
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 03 Apr 2026 23:39:09 GMT</lastBuildDate>
        <item>
            <title><![CDATA[What’s new in Cloudflare One: Digital Experience (DEX) monitoring notifications and seamless access to Cloudflare Gateway with China Express]]></title>
            <link>https://blog.cloudflare.com/roundup-dex-alerts-cloudflare-gateway-china-express/</link>
            <pubDate>Wed, 09 Oct 2024 23:00:00 GMT</pubDate>
            <description><![CDATA[ This roundup blog post shares the latest new features and capabilities at Cloudflare. Learn more about new Digital Experience (DEX) monitoring notifications and seamless access to Cloudflare Gateway with China Express.  ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, we are constantly innovating and launching new features and capabilities across our product portfolio. We are introducing roundup blog posts to ensure that you never miss the latest updates across our platform. In this post, we are excited to share two new ways that our customers can continue to keep their web properties performant and secure with Cloudflare One: new Digital Experience Monitoring (DEX) notifications help proactively identify issues that can affect the end-user digital experience, and integration with China Express enables secure access to China-hosted sites for Cloudflare Gateway customers.   </p>
    <div>
      <h2>Using DEX Notifications for proactive monitoring with Cloudflare Zero Trust</h2>
      <a href="#using-dex-notifications-for-proactive-monitoring-with-cloudflare-zero-trust">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Zvu8KgRXwyP3tVzmh87v1/16a59d1f2adaea1591b79d3afa98c0ce/image1.png" />
          </figure><p><a href="https://developers.cloudflare.com/cloudflare-one/insights/dex/">Digital Experience Monitoring (<u>DEX)</u></a> offers device, application, and network performance monitoring, providing IT administrators with insights to quickly identify and resolve issues. With DEX notifications , account administrators can create configurable alert rules based on available algorithms <a href="https://developers.cloudflare.com/cloudflare-one/insights/dex/notifications/"><u>(z-score, SLO)</u></a> and existing DEX filters. When notification criteria are satisfied, customers are notified via email, <a href="https://developers.cloudflare.com/notifications/get-started/configure-pagerduty/"><u>Pagerduty</u></a>, or <a href="https://developers.cloudflare.com/notifications/get-started/configure-webhooks/"><u>Webhooks</u></a></p><p>As with other notification types, DEX notifications can be configured and reviewed from <a href="https://developers.cloudflare.com/notifications/get-started/"><u>Cloudflare dashboard notifications</u></a>.</p>
    <div>
      <h3>What problem does it solve?</h3>
      <a href="#what-problem-does-it-solve">
        
      </a>
    </div>
    <p>DEX notifications address the challenge of proactively identifying issues affecting the digital experience of your end users. By monitoring device health and conducting synthetic tests from WARP clients deployed on your fleet's end-user devices, DEX provides valuable insights. These notifications empower IT administrators to quickly identify and address connectivity and application performance problems before they impact a wide range of users.</p><p>By proactively notifying administrators when problems arise, DEX helps minimize user disruption and provides peace of mind. Instead of actively refreshing and looking for issues as before, administrators can now receive immediate notifications. Management is simple, as notifications can be easily configured through the <a href="https://dash.cloudflare.com/?to=/:account/notifications"><u>Cloudflare dashboard</u></a>.</p><p>Administrators can now create three new notification types:</p><p><b>1) Device Connectivity Anomaly</b></p><p>Are you tired of manually monitoring your end-users' device connectivity? Do you want to be notified immediately when there's a sudden change? Our new DEX notification for Device Connectivity Anomaly alerts you when there's a significant increase or decrease in the number of monitored devices connecting or disconnecting to the WARP Client. This can be filtered by various characteristics such as data center (“colo”), platform (operating system), and WARP Client version.</p><p>We use a statistical method called <a href="https://en.wikipedia.org/wiki/Standard_score"><u>z-score</u></a> to detect anomalies in monitored device count. A z-score measures how many standard deviations a data point is from the mean. By comparing the current five minutes of data to the past four hours, we can calculate the mean and standard deviation. If the z-score value exceeds 3.5 or falls below -3.5, a notification is triggered.</p><p>Here's an example of a notification configuration for macOS devices in the UK using WARP Client version 2023.7.24:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BPNfnGWu41MkSOTOEyfmf/b218f1a1da535de947865b7afb18e71b/image6.png" />
          </figure><p><b>2) DEX Test Latency </b></p><p>Ever worry application performance is slow? We're thrilled to introduce DEX Test Latency notifications, which are designed for administrators who want to stay ahead of the curve when it comes to application performance. This notification proactively alerts you of significant spikes or drops in latency based on:</p><ul><li><p><b>HTTP Test:</b> Resource Fetch Time measures the time it takes for a web browser to retrieve a specific resource from your application and deliver it to the end user.</p></li><li><p><b>Traceroute Test:</b> Round Trip Time measures the average time it takes for data packets to travel from your device to a specific destination IP address and back (when successful). Traceroute tests focus on the overall network performance between the test client/device and your application.</p></li></ul><p>This notification can be filtered by various characteristics such as data center (“colo”), platform (operating system), WARP Client version, and test name.</p><p>In this example, you have a DEX test monitoring the latency of the website<a href="https://www.cloudflarestatus.com"> www.cloudflarestatus.com</a>. This test, named "Cloudflare Status," uses an HTTP GET request and runs on Windows devices connecting through the Lisbon colo (data center). </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55On0XFpnOkB29AHknBfLk/5c7c158eb15c590591672e0749b86189/image5.png" />
          </figure><p><b>3) DEX Test Low Availability</b></p><p>Is application downtime causing headaches for you and your users? </p><p>DEX Test Low Availability notifications help maintain optimal application health by notifying you when availability falls below a given threshold. This notification monitors the success rate of HTTP or Traceroute requests sent to an application through pre-configured DEX tests. These synthetic tests simulate user traffic and measure the percentage of successful interactions with your application.</p><p>You define the Service Level Objective (SLO) — a specific availability threshold — for each notification. When the percentage of successful requests falls below this threshold, you'll receive immediate notification, allowing you to proactively address issues before they impact a wide range of end users.</p><p>This can be filtered by various characteristics such as colo (data center), platform (operating system), WARP Client version, and test name.</p><p>In this example, a DEX test is targeting <a href="https://www.google.com/">www.google.com</a>. This Traceroute test runs on Chrome OS devices connecting through the Tel Aviv colo. The example notification is configured to alert you whenever the availability (percentage of successful requests) drops below 98%, allowing you to investigate potential issues and take corrective action quickly.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QQ6H0WiaeCffG6JkSVOxA/5ada0e317a1e58bd19c451a0754ec203/image2.png" />
          </figure>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>DEX notifications are now available for Cloudflare One customers. They can be configured by going to <a href="https://dash.cloudflare.com/"><u>Cloudflare Dashboard</u></a> &gt; Account home &gt; Notifications &gt; Add, and then selecting any of the three DEX notification types. For more information, refer to <a href="https://developers.cloudflare.com/notifications/get-started/#create-a-notification"><u>Create a notification</u></a>. DEX notifications are one of the many ways the Cloudflare One suite of solutions work seamlessly together as a unified platform to find and fix security issues across SaaS applications. Get started now with Cloudflare’s Zero Trust platform by <a href="https://dash.cloudflare.com/sign-up/teams"><u>signing up here</u></a>.</p>
    <div>
      <h2>Seamless access to Cloudflare Gateway with China Express</h2>
      <a href="#seamless-access-to-cloudflare-gateway-with-china-express">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7JMTXxIk9JZ0ujFF4zd7nV/8c1310f6c9d1c3efe5ca1fbeeacab33c/image4.png" />
          </figure><p>In January 2023, we proudly launched <a href="https://blog.cloudflare.com/china-express"><u>China Express</u></a> with multiple partners in China to extend Cloudflare One into China and provide connectivity to ensure that customers within the country could enjoy the same level of access to global services as the rest of the world. Our goal was simple: to deliver a consistent experience for customers and employees everywhere.</p><p>Over the past year, we've observed a notable increase in demand from enterprise customers seeking secure access to China-hosted sites. These customers, who often require consistent zero trust security policies applied through <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a>, including device posture checks, have faced challenges like scenic routing, where Internet traffic passes through multiple countries or networks, leading to significant packet loss when connecting to these websites.</p>
    <div>
      <h3>Understanding the problem</h3>
      <a href="#understanding-the-problem">
        
      </a>
    </div>
    <p>For example, a global company with offices in both Hong Kong and San Jose has implemented <a href="https://www.cloudflare.com/lp/ppc/cloudflare-one/?utm_source=google&amp;utm_medium=cpc&amp;utm_campaign=ao-fy-acq-namer_en_na-umbrella-ge-ge-prospecting-sch_g_brand_alpha&amp;utm_content=Alpha_Brand_ZeroTrust_Cloudflare1-Pure&amp;utm_term=cloudflare+one&amp;campaignid=71700000110566648&amp;adgroupid=58700008395369383&amp;creativeid=669302992682&amp;&amp;_bt=669302992682&amp;_bk=cloudflare%20one&amp;_bm=e&amp;_bn=g&amp;_bg=152212903107&amp;_placement=&amp;_target=&amp;_loc=1027627&amp;_dv=c&amp;awsearchcpc=1&amp;gad_source=1&amp;gclid=CjwKCAjwuMC2BhA7EiwAmJKRrLfahJyZl_VP-qlxROmaAvijEE51KPZzcVGiZtPNQQkQIUtUCmDGdRoC1loQAvD_BwE&amp;gclsrc=aw.ds"><u>Cloudflare One</u></a> to implement a unified Zero Trust platform globally, with all employees using <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/"><u>WARP</u></a> on their devices to manage Internet access. As part of their daily operations, employees need to access websites hosted in mainland China. However, they have experienced unstable connections, particularly when accessing the AWS web console in China. Further investigation revealed long and sometimes unpredictable network routes, contributing to the instability.</p><p>Global Internet traffic to and from China flows through a limited number of international links, tightly regulated by government authorities, often leading to significant instability and fluctuations. To address these challenges, our China Express partners offer the 'Reverse Tunnel' solution, a reliable service that ensures stable access to Chinese websites, effectively mitigating connectivity issues.</p>
    <div>
      <h3>Reverse tunnel</h3>
      <a href="#reverse-tunnel">
        
      </a>
    </div>
    <p>Today, we are thrilled to announce a significant enhancement to China Express: a new offering tailored to the needs of global Cloudflare Gateway customers accessing China-hosted sites. This enhancement introduces a dedicated tunnel configuration, ensuring safe and predictable connectivity while maintaining stringent <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/"><u>zero trust security policies</u></a>.</p><p>By <a href="https://blog.cloudflare.com/upgrading-the-cloudflare-china-network"><u>partnering with JD Cloud</u></a>, one of our trusted local providers in China, we've developed a solution that seamlessly integrates with <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/dns-policies/"><u>Cloudflare's Zero Trust Firewall DNS Policies</u></a> by:</p><p><b>Directly routing through our Cloudflare Hong Kong data center:</b> When global Cloudflare Gateway customers attempt to access China-hosted sites, their traffic is routed directly to our Hong Kong data center. This strategic routing point allows us to apply Zero Trust policies before the traffic continues its journey into China.</p><p><b>Using JD Cloud's connectivity tunnel:</b> From our Cloudflare Hong Kong data center, the traffic is then securely transmitted through JD Cloud's private tunnel infrastructure, ensuring reliable and efficient connectivity into China. This partnership with JD Cloud leverages their local expertise and infrastructure capabilities, further enhancing the reliability and performance of the connection.</p><p>Note: This premium service is exclusive to China Network customers and requires a dedicated reverse tunnel contract with JD Cloud.</p>
    <div>
      <h3>Key benefits</h3>
      <a href="#key-benefits">
        
      </a>
    </div>
    <p>This solution offers several key benefits for our customers:</p><ul><li><p><b>Improved stability: </b>By directing all traffic to a dedicated tunnel, customers experience more reliable connections to websites within China.</p></li><li><p><b>Enhanced security: </b>Zero Trust policies are consistently applied to all traffic, regardless of its destination, ensuring the highest level of security for customers accessing China-hosted sites.</p></li><li><p><b>Seamless customer experience: </b>With a dedicated tunnel configuration, customers can access websites in China with confidence, knowing that their connections are both safe and predictable. Whether it’s multinational corporations expanding into the Chinese market, e-commerce platforms serving Chinese customers, or remote workers accessing corporate resources from within China, Cloudflare's China Express with JD Cloud partnership provides a solution tailored to their specific needs.</p></li></ul>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>By having companies implement a DNS host override policy in Cloudflare Gateway for origins in China, which routes traffic through the China Express Reverse Tunnel instead of using public Internet routes, companies can ensure more stable and reliable connections for their employees.</p><p>Looking ahead, we remain committed to continuously improving and expanding our offerings within China Express. Future developments may include further enhancements to performance, additional partnerships with local providers, and ongoing innovation to meet the evolving needs of our customers in the region.</p>
    <div>
      <h3>Never Miss an Update</h3>
      <a href="#never-miss-an-update">
        
      </a>
    </div>
    <p>We’ll continue to share roundup blog posts as we continue to build and innovate. Be sure to follow along on the <a href="https://blog.cloudflare.com/">Cloudflare Blog</a> for the latest news and updates.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Cloudflare Gateway]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[DEX]]></category>
            <guid isPermaLink="false">5CeN58bNiSOtUjklrzm0nG</guid>
            <dc:creator>Guy Nir</dc:creator>
            <dc:creator>Dong Zhang</dc:creator>
            <dc:creator>Erin Shea</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q4/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:25 GMT</pubDate>
            <description><![CDATA[ Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dLcyHxuJpOmtuilCdmlMv/226d5f6d0704e7ef443e924750799873/image14-1.png" />
            
            </figure><p>Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year.</p>
    <div>
      <h2>What are DDoS attacks?</h2>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites and online services for users, making them unavailable by overwhelming them with more traffic than they can handle. They are similar to car gridlocks that jam roads, preventing drivers from getting to their destination.</p><p>There are three main types of DDoS attacks that we will cover in this report. The first is an <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP request</a> intensive DDoS attack that aims to overwhelm HTTP servers with more requests than they can handle to cause a denial of service event. The second is an <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/">IP packet</a> intensive DDoS attack that aims to overwhelm in-line appliances such as routers, firewalls, and servers with more packets than they can handle. The third is a bit-intensive attack that aims to saturate and clog the Internet link causing that ‘gridlock’ that we discussed. In this report, we will highlight various techniques and insights on all three types of attacks.</p><p>Previous editions of the report can be found <a href="/tag/ddos-reports">here</a>, and are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. Cloudflare Radar showcases global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities for zooming in on insights of specific countries, industries, and service providers. Cloudflare Radar also offers a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet usage across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    <ol><li><p>In Q4, we observed a 117% year-over-year increase in network-layer DDoS attacks, and overall increased DDoS activity targeting retail, shipment and public relations websites during and around Black Friday and the holiday season.</p></li><li><p>In Q4, DDoS attack traffic targeting Taiwan registered a 3,370% growth, compared to the previous year, amidst the upcoming general election and reported tensions with China. The percentage of DDoS attack traffic targeting Israeli websites grew by 27% quarter-over-quarter, and the percentage of DDoS attack traffic targeting Palestinian websites grew by 1,126% quarter-over-quarter — as the military conflict between Israel and Hamas continues.</p></li><li><p>In Q4, there was a staggering 61,839% surge in DDoS attack traffic targeting Environmental Services websites compared to the previous year, coinciding with the 28th United Nations Climate Change Conference (COP 28).</p></li></ol><p>For an in-depth analysis of these key findings and additional insights that could redefine your understanding of current cybersecurity challenges, read on!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZbT93S5MJZLC4lm3oEFA/2beb24271129aabf3ca98b66f69f92cb/image1.png" />
            
            </figure><p>Illustration of a DDoS attack</p>
    <div>
      <h2>Hyper-volumetric HTTP DDoS attacks</h2>
      <a href="#hyper-volumetric-http-ddos-attacks">
        
      </a>
    </div>
    <p>2023 was the year of uncharted territories. DDoS attacks reached new heights — in size and sophistication. The wider Internet community, including Cloudflare, faced a persistent and deliberately engineered campaign of thousands of hyper-volumetric DDoS attacks at never before seen rates.</p><p>These attacks were highly complex and exploited an <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 vulnerability</a>. Cloudflare developed purpose-built technology to mitigate the vulnerability’s effect and worked with others in the industry to responsibly disclose it.</p><p>As part of this DDoS campaign, in Q3 our systems mitigated the largest attack we’ve ever seen — 201 million requests per second (rps). That’s almost 8 times larger than our previous 2022 record of 26 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49CXz2EGW8rzgjsaRcSFyT/f6f06108590316e1a3bdf0e0f69dbc89/pasted-image-0.png" />
            
            </figure><p>Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
    <div>
      <h2>Growth in network-layer DDoS attacks</h2>
      <a href="#growth-in-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>After the hyper-volumetric campaign subsided, we saw an unexpected drop in HTTP DDoS attacks. Overall in 2023, our automated defenses mitigated over 5.2 million HTTP DDoS attacks consisting of over 26 trillion requests. That averages at 594 HTTP DDoS attacks and 3 billion mitigated requests every hour.</p><p>Despite these astronomical figures, the amount of HTTP DDoS attack requests actually declined by 20% compared to 2022. This decline was not just annual but was also observed in 2023 Q4 where the number of HTTP DDoS attack requests decreased by 7% YoY and 18% QoQ.</p><p>On the network-layer, we saw a completely different trend. Our automated defenses mitigated 8.7 million network-layer DDoS attacks in 2023. This represents an 85% increase compared to 2022.</p><p>In 2023 Q4, Cloudflare’s automated defenses mitigated over 80 petabytes of network-layer attacks. On average, our systems auto-mitigated 996 network-layer DDoS attacks and 27 terabytes every hour. The number of network-layer DDoS attacks in 2023 Q4 increased by 175% YoY and 25% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Da5bEJbgh9FT5UQb6qPWo/4cf631e2688ca806bcbe996a357e5d5f/HTTP-and-Network-layer-DDoS-attacks-by-quarter-1.png" />
            
            </figure><p>HTTP and Network-layer DDoS attacks by quarter</p>
    <div>
      <h3>DDoS attacks increase during and around COP 28</h3>
      <a href="#ddos-attacks-increase-during-and-around-cop-28">
        
      </a>
    </div>
    <p>In the final quarter of 2023, the landscape of cyber threats witnessed a significant shift. While the Cryptocurrency sector was initially leading in terms of the volume of HTTP DDoS attack requests, a new target emerged as a primary victim. The Environmental Services industry experienced an unprecedented surge in HTTP DDoS attacks, with these attacks constituting half of all its HTTP traffic. This marked a staggering 618-fold increase compared to the previous year, highlighting a disturbing trend in the cyber threat landscape.</p><p>This surge in cyber attacks coincided with COP 28, which ran from November 30th to December 12th, 2023. The conference was a pivotal event, signaling what many considered the <a href="https://unfccc.int/news/cop28-agreement-signals-beginning-of-the-end-of-the-fossil-fuel-era">'beginning of the end' for the fossil fuel era</a>. It was observed that in the period leading up to COP 28, there was a noticeable spike in HTTP attacks targeting Environmental Services websites. This pattern wasn't isolated to this event alone.</p><p>Looking back at historical data, particularly during COP 26 and COP 27, as well as other UN environment-related resolutions or announcements, a similar pattern emerges. Each of these events was accompanied by a corresponding increase in cyber attacks aimed at Environmental Services websites.</p><p>In February and March 2023, significant environmental events like the UN's resolution on <a href="https://www.unep.org/news-and-stories/story/un-resolution-billed-turning-point-climate-justice">climate justice</a> and the launch of United Nations Environment Programme’s <a href="https://www.unep.org/news-and-stories/press-release/largest-river-and-wetland-restoration-initiative-history-launched-un">Freshwater Challenge</a> potentially heightened the profile of environmental websites, possibly correlating with an increase in attacks on these sites​​​​.</p><p>This recurring pattern underscores the growing intersection between environmental issues and cyber security, a nexus that is increasingly becoming a focal point for attackers in the digital age.</p>
    <div>
      <h2>DDoS attacks and Iron Swords</h2>
      <a href="#ddos-attacks-and-iron-swords">
        
      </a>
    </div>
    <p>It’s not just UN resolutions that trigger DDoS attacks. Cyber attacks, and particularly DDoS attacks, have long been a tool of war and disruption. We witnessed an increase in DDoS attack activity in the Ukraine-Russia war, and now we’re also witnessing it in the Israel-Hamas war. We first reported the cyber activity in our report <a href="/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a>, and we continued to monitor the activity throughout Q4.</p><p>Operation “Iron Swords” is the <a href="https://en.wikipedia.org/wiki/2023_Israel%E2%80%93Hamas_war#Israeli_response">military offensive launched by Israel against Hamas</a> following the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel">Hamas-led 7 October attack</a>. During this ongoing armed conflict, we continue to see DDoS attacks targeting both sides.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31johknCeQ8F1pbczj7Neq/2f91e03e355a539043c734e7c5140ff1/pasted-image-0--1-.png" />
            
            </figure><p>DDoS attacks targeting Israeli and Palestinian websites, by industry</p><p>Relative to each region's traffic, the Palestinian territories was the second most attacked region by HTTP DDoS attacks in Q4. Over 10% of all HTTP requests towards Palestinian websites were DDoS attacks, a total of 1.3 billion DDoS requests — representing a 1,126% increase in QoQ. 90% of these DDoS attacks targeted Palestinian Banking websites. Another 8% targeted Information Technology and Internet platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uYrGNHSPfp3nEmFkhTGpa/317d1cb4ead40504677565360d836641/pasted-image-0--2-.png" />
            
            </figure><p>Top attacked Palestinian industries</p><p>Similarly, our systems automatically mitigated over 2.2 billion HTTP DDoS requests targeting Israeli websites. While 2.2 billion represents a decrease compared to the previous quarter and year, it did amount to a larger percentage out of the total Israel-bound traffic. This normalized figure represents a 27% increase QoQ but a 92% decrease YoY. Notwithstanding the larger amount of attack traffic, Israel was the 77th most attacked region relative to its own traffic. It was also the 33rd most attacked by total volume of attacks, whereas the Palestinian territories was 42nd.</p><p>Of those Israeli websites attacked, Newspaper &amp; Media were the main target — receiving almost 40% of all Israel-bound HTTP DDoS attacks. The second most attacked industry was the Computer Software industry. The Banking, Financial Institutions, and Insurance (BFSI) industry came in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N6E8K9fZJZUFID7t0liAB/c0e58eb814bd8f6ee51319c6fa9ac97d/pasted-image-0--3-.png" />
            
            </figure><p>Top attacked Israeli industries</p><p>On the network layer, we see the same trend. Palestinian networks were targeted by 470 terabytes of attack traffic — accounting for over 68% of all traffic towards Palestinian networks. Surpassed only by China, this figure placed the Palestinian territories as the second most attacked region in the world, by network-layer DDoS attack, relative to all Palestinian territories-bound traffic. By absolute volume of traffic, it came in third. Those 470 terabytes accounted for approximately 1% of all DDoS traffic that Cloudflare mitigated.</p><p>Israeli networks, though, were targeted by only 2.4 terabytes of attack traffic, placing it as the 8th most attacked country by network-layer DDoS attacks (normalized). Those 2.4 terabytes accounted for almost 10% of all traffic towards Israeli networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fk4fxxDf20Wt6BmMTDPNq/bf0d999fc9f6b4ca98eb3f4c5b819432/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked countries</p><p>When we turned the picture around, we saw that 3% of all bytes that were ingested in our Israeli-based data centers were network-layer DDoS attacks. In our Palestinian-based data centers, that figure was significantly higher — approximately 17% of all bytes.</p><p>On the application layer, we saw that 4% of HTTP requests originating from Palestinian IP addresses were DDoS attacks, and almost 2% of HTTP requests originating from Israeli IP addresses were DDoS attacks as well.</p>
    <div>
      <h2>Main sources of DDoS attacks</h2>
      <a href="#main-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>In the third quarter of 2022, China was the largest source of HTTP DDoS attack traffic. However, since the fourth quarter of 2022, the US took the first place as the largest source of HTTP DDoS attacks and has maintained that undesirable position for five consecutive quarters. Similarly, our data centers in the US are the ones ingesting the most network-layer DDoS attack traffic — over 38% of all attack bytes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQRkEFpGgYH1o7Ld5m3LH/6e3452323058567ed6e244024644a379/imageLikeEmbed.png" />
            
            </figure><p>HTTP DDoS attacks originating from China and the US by quarter</p><p>Together, China and the US account for a little over a quarter of all HTTP DDoS attack traffic in the world. Brazil, Germany, Indonesia, and Argentina account for the next twenty-five percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OJH3XgpVKTtd93Lhv9pQd/1a4d6d5fb7d6349609c62c9ed5524471/pasted-image-0--6-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks</p><p>These large figures usually correspond to large markets. For this reason, we also normalize the attack traffic originating from each country by comparing their outbound traffic. When we do this, we often get small island nations or smaller market countries that a disproportionate amount of attack traffic originates from. In Q4, 40% of Saint Helena’s outbound traffic were HTTP DDoS attacks — placing it at the top. Following the ‘<a href="https://en.wikipedia.org/wiki/Saint_Helena">remote volcanic tropical island</a>’, Libya came in second, <a href="https://en.wikipedia.org/wiki/Eswatini">Swaziland</a> (also known as Eswatini) in third. Argentina and Egypt follow in fourth and fifth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hyX9SLpTS3ncRB5QZnR9R/447df8e913314ab249c0d5a430efcdcc/pasted-image-0--7-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks with respect to each country’s traffic</p><p>On the network layer, Zimbabwe came in first place. Almost 80% of all traffic we ingested in our Zimbabwe-based data center was malicious. In second place, Paraguay, and Madagascar in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sln1Hbv1Wz7j4oCCL9XRA/56f1f5fa42ab7846b0a0dc33c796afd0/pasted-image-0--8-.png" />
            
            </figure><p>Top source of Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>By volume of attack traffic, Cryptocurrency was the most attacked industry in Q4. Over 330 billion HTTP requests targeted it. This figure accounts for over 4% of all HTTP DDoS traffic for the quarter. The second most attacked industry was Gaming &amp; Gambling. These industries are known for being coveted targets and attract a lot of traffic and attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UoOV6PIx9DqJ0monxhfwu/20411132ba585c3314941bc2aec93e43/pasted-image-0--9-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks</p><p>On the network layer, the Information Technology and Internet industry was the most attacked — over 45% of all network-layer DDoS attack traffic was aimed at it. Following far behind were the Banking, Financial Services and Insurance (BFSI), Gaming &amp; Gambling, and Telecommunications industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tlGK3k5YutHhSEbvm1va0/5842c447cbb6c8dd18630bbb0c63db1f/pasted-image-0--10-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks</p><p>To change perspectives, here too, we normalized the attack traffic by the total traffic for a specific industry. When we do that, we get a different picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DxEla6GwSvU7OBnjGmhJX/dc12c491f1444662e00636b63cf92637/Top-Attacked-Industry-by-Region-Q4-2023.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>We already mentioned in the beginning of this report that the Environmental Services industry was the most attacked relative to its own traffic. In second place was the Packaging and Freight Delivery industry, which is interesting because of its timely correlation with online shopping during Black Friday and the winter holiday season. Purchased gifts and goods need to get to their destination somehow, and it seems as though attackers tried to interfere with that. On a similar note, DDoS attacks on retail companies increased by 16% compared to the previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14CXtsmUxjRwOB1kmYHA6Q/9c8b079ac33d94f8494e53d1ef50c4a6/pasted-image-0--11-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks with respect to each industry’s traffic</p><p>On the network layer, Public Relations and Communications was the most targeted industry — 36% of its traffic was malicious. This too is very interesting given its timing. Public Relations and Communications companies are usually linked to managing public perception and communication. Disrupting their operations can have immediate and widespread reputational impacts which becomes even more critical during the Q4 holiday season. This quarter often sees increased PR and communication activities due to holidays, end-of-year summaries, and preparation for the new year, making it a critical operational period — one that some may want to disrupt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NLJAkykpHhrRuFA2OVuKg/a6ca3bebb6f29c610292cd630a6746cc/pasted-image-0--12-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks with respect to each industry’s traffic</p>
    <div>
      <h2>Most attacked countries and regions</h2>
      <a href="#most-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>Singapore was the main target of HTTP DDoS attacks in Q4. Over 317 billion HTTP requests, 4% of all global DDoS traffic, were aimed at Singaporean websites. The US followed closely in second and Canada in third. Taiwan came in as the fourth most attacked region — amidst the upcoming <a href="https://www.bbc.co.uk/news/world-asia-67770782">general elections and the tensions with China</a>. Taiwan-bound attacks in Q4 traffic increased by 847% compared to the previous year, and 2,858% compared to the previous quarter. This increase is not limited to the absolute values. When normalized, the percentage of HTTP DDoS attack traffic targeting Taiwan relative to all Taiwan-bound traffic also significantly increased. It increased by 624% quarter-over-quarter and 3,370% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/730lynQatPwtsRfi10TXOi/fc993988b6f38b8d00501f3451a16c18/pasted-image-0--13-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks</p><p>While China came in as the ninth most attacked country by HTTP DDoS attacks, it's the number one most attacked country by network-layer attacks. 45% of all network-layer DDoS traffic that Cloudflare mitigated globally was China-bound. The rest of the countries were so far behind that it is almost negligible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MIf27g0zSIEZYQxUsFlTh/62c50ec1d0c25ae82045a71cd41c24c2/pasted-image-0--14-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks</p><p>When normalizing the data, Iraq, Palestinian territories, and Morocco take the lead as the most attacked regions with respect to their total inbound traffic. What’s interesting is that Singapore comes up as fourth. So not only did Singapore face the largest amount of HTTP DDoS attack traffic, but that traffic also made up a significant amount of the total Singapore-bound traffic. By contrast, the US was second most attacked by volume (per the application-layer graph above), but came in the fiftieth place with respect to the total US-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LX2zl13YVM9hZB60Ucedg/1b2ba78c2aeac99a3d9725ea4e418bd4/pasted-image-0--15-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks with respect to each country’s traffic</p><p>Similar to Singapore, but arguably more dramatic, China is both the number one most attacked country by network-layer DDoS attack traffic, and also with respect to all China-bound traffic. Almost 86% of all China-bound traffic was mitigated by Cloudflare as network-layer DDoS attacks. The Palestinian territories, Brazil, Norway, and again Singapore followed with large percentages of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2n9rHcScBY63Q4yX01yKu5/d19a7fc7ccd43c72911897245cc91dc3/pasted-image-0--16-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Attack vectors and attributes</h2>
      <a href="#attack-vectors-and-attributes">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are short and small relative to Cloudflare’s scale. However, unprotected websites and networks can still suffer disruption from short and small attacks without proper inline automated protection — underscoring the need for organizations to be proactive in <a href="https://www.cloudflare.com/cybersecurity-risk-management/">adopting a robust security posture</a>.</p><p>In 2023 Q4, 91% of attacks ended within 10 minutes, 97% peaked below 500 megabits per second (mbps), and 88% never exceeded 50 thousand packets per second (pps).</p><p>Two out of every 100 network-layer DDoS attacks lasted more than an hour, and exceeded 1 gigabit per second (gbps). One out of every 100 attacks exceeded 1 million packets per second. Furthermore, the amount of network-layer DDoS attacks exceeding 100 million packets per second increased by 15% quarter-over-quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YPOZlyzEHc5u5DeFbQXqW/d8dc22556a3f9510ee075b507b699a42/DDoS-attacks-stats-2023-Q4_a.png" />
            
            </figure><p>DDoS attack stats you should know</p><p>One of those large attacks was a Mirai-botnet attack that peaked at 160 million packets per second. The packet per second rate was not the largest we’ve ever seen. The largest we’ve ever seen was <a href="/mitigating-a-754-million-pps-ddos-attack-automatically">754 million packets per second</a>. That attack occurred in 2020, and we have yet to see anything larger.</p><p>This more recent attack, though, was unique in its bits per second rate. This was the largest network-layer DDoS attack we’ve seen in Q4. It peaked at 1.9 terabits per second and originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It was a multi-vector attack, meaning it combined multiple attack methods. Some of those methods included UDP fragments flood, UDP/Echo flood, SYN Flood, ACK Flood, and TCP malformed flags.</p><p>This attack targeted a known European Cloud Provider and originated from over 18 thousand unique IP addresses that are assumed to be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. It was automatically detected and mitigated by Cloudflare’s defenses.</p><p>This goes to show that even the largest attacks end very quickly. Previous large attacks we’ve seen ended within seconds — underlining the need for an in-line automated defense system. Though still rare, attacks in the terabit range are becoming more and more prominent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10QBHlFJPubkFIG1R2uPf1/06c522bfa3aca7713d823d44d9f6c002/pasted-image-0--17-.png" />
            
            </figure><p>1.9 Terabit per second Mirai DDoS attacks</p><p>The use of Mirai-variant botnets is still very common. In Q4, almost 3% of all attacks originate from Mirai. Though, of all attack methods, DNS-based attacks remain the attackers’ favorite. Together, DNS Floods and DNS Amplification attacks account for almost 53% of all attacks in Q4. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> follows in second and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> in third. We’ll cover the two DNS attack types here, and you can visit the hyperlinks to learn more about UDP and SYN floods in our Learning Center.</p>
    <div>
      <h3>DNS floods and amplification attacks</h3>
      <a href="#dns-floods-and-amplification-attacks">
        
      </a>
    </div>
    <p>DNS floods and DNS amplification attacks both exploit the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a>, but they operate differently. DNS is like a phone book for the Internet, translating human-friendly domain names like "<a href="http://www.cloudflare.com">www.cloudflare.com</a>" into numerical IP addresses that computers use to identify each other on the network.</p><p>Simply put, DNS-based DDoS attacks comprise the method computers and servers used to identify one another to cause an outage or disruption, without actually ‘taking down’ a server. For example, a server may be up and running, but the DNS server is down. So clients won't be able to connect to it and will experience it as an outage.</p><p>A <b>DNS flood</b> attack bombards a DNS server with an overwhelming number of DNS queries. This is usually done using a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">DDoS botnet</a>. The sheer volume of queries can overwhelm the DNS server, making it difficult or impossible for it to respond to legitimate queries. This can result in the aforementioned service disruptions, delays or even an outage for those trying to access the websites or services that rely on the targeted DNS server.</p><p>On the other hand, a <b>DNS amplification</b> attack involves sending a small query with a spoofed IP address (the address of the victim) to a DNS server. The trick here is that the DNS response is significantly larger than the request. The server then sends this large response to the victim's IP address. By exploiting open DNS resolvers, the attacker can amplify the volume of traffic sent to the victim, leading to a much more significant impact. This type of attack not only disrupts the victim but also can congest entire networks.</p><p>In both cases, the attacks exploit the critical role of DNS in network operations. Mitigation strategies typically include securing DNS servers against misuse, implementing rate limiting to manage traffic, and filtering DNS traffic to identify and block malicious requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UolIGOVG2jx7ST3CeoF0j/2b78eeb7eb633c49394390086a641dc5/pasted-image-0--18--1.png" />
            
            </figure><p>Top attack vectors</p><p>Amongst the emerging threats we track, we recorded a 1,161% increase in ACK-RST Floods as well as a 515% increase in CLDAP floods, and a 243% increase in SPSS floods, in each case as compared to last quarter. Let’s walk through some of these attacks and how they’re meant to cause disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ac5D51H55vXbKPbWnSGEx/c4c12e4aadc06d6843f7d4c33b60679f/pasted-image-0--19-.png" />
            
            </figure><p>Top emerging attack vectors</p>
    <div>
      <h3>ACK-RST floods</h3>
      <a href="#ack-rst-floods">
        
      </a>
    </div>
    <p>An ACK-RST Flood exploits the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Transmission Control Protocol (TCP)</a> by sending numerous ACK and RST packets to the victim. This overwhelms the victim's ability to process and respond to these packets, leading to service disruption. The attack is effective because each ACK or RST packet prompts a response from the victim’s system, consuming its resources. ACK-RST Floods are often difficult to filter since they mimic legitimate traffic, making detection and mitigation challenging.</p>
    <div>
      <h3>CLDAP floods</h3>
      <a href="#cldap-floods">
        
      </a>
    </div>
    <p>CLDAP (Connectionless Lightweight Directory Access Protocol) is a variant of LDAP (Lightweight Directory Access Protocol). It's used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement which allows attackers to spoof the IP address thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
    <div>
      <h3>SPSS floods</h3>
      <a href="#spss-floods">
        
      </a>
    </div>
    <p>Floods abusing the SPSS (Source Port Service Sweep) protocol is a network attack method that involves sending packets from numerous random or spoofed source ports to various destination ports on a targeted system or network. The aim of this attack is two-fold: first, to overwhelm the victim's processing capabilities, causing service disruptions or network outages, and second, it can be used to scan for open ports and identify vulnerable services. The flood is achieved by sending a large volume of packets, which can saturate the victim's network resources and exhaust the capacities of its firewalls and intrusion detection systems. To mitigate such attacks, it's essential to leverage in-line automated detection capabilities.</p>
    <div>
      <h2>Cloudflare is here to help - no matter the attack type, size, or duration</h2>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we believe that a better Internet is one that is secure, performant, and available to all. No matter the attack type, the attack size, the attack duration or the motivation behind the attack, Cloudflare’s defenses stand strong. Since we pioneered <a href="/unmetered-mitigation">unmetered DDoS Protection in 2017</a>, we’ve made and kept our commitment to make enterprise-grade DDoS protection free for all organizations alike — and of course, without compromising performance. This is made possible by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">unique technology</a> and robust network architecture.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/waf/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>. And, if you’d like to benefit from our easy to use, best-in-class protection against DDoS and other attacks on the Internet, you can sign up — for free! — at <a href="https://www.cloudflare.com/plans/">cloudflare.com</a>. If you’re under attack, register or call the <a href="https://www.cloudflare.com/under-attack-hotline/">cyber emergency hotline number</a> for a rapid response.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Black Friday]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Israel]]></category>
            <guid isPermaLink="false">78R5sLaHmAgKy9ndDVHkN7</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Improving customer experience in China using China Express]]></title>
            <link>https://blog.cloudflare.com/improving-customer-experience-in-china-using-china-express/</link>
            <pubDate>Fri, 19 May 2023 02:00:33 GMT</pubDate>
            <description><![CDATA[ We use China Express to accelerate for performance and Workers to fall back to user through China Express for cost-effectiveness. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SJKe7wrOmbuc5HvAh8InS/1a6264824329b7c1370d6965c02b016a/image11-4.png" />
            
            </figure><p>Global organizations have always strived to provide a consistent app experience for their Internet users all over the world. Cloudflare has helped in this endeavor with our mission to help build a better Internet. In 2021, we announced <a href="/upgrading-the-cloudflare-china-network/">an upgraded Cloudflare China Network</a>, in partnership with JD Cloud to help improve performance for users in China. With this option, Cloudflare customers can serve cached content locally within China without all requests having to go to a data center outside of China. This results in significant performance benefits for end users, but requests to the origin still need to travel overseas.</p><p>We wanted to go a step further to solve this problem. In early 2023, we launched <a href="/china-express/">China Express</a>, a suite of connectivity and performance offerings in partnership with China Mobile International (CMI), CBC Tech and Niaoyun. One of the services available through China Express is Private Link, which is an optimized, high-quality circuit for overseas connectivity. Offered by our local partners, a more reliable and high performance connection from China to the global internet.</p>
    <div>
      <h3>A real world example</h3>
      <a href="#a-real-world-example">
        
      </a>
    </div>
    <p>“Acme Corp” is a global Online Shopping Platform business that serves lots of direct to consumer brands, transacting primarily over <a href="https://www.cloudflare.com/ecommerce/">e-commerce channels</a>. Web performance for them directly translates to customer engagement and suppliers and revenue. With 90% of their suppliers in mainland China and online stores serving the consumers out of China, Acme Corp had enabled the Cloudflare China Network to help <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">accelerate performance</a> and improve suppliers’ experience of Store Backend systems with the suppliers. While their suppliers had a great experience with static content, they still had challenges with dynamic content. They experienced performance bottlenecks and high packet loss on their origin requests. This manifested as an intermittent timeout issue on their origin pull requests.</p><p>This is an expected issue with cross-border network congestion and the vagaries of ISP routing in and out of China. Coming out of the pandemic, the business needed to rapidly evolve and direct suppliers’ dynamic content to global consumers, which meant they couldn’t cache as much content statically within the country. This led to increasing user experience issues and increased the administrative burden on the IT teams.</p>
    <div>
      <h3>China Express to the rescue</h3>
      <a href="#china-express-to-the-rescue">
        
      </a>
    </div>
    <p>The organization wanted a solution that would improve cross-border performance and reduce the number of timeouts experienced during origin pull requests. They wanted to avoid the administrative complexity of using a private line through a third-party vendor which had the potential to increase the chance for human error.</p><p>The organization chose a private link service through Cloudflare’s local partner CMI. The preliminary design looked like this.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tJcHzilsgQ5PhTK5JfWDp/7baf1b0a67135d042f9754b5a8ebecbb/image4-19.png" />
            
            </figure><ul><li><p>Eyeballs in mainland China land on a Cloudflare China Network data center within mainland China.</p></li><li><p>Statically cached content is delivered directly out of one of the 30 data centers within    China</p></li><li><p>Origin pull requests for dynamic content are routed through tunnel to the partner data center in Hong Kong</p></li><li><p>From the partner data center, these requests arrive at the origin server</p></li><li><p>Workers in China Data Center fall back to user through China Express while required, otherwise go through the public Internet</p></li></ul><p>China Express removes the timeout issue, and the performance doubles in peak time!</p><p>When we dive into the peak hour data analysis during 20:00 - 02:00 +1 CST (China Standard Time) by 5 Mins</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YBnNA5GHGya1xdi9hyxms/a4e3d91c6b0fe87bbac9209dce8051b1/image2-32.png" />
            
            </figure><p><i>China express shows fairly stable </i><b><i>Avg. Download Throughput</i></b><i> over peak hour, while due to congestion with public internet the </i><b><i>Avg. Download Throughput</i></b><i> has a big impact</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7c3tJZJDH28FC07Q0fO9iM/97cd5cc6d1fbfa8c9201851289613503/image9-6.png" />
            
            </figure><p><i>Bar chart view of </i><b><i>Avg. Load Time</i></b><i> over peak hour, China express shows 54% performance improvement than public line over peak hour.</i></p>
<table>
<thead>
  <tr>
    <th><span>Test Name</span></th>
    <th><span>Number of Runs</span></th>
    <th><span>% Availability</span></th>
    <th><span>Average Response (ms)</span></th>
    <th><span>Average Load (ms)</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Test w/China Express (CMI AAS)</span></td>
    <td><span>144</span></td>
    <td><span>100</span></td>
    <td><span>2293</span></td>
    <td><span>1001</span></td>
  </tr>
  <tr>
    <td><span>Test w/o China Express (CMI AAS) (Public line ONLY)</span></td>
    <td><span>144</span></td>
    <td><span>78.61</span></td>
    <td><span>4159</span></td>
    <td><span>2186</span></td>
  </tr>
  <tr>
    <td><span>% of performance increase</span></td>
    <td></td>
    <td></td>
    <td><span>81%</span></td>
    <td><span>118%</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>China Express is a great solution for global organizations looking to improve stability and performance for users in mainland China. In conjunction with our in-country China Network data centers, this can make measurable improvements in app stability and performance and reduce the administrative burden for IT teams. If you’d like to learn more, <a href="https://www.cloudflare.com/china-network/">talk to one of our experts</a> who can discuss your specific needs and propose a tailored solution.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[China Network]]></category>
            <guid isPermaLink="false">1wRlTUFpVqc4OLUBCHFtrv</guid>
            <dc:creator>Roy Zhai</dc:creator>
            <dc:creator>Bill Jin</dc:creator>
        </item>
        <item>
            <title><![CDATA[China Express: Cloudflare partners to boost performance in China for corporate networks]]></title>
            <link>https://blog.cloudflare.com/china-express/</link>
            <pubDate>Fri, 13 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ China Express is a suite of connectivity and performance offerings designed to improve application performance for users in China. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3l66m1AWwUMi6FodtAFk4g/458ba9ec5b0fb9515645de51316e4928/image2-26.png" />
            
            </figure><p>Cloudflare has been helping global organizations offer their users a consistent experience all over the world. This includes mainland China, a market our global customers cannot ignore but that continues to be challenging for infrastructure teams trying to ensure performance, security and reliability for their applications and users both in and outside mainland China. We are excited to announce China Express — a new suite of capabilities and best practices in partnership with our partners China Mobile International (CMI) and CBC Tech — that help address some of these performance challenges and ensure a consistent experience for customers and employees everywhere.</p><p>Cloudflare has been providing <a href="https://www.cloudflare.com/application-services/">Application Services</a> to users in mainland China since 2015, improving performance and security using in-country data centers and caching. Today, we have a presence in 30 cities in mainland China thanks to our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. While this delivers significant performance improvements, some requests still need to go back to the origin servers which may live outside mainland China. With limited international Internet gateways and restrictive cross-border regulations, international traffic has a very high latency and packet drop rate in and out of China. This results in inconsistent cached content within China and a poor experience for users trying to access dynamic content that requires frequent access to the origin.</p><p>Last month, we expanded our Cloudflare One, Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform to users and organizations in China with additional connectivity options. This has received tremendous interest from customers, so we’re looking at what else we could do to further improve the user experience for customers with employees or offices in China.</p>
    <div>
      <h3>What is China Express?</h3>
      <a href="#what-is-china-express">
        
      </a>
    </div>
    <p>China Express is a suite of connectivity and performance offerings designed to simplify connectivity and improve performance for users in China. To understand these better, let’s take an example of Acme Corp, a global company with offices in Shanghai and Beijing — with origin data centers in London and Ashburn. And let’s see how we can help their infrastructure teams better serve employees and users in mainland China.</p>
    <div>
      <h3>China Express Premium DIA</h3>
      <a href="#china-express-premium-dia">
        
      </a>
    </div>
    <p>Premium Dedicated Internet Access, is an optimized, high-quality public Internet circuit for cross-border connectivity provided by our local partners CMI and CBC Tech. With this service, traffic from mainland China will arrive at our partner data center in Hong Kong, using a fixed NAT IP. Customers do not worry about compliance issues because their traffic still goes through the public Internet with all regulatory controls in place.</p><p>Acme Corp can use Premium DIA to improve origin performance for their Cloudflare service in mainland China. Requests to the origin data centers in Ashburn and London would traverse the Premium DIA connection, which offers more bandwidth and lower packet loss resulting in more than a 60% improvement in performance.</p><p>Acme employees in mainland China would also see an improvement while accessing SaaS applications such as Microsoft 365 over the Internet when these apps are delivered from outside China. They would also notice an improvement in Internet speed in general.</p>
    <div>
      <h3>China Express Private Link</h3>
      <a href="#china-express-private-link">
        
      </a>
    </div>
    <p>While Premium DIA offers Acme performance improvements over the public Internet, they may want to keep some mission-critical application traffic on a private network for security reasons. Private link offers a dedicated private tunnel between Acme’s locations in China and their data centers outside of China. Private Link can also be used to establish dedicated private connectivity to SaaS data centers like Salesforce.</p><p>Private Link is a highly regulated area in China and depending on your use case, there might be additional requirements from our partners to implement it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tNTZTDshIoX7mWpa1dbs9/269ae731a302957dffeedaeb17633069/image1-33.png" />
            
            </figure>
    <div>
      <h3>China Express Travel SIM</h3>
      <a href="#china-express-travel-sim">
        
      </a>
    </div>
    <p>Acme Corp might have employees visiting China on a regular basis and need access to their corporate apps on their mobile devices including phones and tablets. Their IT teams not only have to procure and provision mobile Internet connectivity for their users, but also enforce consistent <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security</a> controls.</p><p>Cloudflare is pleased to announce that the Travel SIM provided by Cloudflare’s partner CMI automatically provides network connectivity and can be used together with the Cloudflare WARP Client on mobile devices to provide Cloudflare’s suite of Zero Trust security services. Using the same Zero Trust profiles assigned to the user, the WARP client will automatically use the available 4G LTE network and establish a WireGuard tunnel to the closest Cloudflare data center outside of China. The data connection can also be shared with other devices using the hotspot function on the mobile device.</p><p>With the Travel SIM, users can enjoy the same Cloudflare global service as the rest of the world when traveling to China. And IT and security teams no longer need to worry about purchasing or deploying additional Zero Trust seats and device clients to ensure the employees’ Internet connection and the security policy enforcement.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gQPs5y5YsCpGrrWnzytl8/4f28ba9f9a3a7c0318bcce4c9c77931c/image3-24.png" />
            
            </figure>
    <div>
      <h3>China Express — Extending Cloudflare One to China</h3>
      <a href="#china-express-extending-cloudflare-one-to-china">
        
      </a>
    </div>
    <p>As mentioned in a previous blog post, we are extending Cloudflare One, our zero trust network-as-a-service product, to <a href="/cloudflare-one-in-china/">mainland China</a> through our strategic partnerships. Acme Corp will now be able to ensure their employees both inside and outside China will be able to use consistent zero trust security policy using the Cloudflare WARP device client. In addition, they will be able to connect their physical offices in China to their global private WAN using Magic WAN with consistent security policies applied globally.</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare is excited to work with  our partners to help our customers solve connectivity and performance challenges in mainland China. All the above solutions are easy and fast to deploy and are available now. If you’d like to get started, contact us <a href="https://www.cloudflare.com/china-network/">here</a> or reach out to your account team.</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[SASE]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[China Network]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <guid isPermaLink="false">YF1uzQYYGovH8CLHGbeCC</guid>
            <dc:creator>Dafu Wang</dc:creator>
            <dc:creator>Ameet Naik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare partners to simplify China connectivity for corporate networks]]></title>
            <link>https://blog.cloudflare.com/cloudflare-one-in-china/</link>
            <pubDate>Tue, 29 Nov 2022 16:35:47 GMT</pubDate>
            <description><![CDATA[ Today we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best SASE experience for users and organizations in China ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/59bEi3ASQdbRkn2o4KBhIp/14f5f5a20f816a36f1a48100134f8443/image2-57.png" />
            
            </figure><p>IT teams have historically faced challenges with performance, security, and reliability for employees and network resources in mainland China. Today, along with our strategic partners, we’re excited to announce expansion of our Cloudflare One product suite to tackle these problems, with the goal of creating the best <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> experience for users and organizations in China.</p><p>Cloudflare One, our comprehensive SASE platform, allows organizations to connect any source or destination and apply single-pass security policies from one unified control plane. Cloudflare One is built on our <a href="https://www.cloudflare.com/network/">global network</a>, which spans 275 cities across the globe and is within 50ms of 95% of the world’s Internet-connected population. Our ability to serve users extremely close to wherever they’re working—whether that’s in a corporate office, their home, or a <a href="https://www.cloudflare.com/learning/access-management/coffee-shop-networking/">coffee shop</a>—has been a key reason customers choose our platform since day one.</p><p>In 2015, we extended our <a href="https://www.cloudflare.com/application-services/">Application Services</a> portfolio to cities in mainland China; in 2020, we expanded these capabilities to offer better performance and security through our strategic partnership with <a href="/cloudflare-partners-with-jd-cloud/">JD Cloud</a>. Today, we’re unveiling our latest steps in this journey: extending the capabilities of Cloudflare One to users and organizations in mainland China, through additional strategic partnerships. Let’s break down a few ways you can achieve better connectivity, security, and performance for your China network and users with Cloudflare One.</p>
    <div>
      <h3>Accelerating traffic from China networks to private or public resources outside of China through China partner networks</h3>
      <a href="#accelerating-traffic-from-china-networks-to-private-or-public-resources-outside-of-china-through-china-partner-networks">
        
      </a>
    </div>
    <p>Performance and reliability for traffic flows across the mainland China border have been a consistent challenge for IT teams within multinational organizations. Packets crossing the China border often experience reachability, congestion, loss, and latency challenges on their way to an origin server outside of China (and vice versa on the return path). Security and IT teams can also struggle to enforce consistent policies across this traffic, since many aspects of China networking are often treated separately from the rest of an organization’s global network because of their unique challenges.</p><p>Cloudflare is excited to address these challenges with our strategic China partners, combining our network infrastructure to deliver a better end-to-end experience to customers. Here’s an example architecture demonstrating the optimized packet flow with our partners and Cloudflare together:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/doTXbrCkWraGqKxZeLky4/6899fdb9b2492b3f150cceff8beefef0/1-7.png" />
            
            </figure><p>Acme Corp, a multinational organization, has offices in Shanghai and Beijing. Users in those offices need to reach resources hosted in Acme’s data centers in Ashburn and London, as well as SaaS applications like Jira and Workday. Acme procures last mile connectivity at each office in mainland China from Cloudflare’s China partners.</p><p>Cloudflare’s partners route local traffic to its destination within China, and global traffic across a secure link to the closest available Cloudflare data center on the other side of the Chinese border.</p><p>At that data center, Cloudflare enforces a full stack of security functions across the traffic including network <a href="https://www.cloudflare.com/learning/cloud/what-is-a-cloud-firewall/">firewall-as-a-service</a> and Secure Web Gateway policies. The traffic is then routed to its destination, whether that’s another connected location on Acme’s private network (via Anycast GRE or IPsec tunnel or <a href="https://www.cloudflare.com/network-interconnect/">direct connection</a>) or a resource on the public Internet, across an optimized middle-mile path. Acme can choose whether Internet-bound traffic egresses from a shared or dedicated Cloudflare-owned IP pool.</p><p>Return traffic back to Acme’s connected network location in China takes the opposite path: source → Cloudflare’s network (where, again, security policies are applied) → Partner network → Acme local network.</p><p>Cloudflare and our partners are excited to help customers solve challenges with cross-border performance and security. This <a href="https://www.cloudflare.com/application-services/solutions/">solution</a> is easy to deploy and available now - reach out to your account team to get started today.</p>
    <div>
      <h3>Enforcing uniform security policy across remote China user traffic</h3>
      <a href="#enforcing-uniform-security-policy-across-remote-china-user-traffic">
        
      </a>
    </div>
    <p>The same challenges that impact connectivity from China-based networks reaching out to global resources also impact remote users working in China. Expanding on the network connectivity solution we just described, we’re looking forward to improving user connectivity to cross-border resources by adapting our device client (WARP). This solution will also allow security teams to enforce consistent policy across devices connecting to corporate resources, rather than managing separate security stacks for users inside and outside of China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aU3IiM5L9cZa0n6oQvd7q/669873c7e709dc2e18e271defe8e84a4/2-2.png" />
            
            </figure><p>Acme Corp has users that are either based in or traveling to China for business and need to access corporate resources that are hosted beyond China, without necessarily being physically in an Acme office in order to enable this access. Acme uses an MDM provider to install the WARP client on company-managed devices and enroll them in Acme’s Cloudflare Zero Trust organization. Within China, the WARP client utilizes Cloudflare’s China partner networks to establish the same Wireguard tunnel to the nearest Cloudflare point of presence outside of mainland China. Cloudflare’s partners act as the carrier of our customers’ IP traffic through their acceleration service and the content remains secure inside WARP.</p><p>Just as with traffic routed via our partners to Cloudflare at the network layer, WARP client traffic arriving at its first stop outside of China is filtered through Gateway and Access policies. Acme’s IT administrators can choose to enforce the same, or additional policies for device traffic from China vs other global locations. This setup makes life easier for Acme’s IT and security teams - they only need to worry about installing and managing a single device client in order to grant access and control security regardless of where employees are in the world.</p><p>Cloudflare and our partners are actively testing this solution in private beta. If you’re interested in getting access as soon as it’s available to the broader public, please contact your account team.</p>
    <div>
      <h3>Extending SASE filtering to local China data centers (future)</h3>
      <a href="#extending-sase-filtering-to-local-china-data-centers-future">
        
      </a>
    </div>
    <p>The last two use cases have focused primarily on granting network and user access from within China to resources on the other side of the border - but what about improving connectivity and security for local traffic?</p><p>We’ve heard from both China-based and multinational organizations that are excited to have the full suite of Cloudflare One functions available across China to achieve a full SASE architecture just a few milliseconds from everywhere their users and applications are in the world. We’re actively working toward this objective with our strategic partners, expanding upon the current availability of our application services platform across 45 data centers in 38 unique cities in mainland China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/UxurdJVTv7uXteViJbplD/232f198ea2e618df95c9db12bcc934e8/image4-36.png" />
            
            </figure><p>Talk to your account team today to get on the waitlist for the full suite of Cloudflare One functions delivered across our China Network and be notified as soon as beta access is available!</p>
    <div>
      <h3>Get started today</h3>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>We’re so excited to help organizations improve connectivity, performance and security for China networks and users. Contact your account team today to learn more about how Cloudflare One can help you transform your network and achieve a SASE architecture inside and outside of mainland China.</p><p>If you'd like to learn more, join us for a live webinar on Dec 6, 2022 10:00 AM PST through this <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4010917/navigating-the-challenges-of-connecting-with-your-audience-in-china?partnerref=blog">link</a> where we can answer all your questions about connectivity in China.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Network]]></category>
            <guid isPermaLink="false">3qxWHx7DkFzf8F2FAc6UDl</guid>
            <dc:creator>Kyle Krum</dc:creator>
            <dc:creator>Annika Garbers</dc:creator>
        </item>
        <item>
            <title><![CDATA[Upgrading the Cloudflare China Network: better performance and security through product innovation and partnership]]></title>
            <link>https://blog.cloudflare.com/upgrading-the-cloudflare-china-network/</link>
            <pubDate>Thu, 22 Jul 2021 12:56:26 GMT</pubDate>
            <description><![CDATA[ Cloudflare and our strategic partner in China have created a global network that offers a fast experience for visitors inside and outside of China — with DDoS mitigation, web application firewall (WAF), and other security services built in. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Core to Cloudflare’s mission of helping build a better Internet is making it easy for our customers to improve the performance, security, and reliability of their digital properties, no matter where in the world they might be. This includes Mainland China. Cloudflare has had customers using our service in China since 2015 and recently, we expanded our China presence through a partnership with JD Cloud, the cloud division of Chinese Internet giant, JD.com. We’ve also had a local office in Beijing for several years, which has given us a deep understanding of the Chinese Internet landscape as well as local customers.</p><p>The new Cloudflare China Network built in partnership with JD Cloud has been live for several months, with significant performance and security improvements compared to the previous in-country network. Today, we’re excited to describe the improvements we made to our DNS and DDoS systems, and provide data demonstrating the performance gains customers are seeing. All customers licensed to operate in China can now benefit from these innovations, with the click of a button in the Cloudflare dashboard or via the API.</p>
    <div>
      <h2>Serving DNS inside China</h2>
      <a href="#serving-dns-inside-china">
        
      </a>
    </div>
    <p>With over 14% of all domains on the Internet using Cloudflare’s nameservers we are the <a href="https://w3techs.com/technologies/overview/dns_server">largest DNS</a> provider. Furthermore, we pride ourselves on consistently being among the <a href="https://dnsperf.com">fastest authoritative nameservers</a>, answering about 12 million DNS queries per second on average (in Q2 2021). We achieve this scale and performance by running our DNS platform on our <a href="https://www.cloudflare.com/network/">global network</a> in more than 200 cities, in over 100 countries.</p><p>Not too long ago, a user in mainland China accessing a website using Cloudflare DNS did not fully benefit from these advantages. Their DNS queries had to leave the country and, in most cases, cross the Pacific Ocean to reach our nameservers outside of China. This network distance introduced latency and sometimes even packet drops, resulting in a poor user experience.</p><p>With the new China Network offering built on JD Cloud’s infrastructure, customers are now able to serve their DNS in mainland China. This means <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS queries</a> are answered directly from one of the JD Cloud Points of Presence (PoPs), leading to faster response times and improved reliability.</p><p>Once a user signs up a domain and opts in to serve their DNS in China we will assign two nameservers, from two of the following three domains:</p>
            <pre><code>cf-ns.com
cf-ns.net
cf-ns.tech</code></pre>
            <p>We selected these Top Level Domains (TLDs) because they offer the best possible performance from within mainland China. They are chosen to always be different from the TLD of the domain using them. For example, example.com will be assigned nameservers using the <a href="https://www.cloudflare.com/application-services/products/registrar/buy-tech-domains/">.tech</a> and .net TLD. This gives us “glueless delegations” for customers’ nameservers, allowing us to dynamically return nameserver IP addresses instead of static <a href="https://en.wikipedia.org/wiki/Domain_Name_System#Circular_dependencies_and_glue_records">glue records</a>.</p><p>A “glue record” (or just “glue”) is a mapping between nameservers and IPs that’s added by <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registrars</a> to break circular lookup dependencies when a domain uses a nameserver with the same TLD. For example, imagine a resolver asks the .com TLD nameserver: “Where do I find the nameservers for example.com?” and this domain is using ns1.example.com and ns2.example.com as nameservers. If .com just replied: “Go and ask ns1.example.com or ns2.example.com.” the resolver would come back to .com with the same question and this would never stop. One solution is to add glue at .com, so the answer can be: “The nameservers for example.com are ns1.example.com and ns2.example.com, and they can be reached at 192.0.2.78 and 203.0.113.55.”.</p><p>By using different TLDs, as described above, we don’t need to rely on glue records for customers’ nameservers. This way, we can ensure that queries will always be answered from the nearest point of presence (PoP) leading to a faster DNS response. Another advantage of serving dynamic nameserver IPs is the ability to distribute queries across different PoPs, which helps to spread load more efficiently and mitigate attacks.</p>
    <div>
      <h2>Mitigating DDoS attacks within China</h2>
      <a href="#mitigating-ddos-attacks-within-china">
        
      </a>
    </div>
    <p>Everywhere in the world except for China and India, we use a technique known as anycast routing to distribute DDoS attacks and absorb them in data centers as close to the traffic source as possible. But as we <a href="/how-we-extended-cloudflares-performance-and-security-into-mainland-china/">first wrote in 2015</a>, the Internet in China works a bit differently than the rest of the world so anycast-based mitigation was not an option:</p><p><i>Unlike much of the rest of the world where network routing is open, in China core Internet access is largely controlled by two ISPs: China Telecom and China Unicom. [Today this list also includes China Mobile.] These ISPs control IP address allocation and routing inside the country. Even the Chinese Internet giants rarely own their own IP address allocations, or use BGP to control routing across the Chinese Internet. This makes BGP Anycast and many of the other routing techniques we use across Cloudflare's network impossible inside of China.</i></p><p>The lack of anycast in China requires a different approach to mitigating attacks, and our expansion with JD Cloud pushed us to further improve the <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">edge-based mitigation system we wrote about earlier this year</a>. Most importantly, we pushed the detection and mitigation of application (L7) attacks to the edge, reducing our time to mitigate and improving the resiliency of the system by removing a dependency on other core data centers for instructions. In the first quarter of 2021, we mitigated 81% of all L7 attacks at the edge.</p><p>For the larger network-based (L3/L4) attacks, we worked closely with JD Cloud to augment our in-data center protections with remote signaling to China Telecom, China Unicom, and China Mobile. These integrations allow us to remotely — and automatically — signal from our edge-based mitigation systems when we want upstream filtering assistance from the ISP. Mitigating attacks at the edge is faster than relying on centralized data centers, and in the first quarter of 2021 98.6% of all L3/4 DDoS attacks were mitigated without centralized communication. Attacks exceeding certain thresholds can also be re-routed to large scrubbing centers, a technique that doesn’t make sense in an anycast world but is useful when unicast is the only option.</p><p>Beyond the improved mitigation controls, we also developed new traffic engineering processes to move traffic from overloaded data centers to locations with more spare resources. These controls are already used outside of China, but doing so within the country required integration with our DNS systems.</p><p>Lastly, because all of our data centers run the same software stack, the work we did to improve the underlying components of DDoS detection and mitigation systems within China has already made its way back to our data centers outside of China.</p>
    <div>
      <h2>Improving performance</h2>
      <a href="#improving-performance">
        
      </a>
    </div>
    <p>Cloudflare on JD Cloud is significantly faster than our previous in-country network, allowing us to accelerate the delivery of our customers’ web properties in China.</p><p>To compare the Cloudflare PoPs on JD Cloud vs. our previous in-country network, we deployed a test zone to simulate a customer website on both China networks. We tested each website with the same two origin networks. Both origins are commonly used public cloud providers. One site was hosted in the northwest region of the United States, and the other in Western Europe.</p><p>For both zones, we assigned DNS nameservers in China to reduce out-of-country latency incurred during DNS lookups (more details are on DNS below). To test our caching, we used a monitoring and benchmarking service with a wide variety of clients in various Chinese cities and provinces to download 100 kilobyte, 1 megabyte, and 10 megabyte files every 15 minutes over the course of 36 hours.</p><p>Latency, as measured by <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">Round Trip Time (RTT)</a> from the client to our JD Cloud PoPs, was reduced at least 30% across tests for all file sizes. This subsequently reduced our Time to First Byte (TTFB) metrics. Reducing latency — and making it more consistent, i.e., improving jitter — has the most impact on other performance metrics, as latency and the slow-start process is the bottleneck for the vast majority of TCP connections.</p><p>Our latency reduction comes from the quality of the JD Cloud network, their placement of the PoPs within China, and our ability to direct clients to the closest PoP. As we continue to add more capacity and PoPs in partnership with JD Cloud in the future, we only expect our latency metrics to get even better.</p>
    <div>
      <h3>Dynamic Content</h3>
      <a href="#dynamic-content">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1yY5Ifkmq9Fn04Na2OprfR/e6949415e7f45c96fcb07dc4de7a85cc/image3-8.png" />
            
            </figure>
    <div>
      <h3>Static Content</h3>
      <a href="#static-content">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YfT8pRmrfHtKfqvu2PtdA/b1373680a11fda355320fff04d8c9490/image4-7.png" />
            
            </figure>
    <div>
      <h3>DNS Response Time</h3>
      <a href="#dns-response-time">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xhHswN41o23RpkvjCr4G4/9e76f8756dd331316b5ff46cfbdc299a/image2-12.png" />
            
            </figure>
    <div>
      <h2>Looking forward and welcoming new customers in China</h2>
      <a href="#looking-forward-and-welcoming-new-customers-in-china">
        
      </a>
    </div>
    <p>Cloudflare’s sustained product investments in China, in partnership with JD Cloud, have resulted in significant performance and security improvements over our previous in-country network first launched in 2015.</p><p>Specifically, innovations in DNS and DDoS mitigation technology, alongside an improved network design and distribution of PoPs, have resulted in better security for our customers and at least a 30% performance boost.</p><p>This new network is open for business, and interested customers should <a href="https://www.cloudflare.com/china-network/">reach out to learn more</a>.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">RD99TlGNcznZVksJSK8Sn</guid>
            <dc:creator>Patrick R. Donahue</dc:creator>
        </item>
        <item>
            <title><![CDATA[Creating a True One-Stop Solution for Companies to Go Global: Announcing a Partnership Between Cloudflare and JD Cloud & AI]]></title>
            <link>https://blog.cloudflare.com/cloudflare-partners-with-jd-cloud/</link>
            <pubDate>Tue, 28 Apr 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ Our mission is to help build a better Internet, for everyone, everywhere. So, today we’re excited to announce a significant strategic partnership with JD Cloud & AI, the cloud and intelligent technology business unit of Chinese Internet giant JD.com.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>It’s well known that global companies can face challenges doing business in and out of China due to the country’s unique rules, regulations, and norms, not to mention recent political and trade complications. Less well known is that China’s logistical and technical network infrastructure is also quite different from the rest of the world’s. With global Internet traffic up 30% over the past month due to the pandemic, these logistical and technical hurdles are increasing the burden for global businesses at exactly the wrong time. It’s now not unusual for someone based in China to have to wait extended periods and often be unable to access applications hosted elsewhere, or vice-versa, due to the lower performance of international Internet traffic to and from China. This affects global companies with customers, suppliers or employees in China, and Chinese companies who are trying to reach global users.</p><p>Our mission is to help build a better Internet, for everyone, everywhere. So, today we’re excited to announce a significant strategic partnership with JD Cloud &amp; AI, the cloud and intelligent technology business unit of Chinese Internet giant JD.com. Through this partnership, we’ll be adding 150 data centers in mainland China, an increase in the region of over 700%. The partnership will also enable JD to provide a Cloudflare-powered service to China-based customers. As a result, it will create a one-stop solution for companies both inside and outside of China to go truly global.</p>
    <div>
      <h3>Cloudflare’s Long Experience in China</h3>
      <a href="#cloudflares-long-experience-in-china">
        
      </a>
    </div>
    <p>Cloudflare has helped our global customers deliver a secure, fast, and reliable Internet experience for China-based visitors since 2015 and we’ve served Chinese customers since our inception. Cloudflare customers currently are able to extend their configurations with the click of a button across data centers in 17 cities in mainland China. As a result, they’re able to deliver their content faster, more securely, and reliably in-country. The demand for the service has been overwhelming, and we’ve been exploring ways to provide our customers with a network that would have an order of magnitude greater coverage.</p>
    <div>
      <h3>China’s Balkanized Network Architecture</h3>
      <a href="#chinas-balkanized-network-architecture">
        
      </a>
    </div>
    <p>What we’ve learned from our experience is that having a widely distributed network and world class partners in China matters more there than almost anywhere else in the world. To understand why, it’s important to understand the specific technical and logistical hurdles that exist there.</p><p>China has a non-uniform technical and network infrastructure, directly impacting Internet performance. Mainland China has three major telecom carriers—China Telecom, China Unicom, and China Mobile—serving 22 provinces, 4 municipalities, and 5 autonomous regions. In many of these places, each carrier operates a distinct network and in some provinces more than one network, that in many cases, operate independently of one another. The result is many different sub-networks that need to be coordinated.</p><p>Regulatory hurdles in the network space can also present challenges. Unlike the rest of the world, where Anycast routing is generally available, in China the three main ISPs control IP address allocation and routing for customers’ networks both inside the country and globally. Small or large companies rarely own their own IP address allocations, and even fewer use <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/">BGP</a> to control Internet routing. Because of the lack of BGP and the static allocation of IPs, the carriers’ customers operate on IP addresses that are homed onto a single network’s backbone.</p><p>The combination of this single-homed IP connectivity and the fragmented network topography leads to frequent bottlenecks between the various domestic ISPs. This makes network coverage all the more important. Add in a rapidly expanding economy with growing Internet activity, and extraordinary times such as these which puts even more strain on the Internet, and it's easy to see why situations regularly occur where too much traffic is paired with too little capacity.</p>
    <div>
      <h3>The Challenge of Putting Boots on the Ground</h3>
      <a href="#the-challenge-of-putting-boots-on-the-ground">
        
      </a>
    </div>
    <p>Compounding these hurdles further is that, from a business and logistics perspective, China is similarly a collection of sub-markets. There are huge variations between provinces in terms of population levels, average income, consumer spending, and the like. Regional business regulations also vary dramatically_._ Although it is slowly opening up to outside competition, the Chinese transportation and logistics market is one of the most highly regulated in the world. Regulation exists at a number of different tiers, imposed by national, regional, and local authorities. Finally, there are shortages of high-quality logistics facilities and warehousing spaces, making it hard to find domestic providers for managing import, export, and local transportation as well as trade compliance. You often have to hire consultants who specialize in the China market to assess quality, trustworthiness, and other factors.</p><p>This makes it challenging both for foreign companies seeking a fast, secure, and reliable Internet experience but also, as we often hear from our customers, to navigate China more generally.</p>
    <div>
      <h3>The Importance of a World Class Local Partner</h3>
      <a href="#the-importance-of-a-world-class-local-partner">
        
      </a>
    </div>
    <p>Given these technical, logistical, and regulatory complexities, it’s very difficult for foreign companies to navigate the China landscape without local expertise. Partnering with JD Cloud &amp; AI provides not only local expertise, but also a relationship with one of the world’s largest logistics, e-commerce, and Internet companies, JD.com.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fsQ9DPgcc9a42IeuA1H80/837597ecb32796aaafff416be06cd6d0/image1-22.png" />
            
            </figure><p>JD.com is a juggernaut, operating at a scale that’s rare among global companies. It’s China’s largest retailer by revenue, online or offline, with one billion retail customers, a quarter billion registered users, seven million enterprise customers, and $83 billion in 2019 revenue. Its highly automated logistics system uses robots, AI, and fleets of drones to cover 99% of China’s population.</p><p>JD decided several years ago to open its technology platform to its enterprise customers and began offering cloud services through a new business unit called JD Cloud &amp; AI. JD Cloud &amp; AI has quickly become the fastest growing cloud company among the top five Chinese providers. It offers a full range of services across eight availability zones in China and has made security and compliance a key part of its offering. In line with its parent company, JD Cloud &amp; AI has made serving a global audience a key part of its strategy and has partnered with the likes of Microsoft and Citrix to build on this strategy. Importantly, like Cloudflare, the company has continued to invest in its infrastructure through the current pandemic, and has been critical to keeping China’s supply chains flowing and its businesses functioning.</p>
    <div>
      <h3>Taking International Companies Into China &amp; Chinese Companies Global</h3>
      <a href="#taking-international-companies-into-china-chinese-companies-global">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48ZuR8tq7LY0H8kRGDilL8/7b092ae5b059375e655fa2cb70c311a9/image3-16.png" />
            
            </figure><p>Our partnership with JD Cloud &amp; AI will allow international businesses to grow their online presence in China without having to worry about managing separate tools with separate vendors for security and performance in China. Customers will benefit from greater performance and security inside China using the same configurations that they use with Cloudflare everywhere else in the world.</p><p>Using Cloudflare's international network outside of China, and JD Cloud &amp; AI’s network inside of China, any enterprise can rapidly and securely deploy cloud-based firewall, WAN optimization, distributed denial of service (DDoS) mitigation, content delivery, DNS services, and Cloudflare Workers, our serverless computing solution, worldwide. All with the click of a button within Cloudflare’s dashboard and without deploying a single piece of hardware.</p><p>For those customers who need it, we also expect JD.com to be able to help with in-country logistics. JD operates over 700 warehouses that cover almost all the counties and districts in China. It has over 360 million active individual consumers and seven million enterprise customers that purchase products on its platform. For Cloudflare customers interested in reaching these Chinese end-customers, no matter where they are located in China, JD.com will be able to help.</p><p>The partnership with JD Cloud &amp; AI will also allow us to help Chinese companies reach global audiences. JD Cloud &amp; AI will use Cloudflare's international network outside of China, and the JD Cloud &amp; AI network inside of China, to allow any China-based enterprise to use Cloudflare’s integrated performance and security services worldwide, all seamlessly controlled from within the JD Cloud &amp; AI dashboard.</p>
    <div>
      <h3>Data Management</h3>
      <a href="#data-management">
        
      </a>
    </div>
    <p>As always, we’re taking care to be thoughtful about the treatment of customer data with this partnership. Cloudflare operates all services outside of China, and JD Cloud &amp; AI all services inside of China. No Cloudflare customer traffic passes through the China network unless a customer explicitly opts-in to the service. And, for Cloudflare customers that opt-in to proxying content inside China, traffic and log data from outside of China is not stored in the China network or shared with our partner.</p>
    <div>
      <h3>A One-Stop, Truly Global Solution</h3>
      <a href="#a-one-stop-truly-global-solution">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gYYS74USRLYJTJ3D0A4pW/2b7f4f6f6a6092d688e58136bad5486d/image4-12.png" />
            
            </figure><p>We are excited about this new partnership which will help us continue to offer customers the best performance and security service available anywhere in the world — and as a one-stop solution. While we can’t control the trade and political climate, which will inevitably ebb and flow over time, we can help our customers with technical and logistical challenges they may face doing business around the world, especially in these challenging times.</p><p>New and existing Cloudflare customers can request to be served in China by filling out an information request at <a href="https://www.cloudflare.com/china">https://www.cloudflare.com/china</a>.</p> ]]></content:encoded>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[China]]></category>
            <guid isPermaLink="false">6z1LnqRilJle9LipgidTAp</guid>
            <dc:creator>Alex Dyner</dc:creator>
        </item>
        <item>
            <title><![CDATA[Technology's Promise - Highlights from DEF CON China 1.0]]></title>
            <link>https://blog.cloudflare.com/technologys-promise-def-con-china-1-0-highlights/</link>
            <pubDate>Wed, 05 Jun 2019 01:00:00 GMT</pubDate>
            <description><![CDATA[ Themed "Technology's Promise", DEF CON China 1.0 kicked off on 5/30 in Beijing. The Cloudflare team from Beijing, Singapore and San Francisco attended to connect with local security communities. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>DEF CON is one of the largest and oldest security conferences in the world. Last year, it launched a beta event in China in hopes of bringing the local security communities closer together. This year, the organizer made things official by introducing DEF CON China 1.0 with a promise to build a forum for China where everyone can gather, connect, and grow together.</p><p>Themed "Technology's Promise", DEF CON China kicked off on 5/30 in Beijing and attracted participants of all ages. Watching young participants test, play and tinker with new technologies with such curiosity and excitement absolutely warmed our hearts!</p><p>It was a pleasure to participate in DEF CON China 1.0 this year and connect with local communities. Great synergy as we exchanged ideas and learnings on cybersecurity topics. Did I mention we also spoiled ourselves with the warm hospitality, wonderful food, live music, and amazing crowd while in Beijing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/631WXvH0WtXeUtLhRDv1Gi/38b69e39cc007b62d007af9522f4ef55/REVGIENPTiBFdmVudCBIaWdobGlnaHQuanBn-1.jpeg.jpeg" />
            
            </figure><p>Event Highlights: Cloudflare Team Meets with DEF CON China Visitors and Organizers (DEF CON Founder Jeff Moss and Baidu Security General Manager Jefferey Ma)</p><hr /><blockquote><p>Meet our youngest and cutest attendee today at BugZee village. Meet 8 year old "Joy" from Beijing who did phenomenal soldering. Amazing crowd at <a href="https://twitter.com/defcon?ref_src=twsrc%5Etfw">@defcon</a> China. <a href="https://t.co/ub1qpGyGso">pic.twitter.com/ub1qpGyGso</a></p><p>— Abhinav SP | #BugZee, DEFCON China (@TweetsFromPanda) <a href="https://twitter.com/TweetsFromPanda/status/1134370788037939200?ref_src=twsrc%5Etfw">May 31, 2019</a></p></blockquote><p>Youngest DEF CON China Participant Explores New Technologies on the Eve of International Children's Day. (Source: <a href="https://twitter.com/TweetsFromPanda/status/1134370788037939200">Abhinav SP | #BugZee, DEFCON China</a> )</p><hr /><blockquote><p>All my root lights are on! <a href="https://twitter.com/hashtag/unlocked?src=hash&amp;ref_src=twsrc%5Etfw">#unlocked</a> <a href="https://twitter.com/hashtag/DEFCONChina?src=hash&amp;ref_src=twsrc%5Etfw">#DEFCONChina</a> 1.0 <a href="https://twitter.com/defcon?ref_src=twsrc%5Etfw">@defcon</a> <a href="https://twitter.com/hashtag/badgelife?src=hash&amp;ref_src=twsrc%5Etfw">#badgelife</a> <a href="https://twitter.com/Hyr0n1?ref_src=twsrc%5Etfw">@Hyr0n1</a> ?? <a href="https://t.co/YXJDW0vuds">pic.twitter.com/YXJDW0vuds</a></p><p>— donds (@donds) <a href="https://twitter.com/donds/status/1134387956221763585?ref_src=twsrc%5Etfw">May 31, 2019</a></p></blockquote><p>The Iconic DEF CON Badge, Designed by <a href="https://twitter.com/joegrand">Joe Grand</a>, is a Flexible Printed Circuit Board that Lights up the Interactive "Tree of Promise".</p><hr />
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FGzuUQfGjQrqTzrL62LJ7/8a8299105acf870868920c8e62aedbea/BCTF-2.jpg" />
            
            </figure><p>The Capture The Flag (CTF) Contest is a Continuation of One of the Oldest Contests at DEF CON Dating Back to DEF CON 4 in 1996.</p><hr />
    <div>
      <h3>Cloudflare's Mission is to Help Build a Better Internet</h3>
      <a href="#cloudflares-mission-is-to-help-build-a-better-internet">
        
      </a>
    </div>
    <p>Founded in 2009, Cloudflare is a global company with 180 data centers across 80 countries. Our Performance and Security Services work in conjunction to reduce latency of websites, mobile applications, and APIs end-to-end, while protecting against DDoS attack, abusive bots, and data breach.</p><p>We are looking forward to growing our presence in the region and continuing to serve our customers, partners, and prospects. Sign up for a free account now for a faster and safer Internet experience: <a href="https://dash.cloudflare.com/sign-up">cloudflare.com/sign-up</a>.</p>
    <div>
      <h3>We’re Hiring</h3>
      <a href="#were-hiring">
        
      </a>
    </div>
    <p>We are a team with global vision and local insight committed to building a better Internet. We are hiring in Beijing and globally. Check out the opportunities here: <a href="https://www.cloudflare.com/careers/">cloudflare.com/careers</a> and join us at Cloudflare today!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2VsBvK7tqeA17nHS1nqcFY/a941d166dc14f492092897a905fd1f6f/Cloudflare-Team-1.jpg" />
            
            </figure><p>The Cloudflare Team from Beijing, Singapore, and San Francisco</p> ]]></content:encoded>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">2pzeTUduUCTu1693ULip55</guid>
            <dc:creator>Claire Tsai</dc:creator>
        </item>
        <item>
            <title><![CDATA[One night in Beijing]]></title>
            <link>https://blog.cloudflare.com/one-night-in-beijing/</link>
            <pubDate>Mon, 20 May 2019 22:25:00 GMT</pubDate>
            <description><![CDATA[ As the old saying goes, good things come in pairs, 好事成双！ The month of May marks a double celebration in China for our customers, partners and Cloudflare. ]]></description>
            <content:encoded><![CDATA[ <p></p>
    <div>
      <h3>As the old saying goes</h3>
      <a href="#as-the-old-saying-goes">
        
      </a>
    </div>
    <p>Good things come in pairs, 好事成双！ The month of May marks a double celebration in China for our customers, partners and Cloudflare.</p>
    <div>
      <h3>First and Foremost</h3>
      <a href="#first-and-foremost">
        
      </a>
    </div>
    <p>A Beijing Customer Appreciation Cocktail was held in the heart of Beijing at Yintai Centre Xiu Rooftop Garden Bar on the 10 May 2019, an RSVP event graced by our supportive group of partners and customers.</p><p>We have been blessed with almost 10 years of strong growth at Cloudflare - sharing our belief in providing access to internet security and performance to customers of all sizes and industries. This success has been the result of collaboration between our developers, our product team as represented today by our special guest, Jen Taylor, our Global Head of Product, Business Leaders Xavier Cai, Head of China business, and Aliza Knox Head of our APAC Business, James Ball our Head of Solutions Engineers for APAC, Kate Fleming our Head of Customer Success for APAC, most importantly, by the trust and faith that our partners, such as Baidu, and customers have placed in us.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XYYj9SLR0xyjwljFrGlTJ/689a20ce46fe5a2c27e6aa91e948207c/IMG_3448-copy.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4G3zqEjgh7Cyc920qOPvzH/0322c965359d16f8db616e8b2fffaa8a/IMG_1655-copy.jpg" />
            
            </figure>
    <div>
      <h3>Double Happiness, 双喜</h3>
      <a href="#double-happiness-shuang-xi">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/32nP9c4kd4hYQeksYaD4jv/12f6a88495c5127d988dd092679529fe/xi.png" />
            
            </figure><p>On the same week, we embarked on another exciting journey in China with our grand office opening at WeWork. Beijing team consists of functions from Customer Development to Solutions Engineering and Customer Success lead by Xavier, Head of China business. The team has grown rapidly in size by <b>double</b> since it started last year.</p><p>We continue to invest in China and to grow our customer base, and importantly our methods for supporting our customers, here are well. Those of us who came from different parts of the world, are also looking to learn from the wisdom and experience of our customers in this market. And to that end, we look forward to many more years of openness, trust, and mutual success.</p><p>感谢所有花时间来参加我们这次北京鸡尾酒会的客户和合作伙伴，谢谢各位对此活动的大力支持与热烈交流！</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/iGMQ8DQENYjqklFpMV3JW/018863c319d8b8e56e7480c2fdcc4cda/IMG_3469-copy.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1xLHBxJaVB2yG0sKPHkelg/7ef279f6b9a020814c78f3e2c62f8779/11557641032_.pic.jpg" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Events]]></category>
            <guid isPermaLink="false">u3tX1DVz8UgGRt1GzAFHJ</guid>
            <dc:creator>Chris Chua</dc:creator>
        </item>
        <item>
            <title><![CDATA[China | Silicon Valley | China: A path less traveled]]></title>
            <link>https://blog.cloudflare.com/china-silicon-valley-china/</link>
            <pubDate>Wed, 10 Apr 2019 13:00:00 GMT</pubDate>
            <description><![CDATA[ Don’t tell our CEO, Matthew Prince, but the first day I interviewed at Cloudflare I had a $9.00 phone in my pocket, a knock-off similar to a Nokia 5140, but the UI was all in Chinese characters—that phone was a fitting symbol for my technical prowess.  ]]></description>
            <content:encoded><![CDATA[ <blockquote><p>“Real knowledge is to know the extent of one's ignorance.”― Confucius</p></blockquote>
    <div>
      <h3>Blueprint:</h3>
      <a href="#blueprint">
        
      </a>
    </div>
    <p>Don’t tell our CEO, Matthew Prince, but the first day I interviewed at Cloudflare I had a $9.00 phone in my pocket, a knock-off similar to a <a href="https://nokiamuseum.info/nokia-5140/">Nokia 5140</a>, but the UI was all in Chinese characters—that phone was a fitting symbol for my technical prowess. At that time in my career I could send emails and use Google, but that was about the extent of my tech skill set. The only code I’d ever seen was in the Matrix, Apple computers confused me, and I was working as a philosophy lecturer at The University of California, Santa Cruz. So, you know, I was pretty much the ideal candidate for a deeply technical, Silicon Valley startup.</p><p>This was in 2013. I had just returned from two years of <a href="https://www.peacecorps.gov/">Peace Corps</a> service in the far Southwest of China approaching the Himalayan plateau. That experience gave me the confidence to walk into Cloudflare’s office knowing that I would be good for the job despite the gaps in my knowledge. My early training in philosophy plus my Peace Corps service gave me a blueprint for learning and figuring things out when thrown into the deep end (it turns out that I love being thrown into the deep end and learning to swim).</p><p>I had no idea that this first meeting with Matthew would eventually lead me back to China, this time riding on the cloud of a fast-growing Silicon Valley tech giant.</p><p>Two years earlier, eighty Peace Corps Volunteers and myself landed in the capital of Sichuan province, Chengdu. The vast majority of us, myself included, spoke zero Mandarin and only knew about China from books and a few news snippets here and there. The Chinese staff members that greeted us at the Peace Corps China headquarters on the Sichuan University campus affectionately called us “baby pandas”, because we were cute and fairly incompetent in terms of operating in China.  </p><p>Our mission was to help China meet its need for trained men and women—specifically to teach college level students English and train qualified Teachers of English as a foreign language instructors (TEFL instructors). We were also there to promote a better understanding of Americans abroad, and to do our best to gain some understanding of China and its people.</p><p>Thus began two years of deep learning and profound personal growth.</p><p>When I think about the most important aspects of my time in China, there are three fundamentals that I come back to:</p><ul><li><p>The importance of learning the language and culture</p></li><li><p>The importance of 关系 (guanxi) or personal connections and relationships</p></li><li><p>The necessity of being resourceful</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7suuGB13AdbgTa95c7xJO1/9dfd0000c984dad929b7f3c23cc9c4ce/Peace-Corps.png" />
            
            </figure><p>The most successful Peace Corps volunteers in my cohort were the ones that learned to speak Mandarin well, understood enough about Chinese culture to operate effectively in their schools and communities, had built important personal and professional relationships, and had figured out how to survive in Southwest China and be useful as English language resources and American cultural liaisons. There was a steep learning curve.</p><p>Peace Corps Service in China has four phases more or less. Phase one, Pre Service Training (PST), took place at Sichuan University. We were all living with Chinese host families, taking 8-9 hours of Mandarin class each day, learning about Chinese culture, and being trained as TEFL instructors. It is an intense period of learning against a backdrop of tremendous culture shock, jet lag, and general confusion of how to be an American in Southwest China.</p><p>After three months of well taught crash courses, I was sent out to the college where I would spend the next two years of my service. That first night, after I unpacked my bags and took a shower, the reality of my life decisions came crashing down. This was going to be *very* hard. I was alone with millions and millions of Chinese people in remote Sichuan. Phase two was about to begin.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WOAgUyjlpKsOFHC7twHwu/52c5927b1fcdcbf0e578543480e5c9ee/Landscape.jpg" />
            
            </figure><p>This is Yibin (宜宾), the city I lived in for two years. A small city in China of just 5,000,000 people right on the Yangzi river. Photo taken from the countryside looking towards the center of town.</p><p>Getting familiar with the college where I was to spend two years was another steep learning curve. I was introduced to the colleagues I’d be teaching with as well as the school administrators, and, most importantly, I was introduced to my students. I got lucky, the English department at my school was small, and I only had 20-30 students in each of my classes. I met with them 4 times a week for two hours a day, so I had ample time to really get to know them and work with them one-on-one in the classroom, during office hours, and over spicy Sichuan dinners.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YflrX1Yns6qosAKfkPgKt/c2736dcaec37ec44159def6076ab517c/Classroom2.jpg" />
            
            </figure><p>Me and a few of my top students.</p><p>That first year of service I studied Mandarin as if my life depended on it—because it sort of did. Few people, i.e. my students and colleagues, spoke English in rural Sichuan. As I was able to communicate better in Mandarin, my understanding of the culture grew and so did my relationships with folks at my school and community.</p><p>In an effort to understand more about the culture I was living in, I gave myself an education in Chinese philosophy starting with Confucius (孔子) and the Daoist like Laozi (老子) and Zhuangzi (庄子), and I also looked into Buddhism. Since the world’s wisdom traditions contain universal principles that transcend time and culture, these readings gave me subtle insights into the Chinese way of life. I learned that Confucianism is the invisible glue holding much of Chinese society together. And while Confucius spoke to Chinese society and how people ought to act, his contemporary, Laozi, considered the founder of Daoism, spoke to the Chinese soul via the Dao de Jing (道德经).</p><p>Apropos of philosophy, one beautiful Chinese proverb I found in my reading goes: “Only those who take leisurely what the rest of the world is concerned about, can be concerned about with the rest of the world takes leisurely”. A calligraphy artist at my school gifted me a piece of work expressing this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1xvrpe5s4bcZ4DX44vvMve/d23be7405985cc5d4212961799b5aa46/image17-2.jpg" />
            
            </figure><p>I also learned early on in my service what my students needed: authentic opportunities to express themselves in English, understanding and encouragement, and a solid English text book that employed the latest pedagogical techniques for learning a foreign language. Since my Mandarin was slow going, my students had all sorts of authentic opportunities to speak to me in English. They ended up helping me translate a lot that first year as I navigated my life on campus. As for encouragement, I would often talk to them in my developing and broken Mandarin in front of the class. I messed up words and tones constantly, and they laughed (hard) and then kindly corrected me. In this way, I showed them that learning is all about making mistakes, and that it is fine to get it wrong as you begin. There is no other way to learn a language (or anything else). The last part, providing a solid textbook, would be more tricky.</p><p>I received enough training during PST to have some good ideas for teaching English as a foreign language, but I had no experience writing a language textbook. What I ended up doing was replicating the structure of the textbooks I was using to learn Mandarin: a dialogue which incorporates a few new vocab words, a list of those new vocab words, grammar practice using grammatical structures from the dialogue, and then photos of relevant objects or scenes that would allow students to use new vocabulary words to describe the photos using new words and structures. I would record these dialogues and then distribue the audio file to my students so they could hear my pronunciation.</p><p>We’d work with this dialogue, vocabulary, and grammar all week, then on Fridays I’d put them in a “language line”. Sort of like speed dating, but they would have to hold a conversation with their classmates around the topic of that week and use the new vocab words. I’d listen in and help guide them. Then at the end of class, we’d form a line and I’d ask each one of them a question individually that they had to answer before they could leave the classroom. This pushed each student into learning so that they could actually speak English confidently to a native English speaker. It was a rewarding project.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BqeMeM9r0nTZXIOzzDjpe/4ba0216737c1844630fd97dd3904eb14/Classroom.jpg" />
            
            </figure><p>My mom sent Halloween candy for my students in October. They were *very* excited.</p><p>My students were super smart and diligent, and week after week their English level was going up. I was able to hold natural conversations with them while speaking slow, and my Mandarin was progressing to the point that I could clarify things in Mandarin to aid their English learning. And so I learned how to teach English.</p><p>I consider all of the second year of service phase three. It is in that second year that volunteers can do really great work. My language level was high enough to really communicate with my community and explore China more, I had a basic structure for teaching and kept honing it to fit the needs of my students, and I developed a lot of really important relationships with the administrators at my school and other wonderful folks in the area.</p><p>Phase four is the return to the US. Something that no one told me about Peace Corps service before I joined is that you actually sign up for three years, not two. And that the third year, the first year back home after service, would be the most challenging by far … readjusting to life in the US, starting up or continuing a career, feeling a million miles behind peers who cranked through two extra years in a work world. All of this while trying to work on one of the most important goals of the Peace Corps—Goal 3—helping Americans better understand China through my experiences. I’m doing this every chance I get. This blog is a part of fulfilling Goal 3.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73taboUCrN9S6j6RoXhkjL/acf944344e0ca0058834923a53fdebd0/Finish-Him.jpg" />
            
            </figure><p>Me and my good friend, 兵哥, goofing around in the Sichuan countryside after a long bike ride.</p><p>My service in China impacted me in profound ways. I have a love and respect for China that was born of close contact with the wonderful people, culture, philosophy, and language I was steeped in. And it gave me a clear experience of my ability to grow and change and acquire new skills swiftly. By the end of my time, I could confidently hold a conversation in Mandarin, I could read sections of Chinese newspapers, I had written an English text book for my students, and I made so many friends. All of that came from slow, diligent, hard work—and finding the necessary resources to get things done for my students in non-obvious ways. I had a clearly outlined experience of what diligence and time can do, and I knew deep in me is the potential to learn, adapt, and grow into almost anything.</p><p>Two years of remote Peace Corps work (which, despite being among millions of Chinese people, is often an isolating experience) gave me ample time to reflect on my life. While I find teaching deeply rewarding and I love the study of philosophy, I felt that I needed a different pool to swim in than academia. I thought that the private sector would likely offer the most opportunity, so when I came back to the US, I decided to move to San Francisco and aim for a job in tech. I figured that would be like plunging into the ocean, and I was keen to see where the global economic currents might take me.</p><p>In the first few weeks I was back in the US I set up 4-5 informational interviews each week. I spoke to people at Google and Square, folks working in event planning, in finance, in HR, in construction, etc. Then one of my colleagues at the university mentioned that their friend (Matthew) had a tech startup called “Cloudflare” and could maybe use some help writing stuff. I followed up right away.</p>
    <div>
      <h3>Career Change: From teaching to tech - How Hard Can It Be?</h3>
      <a href="#career-change-from-teaching-to-tech-how-hard-can-it-be">
        
      </a>
    </div>
    <p>Despite hours of Googling “What is a Cloudflare?”, I was utterly and completely out of my depth when Matthew explained to me what the company does. Before my interview with him, I had done my homework memorizing definitions for acronyms like CDN, DNS, DDoS, and API, but I didn’t really know what they were. The instructions I received before the interview were to learn a bit about how Cloudflare works, and “Don't wear a suit and tie”. This was a time in Cloudflare history when we had about 60 employees, about 30 data centers, and a bit of duct tape in the office pressing extension cords into the carpet.  </p><p>I was intimidated speaking to Matthew the first time. He is an amazingly accomplished and incredibly intelligent person. I checked out his LinkedIn profile, and I didn’t know anything about SPAM, law school, business school, being an entrepreneur, or how the Internet works. The folks in Peace Corps China always talked about being resourceful, so I looked for and found an opportunity to connect with him on a level that I could grasp. Matthew, who has unbelievable credentials and professional accolades, still has “Ski Instructor” on his LinkedIn profile somewhere between “Adjunct Professor of Law” and “Harvard Business School”:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XT1XJSMkfnkGSmfJYjAtd/6c2f0447c7f009bc3a62ce51f25fdbda/LinkedIn.png" />
            
            </figure><p>I had just spent all of my time in China aiming to build relationships with my students and other people in my community that were from vastly different backgrounds and trying to find common ground from which to build rapport and trust. I thought, if someone this accomplished keeps their ski instructor experience on their resume, it must have a lot of meaning. I’m glad I followed that intuition because this topic led to a great conversation with Matthew about hometowns, ski trips, and ski equipment, which eventually lead to a conversation about surfing and surfboards, which is right in my wheelhouse. It turned out to be a great interview because we connected over things that we both found important. We found a piece of common ground that didn’t seem obvious at first---part of that being a deep curiosity for how and why things work. Looking back five years, I can say without reservation that finding a way to connect with Matthew that day has had a profoundly positive impact on the course of my life.</p><p>When it came time for me to interview with our co-founder, Michelle, she understood that I had a lot to learn about the company, and she took the time to draw out a simplified map of Cloudflare’s network on a yellow legal pad. She drew jagged, little clouds around the world and patiently explained what global caching is, how Anycast networking helps with DDoS attacks, and how DNS is like the phone book of the Internet. I was struck that such a highly intelligent person, HBS grad, co-founder of a major tech firm would take time out of their busy day to do this. I learned later that Michelle is always like this. She is amazing with names, stops to talk to folks in the office whenever she can, and sets a tone of respect, compassion, and understanding at the office. It is inspiring.</p><p>I then had a video interview with <a href="https://www.jgc.org/">John Graham-Cumming</a>, our CTO, who was in London. There was no getting away from tech with this interview. So I Googled everything I could about John. I read his book <a href="https://www.amazon.com/gp/product/0596523203?ie=UTF8&amp;tag=jgcorg-20&amp;linkCode=as2&amp;camp=1789&amp;creative=390957&amp;creativeASIN=0596523203">Geek Atlas</a>, I watched <a href="https://www.ted.com/talks/john_graham_cumming_the_greatest_machine_that_never_was">his TED Talk</a>, and I looked into his interest in <a href="https://moviecode.tumblr.com/">Movie Code</a>. I was ready for this interview. We talked about the Parkes Radio Telescope in Australia, Alan Turing, and about the code in the Matrix (thank you, Neo!). John is a fascinating speaker and a legend in the technology space. He is also kind and patient, and he never made me feel silly for not grasping technical concepts right away.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2JZbMaMKklcCY6CjTjABa4/6439632d1f08ca47d3c9aa2cca489eca/Matrix.png" />
            
            </figure><p>After 6-7 interviews over the following weeks, the feedback I got was that I was a good culture fit, I was hard-working and smart, but I just didn’t have the technical knowledge to do the job. That feedback seemed spot on, but I wasn’t going to let that hold me back. I knew I could be useful to this company. I knew that if they gave me a shot and threw me into the deep end that I would learn to swim. I knew what I needed to do: learn the language and culture of Silicon Valley, make connections, and be resourceful.</p><p>I stood outside of the old Cloudflare office at 665 3rd St. in San Francisco, and I told myself that I have to get in that door. I didn’t know exactly what they are doing in there, but it seemed weird and interesting, and I wanted to be a part of it.</p><p>So I started learning. Another returned Peace Corps volunteer that I’d met in the Bay Area sat down with me one weekend and helped me build a simple website from the ground up. In the most basic HTML and CSS, we embedded <a href="http://www.poshcorps.com/shortschina">a video we made about my China experience</a>. On the site I made the background color orange to match the Cloudflare logo and wrote something like, “Check it out Matthew and Michelle, I’m learning how to write code!”, and I sent them the link.</p><p>In the following weeks, I sent more follow up emails to Matthew than felt polite. But it worked. Matthew, Michelle, and John took a huge risk on me, and I got an offer to be Cloudflare’s “Writer” (since that was really the only thing that made sense for an academic philosopher to do at a tech firm). They actually gave me business cards that read: Andrew A. Schafer - Writer.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3x5bETruleteX2RC0vboQq/e5e756e88f46248f82ee2a251cc55cb4/Writer.jpg" />
            
            </figure><p>When I accepted the offer via email, Matthew wrote back saying that getting up to speed with Cloudflare was “going to be like drinking from a fire hose”.</p>
    <div>
      <h3>Drinking from the Fire Hose:</h3>
      <a href="#drinking-from-the-fire-hose">
        
      </a>
    </div>
    <p>On day one, I sat down next to the folks on the Data Team and introduced myself. They all said a quick, polite “hi” and then put their head phones back on immediately and continued to write code. I didn’t learn for a long time that engineers DO NOT like to be interrupted when they are coding. This is a key feature of tech culture.</p><p>I spent part of my first week at Cloudflare watching a lot of YouTube videos by <a href="https://www.elithecomputerguy.com/">Eli the computer guy.</a> He does a great job explaining DNS, the OSI model, basic networking, etc. He even has <a href="https://www.youtube.com/watch?v=R9oN5RK8JAQ">an older video about Cloudflare</a>, which was super helpful (Thank you, Eli!).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5iotI0exQQdT9sUwCU4Pvs/08f8fe416941bcb157cb9a53c3369f55/Eli-the-Computer-Guy-3.png" />
            
            </figure><p>Eli, The Computer Guy</p><p>At one point John Graham-Cumming walked past my desk and asked me why I was staring at that man in the orange shirt so much. I turned around and exclaimed, “John, did you know that the Internet has LED lasers that blink on and off BILLIONS of times per second?!” He calmly replied, “yes” and then went about his business. That fact made my mind melt. I had so much to learn.</p><p>One of the first things I worked on as Cloudflare’s Writer was some of the PR efforts surrounding <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, DDoS attack protection for at-risk public interest websites, which I’m still proud of. I worked with our legal team to draft up <a href="/naming-project-galileo/">this blog post</a>, which helped me to understand the implications and power of Cloudflare’s technology in real-world terms.</p><p>I worked with <a href="/author/nick-sullivan/">Nick Sullivan</a> a whole bunch at the beginning also, which was mystifying. He is already a great writer and he was writing about <a href="/keyless-ssl-the-nitty-gritty-technical-details/">such complex things</a>. There were times where I was adding punctuation to sentences that made sense grammatically, but I didn’t understand their content. I learned a lot about encryption, and my tech vocabulary grew.</p><p>At one point I also helped John Graham-Cumming with a few blogs. John is a published author, so I didn’t really help him write anything, but I did help him bring his posts way down to my level. You can see my influence on this blog post about <a href="/inside-shellshock/">Shellshock</a>. That day I learned the term “zero day vulnerability”.</p><p>In that blog John wrote: “Attackers will also use an ACE vulnerability to upload or run a program that gives them a simple way of controlling the targeted machine. This is often achieved by running a "shell". I read his draft and I asked him, “What is a shell?”. A question, I learned much later, that was highly embarrassing to ask at a tech office. But I didn’t know, and I wanted to know. So we clarified that, “A shell is a command-line where commands can be entered and executed” in the post just in case other tech noobs like myself were trying to follow along. I learned how to be a translator from tech-speak to normal English.</p><p>I even researched and wrote a few posts of my own, <a href="/dyi-web-server-raspberry-pi-cloudflare/">like this one about Raspberry Pi’s fronted by Cloudflare</a>. I had no idea what a Raspberry Pi was before being asked to write this. Thankfully one of the folks on the Data Team had one and let me borrow it for a photo op. I learned about the inspiring philosophy behind <a href="https://www.raspberrypi.org/">Raspberry Pi</a> and the vibrant community that uses them.</p><p>As the official Cloudflare Writer, I was proud of writing the copy for our dashboard. That project was an amazing way for me to get to know a lot of key members of the engineering team and have them teach me exactly how each feature worked. I wrote out what I understood, clarified some points with them, and then made a pull request to get the explanations into the code base for our dashboard.  </p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dktSpkmfEtKXJv7S2uFGC/208c5f053d718c46e4124d757d313082/HSTS.png" />
            
            </figure><p>If you’ve ever used these help menus—you are welcome! (Note: lots of other Cloudflare team members have kept this updated and expanded.)</p><p>Eventually, I became an honorary member of the Data Team. It took some doing, but I <a href="https://learnpythonthehardway.org/">learned Python the hard way</a>, and I wrote a Python script that would print my name 100,000 times in the terminal. I crashed my machine when I tried to make it print my name 100,000,000,000,000 times. I learned something about code that day—it can break things.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Txh9d8wz5AWwdUnVXQCZE/eb70dc917473250d044db0e19302329d/Print-My-Name.png" />
            
            </figure><p>I ran this code while sitting next to the person who had built Cloudflare’s original database. I did a victory dance when I crashed my laptop I was so proud of myself. That is sort of like me bragging about my backyard badminton skills next to Serena Williams.</p><p>I dipped my toes into the language of code, and started to speak that language with the engineers around me. This helped me to learn an important lesson about tech culture: the deeper your technical understanding the greater the respect you receive.</p><p>Eventually, I was ready for a new challenge at Cloudflare—talking to our clients.</p>
    <div>
      <h3>Client Facing:</h3>
      <a href="#client-facing">
        
      </a>
    </div>
    <p>The first thing I learned in a client facing role at Cloudflare is that Cloudflare is not a widget or a nice-to-have—it is mission critical technology for everyone that uses it. When something goes wrong people are <b>very</b> upset. The second thing I learned in a client facing role at Cloudflare is that the Internet is a fragile little teacup and it runs on human trust—which is astonishing. The combination of those two facts created ample opportunity for me to develop my listening and communication skills.</p><p>I started by rereading How to Win Friends and Influence People, by Dale Carnegie and took special note of rule number four, which states, “Be A Good Listener”. I quickly graduated to the philosophy and practice of Nonviolent Communication, by Marshall B. Rosenberg. I ended up taking some NVC courses in San Francisco focused on listening skills in this style. I also took compassion meditation courses via Stanford a few years in a row, which had a profound impact on my ability to empathise with our clients.</p><p>While brushing up on and honing these interpersonal skills was helpful, what I learned in a lot of those early meetings with clients was that I need to understand Cloudflare’s technology better. It’s one thing to be able to talk about it, it’s a whole different thing to be able to understand it enough to solve real issues.</p><p>I decided to do the “homework” our Solutions Engineering team gives out to their hiring candidates. I had to learn command-line basics, create an origin web server on DigitalOcean, install Ubuntu, configure a firewall, install NGINX, create a simple website from HTML, add an image to that site, set up DNS, and then put Cloudflare in front of it.</p><p>I set up my first DNS record in Cloudflare to point to my origin server, and was like “OHHHHHHH SNAP! <i>That</i> is how DNS works! It maps my domain name to the IP address of my server!” Hands on learning makes all the difference.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/hw4cs8r2xuApanUvRuRxd/4a610059705876ce20a090f7641134bf/DNS.png" />
            
            </figure><p>And I learned that WWW is a subdomain of the apex!! What???</p><p>It wouldn't be a legit Cloudflare blog without more code, so here we go. I ended up writing (modifying) this amazing piece of code based on the NGINX HTML welcome page template:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4B3Vw5W0DxE9d5kLxdsvGu/c0b9c2295c204c8c6a958bf7263c4270/Code-Block.png" />
            
            </figure><p>Notice that I added an image:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bNXYPpch1GTROEczv5Dgj/38d27173e0f90a9a3b80f1483d8ef8e7/Developer.png" />
            
            </figure><p>I’m now a web developer! I’ve added yet another cat photo to the Internet. You are welcome world! (Note at the time of publishing my site is offline [I forgot to renew the domain—oopsy]).</p><p>Once I had my site up and running on Cloudflare, I learned how to make API calls to pull down the our Enterprise raw logs and use jq to sort them (jq, I learned, is “a lightweight and flexible command-line JSON processor”):</p>
            <pre><code>curl -H "X-Auth-Email: aschafer@cloudflare.com" -H "X-Auth-Key:
cc1e78b22222229b9d72643fbda69655579d" -H "Content-Type: application/json" 
"https://api.cloudflare.com/client/v4/zones/f5fb827cf31f628c1c0730bc4b0792d
d/logs/requests?start=0&amp;count=1" | jq 'select(.clientRequest.uri == 
"/admin"), .client.ip'| sort | uniq -c | sort -r</code></pre>
            <p><i>(Note: This cURL command does not contain a real API key. I learned the hard way to NEVER include the API key when sharing a cURL.)</i></p><p>I was so proud. I could say things like, “pull down the raw logs and pipe them into jq” to my clients, and I actually knew what I was saying—my tech language skills were improving.</p><p>I then read “<a href="https://hpbn.co/">High Performance Browser Networking</a>” by Ilya Grigorik. I didn't even understand what that title meant at first. I had to translate it into non-tech English. It turns out that, for example, Chrome is a high performance browser, which is a tool you use to navigate a network of computers, a.k.a. the Internet. So it is a guide book for building the most performant web apps within the limits of current browser and networking technology.</p><p>Grigorik’s philosophy resonates with me, “Good developers know how things work. Great developers know why things work.” Insert any other profession or art and the statement remains true.</p><p>It took me six months of reading on bus rides to work, but by the end I could say things like, WebSocket API, Subprotocol Negotiation, TLS OCSP Stapling, and TCP Head-of-Line Blocking. I learned from Grigorik that, “TCP provides the abstraction of a reliable network running over an unreliable channel, which includes basic packet error checking and correction, in-order delivery, retransmission of lost packets, as well as flow control, congestion control, and congestion avoidance designed to operate the network at the point of greatest efficiency. Combined, these features make TCP the preferred transport for most applications.” Who knew?</p><p>After putting so much work into learning what Cloudflare really does, I came to understand something fundamental about the tech world: <b>the learning never stops</b>. Never. The fire hose never turns off.  </p><p>When I started at Cloudflare we offered more domains and extra SSL cert hosting slots as our additional products. Now we have <a href="https://developers.cloudflare.com/workers/">Workers</a> and <a href="https://developers.cloudflare.com/access/">Access</a> and <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo</a> and <a href="https://developers.cloudflare.com/argo-tunnel/">Argo Tunnel</a> and <a href="https://developers.cloudflare.com/spectrum/">Spectrum</a> and <a href="https://www.cloudflare.com/load-balancing/">Load Balancing</a> and <a href="https://developers.cloudflare.com/stream/">Stream</a> and a <a href="https://developers.cloudflare.com/mobile-sdk/">Mobile SDK</a>, and the list keeps growing. And we all have to learn about all of this new technology as it gets released. It is amazing!</p><p>Over the last few years, I’ve learned the language of Silicon Valley, and more specifically, I can speak the language of Cloudflare fluently. That has made a huge difference in my career.</p>
    <div>
      <h3>Life @ 101 Townsend:</h3>
      <a href="#life-101-townsend">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2HNTv1JlNagGpnS6R7WOgG/e852fe99399ed466519c58ddbacecb83/101-Townsend.jpg" />
            
            </figure>
    <div>
      <h3>Big Horse:</h3>
      <a href="#big-horse">
        
      </a>
    </div>
    <p>I’ve enjoyed a lot of successes at Cloudflare, but the one achievement I’m most proud of is creating the “Big Horse Award for Strong Work”.</p><p>The idea for this came directly from chapter 2 of How to Win Friends and Influence People: “Give honest and sincere appreciation”. I make it a point to tell the folks I work with that they are doing outstanding work every chance I get because the folks I work with really are doing outstanding work all the time, and they should know about it.</p><p>Maybe three years ago <a href="/author/tom-brightbill/">my best friend at Cloudflare</a> sent me a message via HipChat that read something like: “Hey Big Horse, you check that Jira ticket yet?”. From that day forward I called everyone “Big Horse” on HipChat at all times, which I thought was hilarious and everyone else thought was weird or annoying.</p><p>Shortly after that, in an effort to step up my “Give honest and sincere appreciation” game, I started sending emails to the whole company pointing out the strong work our support team was doing in our Zendesk customer support tickets. Our support team is world-class, but since only a few teams in the office can access Zendesk, a lot of folks internally don’t see their amazing work. I decided to take screenshots of tickets that were particularly well-handled and share them. I’d titled these emails “Strong Work, Big Horse!”. I quickly learned that emailing the whole company “does not scale”.</p><p>This culminated at one of our all hands B.E.E.R. meetings, where I gave out a Big Horse Award to a few outstanding members of our Support team. I had this stunningly beautiful trophy made for the occasion:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2GyAuNAZixH1TgDdDuwM5U/fed37da6a64ed94b40034eee4f8b85a6/Big-Horse-trophy-2.jpg" />
            
            </figure><p>We needed a logo, so I Googled “stupid horse drawings” and found an image. With a little editing via photo editor and PowerPoint, a meme was born:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21s6xyuNWwT1OqNwxq2TPP/f333a04c8f8af10f0f9769cd73f95895/Big-Horse.png" />
            
            </figure><p>Since then we’ve had all sorts of iterations of the Big Horse logo:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16iz2815pXuMd8O1hDFcyW/bfc4c754a23dae9da2ced7637d6f8772/Big-Horse-Evolution.png" />
            
            </figure><p>And we had paraphernalia made:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QYaaDW01hUH5yeVjiQg6u/62ce6c1bd0b73273930f8990d35d805e/Big-Horse-swag.png" />
            
            </figure><p>Our support team even spray painted “Big Horse” on the side of a building on 4th St in downtown San Francisco on a team outing:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HxcMxRmKMMICuAMANbBek/56d13da78c6c70e56176dc54dfd81490/Big-Horse-Graffiti.jpg" />
            
            </figure><p>We’ve issued a new Sparkle Lama award as well—since not everyone wants to be called a big horse:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66yXg1Qt0jTpLhgFqCovhe/4f62ddcb2c86d75560970df09156979d/Sparkle-Lama-2.png" />
            
            </figure><p>Many Cloudflare team members have Big Horse and Sparkle Lama stickers on their laptops, and we’ve shipped those golden big horse trophies around the world to our London and Singapore offices. These symbols have become easy ways to let our teammates know that they are doing great work. It is a small thing, but it adds up and helps make Cloudflare a great place to work.</p><p>Just a few weeks ago <a href="https://mobile.twitter.com/neilwlevine/status/1099051366079619072?s=19">this Tweet</a> was pointed out to me:</p><blockquote><p>"For a reason I don’t understand yet, members of the Cloudflare engineering team own over 2% of all active .horse domains in the world" &gt; <a href="https://t.co/IhGW55Oi2h">https://t.co/IhGW55Oi2h</a></p><p>— Neil Levine (@neilwlevine) <a href="https://twitter.com/neilwlevine/status/1099051366079619072?ref_src=twsrc%5Etfw">February 22, 2019</a></p></blockquote><p>Well, Neil, the reason for this is that a few engineers and myself had big plans of launching a website around the Big Horse Award, we bought big.horse and a few others, but we didn’t follow through—yet. Stay tuned.</p><p>The Big Horse and Sparkle Lama Awards are my contribution the tech culture I’ve been a student of these last few years.</p>
    <div>
      <h3>回中国 （Back to China)</h3>
      <a href="#hui-zhong-guo-back-to-china">
        
      </a>
    </div>
    <p>Five years after those first conversations with Matthew, Michelle, and John, I’m headed back to China with Cloudflare!</p><p>We are expanding our presence in China, and I have the good fortune (幸福) to combine the skills I acquired in philosophy and in the Peace Corps with the skills I acquired in Silicon Valley. We will be onboarding new Chinese clients, hiring more team members, and building out partnerships with other Chinese tech firms. I’m incredibly lucky to be headed back to a country that I love and embark on a new adventure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tGPIsz6d84fox4gCUbKEL/fb3aa8de0e61348f344484cf91118384/Red-1.jpg" />
            
            </figure><p>I have a whole new fire hose aimed at me, and I plan to drink deep. I’ve been taking Mandarin classes again, this time to learn words like encryption (加密), caching (缓存), and cloud software (云软件). I’ll be learning a whole new interpersonal skill set around working with clients in China and across Asia. And since the office is just starting, this project will be a new exercise in resourcefulness.</p>
            <pre><code> life_journey = ["China", "Silicon Valley", "China"]
for x in life_journey
   print(x)</code></pre>
            <p>I had no idea how much opportunity lay before me when I walked in the door as “the writer”, and I am profoundly grateful that Cloudflare took a chance on me. I plan to throw myself into this project in China, to learn and grow and contribute, and to figure out the best way to translate “Strong Work, Big Horse” into Mandarin.</p><p>我非常开心回去中国帮助成立我们的北京分部！</p> ]]></content:encoded>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Cloudflare History]]></category>
            <guid isPermaLink="false">345ByIXL2whCxRPpZVedfZ</guid>
            <dc:creator>Andrew A. Schafer</dc:creator>
        </item>
        <item>
            <title><![CDATA[IPv6 in China]]></title>
            <link>https://blog.cloudflare.com/ipv6-in-china/</link>
            <pubDate>Thu, 19 Jul 2018 00:03:37 GMT</pubDate>
            <description><![CDATA[ At the end of 2017, Xinhua reported that there will be 200 Million IPv6 users inside Mainland China by the end of this year.. Halfway into the year, we’re seeing a rapid growth in IPv6 users and traffic originating from Mainland China. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@chuttersnap?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">chuttersnap</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>At the end of 2017, Xinhua reported that there will be 200 Million IPv6 users inside Mainland China <a href="http://www.xinhuanet.com/english/2017-11/26/c_136780735.htm">by the end of this year</a>. Halfway into the year, we’re seeing a rapid growth in IPv6 users and traffic originating from Mainland China.</p>
    <div>
      <h3>Why does this matter?</h3>
      <a href="#why-does-this-matter">
        
      </a>
    </div>
    <p>IPv6 is often referred to the next generation of IP addressing. The reality is, IPv6 is what is needed for addressing today. Taking the largest mobile network in China today, China Mobile has over 900 Million mobile subscribers and over <a href="https://www.chinamobileltd.com/en/ir/operation_m.php">670 Million 4G/LTE subscribers</a>. To be able to provide service to their users, they need to provide an IP address to each subscriber’s device. This means close to a billion IP addresses would be required, which is far more than what is available in IPv4, especially as the available IP address pools have been <a href="https://en.wikipedia.org/wiki/IPv4_address_exhaustion">exhausted</a>.</p>
    <div>
      <h3>What is the solution?</h3>
      <a href="#what-is-the-solution">
        
      </a>
    </div>
    <p>To solve the addressability of clients, many networks, especially mobile networks, will use <a href="https://en.wikipedia.org/wiki/Carrier-grade_NAT">Carrier Grade NAT (CGN)</a>. This allows thousands, possibly up to hundreds of thousands, of devices to be shared behind a single internet IP address. The CGN equipment can be very expensive to scale and further, given the scale of the networks, they might need to layer CGNs behind other CGNs. This increases costs per subscriber, can reduce performance and makes scaling very challenging. A further solution, <a href="https://en.wikipedia.org/wiki/NAT64">NAT64</a>, allows IPv6 addresses to be given to subscribers, but then translated to IPv4 addresses similar to other NATs. This allows networks and ISPs to begin deploying IPv6 to subscribers, a first step in transition to IPv6.</p>
    <div>
      <h3>IPv6 IPv6 IPv6!</h3>
      <a href="#ipv6-ipv6-ipv6">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1iY3FD5e6ymhDdlae7sTwV/b509d4cb412452cba3ab40c467fba9bb/AS9808-BGP-Announcements.png" />
            
            </figure><p>Announcements IPv6 address blocks from China Mobile. Source: <a href="https://bgp.he.net/AS9808#_asinfo">Hurricane Electric</a></p><p>On June 7, China Mobile started to announce IPv6 address blocks to the Internet at large. At the same time, Cloudflare started seeing traffic being exchanged with China Mobile users over IPv6 connections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17A2wJdccc2D06GJEFPm2h/22fba6672a36787088cfb24a4f9bd632/AS9808-IPv6-Stats.png" />
            
            </figure><p>IPv4 to IPv6 percentage of traffic as seen from Cloudflare to AS9808 China Mobile’s Guangdong network.</p><p>Throughout the past 45 days, we’ve seen more and more IPv6 address blocks being announced to the internet, along with very aggressive usage. Interestingly this all started on-or-around June 8th 2018 (seven years to the day from <a href="https://en.wikipedia.org/wiki/World_IPv6_Day_and_World_IPv6_Launch_Day">World IPv6 Day</a>)</p><p>It’s natural to see traffic graphs like this go up; then down after a while. This could indicate there’s some testing still going on with the deployment. We fully expect that the traffic percentage will climb back up once this is fully rolled out.</p><p>It’s fantastic to see the IPv6 enablement! We congratulate China Mobile on their successful enablement going forward.</p> ]]></content:encoded>
            <category><![CDATA[IPv6]]></category>
            <category><![CDATA[China]]></category>
            <guid isPermaLink="false">1SakFiXhHjQEdWaLINxBIt</guid>
            <dc:creator>Tom Paseka</dc:creator>
        </item>
        <item>
            <title><![CDATA[How the Dyn outage affected Cloudflare]]></title>
            <link>https://blog.cloudflare.com/how-the-dyn-outage-affected-cloudflare/</link>
            <pubDate>Thu, 27 Oct 2016 12:10:12 GMT</pubDate>
            <description><![CDATA[ Last Friday the popular DNS service Dyn suffered three waves of DDoS attacks that affected users first on the East Coast of the US, and later users worldwide.  ]]></description>
            <content:encoded><![CDATA[ <p>Last Friday the popular <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> service Dyn suffered three waves of DDoS attacks that affected users first on the East Coast of the US, and later users worldwide. Popular websites, some of which are also Cloudflare customers, were inaccessible. Although Cloudflare was not attacked, joint Dyn/Cloudflare customers were affected.</p><p>Almost as soon as Dyn came under attack we noticed a sudden jump in <a href="https://www.cloudflare.com/learning/dns/common-dns-issues/">DNS errors</a> on our edge machines and alerted our SRE and support teams that Dyn was in trouble. Support was ready to help joint customers and we began looking in detail at the effect the Dyn outage was having on our systems.</p><p>An immediate concern internally was that since our DNS servers were unable to reach Dyn they would be consuming resources waiting on timeouts and retrying. The first question I asked the DNS team was: “<i>Are we seeing increased DNS response latency?</i>” rapidly followed by “<i>If this gets worse are we likely to?</i>”. Happily, the response to both those questions (after the team analyzed the situation) was no.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12gWRrFmU4M0R7VB6b3pVL/2687fac9b1156b1670408fa4c5911c7b/3685880130_c6d9102cba_b.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by-sa/2.0/">CC BY-SA 2.0</a> <a href="https://www.flickr.com/photos/tracyshaun/3685880130/in/photolist-6BH6Kq-6yxLDk-tC1Ht-66MpR2-3UL31-6BS7Ct-4DZJzU-oD5tjD-bwGbQX-bWXcoF-61hvET-psP6eu-4bnRok-HGSYas-7Qux27-a3WiTz-d6Fkjh-eiri25-76nJsM-br9u74-2QzcZR-aeha3e-eJmrLV-r1Se4g-eiU2Li-bzyzvF-qJrsCd-9G8ERM-fHXd1V-oSYEya-8wTQRv-q51NKb-eNqZvX-5tKLeC-r1Sd3P-puYv44-dExeSy-7hp4tS-cg2YbU-7hk7tc-qurGx4-q5ejnH-5PGmi-7CuWcv-qd67mo-r1WtnQ-q51SkN-7z6H4R-qJsP79-qYJda5/">image</a> by <a href="https://www.flickr.com/photos/tracyshaun/">tracyshaun</a></p><p>However, that didn’t mean we had nothing to do. Operating a large scale system like Cloudflare that deals with the continuously changing nature of the Internet means that there’s always something to learn.</p><p>Back in July 2015 Dyn had an <a href="http://hub.dyn.com/dyn-status/update-managed-dns-issue-july-6-2015">outage</a> that also affected some of our customers and we changed our handling of so-called infrastructure DNS records in response to prevent a similar problem, from any provider, affecting Cloudflare.</p><p>Based on what we learned last Friday we are making some changes to our internal DNS infrastructure so that it performs better when a major provider is having problems or an outage (whether caused by DDoS or not). To understand those changes it’s helpful to take a look at the role of DNS and what we saw on Friday.</p>
    <div>
      <h3>A little bit about DNS</h3>
      <a href="#a-little-bit-about-dns">
        
      </a>
    </div>
    <p>The Domain Name System (DNS) provides an address book service for the Internet. It is responsible for converting the friendly, human-readable <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> we type into our web browsers to IP addresses for websites. Let’s walk through the life of an example web request to see where DNS plays a role.</p><p>We can start by entering a web address into our browser, <a href="https://www.cloudflare.com/">https://www.cloudflare.com/</a>. The browser translates this name into an IP address so it can contact the server that’s hosting the page, it will do this using DNS. We can make these DNS queries ourselves using the <code>dig</code> command line tool to see what values are returned.</p>
            <pre><code>$ dig www.cloudflare.com A
...
;; QUESTION SECTION:
;www.cloudflare.com.		IN	A


;; ANSWER SECTION:
www.cloudflare.com.	10	IN	A	198.41.215.162
www.cloudflare.com.	10	IN	A	198.41.214.162</code></pre>
            <p>The DNS data model is split into two core concepts, names and records. The name here is <a href="http://www.cloudflare.com">www.cloudflare.com</a> and the record type we have queried is A, which is used to store IPv4 addresses. There are other types of records for storing other types of data, e.g AAAA records for IPv6 addresses. We can see from the answer above that there are two IPv4 addresses for <a href="http://www.cloudflare.com">www.cloudflare.com</a>; the browser picks one of these to use.</p><p>Records in the DNS also have an associated TTL which defines how long the data should be cached for, these records have a TTL of 10 seconds. This means the browser can store this information and skip making further DNS queries for the domain for the next 10 seconds.</p><p>For Cloudflare customers, the answer will contain our Anycast IPs instead of the origin ones (the IP addresses of the web hosting provider). The browser will then send requests to us, and we will serve content from our cache or proxy the request to the origin web server.</p><p>There are two common ways of configuring origins on Cloudflare. The first is to specify A and AAAA records, which explicitly provides us with the IP addresses of the origin. In this situation, our network knows ahead of time where it can contact the origin, so no further DNS resolution is required. For example, if <code>www.example.com</code> uses Cloudflare and has specified <code>2001:db8:5ca1:ab1e</code> as the IP address of the origin server in the Cloudflare control panel, we can connect directly to the origin server to retrieve resources.</p><p>The other is to use a CNAME, which is a pointer to another DNS name.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lUs1tS77EwOoJX8vlJxgr/ee85582f977cefa8b547140c9f1f71d2/a-aaaa-cname-1.png" />
            
            </figure><p>When our servers receive a request with the origin configured using a CNAME, we have to perform an external DNS lookup to resolve the target of the CNAME to IP addresses. This information is cached, based on the TTL defined on the CNAME record. In this case, our ability to serve content (that is not in the cache) entirely depends on an external DNS lookup to resolve the CNAME to IPs.</p><p>For example, suppose <code>www.example.com</code> had set up a CNAME in the Cloudflare control panel pointing to <code>server11.myhostingprovider.biz</code> it would be necessary to look up the IP address of <code>server11.myhostingprovider.biz</code> before contacting the origin server.</p><p>In many cases the target of a CNAME is handled by a third party DNS provider. If the third party provider is unable to answer our query, we are unable to resolve the domain to an origin IP and cannot serve the request.</p>
    <div>
      <h3>What Friday’s Dyn outage looked like</h3>
      <a href="#what-fridays-dyn-outage-looked-like">
        
      </a>
    </div>
    <p>As Dyn says in their <a href="https://www.dynstatus.com/incidents/5r9mppc1kb77">discussion</a> of the DDoS attack there were three distinct waves. For Cloudflare that manifested itself in two periods during which our internal DNS query error rate spiked.</p><p>The first attack started at 1110 UTC and mostly affected DNS resolution on the US East Coast. This world map from our monitoring systems shows the Cloudflare data centers where the DNS error rate was spiking because of the Dyn outage.</p><p>The green dots on the map are Cloudflare data centers that were unaffected by the Dyn DDoS. The largest effect was on the US East Coast, although the attack had a knock-on effect in Singapore and some parts of Europe. This is most likely because the architecture of the Internet does not directly line up with geography. Locations that are physically disparate can sometimes appear ‘close’ on the Internet because of undersea cables or decisions on how to route traffic.</p>
            <figure>
            <a href="http://staging.blog.mrk.cfdata.org/content/images/2016/10/First-Attack-21st--1-.png">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CcCuvJVJf3wCR03wUSLH3/b80ef4c03453b86b2298b4e2962f9655/First-Attack-21st--1-.png" />
            </a>
            </figure><p>The chart shows the DNS error rate in each Cloudflare data center affected by the outage. It’s possible to see the attack ramp up rapidly and then remained sustained until Dyn was able to tackle it.</p><p>Later in the day the attackers returned with greater force and had a worldwide impact. This map shows the Cloudflare data centers seeing errors because Dyn was inaccessible. As you can see almost the entire planet was affected (with the exception of our China locations; we’ll return to why below).</p>
            <figure>
            <a href="http://staging.blog.mrk.cfdata.org/content/images/2016/10/Second-Attack-21st.png">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6U8jwhb6FxP9aXmMg4JXpH/157f14a27bfb5fb0a71df8b06e590057/Second-Attack-21st.png" />
            </a>
            </figure><p>Once again it’s possible to see the attack ramping up at 1550 UTC and continuing for some time. Dyn reports that the attack was fully mitigated at 1700 UTC.</p><p>Media and Dyn reported a third wave of attacks later on Friday, but Dyn mitigated that wave immediately and so fast that it did not have any affect on Cloudflare protected websites and applications and did not show up in our systems.</p>
    <div>
      <h3>Why China was unaffected</h3>
      <a href="#why-china-was-unaffected">
        
      </a>
    </div>
    <p>During the most intense period of attack on Dyn our locations in China were almost completely unaffected. That’s because we handle DNS a little differently inside China.</p><p>To cope with sometimes fluctuating network conditions inside China our data centers are configured to keep DNS records for origin servers cached in our servers for longer than the rest of the world. This caching meant that even though Dyn was down and couldn’t be reached from anywhere (including China) we still had cached DNS records for sites that used Dyn on our China servers. Thus we were able to reach origin servers and continue serving content. That shows up as green dots on the map above.</p><p>Unfortunately, there’s a downside to hanging on to DNS records for a long time: if one of our customers changes their origin’s DNS records we’ll keep using the old DNS records and IP addresses. That could lead to downtime, or poor service.</p><p>The ideal system would recheck DNS records frequently so that changes are reflected quickly but in the event that the upstream DNS provider was unavailable (because of an attack or other outage) it would be able to use the DNS records it has cached.</p><p>Doing so is known as ‘serve stale while revalidating’. Our upstream DNS resolvers will cache records checking frequently for changes. If the upstream DNS is unavailable we’ll continue to serve from cache until it’s possible to refresh the DNS records.</p><p>We are testing and rolling out that change now and expect this to greatly diminish the impact of events similar to the Dyn DDoS for all of our customers who use CNAME’d DNS records that rely on a third-party DNS provider.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>The Internet is a shared space. Because companies, people, and institutions work together we have a global, connected network that allows us to work and play from almost anywhere. Cooperation means that we work together on standards and interoperability to keep the network running and evolving.</p><p>But the Internet is very complex and, as with many things, the devil is in the details and operating Internet infrastructure is a process of constant improvement. Although the Dyn DDoS felt scary to many people unfamiliar with how the Internet operates, such attacks result in a stronger network. Just as Cloudflare is making changes to its software and configuration, so are others across the net.</p><p>We are always looking to hire smart people interested in making DNS and the Internet better for everyone. Jobs can be found <a href="https://www.cloudflare.com/join-our-team/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Asia]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">16CGSPVQ2azFFtxnsC2l2a</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[Happy 5th Birthday, CloudFlare!]]></title>
            <link>https://blog.cloudflare.com/happy-5th-birthday-cloudflare/</link>
            <pubDate>Mon, 28 Sep 2015 02:00:52 GMT</pubDate>
            <description><![CDATA[ Today is September 27, 2015. It's a rare Super Blood Moon. And it's also CloudFlare's birthday. CloudFlare launched 5 years ago today. It was a Monday. While Michelle, Lee, and I had high expectations, we would never have imagined what's happened since then. ]]></description>
            <content:encoded><![CDATA[ <p>Today is September 27, 2015. It's a rare <a href="http://www.nytimes.com/2015/09/26/science/super-blood-moon-to-make-last-appearance-until-2033.html">Super Blood Moon</a>. And it's also CloudFlare's birthday. CloudFlare launched 5 years ago today. It was a Monday. While Michelle, Lee, and I had high expectations, we would never have imagined what's happened since then.</p><p>In the last five years we've stopped 7 trillion cyber attacks, saved more than 94,116 years worth of time, and served 99.4 trillion requests — nearly half of those in the last 6 months. You can learn more from <a href="https://www.cloudflare.com/five-years">this timeline of the last five years</a>.</p>
    <div>
      <h3>Celebrating by doing the impossible</h3>
      <a href="#celebrating-by-doing-the-impossible">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/23WJdtbfSpiAcioTpNOvxJ/29afdeea8b8ea260a8f54653844a1cf4/network-map-china-1.png" />
            
            </figure><p>Every year we like to celebrate our birthday by giving something seemingly impossible back to our users. Two years ago we enabled on our <a href="/introducing-cloudflares-automatic-ipv6-gatewa/">Automatic IPv6 Gateway</a>, allowing our users to support IPv6 without having to update their own servers. Last year we made <a href="/introducing-universal-ssl/">Universal SSL support</a> available to all our customers, even those on our free plan. And this year, we announced the <a href="/how-we-extended-cloudflares-performance-and-security-into-mainland-china/">expansion across Mainland China</a>, building the first truly global performance and security platform.</p>
    <div>
      <h3>Internet Summit &amp; Party</h3>
      <a href="#internet-summit-party">
        
      </a>
    </div>
    <p>We celebrated in San Francisco last week with CloudFlare's first Internet Summit at our new San Francisco Headquarters with more than 500 of our customers and friends. Speakers discussed their visions for the challenges and opportunities for the Internet over the next five years. We'll be posting videos of those talks over the course of this week. In the meantime, here are some photographs from the Summit and the party later that night with one of our favorite bands, <a href="https://twitter.com/WalkOffTheEarth">Walk Off the Earth</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sHhA4Bsi7QwEWiy8Z8par/5bc23c9d86dcc2c2b0788f8953e32866/matthew_michelle_summit.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YqNjGqCLOJyNsEU0IhKdi/0fb4a2003aad1eb003a286f88d417671/summit_president_estonia.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3T84fMfr5gnKRT1LY8SG6z/ff58fdaeee49c8762bd5c4570fb3f602/cloudflare_baloons.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Ih1nUK1cHAU3cr8p6JwpU/a4a059cd1be88f3d7d62f93eaea29afa/party_roof_deck.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HdjPst9e2aXVxSlvqCeD8/ab5f6e73d7d6e2286d1c0185accf6a55/WOTE.jpg" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3mWVvHuZCVa8J8eLQ5BcLQ/f4c86c88a70d462a0464ccd769500bd7/confetti_cannon.JPG.jpeg" />
            
            </figure><p>Thanks everyone for your support over the last five years. As Michelle likes to say, we're just getting started.</p> ]]></content:encoded>
            <category><![CDATA[Internet Summit]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[IPv6]]></category>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">2rvmOBLXbdtkSd2pmRAL2N</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[How We Extended CloudFlare's Performance and Security Into Mainland China]]></title>
            <link>https://blog.cloudflare.com/how-we-extended-cloudflares-performance-and-security-into-mainland-china/</link>
            <pubDate>Mon, 14 Sep 2015 05:25:41 GMT</pubDate>
            <description><![CDATA[ CloudFlare launched five years ago. Within a year of our launch, the biggest surprise was the strong global demand for our service. From nearly the beginning, China was the second largest source of traffic by country to our network, behind only the United States. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>CloudFlare launched five years ago. Within a year of our launch, the biggest surprise was the strong global demand for our service. From nearly the beginning, China was the second largest source of traffic by country to our network, behind only the United States.</p><p>In retrospect, that shouldn't have been a surprise. In 2010, the year we launched, 34% of China's population, or 450 million people, were online. Today, nearly half the country is online. To put it another way, with 700 million people online, China represents a quarter of all Internet users. If your mission is to help build a better Internet, like CloudFlare's is, then China is a country you cannot ignore.</p><p>Consequently, starting in 2011, we began to investigate how CloudFlare could bring our service to the Chinese Internet. Four years later, we're excited to announce the extension of CloudFlare's performance and security platform across mainland China. This is the story of how we did it.</p>
    <div>
      <h3>The Challenges</h3>
      <a href="#the-challenges">
        
      </a>
    </div>
    <p>There are three major challenges to extending a service like CloudFlare's across mainland China: technical, economic, and regulatory.</p><p><i>Technical</i></p><p>From a technical perspective, the Chinese Internet, despite its many similarities, is different than the rest of the world. Unlike much of the rest of the world where network routing is open, in China core Internet access is largely controlled by two ISPs: China Telecom and China Unicom. These ISPs control IP address allocation and routing inside of the country. Even the Chinese Internet giants rarely own their own IP address allocations, or use BGP to control routing across the Chinese Internet. This makes BGP Anycast and many of the other routing techniques we use across CloudFlare's network impossible inside of China.</p><p>At the same time, there are also frequent bottlenecks both within and between the domestic ISPs. For instance, China Telecom operates many distinct networks across several provinces, many of which operate independently of one another. The interconnection points between these networks, and the ISPs themselves, are also candidates for congestion, with too much traffic paired with too little capacity. The connectivity between different ISPs in different provinces can become so fraught that it is sometimes more efficient to route traffic outside the country, across a third party network, and then back in.</p><p><i>Economic</i></p><p>The technical challenges of the Chinese Internet drive up the costs of doing business as a service provider. Because of local market dynamics among ISPs, the cost of bandwidth, and particularly Anycast bandwidth, is among the highest in the world. Moreover, in order to get adequate performance and route around congestion, you need a large number of geographically distributed data centers across the country. Not an easy feat for a new, non-Chinese entrant to the market.</p><p>Despite what some non-Chinese cloud providers suggest, to provide a quality service in China is not as simple as putting up a single location in Beijing. In fact, when we tested the performance of other non-Chinese cloud providers who claimed to have established a presence in mainland China, we were surprised to find that Chinese traffic to their networks was often routed outside of the country through the West Coast of the United States before being delivered back into the country (what is known as networking tromboning). This inherently adds hundreds of milliseconds per request and, ironically, often makes it more likely the content will never be delivered.</p><p>The high cost of bandwidth, and the requirement to have a large number of data center locations in order to adequately service the country, makes providing service inside China extremely costly. These costs are further compounded by the difficulty of importing equipment into the country from abroad.</p><p><i>Regulatory</i></p><p>As is the case in many countries, Chinese law prohibits the announcement of certain types of content inside of the country. Although such policies vary greatly between countries, in order to maintain local operations, it is necessary to comply with all local laws and regulations in each country in which we operate. In the case of China, any organization that wishes to operate a website inside of the country needs an Internet content provider (ICP) license from the Chinese Ministry of Industry and Information Technology (MIIT). We investigated whether it would be possible for CloudFlare to obtain an ICP license to cover all our customers, but determined that licenses needed to be issued on a per-site basis. This introduced an enormous amount of regulatory complexity.</p><p>Another technical and policy challenge involves the determination of what content can, and cannot be served from within China. At CloudFlare, we fundamentally believe that we should not act as an Internet censor. While we strictly adhere to local rules and regulations, we are careful to do so in a manner that preserves a free and open Internet. Although we may not be able to announce certain content from within China, or any other country in which certain content may be prohibited, we continue to serve it across the Internet from the rest of the network.</p><p>After a survey of our customer base, we determined that more than 99% of our customers’ websites are locally available in China today. This provides a tremendous opportunity to increase the performance and security for millions of websites to 700 million Internet users in China. In the meantime, those of our customers that do not qualify for a permit would continue to be served across our network outside of China with a level of performance and security that is neither any better nor worse.</p>
    <div>
      <h3>Not Going Alone</h3>
      <a href="#not-going-alone">
        
      </a>
    </div>
    <p>These challenges made it clear that we would be unable to enter the Chinese market on our own. Instead, like others in our space, we started looking for a local partner to resell access to China on top of our own service. The problem with this approach is that, in addition to adding expense, it also adds significant complexity. The features of any local provider's platform were different from our own, meaning that our customers couldn't rely on a unified platform to provide global performance and security, and the customer experience was poor.</p><p>Even though we didn’t have a presence in mainland China, we were surprised that Chinese companies continued to sign up for CloudFlare's service. When we surveyed them, there were two primary reasons: 1) we were better at mitigating DDoS attacks (a huge problem for businesses in China) than any rival service; and 2) they had an audience outside of China, and wanted access to our global network even if it meant that their performance suffered at home.</p><p>By the summer of 2013, CloudFlare's market share inside China began to get the attention of several Internet companies in the region. Despite the fact that several services with similar feature sets to CloudFlare had started to spring up in China, CloudFlare quickly became the market share leader. Beginning that summer, we began to meet with potential partners to discuss whether there was a way to work together.</p>
    <div>
      <h3>Models of Cooperation</h3>
      <a href="#models-of-cooperation">
        
      </a>
    </div>
    <p>Traditionally, when tech companies enter China they do so with a partner and form what is known as a joint venture. We studied the various JVs that other tech companies had formed and came away with the conclusion that they were largely unsuccessful. The repeated mistake appeared to be that non-Chinese tech companies applied too heavy a hand, assuming that what had worked outside of China would work inside of the country.</p><p>We concluded that if a collaboration was going to work, we needed to start with the premise that it was a true partnership with CloudFlare providing technology and access to our global network, and the partner contributing local Chinese knowledge and operations. This meant that selecting the right partner was critical.</p>
    <div>
      <h3>Partnering with Baidu</h3>
      <a href="#partnering-with-baidu">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aYcmke2NXBkMkVUe1i0LP/c3fb76fd13168268e25f6ae581e02cbc/imgres.png" />
            
            </figure><p>Among the proposals that we received, Baidu's stood out. Baidu is China’s leading search engine. As we got to know the Baidu team, it was clear that their mission and ethos aligned closely with our own. Moreover, as one of the Internet giants of China, they had the expertise and resources to help us overcome the aforementioned technical, economic, and regulatory challenges.</p><p>Today, we're proud to announce our partnership with Baidu as well as the launch of 17 data centers across mainland China—in Qingdao, Fuzhou, Hengyang, Dongguan, Shenyang, Luoyang, Hangzhou, Jiaxing, Tianjin, Guangzhou, Chengdu, Langfang, Xian, Nanning, Zhengzhou, Shijiazhuang, and Foshan. In the months ahead, we will continue to expand our footprint in the country, and expect that by the end of 2016 there will be more locations in mainland China than exist across all the rest of CloudFlare's network today.</p><p>Globally, CloudFlare’s network now extends to 62 data center locations:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ImRw7JADSmVpZpKORbVVc/010b4cceafe82649fd7fd348dc850b26/network-map.png" />
            
            </figure><p>Baidu's regulatory expertise also helped to solve what previously seemed like an insurmountable problem. They developed a process whereby ICP license applications could be automatically submitted on behalf of CloudFlare customers. This removes the burden of individual customers having to navigate local licensing requirements.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2a5lc2JqnGOB9cjaG19RKg/9eb4efa52dd908543c0ddba0e16ceeeb/Screen-Shot-2015-09-13-at-9-44-33-PM.png" />
            
            </figure><p>In addition to making China available to CloudFlare's customers, we also worked with Baidu to launch their own service: <a href="http://su.baidu.com/">Yunjiasu</a> (百度云加速), which roughly translates to “fast cloud.” Chinese customers of the Yunjiasu network receive the same performance and security benefits as CloudFlare, including access to CloudFlare’s global network. Yunjiasu has grown rapidly since it its launch in December 2014. Already, the service is used by hundreds of thousands of customers, and serves more than 57 billion page views per month. Between CloudFlare and Yunjiasu, we power more than 60% of all websites using a performance and security service in China today.</p>
    <div>
      <h3>Performance</h3>
      <a href="#performance">
        
      </a>
    </div>
    <p>The performance benefits of our China expansion are staggering. We are now able to reduce the time to serve a request from outside of China by over 200ms. Across the span of a single day, the time savings for all the requests served inside China across the CloudFlare and Yunjiasu services collectively saves more than 240 years of time that Chinese Internet users would otherwise have to wait for websites to load. Moreover, website availability in China for sites served on the China network has nearly doubled. These benefits will only increase as we begin to serve more customers across the China network.</p><p>To give you a sense, one of the first customers to be served across the China network was TechCrunch. CloudFlare has a close relationship with the TechCrunch team, having launched at their Disrupt conference in 2010, and we were happy to learn that TechCrunch’s local China edition is just as widely followed as it is in the US. Before TechCrunch.cn went live on CloudFlare's China network, page loads in mainland China averaged 17 seconds. Now they average 2.5 seconds.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76GfALlcbENZo0oBJHLdBL/e4bc645c047f03f8ba1a2d4150f37369/Screen-Shot-2015-09-13-at-9-45-37-PM.png" />
            
            </figure><p>Similar improvements were registered for site availability. Before enabling the China network, TechCrunch.cn was only available about 50% of the time in mainland China. Now the site averages nearly 100% availability.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SSOHijF5SxyErhw5p5Dpv/64ae2cd38e1b480ea2cb30ce3bbae31f/Screen-Shot-2015-09-13-at-9-45-46-PM.png" />
            
            </figure>
    <div>
      <h3>Security</h3>
      <a href="#security">
        
      </a>
    </div>
    <p>The benefit of a network inside mainland China goes beyond just performance. Given its large Internet population, China, like other countries, has a number of active botnets. These botnets can be used to launch large-scale distributed denial of service (DDoS) attacks. Some of the largest attacks we see come from botnets with a large number of nodes inside China. With a network inside China, CloudFlare is now better able to sinkhole attacks before they leave the country. This means that attack traffic originating inside China is less likely to cause disruptions for customers outside of the region.</p>
    <div>
      <h3>Preserving the Integrity of Customer Data</h3>
      <a href="#preserving-the-integrity-of-customer-data">
        
      </a>
    </div>
    <p>As we’ve extended our network into China, we’ve also taken numerous steps to ensure the security and integrity of our customers’ data. CloudFlare operates all services outside of China, and Baidu all services inside of China. No CloudFlare customer traffic will pass through the China network unless a customer explicitly opts-in to the service. A customer’s traffic and log data from outside of China is never sent into China. And, for customers that opt-in to serving content inside China, customer identifiable information such as email addresses, password hashes, and billing information is never stored in the China network or shared with our partner.</p><p>The security and privacy of other potentially sensitive information is also strictly maintained. For instance, CloudFlare's Keyless SSL technology allows us to serve encrypted traffic for customers who opt-in to the China network without having to store private SSL keys within the China network. This allows any customer to receive the benefits of CloudFlare’s full suite of services, even if they elect to have their keys stored outside of China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GwaSIUlMYWFZbrEvR1CSv/e9fe7a078338d32d3a0426b21e468c1b/Screen-Shot-2015-09-13-at-11-19-46-PM.png" />
            
            </figure><p>The same is true for Yunjiasu customers. While they get the benefits of CloudFlare's global network, we’ve worked with Baidu to ensure that personal information is kept with Baidu and never shared with CloudFlare.</p><p>As part of this partnership, CloudFlare was never asked nor did we ever volunteer to provide any data about any of our users to China, the United States, or any other governmental authority. Had that been a requirement of entering the region, we would have passed on the opportunity.</p>
    <div>
      <h3>Speeding Up Your China Performance</h3>
      <a href="#speeding-up-your-china-performance">
        
      </a>
    </div>
    <p>Existing and new CloudFlare customers can request to be served in China by filling out an information request at:</p><p><a href="https://www.cloudflare.com/china">https://www.cloudflare.com/china</a></p><p>Initially, the China network will be limited to Enterprise customers. Over time, as we are better able to operationalize the onboarding of customers, we hope to extend the benefits to all plan levels.</p><p>This is an announcement that has been four years in the making. We’re excited to have built the only truly global performance and security platform. And, while China is the largest country in the world that--until today--didn’t have any CloudFlare data centers, there’s another one that’s almost as big that’s still missing some. Stay tuned as that’s soon about to change.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Baidu]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Data Center]]></category>
            <guid isPermaLink="false">4656utlxPjLBYQS4JapvOd</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Hong Kong Data Center, Now Online!]]></title>
            <link>https://blog.cloudflare.com/hong-kong-data-center-now-online/</link>
            <pubDate>Thu, 12 May 2011 15:12:00 GMT</pubDate>
            <description><![CDATA[ In CloudFlare's relentless effort to make the web faster and safer worldwide, we're excited to announce our newest data center came online last night: Hong Kong. Approximately 10% of the traffic to CloudFlare's network currently originates from Hong Kong and China.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In CloudFlare's relentless effort to make the web faster and safer worldwide, we're excited to announce our newest data center came online last night: Hong Kong. Approximately 10% of the traffic to CloudFlare's network currently originates from Hong Kong and China. The new data center will help give users in this region a substantially faster experience.</p><p>The facility includes our latest hardware upgrades, specifically designed to help mitigate DDoS attacks. Since a significant percentage of the attacks we see come from this region, having a data center closer to the front line will help significantly lessen the load on our existing facilities in Los Angeles and San Jose that have previously borne the brunt of these attacks.</p><p>Next up: Paris and Dallas.</p> ]]></content:encoded>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Asia]]></category>
            <guid isPermaLink="false">FQ8aeOwdip1t9MjOkHtCG</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
    </channel>
</rss>