Also, interesting comment I found on HackerNews (HN):
This post was definitely demoted by HN. It stayed in the first position for less than 5 minutes and, as it quickly gathered upvotes, it jumped straight into 24th and quickly fell off the first page as it got 200 or so more points in less than an hour.
I’m 80% confident HN tried to hide this link. It’s the fastest downhill I’ve noticed on here, and I’ve been lurking and commenting for longer than 10 years.
CF doesn’t give a fuck about 80tb of traffic. These guys were in severe TOS violation that could affect all CF customers if CF IPs got blocked. Given 48 hours to bring their own IPs and switch to (expensive AF anywhere) enterprise account and finally shut down TWO WEEKS later after trying to weasel their way out of this instead of accepting they need to pay to play this stupid game.
We’ve been CF customers forever and enshitification is definitely affecting all of their services and mostly customer support, but in this instance I’m 100% on the side of CF.
100%?
…
This is the part that’s ridiculous to me. If CloudFlare thinks they’re violating TOS that’s fine. If they’re willing to let them continue with their business as-is as long as they pay more? That’s fine. But, scheduling calls with one group and it turns out it’s actually CloudFlare’s sales team on the phone, that’s ridiculous.
Well, the way he describes it does sound messed up, but if the only solution CF is willing to accept is for them to bring their own IPs and that is only available with an enterprise plan, what kind of conversation were they expecting? And like I said in another thread, enshitification at CF affected their customer service the most. We went from being able to to speak directly to devs, to people who actually understood the problem, to first tier support that didn’t understand shit to 0 tier support that barely understands English.
It seems that you’ve misunderstood what the issue is here from cloudflare’s perspective. The customer was using cloudflare IP addresses, which is causing a knock-on effect for the rest of cloudflare’s customers and putting cloudflare as a business themselves at risk. The alternative was for the customer to use their own IP addresses as cloudflare advised . I’m not sure what you think ‘Business development’ teams do but I certainly wouldn’t be expecting engineering advice from them.
Right, so sales should not be involved in any way.
Again, sales should not have been involved in any way.
They are at least not identical to sales. They work with sales, but there’s at least some engineering component of the job. In this case if you were told you were meeting with the business development team, you’d expect that there would be talk about an engineering solution to the problem. Not just paying cloudflare more money.
These articles are always embellished, so I would take it with a grain of saly.
I worked for an online casino in the past. What they do is a standard in the industry. The company I worked for was a small startup and onwed hundreds of domains, mostly just to protect the brand, 98% of which redirected to the main domain, with a few serving slightly different sites for different jurisdictions (e.g. Ontario regulations require that everything happens under a .ca domain). The “blocking evasion” doesn’t require CF to do anything, besides forcing the customer to block traffic from certain countries (the ones where you are suspected to evade the block). At this point - if the casino is really operating in the black or gray markets - they can just set ingress to their site outside CF for those countries only if they really wanted. I worked also for a company who was doing this to allow traffic from Russia, changing every day mirrors (and they had an IT department of maybe 20, it was a joke), and Russia was the main market for them.
If what is told in the article is true - I.e. 95% of the traffic was through the main website - then it doesn’t look like they were really doing this sort of evading deliberately, considering that in that 5% you have all your alternative TLDs plus the traffic from gray/black markets. Having hundreds of domains and some small percentage of traffic from black markets is something that just happens, it’s different from continuously registering new domains for providing access where the previous ones got DNS blocked (this is domain block). It doesn’t seem this is what they were doing based on the article, and if they were, then CF emails didn’t mention it, which is insane.
Obviously we don’t know the full story, so everything has to he taken with a grain of salt.