
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 14 Apr 2026 10:04:25 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Verify Apple devices with no installed software]]></title>
            <link>https://blog.cloudflare.com/private-attestation-token-device-posture/</link>
            <pubDate>Wed, 22 Jun 2022 13:38:09 GMT</pubDate>
            <description><![CDATA[ Security teams that rely on Cloudflare Access can verify a user’s Apple device before they access a sensitive application — no additional software required ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55s423iV6BrsVfI9TBlvCB/6ae9c29261fa9c929d422646d43429e6/image2-33.png" />
            
            </figure><p>One of the foundations of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> is determining if a user’s device is “healthy” — that it has its operating system up-to-date with the latest security patches, that it’s not jailbroken, that it doesn’t have malware installed, and so on. Traditionally, determining this has required installing software directly onto a user’s device.</p><p>Earlier this month, Cloudflare participated in the announcement of <a href="/eliminating-captchas-on-iphones-and-macs-using-new-standard/">an open source standard called a Private Access Token</a>. Device manufacturers who support the standard can now supply a Private Access Token with any request made by one of their devices. On the IT Administration side, Private Access Tokens means that security teams can verify a user’s device before they access a sensitive application — without the need to install any software or collect a user’s device data.</p><p>At WWDC 2022, Apple <a href="https://developer.apple.com/videos/play/wwdc2022/10077/">announced</a> Private Access Tokens. Today, we’re announcing that Cloudflare Access will support verifying a Private Access Token. This means that security teams that rely on Cloudflare Access can verify a user’s Apple device before they access a sensitive application — no additional software required.</p>
    <div>
      <h3>Determining a “healthy” device</h3>
      <a href="#determining-a-healthy-device">
        
      </a>
    </div>
    <p>There are many solutions on the market that help security teams determine if a device is “healthy” and corporately managed. What the majority of these solutions have in common is that they require software to be installed directly on the user’s machine. This comes with challenges associated with client software including compatibility issues, version management, and end user support. Many companies have dedicated Mobile Device Management (MDM) tools to manage the software installed on employee machines.</p><p>MDM is a proven model, but it is also a challenge to manage — taking a dedicated team in many cases. What’s more, installing client or MDM software is not always possible for contractors, vendors or employees using personal machines. Security teams have to resort to VDI or VPN solutions for external users to securely access corporate applications.</p>
    <div>
      <h3>How Private Access Tokens verify a device</h3>
      <a href="#how-private-access-tokens-verify-a-device">
        
      </a>
    </div>
    <p>Private Access Tokens leverage the <a href="https://www.ietf.org/archive/id/draft-ietf-privacypass-auth-scheme-01.html">Privacy Pass Protocol</a>, which Cloudflare authored with major device manufacturers, to attest to a device’s health and integrity.</p><p>In order for Private Access Tokens to work, four parties agree to work in concert with a common framework to generate and exchange anonymous, unforgeable tokens. Without all four parties in the process, PATs won’t work.</p><ol><li><p>An <b>Origin</b>. A website, application, or API that receives requests from a client. When a website receives a request to their origin, the origin must know to look for and request a token from the client making the request. For Cloudflare customers, Cloudflare acts as the origin (on behalf of customers) and handles the requesting and processing of tokens.</p></li><li><p>A <b>Client</b>. Whatever tool the visitor is using to attempt to access the Origin. This will usually be a web browser or mobile application. In our example, let’s say the client is a mobile Safari Browser.</p></li><li><p>An <b>Attester</b>. The Attester is who the client asks to prove something (i.e. that a mobile device has a valid IMEI) before a token can be issued. In our example below, the Attester is Apple, the device vendor.</p></li><li><p>An <b>Issuer</b>. The issuer is the only one in the process that actually generates, or issues, a token. The Attester makes an API call to whatever Issuer the Origin has chosen to trust, instructing the Issuer to produce a token. In our case, Cloudflare will also be the Issuer.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uBg0PUBNIee9hBNdHIYy0/c9b57900b554b3fbf03082c93415bbf1/image1-33.png" />
            
            </figure><p>We are then able to rely on the attestation from the device manufacturer as a form of validation that a device is in a “healthy” enough state to be allowed access to a sensitive application.</p>
    <div>
      <h3>Checking device health without client software</h3>
      <a href="#checking-device-health-without-client-software">
        
      </a>
    </div>
    <p>Private Access Tokens do not require any additional software to be installed on the user’s device. This is because the “attestation” of device health and validity is attested directly by the device operating system’s manufacturer — in this case, Apple.</p><p>This means that a security team can use Cloudflare Access and Private Access Tokens to verify if a user is accessing from a “healthy” Apple device before allowing access to a sensitive corporate application. Some checks as part of the attestation include:</p><ul><li><p>Is the device on the latest OS version?</p></li><li><p>Is the device jailbroken?</p></li><li><p>Is the window attempting to log in, in focus?</p></li><li><p>And much more.</p></li></ul><p>Over time, we are working with other device manufacturers to expand device support and what is verified as part of the device attestation process. The attributes that are attested will also continue to expand over time, which means the device verification in Access will only strengthen.</p><p>In the next few months, we will move Private Attestation Support in Cloudflare Access to a closed beta. The first version will work for iOS devices and support will expand from there. The only change required will be an updated Access policy, no software will need to be installed. If you would like to be part of the beta program, <a href="http://www.cloudflare.com/zero-trust/lp/private-attestation-tokens-access-waitlist">sign up here today</a>!</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One Week]]></category>
            <category><![CDATA[Device Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Apple]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">gjo7IRbbENLbGuze5b33M</guid>
            <dc:creator>Kenny Johnson</dc:creator>
        </item>
        <item>
            <title><![CDATA[iCloud Private Relay: information for Cloudflare customers]]></title>
            <link>https://blog.cloudflare.com/icloud-private-relay/</link>
            <pubDate>Wed, 02 Mar 2022 13:59:09 GMT</pubDate>
            <description><![CDATA[ iCloud Private Relay is a new Internet privacy service from Apple that allows users to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7avcuELKE6yv7dkTIUwrPV/c0e745d98211239172c040ea01b5a5f5/image3.png" />
            
            </figure><p>iCloud Private Relay is a new Internet privacy service from Apple that allows users with iOS 15, iPadOS 15, or macOS Monterey on their devices and an iCloud+ subscription, to connect to the Internet and browse with Safari in a more secure and private way. Cloudflare is proud to work with Apple to operate portions of Private Relay infrastructure.</p><p>In this post, we’ll explain how website operators can ensure the best possible experience for end users using iCloud Private Relay. Additional material is available from Apple, including “<a href="https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud">Set up iCloud Private Relay on all your devices</a>”, and <a href="https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/">“Prepare Your Network or Web Server for iCloud Private Relay”</a> which covers network operator scenarios in detail.</p>
    <div>
      <h2>How browsing works using iCloud Private Relay</h2>
      <a href="#how-browsing-works-using-icloud-private-relay">
        
      </a>
    </div>
    <p>The design of the iCloud Private Relay system ensures that no single party handling user data has complete information on both who the user is and what they are trying to access.</p><p>To do this, Private Relay uses modern encryption and transport mechanisms to relay traffic from user devices through Apple and partner infrastructure before sending traffic to the destination website.</p><p>Here’s a diagram depicting what connection metadata is available to who when <b><i>not</i></b> using Private Relay to browse the Internet:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3kTnsNE4HK74q8j50u276c/0418f9debaea6ad75f2122ac9b6681cf/image2.png" />
            
            </figure><p>Let’s look at what happens when we <b>add</b> Private Relay to the mix:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7FIwHsWOPoSYOFIXPsrFlc/9a58743abf2b8255c5e4b4c7492dd364/image1.png" />
            
            </figure><p>By adding <i>two</i> "relays" (labeled “Ingress Proxy” and “Egress Proxy” above), connection metadata is split:</p><ul><li><p>The user’s original IP address is visible to the access network (e.g. the coffee shop you’re sitting in, or your home ISP) and the first relay (operated by Apple), but the server or website name is encrypted and not visible to either.</p><p>The first relay hands encrypted data to a second relay (e.g. Cloudflare), but is unable to see “inside” the traffic to Cloudflare.</p></li><li><p>Cloudflare-operated relays know only that it is receiving traffic from a Private Relay user, but not specifically who or their client IP address. Cloudflare relays then forward traffic on to the destination server.</p></li></ul><p>Splitting connections in this way prevents websites from seeing user IP addresses and minimizes how much information entities “on path” can collect on user behavior.</p><p>Much more extensive information on how Private Relay works is available from Apple, including in the whitepaper “<a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">iCloud Private Relay Overview</a>” (pdf).</p>
    <div>
      <h2>Cloudflare’s role as a ‘second relay’</h2>
      <a href="#cloudflares-role-as-a-second-relay">
        
      </a>
    </div>
    <p>As mentioned above, Cloudflare functions as a second relay in the iCloud Private Relay system. We’re well suited to the task — Cloudflare operates one of the largest, fastest networks in the world. Our infrastructure makes sure traffic reaches every network in the world quickly and reliably, no matter where in the world a user is connecting from.</p><p>We’re also adept at building and working with modern encryption and transport protocols, including <a href="/rfc-8446-aka-tls-1-3/">TLS 1.3</a> and <a href="/the-road-to-quic/">QUIC</a>. QUIC, and closely related <a href="https://datatracker.ietf.org/wg/masque/about/">MASQUE</a>, are the technologies that enable Private Relay to efficiently move data between multiple relay hops without incurring performance penalties.</p><p>The same building blocks that power Cloudflare products were used to build support for Private Relay: our <a href="https://www.cloudflare.com/network/">network</a>, 1.1.1.1, <a href="https://workers.cloudflare.com/">Cloudflare Workers</a>, and software like <a href="https://github.com/cloudflare/quiche">quiche</a>, our <a href="/enjoy-a-slice-of-quic-and-rust/">open-source</a> QUIC (and now MASQUE) protocol handling library, which now includes proxy support.</p>
    <div>
      <h2>I’m a website operator. What do I need to do to properly handle iCloud Private Relay traffic?</h2>
      <a href="#im-a-website-operator-what-do-i-need-to-do-to-properly-handle-icloud-private-relay-traffic">
        
      </a>
    </div>
    <p>We’ve gone out of our way to ensure the use of iCloud Private Relay does not have any noticeable impact on your websites, APIs, and other content you serve on the web.</p>
    <div>
      <h3>Ensuring geolocation accuracy</h3>
      <a href="#ensuring-geolocation-accuracy">
        
      </a>
    </div>
    <p>IP addresses are often used by website operators to "geolocate" users, with user locations being used to show content specific to certain locations (e.g. search results) or to otherwise customize user experiences. Private Relay is designed to preserve IP address to geolocation mapping accuracy, even while preventing tracking and fingerprinting.</p><p>Preserving the ability to derive rough user location ensures that users with Private Relay enabled are able to:</p><ol><li><p>See place search and other locally relevant content when they interact with geography-specific content without precise location sharing enabled.</p></li><li><p>Consume content subject to licensing restrictions limiting which regions have access to it (e.g. live sports broadcasts and similar rights-restricted content).</p></li></ol><p>One of the key “acceptance tests” we think about when thinking about geolocating users is the “local pizza test”: with location services disabled, are the results returned for the search term “pizza near me” geographically relevant? Because of the geography preserving and IP address management systems we operate, they are!</p><p>At a high-level, here’s how it works:</p><ul><li><p>Apple relays geolocate user IP addresses and translate them into a “<a href="https://en.wikipedia.org/wiki/Geohash">geohash</a>”. Geohashes are compact representations of latitude and longitude. The system includes protections to ensure geohashes cannot be spoofed by clients, and operates with reduced precision to ensure user privacy is maintained. Apple relays do not send user IP addresses onward.</p></li><li><p>Cloudflare relays maintain a pool of IP addresses for exclusive use by Private Relay. These IP addresses have been registered with geolocation database providers to correspond to specific cities around the world. When a Private Relay user connects and presents the previously determined geohash, the closest matching IP address is selected.</p></li><li><p>Servers see an IP address that corresponds to the original user IP address’s location, without obtaining information that may be used to identify the specific user.</p></li></ul><p>In most parts of the world, Private Relay supports geolocation to the nearest city by default. If users prefer to be located at more coarse location granularity, the option to locate based on country and timezone is available in Private Relay settings.</p><p>If your website relies on geolocation of client IP addresses to power or modify user experiences, <b>please ensure your geolocation database is kept up to date</b>. Apple and Cloudflare work directly with every major IP to geolocation provider to ensure they have an accurate mapping of Private Relay egress IP addresses (which present to your server as the client IP address) to geography. These mappings may change from time to time. Using the most up-to-date version of your provider’s database will ensure the most accurate geolocation results for all users, including those using Private Relay.</p><p>In addition to making sure your geolocation databases are up-to-date, even greater location accuracy and precision can be obtained by ensuring your origin is reachable via IPv6. Private Relay egress nodes prefer IPv6 whenever AAAA DNS records are available, and use IPv6 egress IP addresses that are geolocated with greater precision than their IPv4 equivalents. This means you can geolocate users to more specific locations (without compromising user privacy) and deliver more relevant content to users as a result.</p><p><b>If you’re a website operator using Cloudflare to protect and accelerate your site, no action is needed from you</b>. Our geolocation feeds used to enrich client requests with location metadata are kept up-to-date and include the information needed to geolocate users using iCloud Private Relay.</p>
    <div>
      <h3>Delivering high performance user experiences</h3>
      <a href="#delivering-high-performance-user-experiences">
        
      </a>
    </div>
    <p>One of the more counterintuitive things about performance on the Internet is that adding intermediate network “hops” between a user and a server can often <b><i>speed up</i></b> overall network performance, rather than slow it down, if those intermediate hops are well-connected and tuned for speed.</p><p>The networks that power iCloud Private Relay are exceptionally well-connected to other networks around the world, and we spend <a href="/tag/network-performance-update/">considerable effort</a> squeezing every last ounce of performance out of our systems every day. We even have automated systems, like <a href="/argo/">Argo Smart Routing</a>, that take data on how the Internet is performing and find the best paths across it to ensure consistent performance even in the face of Internet congestion and other “weather”.</p><p>Using Private Relay to reach websites instead of going directly to the origin server can result in significant, <b>measured decreases in page load time for clients using Private Relay vs those that are not</b>. That’s pretty neat: increased privacy does <b>not</b> come at the price of reduced page load and render performance when using Private Relay.</p>
    <div>
      <h3>Limiting reliance on IP addresses in fraud and bot management systems</h3>
      <a href="#limiting-reliance-on-ip-addresses-in-fraud-and-bot-management-systems">
        
      </a>
    </div>
    <p>To ensure that iCloud Private Relay users have good experiences interacting with your website, you should ensure that any systems that rely on IP address as a signal or way of indexing users properly accommodate many users originating from one or a handful of addresses.</p><p>Private Relay’s concentration of users behind a given IP address is similar to commonly deployed enterprise web gateways or carrier grade network address translation (CG-NAT) systems.</p><p>As explained in Apple <a href="https://www.apple.com/privacy/docs/iCloud_Private_Relay_Overview_Dec2021.PDF">technical documentation</a>, “Private Relay is designed to ensure only valid Apple devices and accounts in good standing are allowed to use the service. Websites that use IP addresses to enforce fraud prevention and anti-abuse measures can trust that connections through Private Relay have been validated at the account and device level by Apple.” Because of these advanced device and user authorization steps, you might consider allowlisting Private Relay IP addresses explicitly. Should you wish to do so, Private Relay’s egress IP addresses are available in <a href="https://mask-api.icloud.com/egress-ip-ranges.csv">CSV form here</a>.</p><p>If you as a server operator are interested in managing traffic from users using systems like iCloud Private Relay or similar NAT infrastructure, consider constructing rules using user level identifiers like cookies, and other metadata present including geography.</p><p>For Cloudflare customers, our rate limiting and bot management capabilities are well suited to handle traffic from systems like Private Relay. Cloudflare <a href="/multi-user-ip-address-detection/">automatically detects</a> when IP addresses are likely to be used by multiple users, tuning our <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> and other security heuristics accordingly. Additionally, our WAF <a href="https://developers.cloudflare.com/waf/custom-rules/rate-limiting/parameters/">includes functionality</a> specifically designed to manage traffic originating from shared IP addresses.</p>
    <div>
      <h3>Understanding traffic flows</h3>
      <a href="#understanding-traffic-flows">
        
      </a>
    </div>
    <p>As discussed above, IP addresses used by iCloud Private Relay are specific to the service. However, network and server operators (including Cloudflare customers) studying their traffic and logs may notice large amounts of user traffic arriving from Cloudflare’s network, AS13335. These traffic flows originating from AS13335 include forward proxied traffic from iCloud Private Relay, our enterprise web gateway products, and other products including WARP, our consumer VPN.</p><p>In the case of Cloudflare customers, traffic traversing our network to reach your Cloudflare proxied property is included in all usage and billing metrics as traffic from any Internet user would be.</p>
    <div>
      <h2>I operate a corporate or school network and I’d like to know more about iCloud Private Relay</h2>
      <a href="#i-operate-a-corporate-or-school-network-and-id-like-to-know-more-about-icloud-private-relay">
        
      </a>
    </div>
    <p>CIOs and network administrators may have questions about how iCloud Private Relay interacts with their corporate networks, and how they might be able to use similar technologies to make their networks more secure. Apple's document, “<a href="https://developer.apple.com/support/prepare-your-network-for-icloud-private-relay/">Prepare Your Network or Web Server for iCloud Private Relay</a>” covers network operator scenarios in detail.</p><p>Most <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise networks</a> will not have to do anything to support Private Relay traffic. If the end-to-end encrypted nature of the system creates compliance challenges, local networks can block the use of Private Relay for devices connected to them.</p><p>Corporate customers of Cloudflare One services can put in place the name resolution blocks needed to disable Private Relay through their DNS filtering dashboard. Cloudflare One, Cloudflare’s <a href="https://www.cloudflare.com/network-security/">corporate network security suite</a>, includes Gateway, built on the same network and codebase that powers iCloud Private Relay.</p>
    <div>
      <h2>iCloud Private Relay makes browsing the Internet more private and secure</h2>
      <a href="#icloud-private-relay-makes-browsing-the-internet-more-private-and-secure">
        
      </a>
    </div>
    <p>iCloud Private Relay is an exciting step forward in preserving user privacy on the Internet, without forcing compromises in performance.</p><p>If you’re an iCloud+ subscriber you can <a href="https://support.apple.com/guide/icloud/set-up-icloud-private-relay-mm7dc25cb68f/icloud#:~:text=On%20your%20iPhone%2C%20iPad%2C%20or%20iPod%20touch%2C%20go%20to,or%20cellular%20plan%20(SIM).">enable Private Relay in iCloud Settings</a> on your iPhone, iPad, or Mac on iOS15, iPadOS15, or macOS Monterey.</p> ]]></content:encoded>
            <category><![CDATA[iCloud Private Relay]]></category>
            <category><![CDATA[Apple]]></category>
            <guid isPermaLink="false">6XAe2kJXqycDkf5kuqrE8</guid>
            <dc:creator>Rustam Lalkaka</dc:creator>
        </item>
    </channel>
</rss>