Favourite operating systems: Hyperbola Devuan OpenBSD
Say NO to Fascism and Corporatism as much as possible!
Also, Peace Be With us All!

Michaell
Lunatic
Lunatic
Posts: 347
Joined: 2018-05-26, 18:13

Re: CloudFlare discussion thread

Unread post by Michaell » 2025-04-08, 02:41

I don't know what it means if anything but I just got a page from Cloudflare telling me I was blocked from a social media site. I had been on with PM a couple of times earlier today. It didn't even load the site's login page. PM has been fine with this site except that first weekend when all the CF fuss started.
UPDATE: that site is working in PM again this morning, after update to 33.7 but I don't know if that made the difference or they reset their security.

I tried Firefox and was able to get in. I did see the spinning circle thing that I usually don't see. But otherwise OK, EXCEPT Firefox had disabled all my extensions! I won't use a browser without extensions (except for certain required government functions).
Last edited by Michaell on 2025-04-08, 14:02, edited 1 time in total.
Win10home(1709), PM33.7.0-portable as of Apr 8, '25

User avatar
Shadow
Moon lover
Moon lover
Posts: 80
Joined: 2023-03-16, 13:21

Re: CloudFlare discussion thread

Unread post by Shadow » 2025-04-08, 11:31

Michaell wrote:
2025-04-08, 02:41
But otherwise OK, EXCEPT Firefox had disabled all my extensions!
Off-topic:
This is probably why.

See if you can set xpinstall.signatures.required to false in about:config. Can read about why here.

User avatar
moonbat
Knows the dark side
Knows the dark side
Posts: 5584
Joined: 2015-12-09, 15:45

Re: CloudFlare discussion thread

Unread post by moonbat » 2025-04-08, 11:55

Shadow wrote:
2025-04-08, 11:31
See if you can set xpinstall.signatures.required to false in about:config.
That doesn't work on the regular build, only on ESR/developer/nightly versions.
"One hosts to look them up, one DNS to find them and in the darkness BIND them."

Image
KDE Neon on a Slimbook Excalibur (Ryzen 7 8845HS, 64 GB RAM)
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
Jabber: moonbat@hot-chili.net

User avatar
Shadow
Moon lover
Moon lover
Posts: 80
Joined: 2023-03-16, 13:21

Re: CloudFlare discussion thread

Unread post by Shadow » 2025-04-08, 12:04

moonbat wrote:
2025-04-08, 11:55
Shadow wrote:
2025-04-08, 11:31
See if you can set xpinstall.signatures.required to false in about:config.
That doesn't work on the regular build, only on ESR/developer/nightly versions.
Don't think they stated which build they use, so I used see for a reason, as in see if it's actually there.

User avatar
moonbat
Knows the dark side
Knows the dark side
Posts: 5584
Joined: 2015-12-09, 15:45

Re: CloudFlare discussion thread

Unread post by moonbat » 2025-04-08, 12:09

Even I'm going off their long ago announcement when they decided to force extension signing, I haven't touched Firefox with a bargepole in more than 10 years.
"One hosts to look them up, one DNS to find them and in the darkness BIND them."

Image
KDE Neon on a Slimbook Excalibur (Ryzen 7 8845HS, 64 GB RAM)
AutoPageColor|PermissionsPlus|PMPlayer|Pure URL|RecordRewind|TextFX
Jabber: moonbat@hot-chili.net