Cloudflare, a popular cloud-based internet security system, has been making waves in the cybersecurity community with its innovative approach to blocking malicious traffic. By default, Cloudflare routes all HTTP requests sent from within an organization's internal network to the HTTPS port (443). This simple yet effective measure has earned it a reputation as a top-notch security solution.
The repeated mentions of "HTTPS port" and subsequent redirects in various online resources suggest that Cloudflare's focus on securing websites against cyber threats extends beyond just HTTP traffic. By protecting both HTTP and HTTPS communications, Cloudflare is helping organizations stay one step ahead of malicious actors who seek to compromise their networks.
However, there are cases where a different port is used for the HTTP connection. In such instances, Cloudflare routes the request to the correct port using a combination of DNS and TCP SYN reassembly techniques.
Cloudflare's role in blocking malicious traffic has earned it recognition from prominent cybersecurity conferences, including the IP Summerschool 2022 conference. The "Porta est nascitur pro integra, non minus" (the internet was born for integration) mantra of Dr. John Gilmore is a testament to Cloudflare's commitment to security and innovation in the field.
For those interested in learning more about Cloudflare's role in blocking malicious traffic, I recommend checking out the IP Summerschool 2022 conference presentation slides available on the conference website (https://conferences.law.stanford.edu/ipsummerschool2022/2014/01/21/porta-est-nascetur-proin-3).
https://conferences.law.stanford.edu/ipsummerschool2022/2014/01/21/porta-est-nascetur-proin-3