
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 13:15:10 GMT</lastBuildDate>
        <item>
            <title><![CDATA[iCloud Private Relay: information for Cloudflare customers]]></title>
            <link>https://blog.cloudflare.com/icloud-private-relay/</link>
            <pubDate>Wed, 02 Mar 2022 13:59:09 GMT</pubDate>
            <description><![CDATA[ iCloud Private Relay is a new Internet privacy service from Apple that allows users to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7avcuELKE6yv7dkTIUwrPV/c0e745d98211239172c040ea01b5a5f5/image3.png" />
            
            </figure><p>iCloud Private Relay is a new Internet privacy service from Apple that allows users with iOS 15, iPadOS 15, or macOS Monterey on their devices and an iCloud+ subscription, to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure.</p><p>In this post, we’ll explain how website operators can ensure the best possible experience for end users using iCloud Private Relay. Additional material is available from Apple, including “<a href="https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud">Set up iCloud Private Relay on all your devices</a>”, and <a href="https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/">“Prepare Your Network or Web Server for iCloud Private Relay”</a> which covers network operator scenarios in detail.</p>
    <div>
      <h2>How browsing works using iCloud Private Relay</h2>
      <a href="#how-browsing-works-using-icloud-private-relay">
        
      </a>
    </div>
    <p>The design of the iCloud Private Relay system ensures that no single party handling user data has complete information on both who the user is and what they are trying to access.</p><p>To do this, Private Relay uses modern encryption and transport mechanisms to relay traffic from user devices through Apple and partner infrastructure before sending traffic to the destination website.</p><p>Here’s a diagram depicting what connection metadata is available to who when <b><i>not</i></b> using Private Relay to browse the Internet:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kTnsNE4HK74q8j50u276c/0418f9debaea6ad75f2122ac9b6681cf/image2.png" />
            
            </figure><p>Let’s look at what happens when we <b>add</b> Private Relay to the mix:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7FIwHsWOPoSYOFIXPsrFlc/9a58743abf2b8255c5e4b4c7492dd364/image1.png" />
            
            </figure><p>By adding <i>two</i> "relays" (labeled “Ingress Proxy” and “Egress Proxy” above), connection metadata is split:</p><ul><li><p>The user’s original IP address is visible to the access network (e.g. the coffee shop you’re sitting in, or your home ISP) and the first relay (operated by Apple), but the server or website name is encrypted and not visible to either.</p><p>The first relay hands encrypted data to a second relay (e.g. Cloudflare), but is unable to see “inside” the traffic to Cloudflare.</p></li><li><p>Cloudflare-operated relays know only that it is receiving traffic from a Private Relay user, but not specifically who or their client IP address. Cloudflare relays then forward traffic on to the destination server.</p></li></ul><p>Splitting connections in this way prevents websites from seeing user IP addresses and minimizes how much information entities “on path” can collect on user behavior.</p><p>Much more extensive information on how Private Relay works is available from Apple, including in the whitepaper “<a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay Overview</a>” (pdf).</p>
    <div>
      <h2>Cloudflare’s role as a ‘second relay’</h2>
      <a href="#cloudflares-role-as-a-second-relay">
        
      </a>
    </div>
    <p>As mentioned above, Cloudflare functions as a second relay in the iCloud Private Relay system. We’re well suited to the task — Cloudflare operates one of the largest, fastest networks in the world. Our infrastructure makes sure traffic reaches every network in the world quickly and reliably, no matter where in the world a user is connecting from.</p><p>We’re also adept at building and working with modern encryption and transport protocols, including <a href="/rfc-8446-aka-tls-1-3/">TLS 1.3</a> and <a href="/the-road-to-quic/">QUIC</a>. QUIC, and closely related <a href="https://datatracker.ietf.org/wg/masque/about/">MASQUE</a>, are the technologies that enable Private Relay to efficiently move data between multiple relay hops without incurring performance penalties.</p><p>The same building blocks that power Cloudflare products were used to build support for Private Relay: our <a href="https://www.cloudflare.com/network/">network</a>, 1.1.1.1, <a href="https://workers.cloudflare.com/">Cloudflare Workers</a>, and software like <a href="https://github.com/cloudflare/quiche">quiche</a>, our <a href="/enjoy-a-slice-of-quic-and-rust/">open-source</a> QUIC (and now MASQUE) protocol handling library, which now includes proxy support.</p>
    <div>
      <h2>I’m a website operator. What do I need to do to properly handle iCloud Private Relay traffic?</h2>
      <a href="#im-a-website-operator-what-do-i-need-to-do-to-properly-handle-icloud-private-relay-traffic">
        
      </a>
    </div>
    <p>We’ve gone out of our way to ensure the use of iCloud Private Relay does not have any noticeable impact on your websites, APIs, and other content you serve on the web.</p>
    <div>
      <h3>Ensuring geolocation accuracy</h3>
      <a href="#ensuring-geolocation-accuracy">
        
      </a>
    </div>
    <p>IP addresses are often used by website operators to "geolocate" users, with user locations being used to show content specific to certain locations (e.g. search results) or to otherwise customize user experiences. Private Relay is designed to preserve IP address to geolocation mapping accuracy, even while preventing tracking and fingerprinting.</p><p>Preserving the ability to derive rough user location ensures that users with Private Relay enabled are able to:</p><ol><li><p>See place search and other locally relevant content when they interact with geography-specific content without precise location sharing enabled.</p></li><li><p>Consume content subject to licensing restrictions limiting which regions have access to it (e.g. live sports broadcasts and similar rights-restricted content).</p></li></ol><p>One of the key “acceptance tests” we think about when thinking about geolocating users is the “local pizza test”: with location services disabled, are the results returned for the search term “pizza near me” geographically relevant? Because of the geography preserving and IP address management systems we operate, they are!</p><p>At a high-level, here’s how it works:</p><ul><li><p>Apple relays geolocate user IP addresses and translate them into a “<a href="https://en.wikipedia.org/wiki/Geohash">geohash</a>”. Geohashes are compact representations of latitude and longitude. The system includes protections to ensure geohashes cannot be spoofed by clients, and operates with reduced precision to ensure user privacy is maintained. Apple relays do not send user IP addresses onward.</p></li><li><p>Cloudflare relays maintain a pool of IP addresses for exclusive use by Private Relay. These IP addresses have been registered with geolocation database providers to correspond to specific cities around the world. When a Private Relay user connects and presents the previously determined geohash, the closest matching IP address is selected.</p></li><li><p>Servers see an IP address that corresponds to the original user IP address’s location, without obtaining information that may be used to identify the specific user.</p></li></ul><p>In most parts of the world, Private Relay supports geolocation to the nearest city by default. If users prefer to be located at more coarse location granularity, the option to locate based on country and timezone is available in Private Relay settings.</p><p>If your website relies on geolocation of client IP addresses to power or modify user experiences, <b>please ensure your geolocation database is kept up to date</b>. Apple and Cloudflare work directly with every major IP to geolocation provider to ensure they have an accurate mapping of Private Relay egress IP addresses (which present to your server as the client IP address) to geography. These mappings may change from time to time. Using the most up-to-date version of your provider’s database will ensure the most accurate geolocation results for all users, including those using Private Relay.</p><p>In addition to making sure your geolocation databases are up-to-date, even greater location accuracy and precision can be obtained by ensuring your origin is reachable via IPv6. Private Relay egress nodes prefer IPv6 whenever AAAA DNS records are available, and use IPv6 egress IP addresses that are geolocated with greater precision than their IPv4 equivalents. This means you can geolocate users to more specific locations (without compromising user privacy) and deliver more relevant content to users as a result.</p><p><b>If you’re a website operator using Cloudflare to protect and accelerate your site, no action is needed from you</b>. Our geolocation feeds used to enrich client requests with location metadata are kept up-to-date and include the information needed to geolocate users using iCloud Private Relay.</p>
    <div>
      <h3>Delivering high performance user experiences</h3>
      <a href="#delivering-high-performance-user-experiences">
        
      </a>
    </div>
    <p>One of the more counterintuitive things about performance on the Internet is that adding intermediate network “hops” between a user and a server can often <b><i>speed up</i></b> overall network performance, rather than slow it down, if those intermediate hops are well-connected and tuned for speed.</p><p>The networks that power iCloud Private Relay are exceptionally well-connected to other networks around the world, and we spend <a href="/tag/network-performance-update/">considerable effort</a> squeezing every last ounce of performance out of our systems every day. We even have automated systems, like <a href="/argo/">Argo Smart Routing</a>, that take data on how the Internet is performing and find the best paths across it to ensure consistent performance even in the face of Internet congestion and other “weather”.</p><p>Using Private Relay to reach websites instead of going directly to the origin server can result in significant, <b>measured decreases in page load time for clients using Private Relay vs those that are not</b>. That’s pretty neat: increased privacy does <b>not</b> come at the price of reduced page load and render performance when using Private Relay.</p>
    <div>
      <h3>Limiting reliance on IP addresses in fraud and bot management systems</h3>
      <a href="#limiting-reliance-on-ip-addresses-in-fraud-and-bot-management-systems">
        
      </a>
    </div>
    <p>To ensure that iCloud Private Relay users have good experiences interacting with your website, you should ensure that any systems that rely on IP address as a signal or way of indexing users properly accommodate many users originating from one or a handful of addresses.</p><p>Private Relay’s concentration of users behind a given IP address is similar to commonly deployed enterprise web gateways or carrier grade network address translation (CG-NAT) systems.</p><p>As explained in Apple <a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">technical documentation</a>, “Private Relay is designed to ensure only valid Apple devices and accounts in good standing are allowed to use the service. Websites that use IP addresses to enforce fraud prevention and anti-abuse measures can trust that connections through Private Relay have been validated at the account and device level by Apple.” Because of these advanced device and user authorization steps, you might consider allowlisting Private Relay IP addresses explicitly. Should you wish to do so, Private Relay’s egress IP addresses are available in <a href="https://mask-api.icloud.com/egress-ip-ranges.csv">CSV form here</a>.</p><p>If you as a server operator are interested in managing traffic from users using systems like iCloud Private Relay or similar NAT infrastructure, consider constructing rules using user level identifiers like cookies, and other metadata present including geography.</p><p>For Cloudflare customers, our rate limiting and bot management capabilities are well suited to handle traffic from systems like Private Relay. Cloudflare <a href="/multi-user-ip-address-detection/">automatically detects</a> when IP addresses are likely to be used by multiple users, tuning our <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> and other security heuristics accordingly. Additionally, our WAF <a href="https://developers.cloudflare.com/waf/custom-rules/rate-limiting/parameters/">includes functionality</a> specifically designed to manage traffic originating from shared IP addresses.</p>
    <div>
      <h3>Understanding traffic flows</h3>
      <a href="#understanding-traffic-flows">
        
      </a>
    </div>
    <p>As discussed above, IP addresses used by iCloud Private Relay are specific to the service. However, network and server operators (including Cloudflare customers) studying their traffic and logs may notice large amounts of user traffic arriving from Cloudflare’s network, AS13335. These traffic flows originating from AS13335 include forward proxied traffic from iCloud Private Relay, our enterprise web gateway products, and other products including WARP, our consumer VPN.</p><p>In the case of Cloudflare customers, traffic traversing our network to reach your Cloudflare proxied property is included in all usage and billing metrics as traffic from any Internet user would be.</p>
    <div>
      <h2>I operate a corporate or school network and I’d like to know more about iCloud Private Relay</h2>
      <a href="#i-operate-a-corporate-or-school-network-and-id-like-to-know-more-about-icloud-private-relay">
        
      </a>
    </div>
    <p>CIOs and network administrators may have questions about how iCloud Private Relay interacts with their corporate networks, and how they might be able to use similar technologies to make their networks more secure. Apple's document, “<a href="https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/">Prepare Your Network or Web Server for iCloud Private Relay</a>” covers network operator scenarios in detail.</p><p>Most <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise networks</a> will not have to do anything to support Private Relay traffic. If the end-to-end encrypted nature of the system creates compliance challenges, local networks can block the use of Private Relay for devices connected to them.</p><p>Corporate customers of Cloudflare One services can put in place the name resolution blocks needed to disable Private Relay through their DNS filtering dashboard. Cloudflare One, Cloudflare’s <a href="https://www.cloudflare.com/network-security/">corporate network security suite</a>, includes Gateway, built on the same network and codebase that powers iCloud Private Relay.</p>
    <div>
      <h2>iCloud Private Relay makes browsing the Internet more private and secure</h2>
      <a href="#icloud-private-relay-makes-browsing-the-internet-more-private-and-secure">
        
      </a>
    </div>
    <p>iCloud Private Relay is an exciting step forward in preserving user privacy on the Internet, without forcing compromises in performance.</p><p>If you’re an iCloud+ subscriber you can <a href="https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud#:~:text=On%20your%20iPhone%2C%20iPad%2C%20or%20iPod%20touch%2C%20go%20to,or%20cellular%20plan%20(SIM).">enable Private Relay in iCloud Settings</a> on your iPhone, iPad, or Mac on iOS15, iPadOS15, or macOS Monterey.</p> ]]></content:encoded>
            <category><![CDATA[iCloud Private Relay]]></category>
            <category><![CDATA[Apple]]></category>
            <guid isPermaLink="false">6XAe2kJXqycDkf5kuqrE8</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare One: One Year Later]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-one-year-later/</link>
            <pubDate>Mon, 06 Dec 2021 13:59:36 GMT</pubDate>
            <description><![CDATA[ Cloudflare One helps enterprises build modern enterprise networks, operate efficiently and securely, and throw out on-premise hardware. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6kXSmxhrD3yAAXPFRgRKWU/7f115ac709eaf5bd2634ba5d9efed8dc/image6-3.png" />
            
            </figure><p>Cloudflare One helps enterprises build modern <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise networks</a>, operate efficiently and securely, and throw out on-premise hardware. It’s been more than a year since we <a href="/introducing-cloudflare-one/">announced</a> the <a href="/cloudflare-one/">product suite</a>, and we wanted to check in on how things are going.</p><p>We’re celebrating Chief Information Officers this week. Regardless of the size of their organization, they’ve had a challenging year. Overnight, their teams became responsible for years of digital transformation to prepare their networks and users to support work-from-home and to adopt new technologies. They worked with partners across security, engineering, and people teams to keep their <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">critical infrastructure</a> running.</p><p>Today, we want to focus on the problems that CIOs have been able to solve with Cloudflare One in the last year. Customers are using Cloudflare One at a scale we couldn’t have imagined a year ago to solve interesting problems that we didn't know existed yet. We’ll walk through some specific use cases later in the post, but first, let’s recap why we built Cloudflare One, what problems it solves, and some of the new things we’re launching this week.</p>
    <div>
      <h2>What is Cloudflare One?</h2>
      <a href="#what-is-cloudflare-one">
        
      </a>
    </div>
    <p>Cloudflare One allows companies to purchase, provision, and manage connectivity, security, and analytics tools needed to operate a corporate network from one vendor and one control plane.</p><p>Historically, CIOs purchased point solutions from dozens of hardware vendors. They assembled a patchwork of appliances and services to keep their organization connected and secure. The band-aids held together for a while, despite the cost and maintenance burden.</p><p>However, the growth of what needed to be connected broke this model. Office locations became more distributed and, more recently, <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">remote work</a> became widespread. Applications that only existed in the corporate data center moved to public cloud providers or SaaS models. As these shifts pushed the limits on what these band-aids could support, the attacks against networks and endpoints became more sophisticated.</p><p>We talked to customers who explained that these changes presented a hierarchy of problems: at its base layer, they need their users, offices, data centers and clouds connected to each other and to the Internet. Next, they needed to filter the traffic between these entities. Finally, they needed to log, diagnose, and analyze that traffic. Once those initial needs were met, the <a href="https://www.cloudflare.com/network-security/">network security solution</a> needed to be fast and reliable, and comply with local laws and regulations.</p><p>Cloudflare runs a global, programmable edge network. We use that network to improve the speed and security of some of the largest websites and services on the Internet. We built Cloudflare One to make that network available to corporate customers to solve their new challenges. Today, Cloudflare helps CIOs deliver connectivity, security, and visibility without sacrificing performance, no matter where a customer or their employees work.</p>
    <div>
      <h2>How does it work?</h2>
      <a href="#how-does-it-work">
        
      </a>
    </div>
    <p>Cloudflare One starts with connectivity. Your team can connect offices, data centers, devices and cloud properties to Cloudflare’s network. We’re flexible with how you want to send that traffic to us. Connect your offices and data centers to Cloudflare through <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> partnerships or soon our Cloudflare for Offices infrastructure. New this week, you can start using IPsec Tunnels in addition to our existing GRE Tunnels.</p><p>Connect your internal resources and the rest of the Internet with a lightweight agent. Does your team rely on contractors and unmanaged devices? Connect them to internal tools in a fully agentless mode. We’ll also be announcing new improvements to Cloudflare Tunnel and our network interfacing provisioning to keep making it easier to connect your organization to our global network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yfMqUcIenHv29kuYOCCit/e3c6704c1dab766e94a338e43046c72f/image3-4.png" />
            
            </figure><p>Once connected, Cloudflare’s network provides a comprehensive suite of security functions to protect your traffic. Customers can rely on our network for everything from IP-layer DDoS mitigation to blocking threats with <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolation</a>. Later this week, we’ll be sharing details of new network firewall features that help your team continue to rip out even more boxes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HoJtTc6yeVLLIn4FaoqCM/3931c48d3660e3d339d9118dfc9653d2/image8-2.png" />
            
            </figure><p>Beyond <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">securing your organization from threats</a> on the Internet, Cloudflare One also provides your team with comprehensive Zero Trust control over who can access your internal resources and SaaS applications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6HGAYjrvspURppBYc0RKSW/161c65e3ce49ddbc7f65275044079895/image4-6.png" />
            
            </figure><p>Now that traffic is connected and secured through Cloudflare, we can help make you faster. Cloudflare is building the fastest network in the world. You can read more about where we are the fastest today and how we’re working to be the fastest in any location. New this week, we’ll be sharing updates to our network performance and new features that intelligently accelerate packets in our network.</p><p>Just being faster is not enough. The network that powers your organization should also be reliable, even despite factors out of your control. Cloudflare’s network is peered with over 10,000 networks around the world. With one of the most interconnected networks, we can find lots of paths from point A to point B when disruptions elsewhere on the Internet occur.</p><p>Finally, we hear from more and more customers that they need a global network with localized compliance features. Cloudflare One makes compliance with local data protection regulations easy. Customers <a href="/introducing-regional-services/">can choose where</a> Cloudflare’s network applies security functions and <a href="/introducing-the-cloudflare-data-localization-suite/">how we store and export</a> your logs. As part of CIO week, we’ll be previewing new features that give your team the ability to create metadata boundaries in our network.</p><p>All that said, we think the best way to understand how Cloudflare One works is to walk through the problems that our customers no longer have.</p>
    <div>
      <h3>Customers defended 5x more traffic</h3>
      <a href="#customers-defended-5x-more-traffic">
        
      </a>
    </div>
    <p>Overall network traffic growth through Cloudflare One has increased by nearly 400% over the last year, with advanced traffic controls and filtering applied at wire-speed to each of those bits.</p><p>Cloudflare’s composable traffic filtering stack lets customers pick and choose which security controls to apply to which traffic, allowing for flexibility and specificity in how traffic is managed. Some customers are using simple “4-tuple” rules to allow or deny traffic to their networks based on IP addresses and port numbers, others are writing their own network filters in eBPF (more on this later this week!) to perform custom logic on hundreds of gigabits per second of traffic at a time, and others are using pure Zero Trust architectures with identity-based policy enforcement and endpoint protection integration.</p><p>Over a recent (and typical) stretch of 24 hours, customers prevented over <b>9.3 trillion</b> unwanted packets, requests, and other network “nouns” from reaching their networks with custom rules. These rules can all be managed centrally, impose no performance penalty, and can be enforced on traffic no matter where it is coming from or where it is going, whether that is offices, data centers, or cloud providers.</p><p>The same rules and filtering logic are applied to traffic wherever it enters our network. Because our entire edge network is one giant firewall, there is no backhaul required to a central device or network location for a firewall policy to be applied.</p><p>We think Cloudflare One’s architectural advantages make for a pretty killer firewall, and the growth in usage we’ve seen bears that out. But what really sets our network and its integrated security functionality apart is our ability to offer Zero Trust controls from the same network, allowing CIOs to think about <a href="https://www.cloudflare.com/application-services/solutions/">securing applications</a> and users instead of IP addresses and TCP ports.</p>
    <div>
      <h3>Customers protected over 192,000 applications</h3>
      <a href="#customers-protected-over-192-000-applications">
        
      </a>
    </div>
    <p>Legacy private networks and VPN clients provided brittle connectivity without real security. In most deployments, a user in the private network could connect to any resource unless explicitly prohibited. Security teams had no identity-driven controls and lacked visibility into their network while IT teams struggled with help desk tickets.</p><p><a href="https://www.cloudflare.com/teams/access/">Cloudflare Access</a> replaces <a href="https://www.cloudflare.com/learning/network-layer/network-security/">private network</a> security with a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust model</a> that also makes any internal application feel like the Internet’s fastest SaaS applications. Customers connect their internal resources to Cloudflare’s network without poking holes in their firewall. Once connected, administrators can build global rules and per-resource rules to control who can log in and how they can connect. Users launch applications with a single click while Cloudflare’s network enforces those rules and accelerates their traffic around the world.</p><p>In the past year, customers have protected over 192,000 applications with Zero Trust rules in Cloudflare. These applications range from mission-critical tools that power the business to administrative panels that hold the company’s most sensitive data, and the next version of the new marketing website. Since announcing Cloudflare One last year, we’ve also brought non-HTTP use cases to the browser with <a href="/browser-ssh-terminal-with-auditing/">SSH</a> and <a href="/browser-vnc-with-zero-trust-rules/">VNC clients</a> rendered without any additional client software.</p><p>Regardless of what’s being protected, customers can layer rules starting from “only my team can log in” all the way to “only allow access to this group of users, connecting from <a href="/zero-trust-with-managed-devices/">a corporate device</a>, with a <a href="/require-hard-key-auth-with-cloudflare-access/">physical hardkey</a>, <a href="/two-clicks-to-enable-regional-zero-trust-compliance/">from these countries</a>.” We also know that sometimes security needs a second opinion. Earlier this year, we introduced new features that <a href="/access-purpose-justification/">prompt users to input why</a> they are connecting to a resource and <a href="/announcing-access-temporary-authentication/">require a second admin to sign off</a> on the request in real time.</p><p>We also believe that security should <a href="/the-zero-trust-platform-built-for-speed/">never require a compromise in performance</a>. The applications that customers secure with our Zero Trust products benefit from the same routing acceleration that some of the Internet’s largest websites use. We also bring security decisions closer to the user to avoid slowing them down — Cloudflare’s network enforces Zero Trust rules in every one of our 250 data centers around the world, made even faster by running on our own serverless compute platform.</p>
    <div>
      <h3>Over 10,000 small teams are now safer</h3>
      <a href="#over-10-000-small-teams-are-now-safer">
        
      </a>
    </div>
    <p>We launched Cloudflare One with the goal of making Zero Trust security accessible to organizations of any size. When we first released Cloudflare Access over three years ago, smaller teams had limited or no options to replace their VPN. They were turned away from vendors who only serviced the enterprise and had to stick to a legacy private network.</p><p>We’re excited that more than 10,000 organizations are now protecting their resources without the need to sign a contract with Cloudflare. We’ve also made these tools even more accessible to smaller organizations. Last year, we raised the number of free users that customers could add to their plan to <a href="/teams-plans/">50 seats</a>.</p>
    <div>
      <h3>More than 5,500 organizations now secure their outbound Internet traffic</h3>
      <a href="#more-than-5-500-organizations-now-secure-their-outbound-internet-traffic">
        
      </a>
    </div>
    <p>Zero Trust rules do not just apply to your internal applications. When your users connect to the rest of the Internet, attackers work to phish their passwords, get malware on their devices, and steal their data.</p><p>Cloudflare One provides customers with multiple layers of security filters and across multiple on-ramps  that keep your organization safe from data loss and threats. Since last year’s Cloudflare One announcement, over 5,500 organizations secure the traffic leaving their devices, offices, and data centers.</p><p>In the last year, the security they deploy has improved every month. Customers rely on the world’s fastest DNS resolver and the intelligence from Cloudflare’s visibility into the Internet to filter DNS traffic for security threats and content categories. Cloudflare <a href="/network-based-policies-in-cloudflare-gateway/">filters their network traffic</a> with identity-based policies, <a href="/gateway-app-policies/">block file transfers</a>, and inspect HTTP traffic for <a href="/announcing-antivirus-in-cloudflare-gateway/">viruses</a>. Organizations <a href="/gateway-tenant-control/">control which tenants</a> of SaaS applications employees can use and Cloudflare’s network generates a comprehensive <a href="/introducing-shadow-it-discovery/">Shadow IT report</a>.</p><p>When organizations don’t trust anything on the Internet, they can connect to Cloudflare’s isolated browser. Customers can isolate all destinations or just specific ones, without requiring users to use a special browser client or to suffer through legacy approaches to browser isolation like pixel pushing and DOM manipulation. Cloudflare’s network can also add <a href="/data-protection-browser/">data control directly in the browser</a> — blocking copy-paste, printing, or even text input by user and destination.</p>
    <div>
      <h3>All this delivered over a growing global network engineered for scale</h3>
      <a href="#all-this-delivered-over-a-growing-global-network-engineered-for-scale">
        
      </a>
    </div>
    <p>All of this functionality is delivered from our entire global network, on bare metal hardware Cloudflare owns and operates in over 250 cities around the world. There are no public clouds in the mix here, and all our services run on every server in every location in the world. There is no location selection of sizing of hardware, physical or virtualized. Every server is capable of processing every customer’s packet.</p><p>This unique architecture allows us to build reliable products quickly and efficiently. Our network is now handling more than 1.69Tbps of peak forward proxy traffic per day, our largest customers do traffic measured in hundreds of gigabits per second delivered over single virtual interfaces.</p><p>Customers are able to get value both from the connectivity, security and visibility products we offer, but also through the network of our customers themselves. Most Cloudflare One customers have significant interactions with other customer networks connected to Cloudflare, many of them through direct physical connections available in <a href="https://www.peeringdb.com/asn/13335">158 peering facilities</a> around the world.</p>
    <div>
      <h2>How are customers using it?</h2>
      <a href="#how-are-customers-using-it">
        
      </a>
    </div>
    <p>Tens of thousands of customers solved problems at scale with Cloudflare One in the last year. We also want to highlight a few organizations and their specific journeys migrating to this model since last year’s announcement.</p>
    <div>
      <h3>Protecting the United States Federal Government from attacks</h3>
      <a href="#protecting-the-united-states-federal-government-from-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AROZFvSzpMCxkb2avgpWJ/28c9bde0e3bae48008c606a27888a325/image5-4.png" />
            
            </figure><p>Within the United States Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency (CISA) works as “the nation’s risk advisor.” CISA partners with teams across the public and private sector to secure critical infrastructure across the federal government as well as State, Local, Tribal, and Territorial agencies and departments.</p><p>One risk that CISA has <a href="https://media.defense.gov/2021/Mar/03/2002593055/-1/-1/0/CSI_Selecting-Protective-DNS_UOO11765221.PDF">repeatedly flagged</a> is the threat of malicious hostnames, phishing emails with malicious links, and untrustworthy upstream Domain Name System resolvers. Attackers can compromise devices and users by tricking those endpoints into sending a DNS query to a specific hostname. When users connect to the destination behind that resolved query, attackers can steal passwords, data, and put malware on the devices.</p><p>Earlier this year, CISA and the National Security Agency (NSA) recommended that teams deploy protective DNS resolvers to prevent those attacks from becoming incidents. Unlike standard DNS resolvers, protective DNS resolvers check the hostname being queried to determine if the destination is malicious. If the hostname poses a risk, the resolver blocks the connection by not answering the DNS query.</p><p>Earlier this year, CISA announced that they are not only recommending a protective DNS resolver — they are delivering one to their partner agencies. <a href="/helping-keep-governments-safe-and-secure/">CISA selected Cloudflare and Accenture Federal Services</a> to deliver a joint solution to help the government defend itself against cyberattacks.</p>
    <div>
      <h3>Keeping the workforce of a hardware manufacturer safe and productive</h3>
      <a href="#keeping-the-workforce-of-a-hardware-manufacturer-safe-and-productive">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Gqev4Eha2EqQsU2lq9NSA/422c697d0ea3cb49db0719fa0ec76116/image7-1.png" />
            
            </figure><p>Back in 2018, the developer operations team inside of one of the world’s largest telecom and network equipment companies lost patience with their legacy VPN. Developers in their organization relied on the VPN to connect to the tools they needed to do their jobs. The requirement slowed them down and created user headaches, eventually leading to IT help desk tickets.</p><p>The leadership team in that group decided to fix their VPN frustrations by getting rid of it. They signed up to use Cloudflare Access, initially with the personal credit of one of the administrators, to move their development tools to a seamless platform that made their internal applications just feel like SaaS applications for their users.</p><p>Over the next three years, more departments in the organization became jealous and asked to also deprecate the VPN usage in their group. As thousands of users across the organization moved to a Zero Trust model, their security team began to take advantage of the rules that could be created, and the logs generated without the need for any server-side code changes.</p><p>Last month, that security team began using Cloudflare One to build Zero Trust rules for the rest of the Internet. Their organization chose Cloudflare Gateway to replace their legacy DNS filtering solution with a faster, more manageable platform that keeps the 100,000+ team members safe from phishing attacks, malware, and ransomware in any location.</p>
    <div>
      <h3>Securing the team building BlockFi</h3>
      <a href="#securing-the-team-building-blockfi">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oB1CxywNN29ZADx00Qrjv/384314f9721ff7ee9852bcde18bff1e0/image1-15.png" />
            
            </figure><p>BlockFi’s mission is to bring financial empowerment to traditionally underserved markets. BlockFi’s interest accounts, cryptocurrency-backed loans, rewards cards and crypto trading platforms connect hundreds of thousands of users to new financial tools. As of June 30, 2021, BlockFi supports over 450,000 funded clients and manages more than $10 billion in assets.</p><p>Keeping their service available and secure presented new challenges as they grew. <a href="https://www.cloudflare.com/case-studies/blockfi/">BlockFi started their Cloudflare One journey</a> after experiencing a major DDoS attack on its sign-up API. The BlockFi team contacted Cloudflare, and we were able to help mitigate the DDoS and API attacks, getting their systems back up and running within a few hours. BlockFi was then able to block approximately 10 million malicious bots in the first day of the addition of Cloudflare’s Bot Management platform.</p><p>Once their public web infrastructure was up and running again, BlockFi started to evaluate how to improve the security of their internal users and applications. BlockFi relied on a private network that used IP addresses to block or allow users to connect, spending engineering time just maintaining IP lists. As users left the office, that model fell apart.</p><p>BlockFi solved that challenge by replacing their legacy network with Cloudflare One to bring identity-driven Zero Trust control to their internal resources. Team members connect from any location and authenticate with their single-sign on.</p><p>Their security team didn’t stop there. To protect their employees from phishing and malware attacks, BlockFi deployed Cloudflare One’s DNS filtering and Secure Web Gateway to stop attacks that targeted their entire workforce or specific employees.</p>
    <div>
      <h3>Keeping phones ringing with Cloudflare’s network reach</h3>
      <a href="#keeping-phones-ringing-with-cloudflares-network-reach">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zHsAUywmMMgAhvYnP4ZSp/eeb04bb6c9db07af17ed200d6404cae6/image2-7.png" />
            
            </figure><p>Our last customer story involves a large VoIP and unified communications infrastructure company that recently came under ransom attack. They quickly (over the course of less than 24 hours) deployed Cloudflare Magic Transit in front of their entire Internet presence, including their corporate and production networks.</p><p>Given the nature of Internet telephony, they were very concerned about performance regressions and impact to call quality. Fortunately, deploying Cloudflare actually <i>improved</i> key network quality metrics like latency and jitter, surprising their network administrators.</p><p>Cloudflare’s network excels at powering and protecting performance critical workloads where milliseconds matter and reliability is paramount.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Over the course of this week, we’re going to share dozens of new announcements that solve new problems with Cloudflare One. We’re just getting started building the next-generation of the corporate network, so stay tuned to learn more this week.</p><p>We’re also grateful for every organization that trusted Cloudflare One to be your corporate network since last year’s launch. For teams who are ready to begin that journey, follow <a href="https://dash.cloudflare.com/sign-up/teams">this link</a> to get started today.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">4FXeDOXhOEvARMWPGOkTXa</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improving Performance and Search Rankings with Cloudflare for Fun and Profit]]></title>
            <link>https://blog.cloudflare.com/improving-performance-and-search-rankings-with-cloudflare-for-fun-and-profit/</link>
            <pubDate>Thu, 19 Nov 2020 22:38:20 GMT</pubDate>
            <description><![CDATA[ Making things fast is one of the things we do at Cloudflare. More responsive websites, apps, APIs, and networks directly translate into improved conversion and user experience.  ]]></description>
            <content:encoded><![CDATA[ <p>Making things fast is one of the things we do at Cloudflare. More responsive websites, apps, APIs, and networks directly translate into improved conversion and user experience. On November 10th, <a href="https://developers.google.com/search/blog/2020/11/timing-for-page-experience">Google announced</a> that Google Search will directly take web performance and page experience data into account when ranking results on their search engine results pages (SERPs), beginning in May 2021.</p><p>Specifically, Google Search will prioritize results based on how pages score on <a href="https://www.cloudflare.com/learning/performance/what-are-core-web-vitals/">Core Web Vitals</a>, a measurement methodology Cloudflare has worked closely with Google to establish, and we have implemented support for in our analytics tools.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1qLZjGPDFLkD51Nd74CQZM/0fd589c0fbd657883f03e4ba4ac3246c/1-4.png" />
            
            </figure><p>Source: "Search Page Experience Graphic" by Google is licensed under CC BY 4.0</p><p>The Core Web Vitals metrics are Largest Contentful Paint (LCP, a loading measurement), First Input Delay (FID, a measure of interactivity), and Cumulative Layout Shift (CLS, a measure of visual stability). Each one is directly associated with user perceptible page experience milestones. All three can be improved using our performance products, and all three can be <a href="/start-measuring-web-vitals-with-browser-insights/">measured with our Cloudflare Browser Insights product</a>, and soon, with our free privacy-aware <a href="https://www.cloudflare.com/web-analytics/">Cloudflare Web Analytics</a>.</p><p>SEO experts have always suspected faster pages lead to better search ranking. With the recent announcement from Google, we can say with confidence that <b>Cloudflare helps you achieve the web performance trifecta</b>: our product suite makes your site faster, gives you direct visibility into how it is performing (and use that data to iteratively improve), and directly drives improved search ranking and business results.</p><blockquote><p><i>"Google providing more transparency about how Search ranking works is great for the open Web. The fact they are ranking using real metrics that are easy to measure with tools like Cloudflare's analytics suite makes Google's recent announcement all the more exciting. Cloudflare offers a full set of tools to make sites incredibly fast and measure ‘incredibly’ directly."</i></p><p>– <b>Matt Weinberg</b>, president of <a href="https://www.happycog.com/">Happy Cog</a>, a full-service digital agency.</p></blockquote>
    <div>
      <h3>Cloudflare helps make your site faster</h3>
      <a href="#cloudflare-helps-make-your-site-faster">
        
      </a>
    </div>
    <p>Cloudflare offers a diverse, easy to deploy set of products to improve page experience for your visitors. We offer a rich, configurable set of tools to improve page speed, which this post is too small to contain. Unlike Fermat, who once famously described a math problem and then said “the margin is too small to contain the solution”, and then let folks spend three hundred plus years trying to figure out his enigma, I’m going to tell you how to solve web performance problems with Cloudflare. Here are the highlights:</p>
    <div>
      <h3>Caching and Smart Routing</h3>
      <a href="#caching-and-smart-routing">
        
      </a>
    </div>
    <p>The typical website is composed of a mix of static assets, like images and product descriptions, and dynamic content, like the contents of a shopping cart or a user’s profile page. Cloudflare caches customers’ static content at our edge, avoiding the need for a full roundtrip to origin servers each time content is requested. Because our edge network places content very close (in physical terms) to users, there is less distance to travel and page loads are consequently faster. Thanks, Einstein.</p><p>And Argo Smart Routing helps speed page loads that require dynamic content. It analyzes and optimizes routing decisions across the global Internet in real-time. Think Waze, the automobile route optimization app, but for Internet traffic.</p><p>Just as Waze can tell you which route to take when driving by monitoring which roads are congested or blocked, Smart Routing can route connections across the Internet efficiently by avoiding packet loss, congestion, and outages.</p><p>Using caching and Smart Routing directly improves page speed and experience scores like Web Vitals. With Google's recent announcement, this also means improved search ranking.</p>
    <div>
      <h3>Content optimization</h3>
      <a href="#content-optimization">
        
      </a>
    </div>
    <p>Caching and Smart Routing are designed to reduce and speed up round trips from your users to your origin servers, respectively. Cloudflare also offers features to <i>optimize</i> the content we do serve.</p><p>Cloudflare Image Resizing allows on-demand sizing, quality, and format adjustments to images, including the ability to convert images to modern file formats like WebP and AVIF.</p><p>Delivering images this way to your end-users helps you save bandwidth costs and improve performance, since Cloudflare allows you to optimize images already cached at the edge.</p><p>For WordPress operators, we recently launched Automatic Platform Optimization (APO). With APO, Cloudflare will serve your entire site from our edge network, ensuring that customers see improved performance when visiting your site. By default, Cloudflare only caches static content, but with APO we can also cache dynamic content (like HTML) so the entire site is served from cache. This removes round trips from the origin drastically improving TTFB and other site performance metrics. In addition to caching dynamic content, APO caches third party scripts to further reduce the need to make requests that leave Cloudflare's edge network.</p>
    <div>
      <h3>Workers and Workers Sites</h3>
      <a href="#workers-and-workers-sites">
        
      </a>
    </div>
    <p>Reducing load on customer origins and making sure we serve the right content to the right clients at the right time are great, but what if customers want to take things a step further and eliminate origin round trips entirely? What if there <i>was no origin</i>? Before we get into Schrödinger’s cat/server territory, we can make this concrete: Cloudflare offers tools to serve entire websites from our edge, without an origin server being involved at all. For more on Workers Sites, check out our <a href="/workers-sites/">introductory blog post</a> and peruse our <a href="https://workers.cloudflare.com/built-with">Built With Workers</a> project gallery.</p><p>As big proponents of dogfooding, many of Cloudflare’s own web properties are deployed to Workers Sites, and we use Web Vitals to measure our customers’ experiences.</p><p>Using Workers Sites, our <a href="https://developers.cloudflare.com/">developers.cloudflare.com</a> site, which gets hundreds of thousands of visits a day and is critical to developers building atop our platform, is able to attain incredible Web Vitals scores:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3icEZxB7WvbUhwQbgspKCA/831b6bd4998312cfb1884a7bf8ec921e/2-2.png" />
            
            </figure><p>These scores are superb, showing the performance and ease of use of our edge, our static website delivery system, and our analytics toolchain.</p>
    <div>
      <h3>Cloudflare Web Analytics and Browser Insights directly measure the signals Google is prioritizing</h3>
      <a href="#cloudflare-web-analytics-and-browser-insights-directly-measure-the-signals-google-is-prioritizing">
        
      </a>
    </div>
    <p>As illustrated above, <a href="/start-measuring-web-vitals-with-browser-insights/#:~:text=Web%20Vitals%20are%20a%20new,data%20from%20the%20whole%20web.">Cloudflare makes it easy</a> to directly measure Web Vitals with Browser Insights. Enabling Browser Insights for websites proxied by Cloudflare takes one click in the Speed tab of the Cloudflare dashboard. And if you’re <i>not</i> proxying sites through Cloudflare, Web Vitals measurements will be supported in our <a href="/free-privacy-first-analytics-for-a-better-web/">upcoming, free, Cloudflare Web Analytics product</a> that any site, using Cloudflare’s proxy or not, can use.</p><p>Web Vitals breaks down user experience into three components:</p><ul><li><p>Loading: How long did it take for content to become available?</p></li><li><p>Interactivity: How responsive is the website when you interact with it?</p></li><li><p>Visual stability: How much does the page move around while loading?</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/54Igksx7thHQiDLwzhpeFz/472224ed33ef956018811bafbc07a323/3.png" />
            
            </figure><p>This <a href="https://web.dev/vitals/">image</a> is reproduced from work created and <a href="https://developers.google.com/terms/site-policies">shared by Google</a> and used according to terms described in the <a href="https://creativecommons.org/licenses/by/4.0/">Creative Commons 4.0 Attribution License</a>.</p><p>It’s challenging to create a single metric that captures these high-level components. Thankfully, the folks at Google Chrome team have thought about this, and earlier this year introduced three “Core” Web Vitals metrics:  <a href="https://web.dev/lcp/">Largest Contentful Paint</a>,  <a href="https://web.dev/fid/">First Input Delay</a>, and <a href="https://web.dev/cls/">Cumulative Layout Shift</a>.</p><p>Cloudflare Browser Insights measures all three metrics directly in your users’ browsers, all with one-click enablement from the Cloudflare dashboard.</p><p>Once enabled, Browser Insights works by inserting a JavaScript "beacon" into HTML pages. You can control where the beacon loads if you only want to measure specific pages or hostnames. If you’re using CSP version 3, we’ll even automatically detect the nonce (if present) and add it to the script.</p><p>To start using Browser Insights, just head over to the Speed tab in the dashboard.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IHRjBAijCoedt55p1Ezne/d1082ff70c6e99bec6cde854e622ea96/4.png" />
            
            </figure><p><i>An example Browser Insights report, showing what pages on blog.cloudflare.com need improvement.</i></p>
    <div>
      <h3>Making pages fast is better for everyone</h3>
      <a href="#making-pages-fast-is-better-for-everyone">
        
      </a>
    </div>
    <p>Google’s announcement that Web Vitals measurements will be a key part of search ranking starting in May 2021 places even more emphasis on running fast, accessible websites.</p><p>Using Cloudflare’s performance tools, like our best-of-breed caching, Argo Smart Routing, content optimization, and Cloudflare Workers® products, directly improves page experience and Core Web Vitals measurements, and now, very directly, where your pages appear in Google Search results. And you don’t have to take our word for this — our analytics tools directly measure Web Vitals scores, instrumenting your real users’ experiences.</p><p>We’re excited to help our customers build fast websites, understand exactly <i>how</i> fast they are, and rank highly on Google search as a result. Render on!</p> ]]></content:encoded>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[SEO]]></category>
            <category><![CDATA[Performance]]></category>
            <category><![CDATA[Browser Insights]]></category>
            <category><![CDATA[Analytics]]></category>
            <guid isPermaLink="false">2Re8RrgBMhISwGoB1YQw1r</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
            <dc:creator>Rita Kozlov</dc:creator>
        </item>
        <item>
            <title><![CDATA[What is Cloudflare One?]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one/</link>
            <pubDate>Mon, 12 Oct 2020 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to share Cloudflare One™, our vision to tackle the intractable job of corporate security and networking. Run your network on Cloudflare and keep it secure. ]]></description>
            <content:encoded><![CDATA[ <p>Running a <a href="https://www.cloudflare.com/network-services/solutions/enterprise-network-security/">secure enterprise network</a> is really difficult. Employees spread all over the world work from home. Applications are run from data centers, hosted in public cloud, and delivered as services. Persistent and motivated attackers exploit any vulnerability.</p><p>Enterprises used to build networks that resembled a castle-and-moat. The walls and moat kept attackers out and data in. Team members entered over a drawbridge and tended to stay inside the walls. Trust folks on the inside of the castle to do the right thing, and deploy whatever you need in the relative tranquility of your secure <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">network perimeter</a>.</p><p>The Internet, SaaS, and “the cloud” threw a wrench in that plan. Today, more of the workloads in a modern enterprise run <i>outside</i> the castle than <i>inside</i>. So why are enterprises still spending money building more complicated and more ineffective moats?</p><p>Today, we’re excited to share <b><i>Cloudflare One™</i></b>, our vision to tackle the intractable job of corporate security and networking.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KPU0ZjyI3gJLqCCqN400Q/882df35b0fd94f591642aa73e9f432f2/image3-7.png" />
            
            </figure><p>Cloudflare One combines networking products that enable employees to do their best work, no matter where they are, with consistent security controls deployed globally.</p><p>Starting today, you can begin replacing traffic backhauls to security appliances with Cloudflare WARP and Gateway to filter outbound Internet traffic. For your office networks, we plan to bring <a href="https://www.cloudflare.com/learning/security/what-is-next-generation-firewall-ngfw/">next-generation firewall</a> capabilities to Magic Transit with Magic Firewall to let you get rid of your top-of-shelf firewall appliances.</p><p>With multiple on-ramps to the Internet through Cloudflare, and the elimination of backhauled traffic, we plan to make it simple and cost-effective to manage that routing compared to <a href="https://www.cloudflare.com/learning/network-layer/what-is-mpls/">MPLS</a> and <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-sd-wan/">SD-WAN</a> models. Cloudflare <a href="https://www.cloudflare.com/magic-wan">Magic WAN</a> will provide a control plane for how your traffic routes through our network.</p><p>You can use Cloudflare One today to replace the other function of your VPN: putting users on a private network for access control. Cloudflare Access delivers <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> controls that can <a href="https://www.cloudflare.com/network-security/">replace private network security models</a>. Later this week, we’ll announce how you can extend Access to any application - including SaaS applications. We’ll also preview our <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">browser isolation technology</a> to keep the endpoints that connect to those applications safe from malware.</p><p>Finally, the products in Cloudflare One focus on giving your team the logs and tools to both understand and then remediate issues. As part of our Gateway filtering launch this week we’re including logs that provide visibility into the traffic leaving your organization. We’ll be sharing how those logs get smarter later this week with a new Intrusion Detection System that detects and stops intrusion attempts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Lhza66At9UlwNsbmXR8KY/b82550e7e23283fd7e654e970761399a/image1-10.png" />
            
            </figure><p>Many of those components are available today, some new features are arriving this week, and other pieces will be launching soon. All together, we’re excited to share this vision and for the future of the corporate network.</p>
    <div>
      <h2>Problems in enterprise networking and security</h2>
      <a href="#problems-in-enterprise-networking-and-security">
        
      </a>
    </div>
    <p>The demands placed on a corporate network have changed dramatically. IT has gone from a back-office function to mission critical. In parallel with networks becoming more integral, users spread out from offices to work from home. Applications left the datacenter and are now being run out of multiple clouds or are being delivered by vendors directly over the Internet.</p>
    <div>
      <h3>Direct network paths became hairpin turns</h3>
      <a href="#direct-network-paths-became-hairpin-turns">
        
      </a>
    </div>
    <p>Employees sitting inside of an office could connect over a private network to applications running in a datacenter nearby. When team members left the office, they could use a VPN to sneak back onto the network from outside the walls. Branch offices hopped on that same network over expensive MPLS links.</p><p>When applications left the data center and users left their offices, organizations responded by trying to force that scattered world into the same castle-and-moat model. Companies purchased more VPN licenses and replaced MPLS links with difficult SD-WAN deployments. Networks became more complex in an attempt to mimic an older model of networking when in reality the Internet had become the new corporate network.</p>
    <div>
      <h3>Defense-in-depth splintered</h3>
      <a href="#defense-in-depth-splintered">
        
      </a>
    </div>
    <p>Attackers looking to compromise corporate networks have a multitude of tools at their disposal, and may execute surgical malware strikes, throw a volumetric kitchen sink at your network, or any number of things in between. Traditionally, defense against each class of attack was provided by a separate, specialized piece of hardware running in a datacenter.</p><p>Security controls used to be relatively easy when every user and every application sat in the same place. When employees left offices and workloads left data centers, the same security controls struggled to follow. Companies deployed a patchwork of point solutions, attempting to rebuild their topside firewall appliances across hybrid and dynamic environments.</p>
    <div>
      <h3>High-visibility required high-effort</h3>
      <a href="#high-visibility-required-high-effort">
        
      </a>
    </div>
    <p>The move to a patchwork model sacrificed more than just defense-in-depth — companies lost visibility into what was happening in their networks and applications. We hear from customers that this capture and standardization of logs has become one of their biggest hurdles. They purchased expensive data ingestion, analysis, storage, and analytics tools.</p><p>Enterprises now rely on multiple point solutions that one of the biggest hurdles is the capture and standardization of logs. Increasing regulatory and compliance pressures place more emphasis on data retention and analysis. Splintered security solutions become a data management nightmare.</p>
    <div>
      <h3>Fixing issues relied on best guesses</h3>
      <a href="#fixing-issues-relied-on-best-guesses">
        
      </a>
    </div>
    <p>Without visibility into this new networking model, security teams had to guess at what could go wrong. Organizations who wanted to adopt an “assume breach” model struggled to determine what kind of breach could even occur, so they threw every possible solution at the problem.</p><p>We talk to enterprises who purchase new scanning and filtering services, delivered in virtual appliances, for problems they are unsure they have. These teams attempt to remediate every possible event manually, because they lack visibility, rather than targeting specific events and adapting the security model.</p>
    <div>
      <h2>How does Cloudflare One fit?</h2>
      <a href="#how-does-cloudflare-one-fit">
        
      </a>
    </div>
    <p>Over the last several years, we’ve been assembling the components of Cloudflare One. We launched individual products to target some of these problems one-at-a-time. We’re excited to share our vision for how they all fit together in Cloudflare One.</p>
    <div>
      <h3>Flexible data planes</h3>
      <a href="#flexible-data-planes">
        
      </a>
    </div>
    <p>Cloudflare launched as a reverse proxy. Customers put their Internet-facing properties on our network and their audience connected to those specific destinations through our network. Cloudflare One represents years of launches that allow our network to process any type of traffic flowing in either the “reverse” or “forward” direction.</p><p>In 2019, we <a href="/1111-warp-better-vpn/">launched</a> <b>Cloudflare WARP</b> — a mobile application that kept Internet-bound traffic private with an encrypted connection to our network while also making it faster and more reliable. We’re now packaging that same technology into an enterprise version launching this week to connect roaming employees to Cloudflare Gateway.</p><p>Your data centers and offices should have the same advantage. We <a href="/magic-transit/">launched</a> <b>Magic Transit</b> last year to secure your networks from IP-layer attacks. Our initial focus with Magic Transit has been delivering best-in-class DDoS mitigation to on-prem networks. DDoS attacks are a persistent thorn in network operators’ sides, and Magic Transit effectively defuses their sting without forcing performance compromises. That rock-solid DDoS mitigation is the perfect platform on which to build higher level security functions that apply to the same traffic already flowing across our network.</p><p>Earlier this year, we expanded that model when we <a href="/cloudflare-network-interconnect/">launched</a> <b>Cloudflare Network Interconnect</b> (CNI) to allow our customers to interconnect branch offices and data centers directly with Cloudflare. As part of Cloudflare One, we’ll apply outbound filtering to that same connection.</p><p>Cloudflare One should not just help your team move to the Internet as a corporate network, it should be faster than the Internet. Our network is carrier-agnostic, exceptionally well-connected and peered, and delivers the same set of services globally. In each of these on-ramps, we’re adding smarter routing based on our Argo Smart Routing technology, which has been shown to reduce latency by 30% or more in the real-world. Security + Performance, because they’re better together.</p>
    <div>
      <h3>A single, unified control plane</h3>
      <a href="#a-single-unified-control-plane">
        
      </a>
    </div>
    <p>When users connect to the Internet from branch offices and devices, they skip the firewall appliances that used to live in headquarters altogether. To keep pace, enterprises need a way to secure traffic that no longer lives entirely within their own network. Cloudflare One applies standard security controls to all traffic - regardless of how that connection starts or where in the network stack it lives.</p><p><b>Cloudflare Access</b> starts by introducing identity into Cloudflare’s network. Teams apply filters based on identity and context to both inbound and outbound connections. Every login, request, and response proxies through Cloudflare’s network regardless of the location of the server or user. The scale of our network and its distribution can filter and log enterprise traffic without compromising performance.</p><p><b>Cloudflare Gateway</b> keeps connections to the rest of the Internet safe. Gateway inspects traffic leaving devices and networks for threats and data loss events that hide inside of connections at the application layer. Launching soon, Gateway will bring that same level of control lower in the stack to the transport layer.</p><p>You should have the same level of control over how your networks send traffic. We’re excited to announce <b>Magic Firewall</b>, a next-generation firewall for all traffic leaving your offices and data centers. With Gateway and Magic Firewall, you can build a rule once and run it everywhere, or tailor rules to specific use cases in a single control plane.</p><p>We know some attacks can’t be filtered because they launch before filters can be built to stop them. <b>Cloudflare Browser</b>, our isolated browser technology gives your team a bulletproof pane of glass from threats that can evade known filters. Later this week, we’ll invite customers to sign up to join the beta to browse the Internet on Cloudflare’s edge without the risk of code leaping out of the browser to infect an endpoint.</p><p>Finally, the PKI infrastructure that secures your network should be modern and simpler to manage. We heard from customers who described certificate management as one of the core problems of moving to a better model of security. Cloudflare works with, not against, modern encryption standards like TLS 1.3. Cloudflare made it easy to add encryption to your sites on the Internet with one click. We’re going to bring that ease-of-management to the network functions you run on Cloudflare One.</p>
    <div>
      <h3>One place to get your logs, one location for all of your security analysis</h3>
      <a href="#one-place-to-get-your-logs-one-location-for-all-of-your-security-analysis">
        
      </a>
    </div>
    <p>Cloudflare’s network serves 18 million HTTP requests per second on average. We’ve built logging pipelines that make it possible for some of the largest Internet properties in the world to capture and analyze their logs at scale. Cloudflare One builds on that same capability.</p><p>Cloudflare Access and Gateway capture every request, inbound or outbound, without any server-side code changes or advanced client-side configuration. Your team can export those logs to the <a href="https://www.cloudflare.com/learning/security/what-is-siem/">SIEM</a> provider of your choice with our <b>Cloudflare Logpush</b> service - the same pipeline that exports HTTP request events at scale for public sites. Magic Transit expands that logging capability to entire networks and offices to ensure you never lose visibility from any location.</p><p>We’re going beyond just logging events. Available today for your websites, Cloudflare Web Analytics converts logs into insights. We plan to keep expanding that visibility into how your network operates, as well. Just as Cloudflare has replaced the “band-aid boxes” that performed disparate network functions and unified them into a cohesive, adaptable edge, we intend to do the same for the fragmented, hard to use, and expensive security analytics ecosystem. More to come on this soon.</p>
    <div>
      <h3>Smarter, faster remediation</h3>
      <a href="#smarter-faster-remediation">
        
      </a>
    </div>
    <p>Data and analytics should surface events that a team can remediate. Log systems that lead to one-click fixes can be powerful tools, but we want to make that remediation automatic.</p><p>Launching into a closed preview later this week, Cloudflare Intrusion Detection System (IDS) will proactively scan your network for anomalous events and recommend actions or, better yet, take actions for you to remediate problems. We plan to bring that same proactive scanning and remediation approach to Cloudflare Access and Cloudflare Gateway.</p>
    <div>
      <h2>Run your network on our globally scaled network</h2>
      <a href="#run-your-network-on-our-globally-scaled-network">
        
      </a>
    </div>
    <p>Over 25 million Internet properties rely on Cloudflare’s network to reach their audiences. More than 10% of all websites connect through our reverse proxy, including 16% of the Fortune 1000. Cloudflare accelerates traffic for huge chunks of the Internet by delivering services from datacenters around the world.</p><p>We deliver Cloudflare One from those same data centers. And critically, every datacenter we operate delivers the same set of services, whether that is Cloudflare Access, WARP, Magic Transit, or our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a>. As an example, when your employees connect through Cloudflare WARP to one of our data centers, there is a real chance they never have to leave our network or that data center to reach the site or data they need. As a result, their entire Internet experience becomes extraordinarily fast, no matter where they are in the world.</p><p>We expect that performance bonus to become even more meaningful as browsing moves to Cloudflare’s edge with Cloudflare Browser. The isolated browsers running in Cloudflare’s data centers can request content that sits just centimeters away. Even further, as more web properties rely on Cloudflare Workers to power their applications, entire workflows can stay inside of a data center within 100 ms of your employees.</p>
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>While many of these features are available today, we’re going to be launching several new features over the next several days as part of Cloudflare’s Zero Trust week. Stay tuned for announcements each day this week that add new pieces to the Cloudflare One featureset.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5yKWZHFUbzxe76mjgODPHA/661e95956c79f69b77947e952490f2ba/image2-9.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Zero Trust Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Deep Dive]]></category>
            <guid isPermaLink="false">3eSKC7iXGnr0NL0jcQAuOE</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
            <dc:creator>Sam Rhea</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare response to CPDoS exploits]]></title>
            <link>https://blog.cloudflare.com/cloudflare-response-to-cpdos-exploits/</link>
            <pubDate>Thu, 24 Oct 2019 17:27:49 GMT</pubDate>
            <description><![CDATA[ Three vulnerabilities were disclosed as Cache Poisoning Denial of Service attacks in a paper written by Hoai Viet Nguyen, Luigi Lo Iacono, and Hannes Federrath of TH Köln - University of Applied Sciences. These attacks are similar to the cache poisoning attacks presented last year at DEFCON. ]]></description>
            <content:encoded><![CDATA[ <p>Three vulnerabilities were disclosed as <a href="https://cpdos.org">Cache Poisoning Denial of Service</a> attacks in a paper written by Hoai Viet Nguyen, Luigi Lo Iacono, and Hannes Federrath of TH Köln - University of Applied Sciences. These attacks are similar to the cache poisoning attacks presented last year at DEFCON. <a href="/cache-poisoning-protection/">Our blog post</a> in response to those attacks includes a detailed description of what a cache poisoning attack is.</p><p><b>Most customers do not have to take any action to protect themselves from the newly disclosed vulnerabilities</b>. Some configuration changes are recommended if you are a Cloudflare customer running unpatched versions of Microsoft IIS and have <a href="https://docs.microsoft.com/en-us/iis/configuration/system.webserver/security/requestfiltering/requestlimits/headerlimits/add">request filtering</a> enabled on your origin or have forced caching of HTTP response code 400 through the use of Cloudflare Workers.</p><p>We have not seen any attempted exploitation of the vulnerabilities described in this paper.</p><p>Maintaining the integrity of our content caching infrastructure and ensuring our customers are able to quickly and reliably serve the content they expect to their visitors is of paramount importance to us. In practice, Cloudflare ensures caches serve the content they should in two ways:</p><ol><li><p>We build our caching infrastructure to behave in ways compliant with industry standards.</p></li><li><p>We actively add defenses to our caching logic to protect customers from common caching pitfalls. We see our job as solving customer problems whenever possible, even if they’re not directly related to using Cloudflare. Examples of this philosophy can be found in how we <a href="/cache-poisoning-protection/">addressed</a> <a href="/web-cache-deception-attack-revisited/">previously</a> discovered cache attack techniques.</p></li></ol><p>A summary of the three attacks disclosed in the paper and how Cloudflare handles them:</p><p><b><b><b>HTTP Header Method Override (HMO)</b></b></b><b><b>:</b></b></p><ul><li><p><b><b><b>Impact:</b></b></b> Some web frameworks support headers for overriding the HTTP method sent in the HTTP request. Ex: A GET request sent with <code>X-HTTP-Method: POST</code> will be treated by the origin as a POST request (this is not a standard but something many frameworks support). An attacker can use this behavior to potentially trick a <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">CDN</a> into caching poisoned content.</p></li><li><p><b><b><b>Mitigation:</b></b></b> We include the following method override headers as part of customer cache keys for requests which include the headers. This ensures that requests made with the headers present do not poison cache contents for requests without them. Note that Cloudflare does <i>not</i> interpret these headers as an actual method override (ie. the GET request in the above example stays a GET request in our eyes). Headers we consider as part of this cache key modification logic are:</p><ol><li><p>X-HTTP-Method-Override</p></li><li><p>X-HTTP-Method</p></li><li><p>X-Method-Override</p></li></ol></li></ul><p><b><b><b>Oversized HTTP Headers (HHO)</b></b></b><b><b>:</b></b></p><ul><li><p><b><b><b>Impact:</b></b></b> The attacker sends large headers that a CDN passes through to origin, but are too large for the origin server to handle. If in this case the origin returns an error page that a shared cache deems cacheable it can result in denial of service for subsequent visitors.</p></li><li><p><b><b><b>Mitigation:</b></b></b> Cloudflare does not cache HTTP status code 400 responses by default, which is the common denial of service vector called out by the exploit authors. Some CDN vendors <i>did</i> cache 400 responses, which created the poisoning vector called out by the exploit authors. Cloudflare customers were never vulnerable if their origins emitted 400 errors in response to oversized headers.</p><p>The one exception to this is Microsoft IIS in specific circumstances. Versions of Microsoft IIS that have not applied the <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0941">security update</a> for CVE-2019-0941 will return an HTTP 404 response if limits are configured and exceeded for individual request header sizes using the <a href="https://docs.microsoft.com/en-us/iis/configuration/system.webserver/security/requestfiltering/requestlimits/headerlimits/add">“headerLimits” configuration directive</a>. Shared caches are permitted to cache these 404 responses. We recommend either upgrading IIS or removing headerLimits configuration directives on your origin.</p></li></ul><p><b><b><b>HTTP Meta Characters</b></b></b><b><b>:</b></b></p><ul><li><p><b><b><b>Impact:</b></b></b> Essentially the same attack as oversized HTTP headers, except the attack uses meta characters like <code>\r</code> and <code>\n</code> to cause origins to return errors to shared caches.</p></li><li><p><b><b><b>Mitigation:</b></b></b> Same as oversized HTTP headers; Cloudflare does not cache 400 errors by default.</p></li></ul><p>In addition to the behavior laid out above, Cloudflare’s caching logic <a href="https://support.cloudflare.com/hc/en-us/articles/115003206852-Enabling-Origin-Cache-Control-with-Cloudflare-Page-Rules">respects origin Cache-Control headers</a>, which allows customers extremely granular control over how our caches behave. We actively work with customers to ensure that they are following best practices for avoiding cache poisoning attacks and add defense in depth through smarter software whenever possible.</p><p>We look forward to continuing to work with the security community on issues like those discovered to make the Internet safer and more secure for everyone.</p> ]]></content:encoded>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">6aZc8MVulMmoxvfGOEmGvN</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[HTTP/3: the past, the present, and the future]]></title>
            <link>https://blog.cloudflare.com/http3-the-past-present-and-future/</link>
            <pubDate>Thu, 26 Sep 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ We are now happy to announce that QUIC and HTTP/3 support is available on the Cloudflare edge network. We’re excited to be joined in this announcement by Google Chrome and Mozilla Firefox, two of the leading browser vendors and partners in our effort to make the web faster and more reliable for all. ]]></description>
            <content:encoded><![CDATA[ <p>During last year’s Birthday Week <a href="/the-quicening/">we announced preliminary support for QUIC and HTTP/3</a> (or “HTTP over QUIC” as it was known back then), the new standard for the web, enabling faster, more reliable, and more secure connections to web endpoints like websites and <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a>. We also let our customers join a waiting list to try QUIC and <a href="https://www.cloudflare.com/learning/performance/what-is-http3/">HTTP/3</a> as soon as they became available.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vl1aHmtQdfvJSyQEDaHJu/1f07700e6de58e6928debfc3e502fb6a/http3-tube_2x.png" />
            
            </figure><p>Since then, we’ve been working with industry peers through the <a href="https://ietf.org/">Internet Engineering Task Force</a>, including Google Chrome and Mozilla Firefox, to iterate on the HTTP/3 and QUIC standards documents. In parallel with the standards maturing, we’ve also worked on <a href="/enjoy-a-slice-of-quic-and-rust/">improving support</a> on our network.</p><p><b>We are now happy to announce that QUIC and HTTP/3 support is available on the Cloudflare edge network.</b> We’re excited to be joined in this announcement by Google Chrome and Mozilla Firefox, two of the leading browser vendors and partners in our effort to make the web faster and more reliable for all.</p><p>In the words of Ryan Hamilton, Staff Software Engineer at Google, “HTTP/3 should make the web better for everyone. The Chrome and Cloudflare teams have worked together closely to bring HTTP/3 and QUIC from nascent standards to widely adopted technologies for improving the web. Strong partnership between industry leaders is what makes Internet standards innovations possible, and we look forward to our continued work together.”</p><p>What does this mean for you, a Cloudflare customer who uses our services and edge network to make your web presence faster and more secure? Once HTTP/3 support is <a href="#how-do-i-enable-http-3-for-my-domain">enabled for your domain in the Cloudflare dashboard</a>, your customers can interact with your websites and APIs using HTTP/3. We’ve been steadily inviting customers on our HTTP/3 waiting list to turn on the feature (so keep an eye out for an email from us), and in the coming weeks we’ll make the feature available to everyone.</p><p>What does this announcement mean if you’re a user of the Internet interacting with sites and APIs through a browser and other clients? Starting today, you can <a href="#using-google-chrome-as-an-http-3-client">use Chrome Canary</a> to interact with Cloudflare and other servers over HTTP/3. For those of you looking for a command line client, <a href="#using-curl">curl also provides support for HTTP/3</a>. Instructions for using Chrome and curl with HTTP/3 follow later in this post.</p>
    <div>
      <h2>The Chicken and the Egg</h2>
      <a href="#the-chicken-and-the-egg">
        
      </a>
    </div>
    <p>Standards innovation on the Internet has historically been difficult because of a chicken and egg problem: which needs to come first, server support (like Cloudflare, or other large sources of response data) or client support (like browsers, operating systems, etc)? Both sides of a connection need to support a new communications protocol for it to be any use at all.</p><p>Cloudflare has a long history of driving web standards forward, from <a href="/introducing-http2/">HTTP/2</a> (the version of HTTP preceding HTTP/3), to <a href="https://www.cloudflare.com/learning/ssl/why-use-tls-1.3/">TLS 1.3</a>, to things like <a href="https://www.cloudflare.com/learning/ssl/what-is-encrypted-sni/">encrypted SNI</a>. We’ve pushed standards forward by partnering with like-minded organizations who share in our desire to help build a better Internet. Our efforts to move HTTP/3 into the mainstream are no different.</p><p>Throughout the HTTP/3 standards development process, we’ve been working closely with industry partners to build and validate client HTTP/3 support compatible with our edge support. We’re thrilled to be joined by Google Chrome and curl, both of which can be used today to make requests to the Cloudflare edge over HTTP/3. Mozilla Firefox expects to ship support in a nightly release soon as well.</p><p>Bringing this all together: today is a good day for Internet users; widespread rollout of HTTP/3 will mean a faster web experience for all, and today’s support is a large step toward that.</p><p>More importantly, today is a good day for the Internet: Chrome, curl, and Cloudflare, and soon, Mozilla, rolling out experimental but functional, support for HTTP/3 in quick succession shows that the Internet standards creation process works. Coordinated by the Internet Engineering Task Force, industry partners, competitors, and other key stakeholders can come together to craft standards that benefit the entire Internet, not just the behemoths.</p><p>Eric Rescorla, CTO of Firefox, summed it up nicely: “Developing a new network protocol is hard, and getting it right requires everyone to work together. Over the past few years, we've been working with Cloudflare and other industry partners to test TLS 1.3 and now HTTP/3 and QUIC. Cloudflare's early server-side support for these protocols has helped us work the interoperability kinks out of our client-side Firefox implementation. We look forward to advancing the security and performance of the Internet together.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6GH3p4lKpUIwOiWKDsgamN/6ab9009925489ca8a06ff935108401cc/HTTP3-partnership_2x-1.png" />
            
            </figure>
    <div>
      <h2>How did we get here?</h2>
      <a href="#how-did-we-get-here">
        
      </a>
    </div>
    <p>Before we dive deeper into HTTP/3, let’s have a quick look at the <a href="/http-3-from-root-to-tip/">evolution of HTTP over the years</a> in order to better understand why HTTP/3 is needed.</p><p>It all started back in 1996 with the publication of the <a href="https://tools.ietf.org/html/rfc1945">HTTP/1.0 specification</a> which defined the basic HTTP textual wire format as we know it today (for the purposes of this post I’m pretending HTTP/0.9 never existed). In HTTP/1.0 a new TCP connection is created for each request/response exchange between clients and servers, meaning that all requests incur a latency penalty as the TCP and <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">TLS handshakes</a> are completed before each request.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/oo0toRnPpU4dLMrkXUBk7/cc8d46c65edd60f5d9fc18c282000b97/http-request-over-tcp-tls_2x.png" />
            
            </figure><p>Worse still, rather than sending all outstanding data as fast as possible once the connection is established, TCP enforces a warm-up period called “slow start”, which allows the TCP congestion control algorithm to determine the amount of data that can be in flight at any given moment before congestion on the network path occurs, and avoid flooding the network with packets it can’t handle. But because new connections have to go through the slow start process, they can’t use all of the network bandwidth available immediately.</p><p>The <a href="https://tools.ietf.org/html/rfc2616">HTTP/1.1 revision of the HTTP specification</a> tried to solve these problems a few years later by introducing the concept of “keep-alive” connections, that allow clients to reuse TCP connections, and thus amortize the cost of the initial connection establishment and slow start across multiple requests. But this was no silver bullet: while multiple requests could share the same connection, they still had to be serialized one after the other, so a client and server could only execute a single request/response exchange at any given time for each connection.</p><p>As the web evolved, browsers found themselves needing more and more concurrency when fetching and rendering web pages as the number of resources (CSS, JavaScript, images, …) required by each web site increased over the years. But since HTTP/1.1 only allowed clients to do one HTTP request/response exchange at a time, the only way to gain concurrency at the network layer was to use multiple TCP connections to the same origin in parallel, thus losing most of the benefits of keep-alive connections. While connections would still be reused to a certain (but lesser) extent, we were back at square one.</p><p>Finally, more than a decade later, came SPDY and then <a href="https://tools.ietf.org/html/rfc7540">HTTP/2</a>, which, among other things, introduced the concept of HTTP “streams”: an abstraction that allows HTTP implementations to concurrently multiplex different HTTP exchanges onto the same TCP connection, allowing browsers to more efficiently reuse TCP connections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gBysPThlyWyj8a339vwWI/c616564cc352fccac4eb7e1977ddfe28/Screen-Shot-2019-09-25-at-7.43.01-PM.png" />
            
            </figure><p>But, yet again, this was no silver bullet! HTTP/2 solves the original problem — inefficient use of a single TCP connection — since multiple requests/responses can now be transmitted over the same connection at the same time. However, all requests and responses are equally affected by packet loss (e.g. due to network congestion), even if the data that is lost only concerns a single request. This is because while the HTTP/2 layer can segregate different HTTP exchanges on separate streams, TCP has no knowledge of this abstraction, and all it sees is a stream of bytes with no particular meaning.</p><p>The role of TCP is to deliver the entire stream of bytes, in the correct order, from one endpoint to the other. When a TCP packet carrying some of those bytes is lost on the network path, it creates a gap in the stream and TCP needs to fill it by resending the affected packet when the loss is detected. While doing so, none of the successfully delivered bytes that follow the lost ones can be delivered to the application, even if they were not themselves lost and belong to a completely independent HTTP request. So they end up getting unnecessarily delayed as TCP cannot know whether the application would be able to process them without the missing bits. This problem is known as “head-of-line blocking”.</p>
    <div>
      <h2>Enter HTTP/3</h2>
      <a href="#enter-http-3">
        
      </a>
    </div>
    <p>This is where HTTP/3 comes into play: instead of using TCP as the transport layer for the session, it uses <a href="/the-road-to-quic/">QUIC, a new Internet transport protocol</a>, which, among other things, introduces streams as first-class citizens at the transport layer. QUIC streams share the same QUIC connection, so no additional handshakes and slow starts are required to create new ones, but QUIC streams are delivered independently such that in most cases packet loss affecting one stream doesn't affect others. This is possible because QUIC packets are encapsulated on top of <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP datagrams</a>.</p><p>Using UDP allows much more flexibility compared to TCP, and enables QUIC implementations to live fully in user-space — updates to the protocol’s implementations are not tied to operating systems updates as is the case with TCP. With QUIC, HTTP-level streams can be simply mapped on top of QUIC streams to get all the benefits of HTTP/2 without the head-of-line blocking.</p><p>QUIC also combines the typical 3-way TCP handshake with <a href="/rfc-8446-aka-tls-1-3/">TLS 1.3</a>'s handshake. Combining these steps means that encryption and authentication are provided by default, and also enables faster connection establishment. In other words, even when a new QUIC connection is required for the initial request in an HTTP session, the latency incurred before data starts flowing is lower than that of TCP with TLS.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fHLYlTE6rQeewwbb11hVH/1e56b0a3ad747f02222b96ebac3d37a3/http-request-over-quic_2x.png" />
            
            </figure><p>But why not just use HTTP/2 on top of QUIC, instead of creating a whole new HTTP revision? After all, HTTP/2 also offers the stream multiplexing feature. As it turns out, it’s somewhat more complicated than that.</p><p>While it’s true that some of the HTTP/2 features can be mapped on top of QUIC very easily, that’s not true for all of them. One in particular, <a href="/hpack-the-silent-killer-feature-of-http-2/">HTTP/2’s header compression scheme called HPACK</a>, heavily depends on the order in which different HTTP requests and responses are delivered to the endpoints. QUIC enforces delivery order of bytes within single streams, but does not guarantee ordering among different streams.</p><p>This behavior required the creation of a new HTTP header compression scheme, called QPACK, which fixes the problem but requires changes to the HTTP mapping. In addition, some of the features offered by HTTP/2 (like per-stream flow control) are already offered by QUIC itself, so they were dropped from HTTP/3 in order to remove unnecessary complexity from the protocol.</p>
    <div>
      <h2>HTTP/3, powered by a delicious quiche</h2>
      <a href="#http-3-powered-by-a-delicious-quiche">
        
      </a>
    </div>
    <p>QUIC and HTTP/3 are very exciting standards, promising to address many of the shortcomings of previous standards and ushering in a new era of performance on the web. So how do we go from exciting standards documents to working implementation?</p><p>Cloudflare's QUIC and HTTP/3 support is powered by quiche, <a href="/enjoy-a-slice-of-quic-and-rust/">our own open-source implementation written in Rust</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3SjyP0JlJLJAUAGnLJmLm/07b8ae667df06953b1ee5e16014ecf3f/Screen-Shot-2019-09-25-at-7.39.59-PM.png" />
            
            </figure><p>You can find it on GitHub at <a href="https://github.com/cloudflare/quiche">github.com/cloudflare/quiche</a>.</p><p>We announced quiche a few months ago and since then have added support for the HTTP/3 protocol, on top of the existing QUIC support. We have designed quiche in such a way that it can now be used to implement HTTP/3 clients and servers or just plain QUIC ones.</p>
    <div>
      <h2>How do I enable HTTP/3 for my domain?</h2>
      <a href="#how-do-i-enable-http-3-for-my-domain">
        
      </a>
    </div>
    <p>As mentioned above, we have started on-boarding customers that signed up for the waiting list. If you are on the waiting list and have received an email from us communicating that you can now enable the feature for your websites, you can simply go to the <a href="https://dash.cloudflare.com/?to=/:account/:zone/network">Cloudflare dashboard</a> and flip the switch from the "Network" tab manually:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DADHjrJrzR3HCwKXT8G9m/7cefedde11594b83a23845c92359be0f/http3-toggle-1.png" />
            
            </figure><p>We expect to make the HTTP/3 feature available to all customers in the near future.</p><p>Once enabled, you can experiment with HTTP/3 in a number of ways:</p>
    <div>
      <h3>Using Google Chrome as an HTTP/3 client</h3>
      <a href="#using-google-chrome-as-an-http-3-client">
        
      </a>
    </div>
    <p>In order to use the Chrome browser to connect to your website over HTTP/3, you first need to download and install the <a href="https://www.google.com/chrome/canary/">latest Canary build</a>. Then all you need to do to enable HTTP/3 support is starting Chrome Canary with the “--enable-quic” and “--quic-version=h3-23” <a href="https://www.chromium.org/developers/how-tos/run-chromium-with-flags">command-line arguments</a>.</p><p>Once Chrome is started with the required arguments, you can just type your domain in the address bar, and see it loaded over HTTP/3 (you can use the Network tab in Chrome’s Developer Tools to check what protocol version was used). Note that due to how HTTP/3 is negotiated between the browser and the server, HTTP/3 might not be used for the first few connections to the domain, so you should try to reload the page a few times.</p><p>If this seems too complicated, don’t worry, as the HTTP/3 support in Chrome will become more stable as time goes on, enabling HTTP/3 will become easier.</p><p>This is what the Network tab in the Developer Tools shows when browsing this very blog over HTTP/3:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5doD9EStpvkaCUGlV8iCyx/7615f6b8f52b126c7ac12028c2891444/Screen-Shot-2019-09-20-at-1.27.34-PM.png" />
            
            </figure><p>Note that due to the experimental nature of the HTTP/3 support in Chrome, the protocol is actually identified as “http2+quic/99” in Developer Tools, but don’t let that fool you, it is indeed HTTP/3.</p>
    <div>
      <h3>Using curl</h3>
      <a href="#using-curl">
        
      </a>
    </div>
    <p>The curl command-line tool also <a href="https://daniel.haxx.se/blog/2019/09/11/curl-7-66-0-the-parallel-http-3-future-is-here/">supports HTTP/3 as an experimental feature</a>. You’ll need to download the <a href="https://github.com/curl/curl">latest version from git</a> and <a href="https://github.com/curl/curl/blob/master/docs/HTTP3.md#quiche-version">follow the instructions on how to enable HTTP/3 support</a>.</p><p>If you're running macOS, we've also made it easy to install an HTTP/3 equipped version of curl via Homebrew:</p>
            <pre><code> % brew install --HEAD -s https://raw.githubusercontent.com/cloudflare/homebrew-cloudflare/master/curl.rb</code></pre>
            <p>In order to perform an HTTP/3 request all you need is to add the “--http3” command-line flag to a normal curl command:</p>
            <pre><code> % ./curl -I https://blog.cloudflare.com/ --http3
HTTP/3 200
date: Tue, 17 Sep 2019 12:27:07 GMT
content-type: text/html; charset=utf-8
set-cookie: __cfduid=d3fc7b95edd40bc69c7d894d296564df31568723227; expires=Wed, 16-Sep-20 12:27:07 GMT; path=/; domain=.blog.cloudflare.com; HttpOnly; Secure
x-powered-by: Express
cache-control: public, max-age=60
vary: Accept-Encoding
cf-cache-status: HIT
age: 57
expires: Tue, 17 Sep 2019 12:28:07 GMT
alt-svc: h3-23=":443"; ma=86400
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server: cloudflare
cf-ray: 517b128df871bfe3-MAN</code></pre>
            
    <div>
      <h3>Using quiche’s http3-client</h3>
      <a href="#using-quiches-http3-client">
        
      </a>
    </div>
    <p>Finally, we also provide an example <a href="https://github.com/cloudflare/quiche/blob/master/examples/http3-client.rs">HTTP/3 command-line client</a> (as well as a command-line server) built on top of quiche, that you can use to experiment with HTTP/3.</p><p>To get it running, first clone quiche’s GitHub repository:</p>
            <pre><code>$ git clone --recursive https://github.com/cloudflare/quiche</code></pre>
            <p>Then build it. You need a working Rust and Cargo installation for this to work (we recommend using <a href="https://rustup.rs/">rustup</a> to easily setup a working Rust development environment).</p>
            <pre><code>$ cargo build --examples</code></pre>
            <p>And finally you can execute an HTTP/3 request:</p>
            <pre><code>$ RUST_LOG=info target/debug/examples/http3-client https://blog.cloudflare.com/</code></pre>
            
    <div>
      <h2>What’s next?</h2>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>In the coming months we’ll be working on improving and optimizing our QUIC and <a href="https://www.cloudflare.com/learning/performance/what-is-http3/">HTTP/3 implementation</a>, and will eventually allow everyone to enable this new feature without having to go through a waiting list. We'll continue updating our implementation as standards evolve, which <b>may result in breaking changes</b> between draft versions of the standards.</p><p>Here are a few new features on our roadmap that we're particularly excited about:</p>
    <div>
      <h3>Connection migration</h3>
      <a href="#connection-migration">
        
      </a>
    </div>
    <p>One important feature that QUIC enables is seamless and transparent migration of connections between different networks (such as your home WiFi network and your carrier’s mobile network as you leave for work in the morning) without requiring a whole new connection to be created.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KaBR6EaZ00sko7yvIPavs/182d187326680c8c92d34486acea0de1/Screen-Shot-2019-09-25-at-7.39.44-PM.png" />
            
            </figure><p>This feature will require some additional changes to our infrastructure, but it’s something we are excited to offer our customers in the future.</p>
    <div>
      <h3>Zero Round Trip Time Resumption</h3>
      <a href="#zero-round-trip-time-resumption">
        
      </a>
    </div>
    <p>Just like TLS 1.3, QUIC supports a <a href="/introducing-0-rtt/">mode of operation that allows clients to start sending HTTP requests before the connection handshake has completed</a>. We don’t yet support this feature in our QUIC deployment, but we’ll be working on making it available, just like we already do for our TLS 1.3 support.</p>
    <div>
      <h2>HTTP/3: it's alive!</h2>
      <a href="#http-3-its-alive">
        
      </a>
    </div>
    <p>We are excited to support HTTP/3 and allow our customers to experiment with it while efforts to standardize QUIC and HTTP/3 are still ongoing. We'll continue working alongside other organizations, including Google and Mozilla, to finalize the QUIC and HTTP/3 standards and encourage broad adoption.</p><p>Here's to a faster, more reliable, more secure web experience for all.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[HTTP3]]></category>
            <category><![CDATA[QUIC]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4cfvya4KDyDXaX5DdNkv9x</guid>
            <dc:creator>Alessandro Ghedini</dc:creator>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Magic Transit makes your network smarter, better, stronger, and cheaper to operate]]></title>
            <link>https://blog.cloudflare.com/magic-transit/</link>
            <pubDate>Tue, 13 Aug 2019 13:01:00 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce Cloudflare Magic Transit. Magic Transit provides secure, performant, and reliable IP connectivity to the Internet. Out-of-the-box, Magic Transit deployed in front of your on-premise network protects it from DDoS attack  ]]></description>
            <content:encoded><![CDATA[ <p>Today we’re excited to announce <a href="http://www.cloudflare.com/magic-transit">Cloudflare Magic Transit</a>. Magic Transit provides secure, performant, and reliable IP connectivity to the Internet. Out-of-the-box, Magic Transit deployed in front of your on-premise network protects it from DDoS attack and enables provisioning of a full suite of virtual network functions, including advanced packet filtering, load balancing, and traffic management tools.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xrudUtd0p89Xzltytmvr5/85d2ae11d640a1d2c56dc0dda37d0103/Magic-Transit-Network-Diagram-3.gif" />
            
            </figure><p>Magic Transit is built on the standards and networking primitives you are familiar with, but delivered from Cloudflare’s global edge network as a service. Traffic is ingested by the Cloudflare Network with anycast and BGP, announcing your company’s IP address space and extending your network presence globally. Today, our anycast edge network spans 193 cities in more than 90 countries around the world.</p><p>Once packets hit our network, traffic is inspected for attacks, filtered, steered, accelerated, and sent onward to the origin. Magic Transit will connect back to your origin infrastructure over Generic Routing Encapsulation (GRE) tunnels, private network interconnects (PNI), or other forms of peering.</p><p>Enterprises are often forced to pick between performance and security when deploying IP network services. Magic Transit is designed from the ground up to minimize these trade-offs: performance and security are better together. Magic Transit deploys IP security services across our entire global network. <b>This means no more diverting traffic to small numbers of distant “scrubbing centers” or relying on on-premise hardware to mitigate attacks on your infrastructure.</b></p><p>We’ve been laying the groundwork for Magic Transit for as long as Cloudflare has been in existence, since 2010. Scaling and securing the IP network Cloudflare is built on has required tooling that would have been impossible or exorbitantly expensive to buy. So we built the tools ourselves! We grew up in the age of <a href="https://en.wikipedia.org/wiki/Software-defined_networking">software-defined networking</a> and <a href="https://en.wikipedia.org/wiki/Network_function_virtualization">network function virtualization</a>, and the principles behind these modern concepts run through everything we do.</p><p>When we talk to our customers managing on-premise networks, we consistently hear a few things: building and managing their networks is expensive and painful, and those on-premise networks aren’t going away anytime soon.</p><p>Traditionally, CIOs trying to connect their IP networks to the Internet do this in two steps:</p><ol><li><p>Source connectivity to the Internet from transit providers (ISPs).</p></li><li><p>Purchase, operate, and maintain network function specific hardware appliances. Think hardware load balancers, firewalls, DDoS mitigation equipment, <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-wan/">WAN</a> optimization, and more.</p></li></ol><p>Each of these boxes costs time and money to maintain, not to mention the skilled, expensive people required to properly run them. Each additional link in the chain makes a network harder to manage.</p><p>This all sounded familiar to us. We had an aha! moment: we had the same issues managing our datacenter networks that power all of our products, and we had spent significant time and effort building solutions to those problems. Now, nine years later, we had a robust set of tools we could turn into products for our own customers.</p><p>Magic Transit aims to bring the traditional datacenter hardware model into the cloud, packaging transit with all the network “hardware” you might need to keep your network fast, reliable, and secure. Once deployed, Magic Transit allows seamless provisioning of virtualized network functions, including routing, DDoS mitigation, firewalling, load balancing, and traffic acceleration services.</p>
    <div>
      <h2>Magic Transit is your network’s on-ramp to the Internet</h2>
      <a href="#magic-transit-is-your-networks-on-ramp-to-the-internet">
        
      </a>
    </div>
    <p>Magic Transit delivers its connectivity, security, and performance benefits by serving as the “front door” to your IP network. This means it accepts IP packets destined for your network, processes them, and then outputs them to your origin infrastructure.</p><p>Connecting to the Internet via Cloudflare offers numerous benefits. Starting with the most basic, Cloudflare is one of the most <a href="https://bgp.he.net/AS13335">extensively connected networks</a> on the Internet. We work with carriers, Internet exchanges, and peering partners around the world to ensure that a bit placed on our network will reach its destination quickly and reliably, no matter the destination.</p>
    <div>
      <h3>An example deployment: Acme Corp</h3>
      <a href="#an-example-deployment-acme-corp">
        
      </a>
    </div>
    <p>Let’s walk through how a customer might deploy Magic Transit. Customer Acme Corp. owns the IP prefix 203.0.113.0/24, which they use to address a rack of hardware they run in their own physical datacenter. Acme currently announces routes to the Internet from their customer-premise equipment (CPE, aka a router at the perimeter of their datacenter), telling the world 203.0.113.0/24 is reachable from their autonomous system number, AS64512. Acme has DDoS mitigation and firewall hardware appliances on-premise.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dKeZlmtO1CLvJY4ZuIk9b/8c967c28d3187864e211067b8f90ea31/Legacy-Arch_Diagram_3x--1-.png" />
            
            </figure><p>Acme wants to connect to the Cloudflare Network to improve the security and performance of their own network. Specifically, they’ve been the target of distributed denial of service attacks, and want to sleep soundly at night without relying on on-premise hardware. This is where Cloudflare comes in.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/108YJxvEAZllG1WQA5uCnw/efc1cf482336a8b67dbbbff76bbf5dac/Modern-Arch_Diagram_3x.png" />
            
            </figure><p>Deploying Magic Transit in front of their network is simple:</p><ol><li><p>Cloudflare uses Border Gateway Protocol (BGP) to announce Acme’s 203.0.113.0/24 prefix from Cloudflare’s edge, with Acme’s permission.</p></li><li><p>Cloudflare begins ingesting packets destined for the Acme IP prefix.</p></li><li><p>Magic Transit applies DDoS mitigation and firewall rules to the network traffic. After it is ingested by the Cloudflare network, traffic that would benefit from HTTPS caching and WAF inspection can be “upgraded” to our Layer 7 HTTPS pipeline without incurring additional network hops.</p></li><li><p>Acme would like Cloudflare to use Generic Routing Encapsulation (GRE) to tunnel traffic back from the Cloudflare Network back to Acme’s datacenter. GRE tunnels are initiated from anycast endpoints back to Acme’s premise. Through the magic of anycast, the tunnels are constantly and simultaneously connected to hundreds of network locations, ensuring the tunnels are highly available and resilient to network failures that would bring down traditionally formed GRE tunnels.</p></li><li><p>Cloudflare egresses packets bound for Acme over these GRE tunnels.</p></li></ol><p>Let’s dive deeper on how the DDoS mitigation included in Magic Transit works.</p>
    <div>
      <h2>Magic Transit protects networks from DDoS attack</h2>
      <a href="#magic-transit-protects-networks-from-ddos-attack">
        
      </a>
    </div>
    <p>Customers deploying Cloudflare Magic Transit instantly get access to the same IP-layer DDoS protection system that has protected the Cloudflare Network for the past 9 years. This is the same mitigation system that stopped a 942Gbps attack dead in its tracks, in seconds. This is the same mitigation system that <a href="/memcrashed-major-amplification-attacks-from-port-11211/">knew how to stop memcached amplification attacks</a> days <i>before</i> a 1.3Tbps attack took down Github, which did not have Cloudflare watching its back. This is the same mitigation we trust every day to protect Cloudflare, and now it protects your network.</p><p>Cloudflare has historically protected Layer 7 HTTP and HTTPS applications from attacks at all layers of the OSI Layer model. The <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> our customers have come to know and love relies on a blend of techniques, but can be broken into a few complementary defenses:</p><ol><li><p>Anycast and a network presence in 193 cities around the world allows our network to get close to users and attackers, allowing us to soak up traffic close to the source without introducing significant latency.</p></li><li><p>30+Tbps of network capacity allows us to soak up <i>a lot</i> of traffic close to the source. Cloudflare's network has more capacity to stop DDoS attacks than that of <a href="https://www.cloudflare.com/cloudflare-vs-akamai/">Akamai</a> Prolexic, Imperva, Neustar, and Radware — combined.</p></li><li><p>Our HTTPS reverse proxy absorbs L3 (IP layer) and L4 (TCP layer) attacks by terminating connections and re-establishing them to the origin. This stops most spurious packet transmissions from ever getting close to a customer origin server.</p></li><li><p>Layer 7 mitigations and rate limiting stop floods at the HTTPS application layer.</p></li></ol><p>Looking at the above description carefully, you might notice something: our reverse proxy servers protect our customers by terminating connections, but our network and servers still get slammed by the L3 and 4 attacks we stop on behalf of our customers. How do we protect our own infrastructure from these attacks?</p><p><a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Enter Gatebot</a>!</p><p>Gatebot is a suite of software running on every one of our servers inside each of our datacenters in the 193 cities we operate, constantly analyzing and blocking attack traffic. Part of Gatebot’s beauty is its simple architecture; it sits silently, in wait, sampling packets as they pass from the network card into the kernel and onward into userspace. Gatebot does not have a learning or warm-up period. As soon as it detects an attack, it instructs the kernel of the machine it is running on to drop the packet, log its decision, and move on.</p><p>Historically, if you wanted to protect your network from a DDoS attack, you might have purchased a specialized piece of hardware to sit at the <a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter of your network</a>. This hardware box (let’s call it “The DDoS Protection Box”) would have been fantastically expensive, pretty to look at (as pretty as a 2U hardware box could get), and required a ton of recurring effort and money to stay on its feet, keep its licence up to date, and keep its attack detection system accurate and trained.</p><p>For one thing, it would have to be carefully monitored to make sure it was stopping attacks but not stopping legitimate traffic. For another, if an attacker managed to generate enough traffic to saturate your datacenter’s transit links to the Internet, you were out of luck; no box sitting <i>inside</i> your datacenter can protect you from an attack generating enough traffic to congest the links running from the outside world to the datacenter itself.</p><p>Early on, Cloudflare considered buying The DDoS Protection Box(es) to protect our various network locations, but ruled them out quickly. Buying hardware would have incurred substantial cost and complexity. In addition, buying, racking, and managing specialized pieces of hardware makes a network hard to scale. There had to be a better way. We set out to solve this problem ourselves, starting from first principles and modern technology.</p><p>To make our modern approach to DDoS mitigation work, we had to invent a suite of tools and techniques to allow us to do ultra-high performance networking on a generic x86 server running Linux.</p><p>At the core of our network data plane is the eXpress Data Path (XDP) and the extended Berkeley Packet Filter (eBPF), a set of APIs that allow us to build ultra-high performance networking applications in the Linux kernel. My colleagues have written extensively about how we use XDP and eBPF to stop DDoS attacks:</p><ul><li><p><a href="/l4drop-xdp-ebpf-based-ddos-mitigations/">L4Drop: XDP DDoS Mitigations</a></p></li><li><p><a href="/xdpcap/">xdpcap: XDP Packet Capture</a></p></li><li><p><a href="https://netdevconf.org/0x13/session.html?talk-XDP-based-DDoS-mitigation">XDP based DoS mitigation</a> presentation</p></li><li><p><a href="https://netdevconf.org/2.1/papers/Gilberto_Bertin_XDP_in_practice.pdf">XDP in practice: integrating XDP into our DDoS mitigation pipeline</a> (PDF)</p></li><li><p><a href="/cloudflare-architecture-and-how-bpf-eats-the-world/">Cloudflare architecture and how BPF eats the world</a></p></li></ul><p>At the end of the day, we ended up with a DDoS mitigation system that:</p><ul><li><p>Is delivered by our entire network, spread across 193 cities around the world. To put this another way, our network doesn’t have the concept of “scrubbing centers” — every single one of our network locations is always mitigating attacks, all the time. This means faster attack mitigation and minimal latency impact for your users.</p></li><li><p>Has exceptionally fast times to mitigate, with most attacks mitigated in 10s or less.</p></li><li><p>Was built in-house, giving us deep visibility into its behavior and the ability to rapidly develop new mitigations as we see new attack types.</p></li><li><p>Is deployed as a service, and is horizontally scalable. Adding x86 hardware running our DDoS mitigation software stack to a datacenter (or adding another network location) instantly brings more DDoS mitigation capacity online.</p></li></ul><p>Gatebot is designed to protect Cloudflare infrastructure from attack. And today, as part of Magic Transit, customers operating their own IP networks and infrastructure can rely on Gatebot to protect their own network.</p>
    <div>
      <h2>Magic Transit puts your network hardware in the cloud</h2>
      <a href="#magic-transit-puts-your-network-hardware-in-the-cloud">
        
      </a>
    </div>
    <p>We’ve covered how Cloudflare Magic Transit connects your network to the Internet, and how it protects you from DDoS attack. If you were running your network the old-fashioned way, this is where you’d stop to buy firewall hardware, and maybe another box to do load balancing.</p><p>With Magic Transit, you don’t need those boxes. We have a long track record of delivering common network functions (firewalls, load balancers, etc.) as services. Up until this point, customers deploying our services have relied on DNS to bring traffic to our edge, after which our Layer 3 (IP), Layer 4 (TCP &amp; UDP), and Layer 7 (HTTP, HTTPS, and DNS) stacks take over and deliver performance and security to our customers.</p><p>Magic Transit is designed to handle your entire network, but does not enforce a one-size-fits-all approach to what services get applied to which portion of your traffic. To revisit Acme, our example customer from above, they have brought 203.0.113.0/24 to the Cloudflare Network. This represents 256 IPv4 addresses, some of which (eg 203.0.113.8/30) might front load balancers and HTTP servers, others mail servers, and others still custom UDP-based applications.</p><p>Each of these sub-ranges may have different security and traffic management requirements. Magic Transit allows you to configure specific IP addresses with their own suite of services, or apply the same configuration to large portions (or all) of your block.</p><p>Taking the above example, Acme may wish that the 203.0.113.8/30 block containing HTTP services fronted by a traditional hardware load balancer instead deploy the Cloudflare Load Balancer, and also wants HTTP traffic analyzed with Cloudflare’s <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> and content cached by our CDN. With Magic Transit, deploying these network functions is straight-forward — a few clicks in our dashboard or API calls will have your traffic handled at a higher layer of network abstraction, with all the attendant goodies applying application level load balancing, firewall, and caching logic bring.</p><p>This is just one example of a deployment customers might pursue. We’ve worked with several who just want pure IP passthrough, with DDoS mitigation applied to specific IP addresses. Want that? We got you!</p>
    <div>
      <h2>Magic Transit runs on the entire Cloudflare Global Network. Or, no more scrubs!</h2>
      <a href="#magic-transit-runs-on-the-entire-cloudflare-global-network-or-no-more-scrubs">
        
      </a>
    </div>
    <p>When you connect your network to Cloudflare Magic Transit, you get access to the entire Cloudflare network. This means all of our network locations become <i>your</i> network locations. Our network capacity becomes <i>your</i> network capacity, at your disposal to power your experiences, deliver your content, and mitigate attacks on your infrastructure.</p><p>How expansive is the Cloudflare Network? We’re in 193 cities worldwide, with more than 30Tbps of network capacity spread across them. Cloudflare operates within 100 milliseconds of 98% of the Internet-connected population in the developed world, and 93% of the Internet-connected population globally (for context, the blink of an eye is 300-400 milliseconds).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kjGmLjsRPHSa8c91odBGG/6d46342b7a6d8e72f420966737d6e35b/image1-2.png" />
            
            </figure><p>Areas of the globe within 100 milliseconds of a Cloudflare datacenter.</p><p>Just as we built our own products in house, we also built our network in house. Every product runs in every datacenter, meaning our entire network delivers all of our services. This might not have been the case if we had assembled our product portfolio piecemeal through acquisition, or not had completeness of vision when we set out to build our current suite of services.</p><p>The end result for customers of Magic Transit: a network presence around the globe as soon you come on board. Full access to a diverse set of services worldwide. All delivered with latency and performance in mind.</p><p>We'll be sharing a lot more technical detail on how we deliver Magic Transit in the coming weeks and months.</p>
    <div>
      <h2>Magic Transit lowers total cost of ownership</h2>
      <a href="#magic-transit-lowers-total-cost-of-ownership">
        
      </a>
    </div>
    <p>Traditional network services don’t come cheap; they require high capital outlays up front, investment in staff to operate, and ongoing maintenance contracts to stay functional. Just as our product aims to be disruptive technically, we want to disrupt traditional network cost-structures as well.</p><p>Magic Transit is delivered and billed as a service. You pay for what you use, and can add services at any time. Your team will thank you for its ease of management; your management will thank you for its ease of accounting. That sounds pretty good to us!</p>
    <div>
      <h2>Magic Transit is available today</h2>
      <a href="#magic-transit-is-available-today">
        
      </a>
    </div>
    <p>We’ve worked hard over the past nine years to get our network, management tools, and network functions as a service into the state they’re in today. We’re excited to get the tools we use every day in customers’ hands.</p><p>So that brings us to naming. When we showed this to customers the most common word they used was ‘whoa.’ When we pressed what they meant by that they almost all said: ‘It’s so much better than any solution we’ve seen before. It’s, like, magic!’ So it seems only natural, if a bit cheesy, that we call this product what it is: Magic Transit.</p><p>We think this is all pretty magical, and think you will too. <a href="https://www.cloudflare.com/plans/enterprise/contact/">Contact our Enterprise Sales Team</a> today.</p> ]]></content:encoded>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">43g858qf8y028mLD79a2Yn</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Argo and the Cloudflare Global Private Backbone]]></title>
            <link>https://blog.cloudflare.com/argo-and-the-cloudflare-global-private-backbone/</link>
            <pubDate>Mon, 13 May 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are announcing a faster, smarter Argo. One that leverages richer data sets, smarter routing algorithms, and under the hood advancements to deliver a faster-than-ever experience to end users.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to Speed Week! Each day this week, we’re going to talk about something Cloudflare is doing to make the Internet meaningfully faster for everyone.</p><p>Cloudflare has built a massive network of data centers in 180 cities in 75 countries. One way to think of Cloudflare is a global system to transport bits securely, quickly, and reliably from any point A to any other point B on the planet.</p><p>To make that a reality, we built Argo. Argo uses real-time global network information to route around brownouts, cable cuts, packet loss, and other problems on the Internet. Argo makes the network that Cloudflare relies on—the Internet—faster, more reliable, and more secure on every hop around the world.</p><p>We launched Argo two years ago, and it now carries over 22% of Cloudflare’s traffic. On an average day, Argo cuts the amount of time Internet users spend waiting for content by 112 years!</p><p>As Cloudflare and our traffic volumes have grown, it now makes sense to build our own private backbone to add further security, reliability, and speed to key connections between Cloudflare locations.</p><p>Today, we’re introducing the Cloudflare Global Private Backbone. It’s been in operation for a while now and links Cloudflare locations with private fiber connections.</p><p>This private backbone benefits all Cloudflare customers, and it shines in combination with Argo. Argo can select the best available link across the Internet on a per data center-basis, and takes full advantage of the Cloudflare Global Private Backbone automatically.</p><p>Let’s open the hood on Argo and explain how our backbone network further improves performance for our customers.</p>
    <div>
      <h3>What’s Argo?</h3>
      <a href="#whats-argo">
        
      </a>
    </div>
    <p>Argo is like Waze for the Internet. Every day, Cloudflare carries hundreds of billions of requests across our network and the Internet. Because our network, our customers, and their end-users are well distributed globally, all of these requests flowing across our infrastructure paint a great picture of how different parts of the Internet are performing at any given time.</p><p>Just like Waze examines real data from real drivers to give you accurate, uncongested (and sometimes unorthodox) routes across town, Argo Smart Routing uses the timing data Cloudflare collects from each request to pick faster, more efficient routes across the Internet.</p><p>In practical terms, Cloudflare’s network is expansive in its reach. Some of the Internet links in a given region may be congested and cause poor performance (a literal traffic jam). By understanding this is happening and using alternative network locations and providers, Argo can put traffic on a less direct, but faster, route from its origin to its destination.</p><p>These benefits are not theoretical: <b>enabling Argo Smart Routing shaves an average of 33%</b> off HTTP time to first byte (TTFB).</p><p>One other thing we’re proud of: we’ve stayed super focused on making it easy to use. One click in the dashboard enables better, smarter routing, bringing the full weight of Cloudflare’s network, data, and engineering expertise to bear on making your traffic faster. Advanced analytics allow you to understand exactly how Argo is performing for you around the world.</p><p>You can read a lot more about how Argo works in our original <a href="/argo">launch blog post</a>.</p><p>So far, we’ve been talking about Argo at a functional level: you turn it on and it makes requests that traverse the Internet to your origin faster. How does it actually work? Argo is dependent on a few things to make its magic happen: Cloudflare’s network, up-to-the-second performance data on how traffic is moving on the Internet, and machine learning routing algorithms.</p>
    <div>
      <h3>Cloudflare’s Global Network</h3>
      <a href="#cloudflares-global-network">
        
      </a>
    </div>
    <p>Cloudflare maintains a network of data centers around the world, and our network continues to grow significantly. Today, we have <a href="https://www.cloudflare.com/network/">more than 180</a> data centers in 75 countries. That’s an additional 69 data centers since we launched Argo in May 2017.</p><p>In addition to adding new locations, Cloudflare is constantly working with network partners to add connectivity options to our network locations. A single Cloudflare data center may be peered with a dozen networks, connected to multiple Internet eXchanges (IXs), connected to multiple transit providers (e.g. Telia, GTT, etc), and now, connected to our own physical backbone. A given destination may be reachable over multiple different links from the same location; each of these links will have different performance and reliability characteristics.</p><p>This increased network footprint is important in making Argo faster. Additional network locations and providers mean Argo has more options at its disposal to route around network disruptions and congestion. Every time we add a new network location, we exponentially grow the number of routing options available to any given request.</p>
    <div>
      <h3>Better routing for improved performance</h3>
      <a href="#better-routing-for-improved-performance">
        
      </a>
    </div>
    <p>Argo requires the huge global network we’ve built to do its thing. But it wouldn’t do much of anything if it didn’t have the smarts to actually take advantage of all our data centers and cables between them to move traffic faster.</p><p>Argo combines multiple <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning techniques</a> to build routes, test them, and disqualify routes that are not performing as we expect.</p><p>The generation of routes is performed on data using “offline” optimization techniques: Argo’s route construction algorithms take an input data set (timing data) and fixed optimization target (“minimize TTFB”), outputting routes that it believes satisfy this constraint.</p><p>Route disqualification is performed by a separate pipeline that has no knowledge of the route construction algorithms. These two systems are intentionally designed to be adversarial, allowing Argo to be both aggressive in finding better routes across the Internet but also adaptive to rapidly changing network conditions.</p><p>One specific example of Argo’s smarts is its ability to distinguish between multiple potential connectivity options as it leaves a given data center. We call this “transit selection”.</p><p>As we discussed above, some of our data centers may have a dozen different, viable options for reaching a given destination IP address. It’s as if you subscribed to every available ISP at your house, and you could choose to use any one of them for each website you tried to access. Transit selection enables Cloudflare to pick the fastest available path in real-time at every hop to reach the destination.</p><p>With transit selection, Argo is able to specify both:</p><ol><li><p>Network location waypoints on the way to the origin.</p></li><li><p>The <i>specific transit provider or link</i> at each waypoint in the journey of the packet all the way from the source to the destination.</p></li></ol><p>To analogize this to Waze, Argo giving directions <i>without</i> transit selection is like telling someone to drive to a waypoint (go to New York from San Francisco, passing through Salt Lake City), without specifying the roads to actually take <i>to</i> Salt Lake City or New York. <i>With</i> transit selection, we’re able to give full turn-by-turn directions — take I-80 out of San Francisco, take a left here, enter the Salt Lake City area using SR-201 (because I-80 is congested around SLC), etc. This allows us to route around issues on the Internet with much greater precision.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2x806c835ECNPmNDRr5fRT/7e9928cdc07f28c50732c68cd22d2ea1/Argo-Map_2x.png" />
            
            </figure><p>Transit selection requires logic in our inter-data center data plane (the components that actually move data across our network) to allow for differentiation between different providers and links available in each location. Some interesting network automation and advertisement techniques allow us to be much more discerning about which link actually gets picked to move traffic.</p><p>Without modifications to the Argo data plane, those options would be abstracted away by our edge routers, with the choice of transit left to BGP. We plan to talk more publicly about the routing techniques used in the future.</p><p>We are able to directly measure the impact transit selection has on Argo customer traffic. Looking at global average improvement, <b>transit selection gets customers an additional 16% TTFB latency benefit</b> over taking standard BGP-derived routes. That’s huge!</p><p>One thing we think about: Argo can itself change network conditions when moving traffic from one location or provider to another by <a href="https://www.citylab.com/transportation/2018/09/citylab-university-induced-demand/569455/">inducing demand</a> (adding additional data volume because of improved performance) and changing traffic profiles. With great power comes great intricacy.</p>
    <div>
      <h3>Adding the Cloudflare Global Private Backbone</h3>
      <a href="#adding-the-cloudflare-global-private-backbone">
        
      </a>
    </div>
    <p>Given our diversity of transit and connectivity options in each of our data centers, and the smarts that allow us to pick between them, why did we go through the time and trouble of building a backbone for ourselves? The short answer: operating our own private backbone allows us much more control over end-to-end performance and capacity management.</p><p>When we buy transit or use a partner for connectivity, we’re relying on that provider to manage the link’s health and ensure that it stays uncongested and available. Some networks are better than others, and conditions change all the time.</p><p>As an example, here’s a measurement of jitter (variance in round trip time) between two of our data centers, Chicago and Newark, over a transit provider’s network:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5j3Wu37eyBkXzcOEiaV1tH/70d3697a9a37bd3cbe77ed88ac2277c8/image4-1.png" />
            
            </figure><p>Average jitter over the pictured 6 hours is 4ms, with average round trip latency of 27ms. Some amount of latency is something we just need to learn to live with; the speed of light is a tough physical constant to do battle with, and network protocols are built to function over links with high or low latency.</p><p>Jitter, on the other hand, is “bad” because it is unpredictable and network protocols and applications built on them often degrade quickly when jitter rises. Jitter on a link is usually caused by more buffering, queuing, and general competition for resources in the routing hardware on either side of a connection. As an illustration, having a VoIP conversation over a network with high latency is annoying but manageable. Each party on a call will notice “lag”, but voice quality will not suffer. Jitter causes the conversation to garble, with packets arriving on top of each other and unpredictable glitches making the conversation unintelligible.</p><p>Here’s the same jitter chart between Chicago and Newark, except this time, transiting the Cloudflare Global Private Backbone:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5aHclF30Av4bIGTOkHFLg4/80e32ef8cb6de89cbafd2eaf3a449a2e/image3.png" />
            
            </figure><p>Much better! Here we see a jitter measurement of 536μs (microseconds), almost eight times better than the measurement over a transit provider between the same two sites.</p><p>The combination of fiber we control end-to-end and Argo Smart Routing allows us to unlock the full potential of Cloudflare’s backbone network. Argo’s routing system knows exactly how much capacity the backbone has available, and can manage how much additional data it tries to push through it. By controlling both ends of the pipe, and the pipe itself, we can guarantee certain performance characteristics and build those expectations into our routing models. The same principles do not apply to transit providers and networks we don’t control.</p>
    <div>
      <h3>Latency, be gone!</h3>
      <a href="#latency-be-gone">
        
      </a>
    </div>
    <p>Our private backbone is another tool available to us to improve performance on the Internet. Combining Argo’s cutting-edge machine learning and direct fiber connectivity between points on our large network allows us to route customer traffic with predictable, excellent performance.</p><p>We’re excited to see the backbone and its impact continue to expand.</p><p>Speaking personally as a product manager, Argo is really fun to work on. We make customers happier by making their websites, APIs, and networks faster. Enabling Argo allows customers to do that with one click, and see immediate benefit. Under the covers, huge investments in physical and virtual infrastructure begin working to accelerate traffic as it flows from its source to destination.  </p><p>From an engineering perspective, our weekly goals and objectives are directly measurable — did we make our customers faster by doing additional engineering work? When we ship a new optimization to Argo and immediately see our charts move up and to the right, we know we’ve done our job.</p><p>Building our physical private backbone is the latest thing we’ve done in our need for speed.</p><p>Welcome to Speed Week!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DjjNeUjd2lQWKw6rPgbXR/726957024645198035c25b569b64d1fd/image1-2.png" />
            
            </figure><p><a href="https://dash.cloudflare.com/traffic">Activate Argo</a> now, or <a>contact sales</a> to learn more!</p> ]]></content:encoded>
            <category><![CDATA[Argo Smart Routing]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Speed Week]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">4YEJmuSBsWUEo0ey4KPCQW</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Traffic Acceleration with Cloudflare Mobile SDK]]></title>
            <link>https://blog.cloudflare.com/mobile-sdk-acceleration/</link>
            <pubDate>Thu, 13 Dec 2018 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce early access for Traffic Acceleration with Cloudflare Mobile SDK. Enabling Acceleration through the SDK reduces latency, increases throughput, and improves app user experiences. ]]></description>
            <content:encoded><![CDATA[ <p>We’re excited to announce early access for Traffic Acceleration with Cloudflare Mobile SDK. Acceleration uses novel transport algorithms built into the SDK to accelerate apps beyond the performance they would see with TCP. Enabling Acceleration through the SDK reduces latency, drives down network timeouts, and improves app user experiences.</p><p>A year ago, we launched Cloudflare Mobile SDK with a set of free features focused on measuring mobile app networking performance. Apps are dependent on network connectivity to deliver their app’s user experiences, but developers have limited visibility into how network connectivity is impacting app performance. Integrating the Mobile SDK allows developers to measure and improve the speed of their app’s network interactions.</p>
            
            
          
    <div>
      <h2>How it works</h2>
      <a href="#how-it-works">
        
      </a>
    </div>
    <p>Mobile applications interact with the Internet to do everything — to fetch the weather, your email, to step through a checkout flow. Everything that makes a smartphone magical is powered by a service on the Internet. How quickly those network interactions happen is dictated by two things: how large the payloads are for the given request/response, and what the available link bandwidth is.</p><p>Payload size is mostly application specific: a shopping app is going to request product images and similar medium sized assets, while a stock quotes app could be expected to have smaller payloads in the API responses powering it.</p><p>Available link bandwidth is usually dictated by your network provider. Everyone familiar with the feeling of trying to check out in an <a href="https://www.cloudflare.com/ecommerce/">e-commerce app</a> and being stymied by poor cell connectivity. But network quality is not the only thing that impacts available bandwidth; the transport protocol (at Layer 4, in OSI-model-speak) in use also has a huge <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">impact</a> on how quickly your phone can pull content off the Internet.</p>
    <div>
      <h2>A primer on TCP congestion control</h2>
      <a href="#a-primer-on-tcp-congestion-control">
        
      </a>
    </div>
    <p>TCP is the dominant transport protocol for most applications you know and love. It’s over 40 years old, and impressive in both its simplicity and longevity (they are likely related). TCP relies on congestion control algorithms to understand how quickly to send traffic over a connection without congesting the link (filling the pipe to the point things start getting backed up).</p><p>Congestion is something to be avoided. TCP guarantees reliable delivery, and cleaning up from a congestion event often involves additional round trips and retransmits. TCP implementations are often conservative in two important dimensions: how much data they choose to send on connection establishment (called the <i>initcwnd</i>, or initial congestion window), and what to do when the sender senses packet loss (congestion avoidance).</p><p>Source: <a href="https://commons.wikimedia.org/wiki/File:TCP_Slow-Start_and_Congestion_Avoidance.svg">https://commons.wikimedia.org/wiki/File:TCP_Slow-Start_and_Congestion_Avoidance.svg</a></p><p>An example of the data rate on a connection over time. Congestion avoidance is illustrated in pink.</p><p>How TCP opens connections and how it responds to packet loss are critical factors in determining how much data actually gets to flow over the connection. Tuning TCP connection parameters allows more data to flow over the link without actually touching the actual physical layer (i.e. boosting your cell signal).</p>
    <div>
      <h2>Moving beyond TCP</h2>
      <a href="#moving-beyond-tcp">
        
      </a>
    </div>
    <p>Unfortunately, TCP parameters governing a connection’s data rate are hidden in the kernel, out of reach of user space and the optimizing, enterprising app developer. Cloudflare Mobile SDK aims to solve this problem by shipping a replacement transport protocol implemented on top of UDP, which the SDK can speak with the Cloudflare edge.</p><p>There are three advantages to replacing TCP with a custom UDP transport protocol:</p><ol><li><p>Performance tuning, bug fixes, and incremental updates to the protocol itself can be done without any downtime or coordination with the kernel. This is not the case with TCP.</p></li><li><p>Middle-boxes' (eg. corporate proxies, etc) assumptions on how TCP works have made improving TCP very difficult. UDP based protocols don't suffer from the same middle-box ossification.</p></li><li><p>Having tight control and coordination between the send-side Cloudflare edge and receive-side Mobile SDK makes optimizing individual connections possible, even over very dissimilar mobile netwoks.</p></li></ol><p>All of these factors lead directly to reduced latency, increased throughput, and improved user experiences.</p>
    <div>
      <h2>Integrating with SDK and example results</h2>
      <a href="#integrating-with-sdk-and-example-results">
        
      </a>
    </div>
    <p>Once an app is integrated with the SDK, enabling Acceleration is straightforward. Most standard HTTP networking libraries are supported out of the box, and require no additional integration work beyond initializing the SDK with your API key.</p><p>Customers accelerating their traffic with Cloudflare Mobile SDK see significant reductions in latency, increases in throughput, and reductions in TCP related timeouts.</p><p>As an example, a transportation company enabled acceleration in their iOS app. Their users immediately saw a 7% decrease in network response time and a 13.8% drop in network timeouts. This directly translates to an increase in conversions: <b>purchases per user increased 3% with Acceleration enabled</b>.</p>
    <div>
      <h2>Early Access</h2>
      <a href="#early-access">
        
      </a>
    </div>
    <p>We’re excited to bring Acceleration to a broader audience. <a>Get in touch</a> with us for early access. Mobile SDK supports both iOS and Android.</p><p>In addition to developing features to improve app performance, we’re working hard on features to better authenticate mobile devices with the APIs that power them. Why is this important? Non-humans (bots) are increasingly interacting with the APIs that power apps to scrape data, stuff credentials, and otherwise act in ways humans would not.</p><p>The Mobile SDK will soon include features to help API owners understand whether or not the user purporting to be using an app actually is a real mobile user. We’ll have a lot more detail on this soon; if you’re interested in hearing more sooner, please <a>get in touch</a>!</p> ]]></content:encoded>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Mobile SDK]]></category>
            <category><![CDATA[Mobile]]></category>
            <category><![CDATA[Developers]]></category>
            <guid isPermaLink="false">5hw9Dirpa6o0K51ZbbyiNg</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Spectrum with Load Balancing]]></title>
            <link>https://blog.cloudflare.com/introducing-spectrum-with-load-balancing/</link>
            <pubDate>Thu, 25 Oct 2018 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re excited to announce the full integration of Cloudflare Spectrum with Load Balancing. Combining Spectrum with Load Balancing enables traffic management of TCP connections utilising the same battle tested Load Balancer our customers already use for billions of HTTP requests every day. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We’re excited to announce the full integration of Cloudflare Spectrum with Load Balancing. Combining Spectrum with Load Balancing enables traffic management of TCP connections utilising the same battle tested Load Balancer our customers already use for billions of HTTP requests every day.</p><p>Customers can configure load balancers with TCP health checks, failover, and steering policies to dictate where traffic should flow. This is live in the Cloudflare dashboard and API — give it a shot!</p>
    <div>
      <h3>TCP Health Checks</h3>
      <a href="#tcp-health-checks">
        
      </a>
    </div>
    <p>You can now configure <a href="https://www.cloudflare.com/load-balancing/">Cloudflare’s Load Balancer</a> health checks to probe any TCP port for an accepted connection. This is in addition to the existing HTTP and HTTPS options.</p><p>Health checks are an optional feature within Cloudflare’s Load Balancing product. Without health checks, the Cloudflare Load Balancer will distribute traffic to all origins in the first pool. While this is in itself useful, adding a health check to a Load Balancer provides additional functionality.</p><p>With a health check configured for a pool in a Load Balancer, Cloudflare will automatically distribute traffic within a pool to any origins that are marked up by the health check. Unhealthy origins will be dropped automatically. This allows for intelligent failover both within a pool and amongst pools. Health checks can be configured from multiple regions (and even all of Cloudflare’s PoPs as an Enterprise customer) to detect local and global connectivity issues from your origins.</p><p>In this example, we will configure a TCP health check for an application running on port 2408 with a refresh rate of every 30 seconds via either the dashboard or our API.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wwdhg0k3y6QUdo9oSRic1/23425df3294af54b150d95f5ec05e1fc/Load-Balancing-Manage-Monitors.png" />
            
            </figure><p>Configuring a TCP health check</p>
            <pre><code># POST accounts/:account_identifier/load_balancers/monitors

{
  "description": "Spectrum Health Check",
  "type": "tcp",
  "port": 2048,
  "interval": 30,
  "retries": 2,
  "timeout": 5,
  "method": "connection_established",
}</code></pre>
            
    <div>
      <h3>Weights</h3>
      <a href="#weights">
        
      </a>
    </div>
    <p>Origin weights are beneficial should you have origins that are not of equal capacity or if you want to unequally split traffic for any other reason.</p><p>Weights configured within a load balancer pool will be honored with transport load balancing through Spectrum. If configured, Cloudflare will distribute traffic amongst the available origins within a pool according to the relative weights assigned to each origin.</p><p>For further information on weighted steering, see the <a href="https://support.cloudflare.com/hc/en-us/articles/360001372131-Load-Balancing-Configurable-Origin-Weights">knowledge base article</a>.</p>
    <div>
      <h3>Steering Modes</h3>
      <a href="#steering-modes">
        
      </a>
    </div>
    <p>All steering modes are available for transport load balancing through Spectrum: You can choose standard failover, dynamic steering, or geo steering:</p><ul><li><p><b>Failover</b>In this mode, the Cloudflare Load Balancer will <a href="https://www.cloudflare.com/learning/performance/what-is-server-failover/">fail over</a> amongst pools listed in a given load balancer configuration as they are marked down by health checks. If all pools are marked down, Cloudflare will send traffic to the fallback pool. The fallback pool is the last pool in the list in the dashboard or specifically nominated via a parameter in the API. If no health checks are configured, Cloudflare will send to the primary pool exclusively.</p></li><li><p><b>Dynamic Steering</b><a href="/i-wanna-go-fast-load-balancing-dynamic-steering/">Dynamic steering</a> was recently introduced by Cloudflare as a way of directing traffic to the fastest pool for a given user. In this mode, the Cloudflare load balancer will select the fastest pool for the given Cloudflare Region or PoP (ENT only) through health check data. If there is no health check data for a given colo or region, the load balancer will select a pool in failover order. It is important to note that with TCP health checks, latency calculated may not be representative of true latency to origin if you are terminating TCP at a cloud provider edge location.</p></li><li><p><b>Geo Steering</b><a href="https://support.cloudflare.com/hc/en-us/articles/115000540888-Load-Balancing-Geographic-Regions">Geo Steering</a> allows you to specify pools for a given Region or PoP (ENT only). In this configuration, Cloudflare will direct traffic from specified Cloudflare locations to configured pools. You may configure multiple pools, and the load balancer will use them in failover order. If this steering mode is selected and there is no configuration for a region or pool, the load balancer will use the default failover order.</p></li></ul>
    <div>
      <h3>Build Scalable TCP Applications</h3>
      <a href="#build-scalable-tcp-applications">
        
      </a>
    </div>
    <p>Once your load balancer is configured, it’s available for use as an origin with your Spectrum application:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dMaJShOEXdDpK5pu4sbLm/7fe4496c05d50895bd3c48e4896e26c4/Load-balancing-Edit-Application.png" />
            
            </figure><p>Configuring a Spectrum application with Load Balancing</p><p>Combining Spectrum’s ability to proxy TCP applications, our Load Balancer’s full feature set, and Cloudflare’s global network allows our customers to build performant, reliable, and secure network applications with minimal effort.</p><p>We’ve seen customers combine Spectrum and Load Balancing to build scalable gaming platforms, make their live streaming infrastructure more robust, push the envelope with interesting cryptocurrency use cases, and lots more. What will you build?</p><p>Spectrum with Load Balancing is available to all current Spectrum and Load Balancing users. Want access to Spectrum? <a href="https://cloudflare.com/products/cloudflare-spectrum/">Get in touch with our team</a>. Spectrum is available for applications on the Enterprise plan.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Spectrum]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">4tdZv1JvUSLlr67ji4kXC1</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
            <dc:creator>Sergi Isasi</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bandwidth Alliance: powered by smart routing on Cloudflare’s network]]></title>
            <link>https://blog.cloudflare.com/smart-routing-for-bandwidth-alliance/</link>
            <pubDate>Wed, 26 Sep 2018 12:01:00 GMT</pubDate>
            <description><![CDATA[ Today, we’re excited to announce the launch of the Bandwidth Alliance, a group of cloud providers that have agreed to reduce data transfer fees for mutual customers. ]]></description>
            <content:encoded><![CDATA[ <p>Today, we’re excited to announce the launch of the Bandwidth Alliance, a group of cloud providers that have agreed to reduce data transfer fees for mutual customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dCYmEhXXpIdFgxGZSRgkT/25a256b68d61dc5bdccb3aac2a15df79/image-1.png" />
            
            </figure><p>Three things were required to make the Bandwidth Alliance a reality:</p><ol><li><p><b>An ecosystem of like-minded companies</b> who want to provide reduced data transfer fees to their customers.</p></li><li><p><b>A large global and well-connected network</b> (Cloudflare has 150+ points of presence around the world and multiple peered and paid links at each location). Our network is connected to thousands of partners through transit providers, Internet exchanges, peering interconnects, and private network interconnects. Having a large network footprint allows us to meet our partners where their infrastructure is and exchange traffic with them over low-cost or free connections, instead of expensive paid transit.</p></li><li><p><b>Argo, our sophisticated traffic routing engine.</b> Argo allows us to make decisions on how to carry traffic across our network in ways that optimize for a number of factors: latency, throughput, jitter, or in the case of the Bandwidth Alliance, cost to our partners to exchange traffic. This routing engine is the technical underpinning of the Bandwidth Alliance.</p></li></ol><br />


<br /><p>Typically, as traffic moves across the Internet, packets are exchanged between multiple networks as they move from origin to destination. The specific path taken is determined by routers along the way using <a href="https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13753-25.html">Border Gateway Protocol</a> (BGP). BGP allows routers to learn which networks have connectivity to which other networks and to pick optimal paths across those. Notably, “optimal path” in this case refers to the path with the fewest number of network hops to the destination, not the best performance or lowest monetary cost for any party involved.</p><p>Cloudflare is directly connected and peered with thousands of different networks, including all of our Bandwidth Alliance partners. Moving traffic over one of these links is very fast and very cheap, especially compared to moving the same traffic over public transit. However, because BGP and standard path discovery techniques are not built to directly understand either real world performance or monetary cost, moving traffic from Cloudflare to our Bandwidth Alliance partners and back may not actually use these fast, cheap links between us and them.</p>
    <div>
      <h3>Argo: Cloudflare’s Intelligent Network</h3>
      <a href="#argo-cloudflares-intelligent-network">
        
      </a>
    </div>
    <p>This is where Argo comes in. We can plug different routing functions into Argo, optimizing for connection parameters other than the default heuristics BGP users.</p><p>Argo consists of two logical components:</p><ol><li><p>A control plane, that mines our network performance data and understands our network topology in order to generate good routes across the globe.</p></li><li><p>A data plane, that takes that routing information and makes sure data flowing across our network actually takes those paths.</p></li></ol><p>Argo’s control plane, in its standard configuration, optimizes connections for minimum latency. It does this by examining subnet-to-subnet timing data collected from requests that pass between those subnets, determining which paths are fastest. The list of subnets examined is determined by looking at global routing tables; each entry in the table is a logically and physically grouped set of hosts. Argo then determines where on our network traffic destined for a given subnet should exit our network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Rck3hWNdJfLNyX248hX0b/98bc863ef971771ae73c4ab4fe7aadca/IPFS--not-gateway-distributed-network_4x.png" />
            
            </figure><p><a href="https://www.cloudflare.com/products/argo-smart-routing/">Full Argo</a> is a paid service that Cloudflare customers can subscribe to. For the customers hosted on providers that are part of the Bandwidth Alliance, Cloudflare automatically enables a limited, routing-only version of Argo at no additional charge. While this does not get all the benefits of Argo's full performance feature set, it does ensure that traffic is routed to the Cloudflare location nearest where our customer is hosted so traffic can pass across a Private Network Interface (PNI) and therefore enjoy substantially lowered bandwidth costs. Customers who choose to subscribe to full-featured Argo get additional performance benefits from optimized route selection, data compression, tiered caching, and protocol optimization.</p><p>The end result of all this: low latency, highly available transit across our network from your host to your user, and all at little to no cost to Cloudflare or your cloud provider — and, in turn, a substantially reduced cost to you. We expect that as the Bandwidth Alliance comes online, Cloudflare customers could save more than $50 million per year in cloud bandwidth fees.</p><p>Our commitment through the Bandwidth Alliance is to pass those cost savings on to you, our mutual customers. Today, we’re excited to put the benefits in your hands: smaller bills and better performance.</p><p><a href="/subscribe/"><b>Subscribe to the blog</b></a><b> for daily updates on all our Birthday Week announcements.</b></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Bandwidth Costs]]></category>
            <guid isPermaLink="false">6DWwPFbKXvbQjAkzcBfBfQ</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Data-driven development with Cloudflare Mobile SDK]]></title>
            <link>https://blog.cloudflare.com/mobile-sdk-metrics/</link>
            <pubDate>Thu, 22 Mar 2018 13:00:00 GMT</pubDate>
            <description><![CDATA[ How much engagement are you losing in your app to network errors? Chances are, you don't know.  We didn't either, until we built a free tool that helps Android and iOS developers visualize and understand their mobile app's network utilization.

 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>If your app loads critical resources over the network, it's relying on your user's mobile network connection to deliver an engaging experience. Network errors occur in 3 to 12% of app sessions depending on infrastructure reliability and user geography.</p><p>How much engagement are you losing in your app to network errors? Chances are, you don't know.</p><p>We didn't either, until we built a free tool that helps Android and iOS developers visualize and understand their mobile app's network utilization.</p>
    <div>
      <h3>Introducing Cloudflare Mobile SDK</h3>
      <a href="#introducing-cloudflare-mobile-sdk">
        
      </a>
    </div>
    <p>Our SDK helps you identify slowdowns caused by balky or too frequent network calls, so you can focus your development effort on optimizing the lowest-hanging fruit.</p><p>Modern app developers already heavily instrument their apps to identify UX impacting events: they measure and collect launch time, session length, crash rates, conversion events, and lots more, using a multitude of different metrics packages and services.</p><p>Web developers look at similar data. They also pay tons of attention to their resource waterfall, mapping their critical rendering path, and understanding which resource loads are synchronous, which are not, and which block rendering. JavaScript even exposes an API to collect waterfalls in the browser programmatically.</p><p>It's time to bring the same visibility to your app's network waterfall.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1UUcRQhjNeYPtMD0sv2BXm/d1bffd067513770e50831ccce18733ca/out.gif" />
            
            </figure><p>Using Cloudflare Mobile SDK, you can identify top N requests, slow requests, and requests most likely to fail. You can also inspect all the third party calls your app is making through included libraries. Always suspected that ad network you're calling out to is crippling your app's performance? Now you know.</p><p>Our aim is to make this data as useful as possible. We know you're already looking at engagement data in tools like Mixpanel, Amplitude, and Heap. To this end, we're making it as easy as possible to correlate network experience data with the event and engagement data you're already tracking.</p><p><b>All of this is free as in beer, with no cap on active users or metrics tracked.</b> Collecting metrics does not require you use Cloudflare as part of your infrastructure stack, and adds minimal weight to your app APK or IPA. Integration is as simple as including our library, adding one line to your AppDelegate or Gradle config, and building.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UGUoWjCFha2DRjFGzTOz5/8b6ebbeb6c75c52a55810cc353e47191/sdk-installation-gif.gif" />
            
            </figure><p>Privacy is, and was, top of mind as we built this. Cloudflare Mobile SDK does not collect any persistent identifiers (UDID, IDFA, etc.), and we will never sell the data we collect to any third party.</p><p>Interested in giving this a shot?<b>Register for an SDK key here:</b> <a href="https://mobilesdk.cloudflare.com/v2s/signup">mobilesdk.cloudflare.com/v2s/signup</a><b>And get docs here:</b> <a href="https://developers.cloudflare.com/mobile-sdk/overview/">developers.cloudflare.com/mobile-sdk/overview</a></p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Mobile SDK]]></category>
            <category><![CDATA[Mobile]]></category>
            <category><![CDATA[Analytics]]></category>
            <guid isPermaLink="false">3JZwibdSUf9LTHiYPaOWfb</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Argo — A faster, more reliable, more secure Internet for everyone]]></title>
            <link>https://blog.cloudflare.com/argo/</link>
            <pubDate>Thu, 18 May 2017 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Internet is inherently unreliable, a collection of networks connected to each other with fiber optics, copper, microwaves and trust. ]]></description>
            <content:encoded><![CDATA[ <p>The Internet is inherently unreliable, a collection of networks connected to each other with fiber optics, copper, microwaves and trust. It’s a magical thing, but things on the Internet break all the time; cables get cut, bogus routes get advertised, routers crash. Most of the time, these failures are noticed but inexplicable to the average user — ”The Internet is slow today!” — frustrating user experiences as people go about their lives on the Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XfrNmoyuuVQ12stjKU1sO/a2601cdb4d5c874c634297f966008f1e/Argo_horizontal.png" />
            
            </figure><p>Today, to fix all of this, Cloudflare is launching <a href="https://cloudflare.com/argo">Argo</a>, a “virtual backbone” for the modern Internet. Argo analyzes and optimizes routing decisions across the global Internet in real-time. Think Waze, the automobile route optimization app, but for Internet traffic.</p><p>Just as Waze can tell you which route to take when driving by monitoring which roads are congested or blocked, Argo can route connections across the Internet efficiently by avoiding packet loss, congestion, and outages.</p><p>Cloudflare’s Argo is able to deliver content across our network with dramatically reduced latency, increased reliability, heightened encryption, and reduced cost vs. an equivalent path across the open Internet. The results are impressive: <b>an average 35% decrease in latency, a 27% decrease in connection errors, and a 60% decrease in cache misses</b>. Websites, APIs, and applications using Argo have seen bandwidth bills fall by more than half and speed improvements end users can feel.</p><p>Argo is a central nervous system for the Internet, processing information from every request we see to determine which routes are fast, which are slow, and what the optimum path from visitor to content is at that given moment. Through Cloudflare’s <a href="https://www.cloudflare.com/network/">115 PoPs</a> and 6 million domains, we see every ISP and every user of the Internet pass through our network. The intelligence from this gives us a billion eyes feeding information about brownouts, faults, and packet loss globally.</p><p>Today, Argo includes two core features: Smart Routing and Tiered Cache. All customers can enable Argo today in the <a href="https://www.cloudflare.com/a/traffic">Traffic app</a> in the dashboard. Argo is priced at \$5/domain monthly, plus \$0.10 per GB of transfer from Cloudflare to your visitors.</p>
    <div>
      <h3>Argo Smart Routing</h3>
      <a href="#argo-smart-routing">
        
      </a>
    </div>
    <p>Networks on the Internet rely on legacy technologies like <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol">BGP</a> to propagate and calculate routes from network to network, ultimately getting you from laptop-on-couch to video-on-YouTube. BGP has been around for decades, and was not designed for a world with malicious or incompetent actors lurking at every network hop.</p><p>In one comical example from 2008, a Pakistani ISP turned a botched censorship order into a <a href="http://www.nytimes.com/2008/02/26/technology/26tube.html">global YouTube outage</a>, bringing the fragility of core Internet routing algorithms into the public eye. In the same situation, Argo Smart Routing would detect which transit providers had valid routes to YouTube and which did not, keeping end user experience fast, reliable, and secure.</p><p><a href="https://en.wikipedia.org/wiki/Metcalfe%27s_law">Metcalfe’s Law</a> states that the value of a network is defined by the square of the number of nodes that make up the network. The existing Internet is incredibly valuable because of the number and diversity of nodes connected to the network. Unfortunately, this makes it difficult to pick up and start over; no Internet started from scratch, with sounder routing and traffic management, would come close to delivering the value provided by the current incarnation without a similar network footprint.</p><p>Because of our physical and virtual presence around the world, Cloudflare is uniquely positioned to rebuild the core of the Internet. Every customer we bring on increases the size of our network and the value of that network to each of our customers. Argo is Metcalfe’s Law brought to life.</p><p>Argo Smart Routing uses latency and packet loss data collected from each request that traverses our network to pick optimal paths across the Internet. Using this latency data, we’re able to determine which of our transit providers are performing best between any two points on the planet. Cloudflare now sees about 10% of all HTTP/HTTPS requests on the Internet. With Argo, each of those requests is providing the insight necessary to speed up all of its peers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ni36rsDqDZXGjvJGN4mLY/2dfcfed39920719b2b5b2c50d8b5d8b0/916142_ddc2fd0140.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/jurvetson/916142/in/photolist-5Gky-SWsDvP-hBvqn-fv6F5e-rUNDSQ-5cdENs-9W2TUo-4ziFqE-5CttRH-5pSrgB-8tbzvW-63k6cB-qoTfsN-qrQMkd-bjZX2J-9hCGJC-8QM8B1-2H7uc6-aygB5n-8B47Zf-4WF7HT-sMeQW-sMeNR-yP5Hfz-6DDNqT-sMeN8-aF9ufE-6UvUtt-7Tf66X-5CTbb4-2H7uw6-5ny4q-5B6pL4-sMeRJ-dMNYzx-35Hks2-d27sow-3xPib-6sgGGQ-5Rp8Fq-6gZLGF-bRZ4Wx-eVQmrb-9hzzzV-9hzsBz-SQ2H3n-6gZLyV-mJFXRy-9hCxZj-bcEVA">image</a> by <a href="https://www.flickr.com/photos/jurvetson/">Steve Jurvetson</a></p><p>Enabling Argo (and Smart Routing with it) results in breathtaking reductions in latency. As an example, <a href="https://www.okcupid.com/"><b>OKCupid</b></a><b> enabled Argo and immediately saw a 36% decrease in request latency</b>, as measured by TTFB (Time To First Byte). Without Argo, requests back to the origin from a Cloudflare PoP traverse the public Internet, subject to vagaries of routers, cables, and computers they will touch on their journey. With Argo, requests back to the origin are tunneled over our secure overlay network, on a path to the origin we've learned the performance of from all the requests that have traversed before it.</p><p>Transit over the public Internet is like driving with paper maps; it usually works, but using a modern navigation system that takes current traffic conditions into account will almost always be faster.</p><p>Routing over intelligently determined paths also results in significant reliability gains. Argo picks the fastest, most reliable route to the origin, which means routing around flapping links and routers that refuse to do their job. In a real-world illustration of these reliability gains, <b>OKCupid saw a 42% drop in the number of connection timeouts</b> on their site with Argo enabled.</p><p>It’s not just OKCupid that’s happy with Argo. 50,000 customers, large and small, have been beta testing Argo over the last 12 months. On average, these Argo Smart Routing beta customers saw a 35% decrease in latency and a 27% decrease in connection timeouts.</p>
    <div>
      <h3>Argo Tiered Cache</h3>
      <a href="#argo-tiered-cache">
        
      </a>
    </div>
    <p>Argo Tiered Cache uses the size of our network to reduce requests to customer origins by dramatically increasing cache hit ratios. By having 115 PoPs around the world, Cloudflare caches content very close to end users, but if a piece of content is not in cache, the Cloudflare edge PoP must contact the origin server to receive the cacheable content. This can be slow and places load on an origin server compared to serving directly from cache.</p><p>Argo Tiered Cache lowers origin load, increases cache hit ratios, and improves end user experience by first asking other Cloudflare PoPs if they have the requested content when a cache miss occurs. This results in improved performance for visitors, because distances and links traversed between Cloudflare PoPs are generally shorter and faster than the links between PoPs and origins. It also reduces load on origins, making web properties more economical to operate. Customers enabling Argo can expect to see a <b>60% reduction in their cache miss rate</b> as compared to Cloudflare’s traditional CDN service.</p><p>Argo Tiered Cache also concentrates connections to origin servers so they come from a small number of PoPs rather than the full set of 115 PoPs. This results in fewer open connections using server resources. In our testing, we've found many customers save more on their cloud hosting bills than Argo costs, because of reduced bandwidth usage and fewer requests to the origin. This makes the service a “no brainer” to enable.</p>
    <div>
      <h3>Additional Benefits</h3>
      <a href="#additional-benefits">
        
      </a>
    </div>
    <p>In addition to performance and reliability gains, Argo also delivers a more secure online experience. All traffic between Cloudflare data centers is protected by mutually authenticated TLS, ensuring any traffic traversing the Argo backbone is protected from interception, tampering, and eavesdropping.</p><p>With Argo, we’ve rebuilt things at the very core of the Internet, the algorithms that figure out where traffic should flow and how. We’ve done all this without any disruption to how the Internet works or <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">how applications behave</a>.</p><p>Cloudflare has built a suite of products to address lots of pains on the Internet. Argo is our newest offering.</p><p>Go ahead and enable it — you’ll find it in the <a href="https://www.cloudflare.com/a/traffic">Traffic tab</a> in your dashboard.</p><p>PS. Interested in working on Argo? <a href="https://www.cloudflare.com/careers/">Drop us a line!</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hNDPxqURG6CNrMyZmDs1w/f7942f9dff0f8119310287c28e721a6f/Argo-infographic-1.jpg" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Speed]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Argo Smart Routing]]></category>
            <guid isPermaLink="false">2YdzvdlJkxHFF5TAkGPOy2</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
    </channel>
</rss>