
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 10 Apr 2026 09:56:07 GMT</lastBuildDate>
        <item>
            <title><![CDATA[When the Attackers Name Malware After You, You Know You're Doing Something Right]]></title>
            <link>https://blog.cloudflare.com/when-the-bad-guys-name-malware-after-you-you/</link>
            <pubDate>Thu, 14 Feb 2013 01:29:00 GMT</pubDate>
            <description><![CDATA[ CloudFlare's I'm Under Attack Mode (IUAM) is elegantly simple. When a site is under an application layer (Layer 7) distributed denial of service (DDoS) attack, the mode will return a challenge page to a visitor.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>CloudFlare's I'm Under Attack Mode (IUAM) is elegantly simple. When a site is under an application layer (Layer 7) distributed denial of service (DDoS) attack, the mode will return a challenge page to a visitor. The challenge requires the visitor's browser to answer a math problem which takes a bit of time to compute. Once successfully answered, the browser can request a cookie and won't be challenged again.</p>
    <div>
      <h4>2 + 2 = Surprisingly Effective</h4>
      <a href="#2-2-surprisingly-effective">
        
      </a>
    </div>
    <p>IUAM has been incredibly successful at stopping Layer 7 attacks, but it's had a dirty little secret since it was first launched. While we'd suggested that the math problem the browser had to solve would be computationally complex, in reality it was incredibly simple: literally adding together two single-digit integers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6pMc2EaBSeFBQ1nmhfxgQq/349171dbf1bc832d2c9c0594b14f7fd9/hard_math.png.scaled500.png" />
            
            </figure><p>Several people over the last 6 months had written to us to let us know about this "critical vulnerability." They explained how easy it would be for an attacker to reverse engineer the math problem and create malware that could bypass the protection. Internally, we had a bet on how long it would take for some bad guy to actually do so. My money was on "never."</p>
    <div>
      <h4>Good News/Bad News: I Lost the Bet</h4>
      <a href="#good-news-bad-news-i-lost-the-bet">
        
      </a>
    </div>
    <p>When Lee and I created Project Honey Pot back in 2004 we spent hundreds of engineering hours designing traps that were so random they were hard to identify. Even then, I secretly worried that an enterprising bad guy would recognize some pattern in the traps and be able to avoid them. We watched carefully for 9 years and no one ever took the time to do so. It was great, on one hand, since it meant that Project Honey Pot kept tracking attackers but, on the other, it meant it was never causing them enough trouble that they'd spend the engineering effort to defeat us. Lee and I learned the lesson: don't over-engineer too early.</p><p>Which brings me back to IUAM. This morning we got word from the great folks over at <a href="http://www.eset.com">ESET</a> that they'd <a href="http://www.welivesecurity.com/2013/02/13/malware-evolving-to-defeat-anti-ddos-services-like-cloudflare/">detected malware specifically designed to bypass CloudFlare's IUAM</a>. Called OutFlare -- how cool is it that we have malware named after us!! -- the malware reads our IUAM page, finds the simple math problem, and calculates the answer. It is hardly rocket science, but it was actually pretty thrilling to the whole CloudFlare team that we'd been so successful at stopping attackers that at least one of them took the time to reverse engineer this protection.</p>
    <div>
      <h4>Proof of Work</h4>
      <a href="#proof-of-work">
        
      </a>
    </div>
    <p>Unlike me, some other engineers on CloudFlare's team had a suspicion that this day would come. They therefore had, waiting in the wings, code to increase the complexity of IUAM's challenges. The malware pulls the math equation off the page and computes the answer before posting back. The solution was easy: obfuscate the equation and run through some other tricks that make it hard to find the answer if you're not actually rendering the Javascript.</p><p>Today, after getting word that the simple version of IUAM had been reverse engineered by the OutFlare's malware, we pushed an update. If you're using IUAM there's nothing you need to do to take advantage of the new protection, we've already updated the protection rendering the OutFlare malware obsolete.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oycmQjNNld5vVxFdym7qT/1138ecefbbbf7954b9f5d794b7294242/proof_of_work.jpg.scaled500.jpg" />
            
            </figure><p>Going forward, we have plans if this scheme gets cracked. Specifically, we have an IUAM version that relies on a field of mathematics known as "proof of work" problems. These are difficult to compute answers for but easy to verify. A recent example of such a proof of work problem which has captured the imagination of much of the tech community is Bitcoin. The electronic currency requires a significant amount of computational time to find the answer to a problem, but once found each answer ("coin") is easy to verify.</p><p>In Bitcoin's case, the difficulty of the question is adjusted upward over time to compensate for increasing computing power and to control currency inflation. We can use the same premise to increase the "work" that an attacker needs to do when we detect a Layer 7 attack against a CloudFlare customer.</p>
    <div>
      <h4>Arms Race? Bet on the Cloud</h4>
      <a href="#arms-race-bet-on-the-cloud">
        
      </a>
    </div>
    <p>In these situations there's always a question of whether there will be an arms race between the attackers writing the malware and the good guys offering protection. In this case there may be, but I like our odds in such a war. As today's example demonstrated, because CloudFlare is deployed as a service and we can update our systems to adjust to new threats in realtime we have an asymmetrical advantage. Pity the poor malware writer who now has to reverse engineer the new IUAM protection and push a code change to all his bots. If he comes up with something effective, we'll just adapt again — instantly.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2zKZBB94U1ek9GSeVwzipO/b007215000ab6705a574425c03b64ca2/arms_race.gif.scaled500.gif" />
            
            </figure><p>The history of such arms races suggests you should bet on the cloud to win. In the spam wars, spammers and anti-spam software makers were locked in an arms race that it looked like neither would win from the mid-90s through the mid-2000s. Then something changed: new services like MXLogic, MessageLabs, CloudMark, and Postini started delivering anti-spam not as software but as a "cloud" service. Not only were these services easier to install and administer than previous anti-spam software or appliances, they could also adjust to spammers in realtime. The result has been that today these services have largely won the spam wars.</p>
    <div>
      <h4>One More Thing</h4>
      <a href="#one-more-thing">
        
      </a>
    </div>
    <p>One more thing with regard to OutFlare. While the malware was able to read and pass the simple math challenge, that is only one layer of IUAM's protection. On the server side, CloudFlare still tracked all requests and, for devices that created a statistically high number of connections, we automatically imposed rate limits and other mitigation techniques. In other words, even without the fix we made, our customers were protected from the attack.</p><p>Thanks again to our friends at <a href="http://www.eset.com">ESET</a> for alerting us to the new OutFlare malware. We'll keep our eyes open to any new variants and, as they inevitably arise, we'll continue to adapt to ensure that all CloudFlare customers are always a step ahead of the web's nastiest threats.</p> ]]></content:encoded>
            <category><![CDATA[I'm Under Attack Mode]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Cloudflare History]]></category>
            <guid isPermaLink="false">3deq5bLDddSjXUcDsCjHFp</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[How to Launch a 65Gbps DDoS, and How to Stop One]]></title>
            <link>https://blog.cloudflare.com/65gbps-ddos-no-problem/</link>
            <pubDate>Mon, 17 Sep 2012 20:17:00 GMT</pubDate>
            <description><![CDATA[ Yesterday I posted a post mortem on an outage we had Saturday. The outage was caused when we applied an overly aggressive rate limit to traffic on our network while battling a determined DDoS attacker.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Yesterday I posted a post mortem on an outage we had Saturday. The outage was caused when we applied an overly aggressive rate limit to traffic on our network while battling a determined DDoS attacker. In the process of writing it I mentioned that we'd seen a 65Gbps DDoS earlier on Saturday. I've received several questions since that all go something like: "65Gbps DDoS!? Who launches such an attack and how do you defend yourself against it?!" So I thought I'd give a bit more detail.</p>
    <div>
      <h3>What Constitutes a Big DDoS?</h3>
      <a href="#what-constitutes-a-big-ddos">
        
      </a>
    </div>
    <p>A 65Gbps DDoS is a big attack, easily in the top 5% of the biggest attacks we see. The graph below shows the volume of the attack hitting our EU data centers (the green line represents inbound traffic). When an attack is 65Gbps that means every second 65 Gigabits of data is sent to our network. That's the equivalent data volume of watching 3,400 HD TV channels all at the same time. It's a ton of data. Most network connections are measured in 100Mbps, 1Gbps or 10Gbps so attacks like this would quickly saturate even a large Internet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SScSKQoLvfTBZABvmJdi9/bd5f59b78cc4566ade46af3166c58cf6/eu_slice_of_65Gbps_attack.png.scaled500.png" />
            
            </figure><p>At CloudFlare, an attack needs to get over about 5Gbps to set off alarms with our ops team. Even then, our automated network defenses usually stop attacks without the need of any manual intervention. When an attack gets up in the tens of Gigabits of data per second, our ops team starts monitoring the attack: applying filters and shifting traffic to ensure the attacked customer's site stays online and none of the rest of our network is affected.</p>
    <div>
      <h3>So You Want to Launch a DDoS</h3>
      <a href="#so-you-want-to-launch-a-ddos">
        
      </a>
    </div>
    <p>So how does an attacker generate 65Gbps of traffic? It is highly unlikely that the attacker has a single machine with a big enough Internet connection to generate that much traffic on its own. One way to generate that much traffic is through a botnet. A botnet is a collection of PCs that have been compromised with a virus and can be controlled by what is known as a botnet herder.</p><p>Botnet herders will often rent out access to their botnets, often billing in 15 minute increments (just like lawyers). Rental prices depend on the size of the botnets. Traditionally, email spammers purchased time on botnets in order to send their messages to appear to come from a large number of sources. As email spam has become less profitable with the rise of better spam filters, botnet herders have increasingly turned to renting out their networks of compromised machines to attackers wanting to launch a DDoS attack.</p><p>To launch a 65Gbps attack, you'd need a botnet with at least 65,000 compromised machines each capable of sending 1Mbps of upstream data. Given that many of these compromised computers are in the developing world where connections are slower, and many of the machines that make up part of a botnet may not be online at any given time, the actual size of the botnet necessary to launch that attack would likely need to be at least 10x that size. While by no means unheard of, that's a large botnetand using all its resources to launch a DDoS risks ISPs detecting many of the compromised machines and taking them offline.</p>
    <div>
      <h3>Amplifying the Attacks</h3>
      <a href="#amplifying-the-attacks">
        
      </a>
    </div>
    <p>Since renting a large botnet can be expensive and unwieldy, attackers typically look for additional ways to amplify the size of their attacks. The attack on Saturday used one such amplification technique called DNS reflection. To understand how these work, you need to understand a bit about <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">how DNS works</a>.</p><p>When you first sign up for an Internet connection, your ISP will provide you with a recursive DNS server, also known as a DNS resolver. When you click on a link, your computer sends a lookup to your ISP's DNS resolver. The lookup is asking a question, like: what is the IP address of the server for cloudflare.com? If the DNS resolver you query knows the answer, because someone has already asked it recently and the answer is cached, it responds. If it doesn't, it passes the request on to the authoritative DNS for the domain.</p><p>Typically, an ISP's DNS resolvers are setup to only answer requests from the ISP's clients. Unfortunately, there are a <a href="http://dns.measurement-factory.com/surveys/openresolvers/ASN-reports/latest.html">large number of misconfigured DNS resolvers</a> that will accept queries from anyone on the Internet. These are known as "open resolvers" and they are a sort of latent landmine on the Internet just waiting to explode when misused.</p><p>DNS queries are usually sent via the UDP protocol. UDP is a fire-and-forget protocol, meaning that there is no handshake to establish that where a packet says it is coming from actually is where it is coming from. This means, if you're an attacker, you can forge the header of a UDP packet to say it is coming from a particular IP you want to attack and send that forged packet to an open DNS resolver. The DNS resolver will reply back with a response to the forged IP address with an answer to whatever question was asked.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1iJIekHbA376kG6WbnLUpa/85b90e483ba3ddb934da6786dd4aebc8/amp_goes_to_11.jpg.scaled500.jpg" />
            
            </figure><p>To amplify an attack, the attacker asks a question that will result in a very large response. For example, the attacker may request all the DNS records for a particular zone. Or they may request the DNSSEC records which, often, are extremely large. Since resolvers typically have relatively high bandwidth connections to the Internet, they have no problem pumping out tons of bytes. In other words, the attacker can send a relatively small UDP request and use open resolvers to fire back at an intended target with a crippling amount of traffic.</p>
    <div>
      <h3>Mitigating DNS Reflection Attacks</h3>
      <a href="#mitigating-dns-reflection-attacks">
        
      </a>
    </div>
    <p>One of the great ironies when we deal with these attacks is we'll often get an email from the owner of the network where an open resolver is running asking us to shut down the attack our network is launching against them. They're seeing a large number of UDP packets with one of our IPs as the source coming in to their network and assume we're the ones launching it. In fact, it is actually their network which is being used to launch an attack against us. What's great is that we can safely respond and ask them to block all DNS requests originating from our network since our IPs should never originate a DNS request to a resolver. Not only does that solve their problem, but it means there's a smaller pool of open resolvers that can be used to target sites onCloudFlare's network.</p><p>There have been a <a href="http://dns.measurement-factory.com/surveys/openresolvers.html">number of efforts to clean up open resolvers</a> that are currently active. Unfortunately, it is slow going and the default installation of many DNS clients still has them open by default. While we actively reach out to the worst offenders to protect our network, to protect the Internet generally there will need to be a concerted effort to clean up open DNS resolvers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21ZrWWs8wHqC12VcrUqfQk/9d3ba958971ef82faad7cf1bb5d53ef6/voltron_cloudflare_defenders_of_the_interwebs.jpg.scaled500.jpg" />
            
            </figure><p>In terms of stopping these attacks, CloudFlare uses a number of techniques. It starts with our network architecture. <a href="/a-brief-anycast-primer">We use Anycast</a> which means the response from a resolver, while targeting one particular IP address, will hit whatever data center is closest. This inherently dilutes the impact of an attack, distributing its effects across all <a href="http://www.cloudflare.com/network-map">23 of our data centers</a>. Given the hundreds of gigs of capacity we have across our network, even a big attack rarely saturates a connection.</p><p>At each of our facilities we take additional steps to protect ourselves. We know, for example, that we haven't sent any DNS inquiries out from our network. We can therefore safely filter the responses from DNS resolvers: dropping the response packets from the open resolvers at our routers or, in some cases, even upstream at one of our bandwidth providers. The result is that these types of attacks are relatively easily mitigated.</p><p>What was fun to watch was that while the customer <a href="https://www.cloudflare.com/ddos/under-attack/">under attack</a> was being targeted by 65Gbps of traffic, not a single packet from that attack made it to their network or affected their operations. In fact, CloudFlare stopped the entire attack without the customer even knowing there was a problem. From the network graph you can see after about 30 minutes the attacker gave up. We think that's pretty cool and, as we continue to expand our network, we'll get even more resilient to attacks like this one.</p> ]]></content:encoded>
            <category><![CDATA[I'm Under Attack Mode]]></category>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">3NyTiBl9VJgX8YwPpzRU61</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Turning "I'm Under Attack" into "I'm Doing Some Good"]]></title>
            <link>https://blog.cloudflare.com/turning-im-under-attack-into-im-doing-some-go/</link>
            <pubDate>Tue, 28 Aug 2012 17:44:00 GMT</pubDate>
            <description><![CDATA[ CloudFlare's I'm Under Attack mode allows our customers to, at the click of a button, tell us that they are experiencing an attack and enable automatic protection. It works by slowing down visits to the web site that's under attack and performing extra work to identify malicious visitors.  ]]></description>
            <content:encoded><![CDATA[ <p>CloudFlare's <a href="/introducing-im-under-attack-mode">I'm Under Attack</a> mode allows our customers to, at the click of a button, tell us that they are experiencing an attack and enable automatic protection. It works by slowing down visits to the web site that's under attack and performing extra work to identify malicious visitors. When enabled, visitors to the site suffering an attack see a web page like this:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rfIdiItixFtZ29aGGPRA9/941d4969d12594b5a50a7b08cdbac044/introducing-im-under-attack-mode.png.scaled500.png" />
            
            </figure><p>These checks take about 5 seconds to perform, and during that time the visitor's (or attacker's) web browser could be performing other work. Part of the verification takes the form of JavaScript that CloudFlare delivers to the browser. Currently, that JavaScript only performs the verification checks, but it could do more. After the checks the visitor is forwarded on to the web site.</p><p>In the past, many distributed computing efforts have harnessed the power of machines across the Internet to do collaborative work. The <a href="http://en.wikipedia.org/wiki/SETI@home">SETI@Home</a> project looks for extraterrestrial life, <a href="http://en.wikipedia.org/wiki/Folding@home">Folding@Home</a> looks at protein folding to help research into drugs and diseases, and <a href="http://en.wikipedia.org/wiki/Great_Internet_Mersenne_Prime_Search">GIMPS</a> is looking for particular prime numbers. Wikipedia has a <a href="http://en.wikipedia.org/wiki/List_of_distributed_computing_projects">long list</a> of such projects.</p><p>We think that I'm Under Attack mode version 2.0 could be an "I'm Doing Some Good" mode by including a distributed computation in the JavaScript that's delivered as part of dealing with attacks. The project would need to be able to broken down into chunks that run 5 seconds at a time, and be written in JavaScript. It could be run across all web sites that are under attack and in the browsers of legitimate and attacking users potentially using the resources of evil doers for a good purpose.</p><p>The end users wouldn't see any difference from the way I'm Under Attack Mode works today, but a little bit of compute power that's not being used while checks for malicious behavior are made could be put to gooduse. Put together, many thousands of machines could be working on a distributed computing project without any effort on the part of end users. And without any extra impact on web site owners.</p><p>The hard question to answer is... which project?</p><p>Rather than come up with our own ideas we'd like to throw this open to the community for suggestions. The best (and most implementable) solution will be picked by CloudFlare and implemented to start turning a bad situation into a good one.</p><p>Make suggestions in the comments below.</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[I'm Under Attack Mode]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">73BzYAYrq8Pudss8ooKqOr</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing: I'm Under Attack Mode]]></title>
            <link>https://blog.cloudflare.com/introducing-im-under-attack-mode/</link>
            <pubDate>Wed, 11 Apr 2012 23:12:00 GMT</pubDate>
            <description><![CDATA[ CloudFlare provides a broad level of protection from a wide range of attacks. We do this while minimizing false positives or annoyances to legitimate customers. CloudFlare didn't begin as a DDoS mitigation service, but we've rapidly found that we are good at it. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>CloudFlare provides a broad level of protection from a wide range of attacks. We do this while minimizing false positives or annoyances to legitimate customers. CloudFlare didn't begin as a DDoS mitigation service, but we've rapidly found that we are good at protecting sites from these attacks. Today we're offering a new security mode to make our DDoS protection even better.</p>
    <div>
      <h3>A Brief History of DDoS</h3>
      <a href="#a-brief-history-of-ddos">
        
      </a>
    </div>
    <p>In the <a href="http://en.wikipedia.org/wiki/OSI_model">OSI model</a>, traditional DDoS attacks targeted the Layer 4. The so called "transport" layer of the network stack specifies the protocol (e.g., TCP or UDP). These attacks flood an interface with garbage traffic in order to overwhelm it's resources in one way or another. Usually, the attack fills up the capacity of a network switch or overwhelms a server's network card or CPU's ability to handle the traffic.</p><p>CloudFlare has largely mitigated these attacks by building out significant capacity across our network. We have fat pipes and lots of machines to absorb floods of traffic. We also make broad use of the <a href="/a-brief-anycast-primer">Anycast protocol</a> which has the effect of scattering the load of a distributed attack across multiple data centers, reducing the exposure of potential single point of failure. The result is that no packets from a traditional Layer 4 attack will ever reach a site behind CloudFlare.</p>
    <div>
      <h3>HTTP-Based Attacks</h3>
      <a href="#http-based-attacks">
        
      </a>
    </div>
    <p>A new breed of attacks targets Layer 7, the "application" layer. These attacks focus on specific characteristics of web applications that present bottlenecks. For example, the so-called Slow Read attack sends packets very slowly across multiple connections. Since Apache opens a new thread for each connection, and since connections are maintained as long as there is some traffic being sent, you can overwhelm a web server by exhaust its thread pool relatively easily.</p><p>CloudFlare has protections in place against many of these attacks, and in real world experiences we generally reduce the HTTP attack traffic by about 90%. For most attacks and most of our customers, this has been enough to keep them online. However, the 10% of traffic that gets through our traditional protections can still be overwhelming to either customers with limited resources or in the face of very large attacks. We wanted to help in these cases too, so today we're announcing something new.</p>
    <div>
      <h3>I'm Under Attack Mode</h3>
      <a href="#im-under-attack-mode">
        
      </a>
    </div>
    <p>Introducing "I'm Under Attack Mode." The name is pretty self-explanatory: it's a new security level you can set for your site when you're <a href="https://www.cloudflare.com/ddos/under-attack/">under attack</a>. The effect is that we will add an additional set of protections to stop potentially malicious HTTP traffic from being passed to your server. While we perform a number of additional checks, the only thing noticeable to legitimate visitors to your site is that when they first arrive they'll see an interstitial page for about 5 seconds while checks are complete. Think of it as a challenge where the tests are automatic and visitors never need to fill in a CAPTCHA.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19dMBKmrJ17nace7uKwPHC/11ff1f783c89c3b66bd1fb241671f0ad/im_under_attack_page.png.scaled500.png" />
            
            </figure><p>After verified as legitimate by the automated tests, visitors are able to browse your site unencumbered and won't see typically the test page again. Javascript and cookies are required for the tests and recording the fact that the tests were correctly passed. We've also designed the new checks to not block search engine crawlers, your existing allowlists, and other pre-vetted traffic. As a result, enabling I'm Under Attack Mode will not negatively impact your SEO or known legitimate visitors. What's also cool is that data on attack traffic that doesn't pass the automatic checks is fed back into CloudFlare's system to further enhance our traditional protections.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HpZszjoK2t8prZfiwatkK/634cd289df6847129c0200ccaa25f662/shields_up.jpg.scaled500.jpg" />
            
            </figure><p>While CloudFlare did not start as a DDoS mitigation service we have realized this is an area where we can provide a lot of benefit in an easy and affordable way. I'm Under Attack Mode is the first of several new features we'll be releasing over the coming month to offer a full gauntlet of DDoS protection. Stay tuned.</p> ]]></content:encoded>
            <category><![CDATA[I'm Under Attack Mode]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">rCP1IBNHPXTKL8d6WbGRS</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
    </channel>
</rss>