Nick Sullivan on twitter claims that Cloudflare detects and treats Tor users differently so however they're detecting that may have been broken by 8.0.1.
I don't mean to imply the problem has anything to do with this new feature because if you see the screenshots, neither was given the alt-svc header that is supposed to allow Torbrowser to access Cloudflare sites without the captcha.
Trac: Username: cypherpunks_reply
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
mitmflare does detect tor browser, this is not new (it has nothing to do with the mentioned alt-svc-based onion redirections), it exists since at least tor browser 7.x
and it's not a trivial detection (like just the value of request headers), their fingerprint includes much more, it likely goes to the tls level, possibly to the tcp level
if anyone knows details, I want to read them, thanks
TLS 1.3 is a modern security protocol built with modern tools like formal analysis that retains its backwards compatibility. It has been tested widely and iterated upon using real world deployment data. It’s a cleaner, faster, and more secure protocol ready to become the de facto two-party encryption protocol online. Draft 28 of TLS 1.3 is enabled by default for all Cloudflare customers, and we will be rolling out the final version soon.
Publishing TLS 1.3 is a huge accomplishment. It is one the best recent examples of how it is possible to take 20 years of deployed legacy code and change it on the fly, resulting in a better internet for everyone. TLS 1.3 has been debated and analyzed for the last three years and it’s now ready for prime time. Welcome, RFC 8446.