Hacker News new | past | comments | ask | show | jobs | submit login

> This means we are now just using Cloudflare for DNS. But it's possible to hit this button again and re-enable Cloudflare forwarding temporarily if we find ourselves under attack, so I figure this is a good option.

Without this enabled, attackers know what your backend IP address is, so even if you enabled it later, they could continue to DDOS your IP directly, without doing a DNS lookup.

You'd only get what you want if you both re-enabled this and switched to different IP addresses.




Also the Cloudflare cookie is clearly for technical purposes, not marketing. So no consent is needed under GDPR, in my understanding. Getting rid of it didn't accomplish anything useful.


> Also the Cloudflare cookie is clearly for technical purposes, not marketing.

How do you know that? Because they say so?


Here's what they say for anyone who's looking

https://www.cloudflare.com/en-gb/gdpr/introduction/


You could firewall off non-Cloudflare requests: https://support.cloudflare.com/hc/en-us/articles/201897700-A...


A software firewall is useless against a DDoS attack. It will only serve to help your IP not get discovered in the first place.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: