<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Cloudflare on Wirez</title><link>https://wirez.top/tags/cloudflare/</link><description>Recent content in Cloudflare on Wirez</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://wirez.top/tags/cloudflare/index.xml" rel="self" type="application/rss+xml"/><item><title>Cloudflare's 500 Tbps capacity stops 31.4 Tbps attacks</title><link>https://wirez.top/posts/cloudflares-500-tbps-capacity-stops-314-tbps-attacks/</link><pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflares-500-tbps-capacity-stops-314-tbps-attacks/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a> now commands &lt;strong>500 Tbps&lt;/strong> of external capacity across 330+ cities, reserving the surplus explicitly as a &lt;strong>DDoS budget&lt;/strong>. You will examine the sheer physical reality of this &lt;strong>global backbone&lt;/strong>, dissect the &lt;strong>packet processing pipeline&lt;/strong> using eBPF and XDP for line-rate filtering, and explore how &lt;strong>Workers&lt;/strong> and &lt;strong>RPKI&lt;/strong> validate routes at the edge.&lt;/p></description></item><item><title>Cloudflare edge shift: Why 2MB cache matters</title><link>https://wirez.top/posts/cloudflare-edge-shift-why-2mb-cache-matters/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-edge-shift-why-2mb-cache-matters/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a>&amp;#039;s new Gen 13 servers cut per-core L3 cache to just 2MB, a sixth of the previous generation&amp;#039;s allocation. &lt;a href="https://blog.cloudflare.com/a-tour-inside-cloudflares-latest-generation-servers/" target="_blank" rel="noopener noreferrer">A tour inside cloudflares latest generation servers&lt;/a> This hardware reality forces a fundamental architectural pivot: high-density edge infrastructure can no longer rely on massive caches to mask software inefficiencies. The era of cache-heavy reliance is over, replaced by a &lt;strong>core-dense model&lt;/strong> where performance scales strictly through software optimization and thread isolation.&lt;/p></description></item><item><title>ASPA validation stops Cloudflare route hijacks now</title><link>https://wirez.top/posts/aspa-validation-stops-cloudflare-route-hijacks-now/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/aspa-validation-stops-cloudflare-route-hijacks-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a>, handling over 20% of global traffic, now validates BGP paths to stop leaks that origin checks miss. &lt;a href="https://blog.cloudflare.com/white-house-routing-security/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s white house routing security&lt;/a> &lt;strong>ASPA&lt;/strong> closes the critical security gap between simple route origin validation and full path verification by cryptographically authorizing upstream providers. While the broader network security market races toward $47.37 billion by 2031, core internet infrastructure still relies on trust-based protocols vulnerable to detours. Readers will learn why validating the &lt;strong>AS_PATH&lt;/strong> chain is essential when standard &lt;strong>RPKI&lt;/strong> mechanisms fail to detect unauthorized intermediate hops. We examine how &lt;strong>Cloudflare&amp;#039;s&lt;/strong> March 2026 implementation allows networks to publish authorized provider lists, ensuring traffic traverses only approved chains. The discussion details the operational steps for creating &lt;strong>ASPA objects&lt;/strong> and monitoring their propagation to eliminate route leaks.&lt;/p></description></item><item><title>PMTUD black holes stall your video calls now</title><link>https://wirez.top/posts/pmtud-black-holes-stall-your-video-calls-now/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/pmtud-black-holes-stall-your-video-calls-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">When packets exceed 1500 bytes, &lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a>&amp;#039;s 2026 data confirms that silent ICMP drops create a &lt;strong>zombie state&lt;/strong> where connections hang indefinitely. &lt;a href="https://blog.cloudflare.com/client-dynamic-path-mtu-discovery/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s client dynamic path mtu discovery&lt;/a> The industry must abandon fragile reliance on legacy feedback loops in favor of &lt;strong>Dynamic Path MTU Discovery&lt;/strong> to ensure connectivity across restrictive modern networks. This article details how active probing architectures utilizing &lt;strong>QUIC&lt;/strong> and &lt;strong>MASQUE&lt;/strong> protocols bypass firewall restrictions that traditionally block essential size-limit notifications. We examine the mechanics of the &lt;strong>PMTUD Black Hole&lt;/strong>, specifically how encrypted overhead in FIPS 140-2 compliant clients exacerbates fragmentation issues on LTE/5G and FirstNet links. Furthermore, we outline enterprise deployment strategies for hybrid environments, demonstrating how shifting from static configurations to dynamic discovery prevents data streams from failing during critical video calls or large file transfers. By adopting these methods, organizations can finally resolve the decades-old conflict between rigid infrastructure expectations and the reality of variable path limits without sacrificing security metadata.&lt;/p></description></item><item><title>Routing fixes for duplicate private IP chaos now</title><link>https://wirez.top/posts/routing-fixes-for-duplicate-private-ip-chaos-now/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/routing-fixes-for-duplicate-private-ip-chaos-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">With 20% of global Internet traffic now handled by &lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a>, duplicate private IPs create immediate routing failures that break return paths. &lt;a href="https://blog.cloudflare.com/automatic-return-routing-ip-overlap/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s automatic return routing ip overlap&lt;/a> &lt;strong>Automatic Return Routing&lt;/strong> eliminates the need for complex NAT or VRF configurations by using stateful flow tracking to correctly route traffic in overlapping networks.&lt;/p></description></item><item><title>Cloudflare remediation stops SaaS link risks fast</title><link>https://wirez.top/posts/cloudflare-remediation-stops-saas-link-risks-fast/</link><pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-remediation-stops-saas-link-risks-fast/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Cloud attacks surged 26% in 2024, proving that visibility without &lt;strong>automated remediation&lt;/strong> is merely a delay tactic. &lt;a href="https://blog.cloudflare.com/casb-ga/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s casb ga&lt;/a> The narrative explores how security teams can finally bypass the friction of manual ticketing and external admin consoles by using &lt;strong>Remediation&lt;/strong> actions directly inside the &lt;strong>Cloudflare One&lt;/strong> dashboard. Instead of flagging overshared files in &lt;strong>Microsoft 365&lt;/strong> or &lt;strong>Google Workspace&lt;/strong> and waiting for IT to respond, administrators can now instantly revoke public links or restrict domain-wide access with a single click. This capability addresses the critical gap where dangerous configurations persist simply because the fix requires too many steps across disjointed interfaces.&lt;/p></description></item><item><title>Validation errors break blackhole routes now</title><link>https://wirez.top/posts/validation-errors-break-blackhole-routes-now/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/validation-errors-break-blackhole-routes-now/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Bryton Herdes warns that relaxing &lt;strong>maxLength protections&lt;/strong> for blackhole routes creates a direct path for BGP hijacks.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The central thesis is that networks must strictly pair &lt;strong>originAS-only validation&lt;/strong> with the mandatory presence of the &lt;strong>BLACKHOLE community&lt;/strong> to prevent security degradation. While the global network security market races toward USD 205.98 billion by 2031, basic BGP hygiene remains fragile without these specific constraints. Herdes, a Principal Network Engineer at Cloudflare, argues that vendors offering shortcut configurations for loose validation directly undermine RFC9319 standards. &lt;a href="https://blog.cloudflare.com/rpki-2020-fall-update/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s rpki 2020 fall update&lt;/a>&lt;/p></description></item><item><title>ASPA records prove your upstream provider ties</title><link>https://wirez.top/posts/aspa-records-prove-your-upstream-provider-ties/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/aspa-records-prove-your-upstream-provider-ties/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a> handles over 20% of global Internet traffic, yet standard BGP routing remains vulnerable to undetected path manipulation. &lt;a href="https://blog.cloudflare.com/bgp-hijack-detection/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s bgp hijack detection&lt;/a> The deployment of &lt;strong>ASPA records&lt;/strong> under &lt;strong>RFC 9582&lt;/strong> represents the critical shift from verifying only traffic origins to validating the entire transmission path against configuration errors and malicious leaks. While &lt;strong>ROA&lt;/strong> systems successfully mitigate origin hijacks, they fail to detect when traffic traverses unauthorized intermediate networks, a gap this new cryptographic standard explicitly closes.&lt;/p></description></item><item><title>Cloudflare data reveals origin server lag today</title><link>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/cloudflare-data-reveals-origin-server-lag-today/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Over 60% of client connections now support post-quantum encryption, yet origin server readiness remains the critical blind spot. &lt;a href="https://blog.cloudflare.com/cloudflare-radars-2023-overview-of-new-tools-and-insights/" target="_blank" rel="noopener noreferrer">&lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a> radars 2023 overview of new tools and insights&lt;/a> &lt;strong>Cloudflare Radar&lt;/strong> exposes this disconnect by shifting visibility from edge metrics to the actual security posture of customer infrastructure. The platform&amp;#039;s latest update argues that true durability requires auditable proof of &lt;strong>hybrid key exchange&lt;/strong> deployment and rigorous &lt;strong>routing security&lt;/strong> validation, not just theoretical compatibility.&lt;/p></description></item><item><title>Physical damage now drives global internet loss</title><link>https://wirez.top/posts/physical-damage-now-drives-global-internet-loss/</link><pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/physical-damage-now-drives-global-internet-loss/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Only one government shutdown occurred in Q4 2027, proving &lt;strong>physical fragility&lt;/strong> now drives global connectivity loss more than political censorship. While 2025 saw a record 212 state-imposed outages across 28 countries, the final quarter marked a decisive shift where cable damage, power failures, and routine operational errors became the dominant disruptors. This transition highlights that the internet&amp;#039;s greatest vulnerability is no longer the kill switch, but the decaying infrastructure supporting.&lt;/p></description></item><item><title>Route leak lessons: What the 25-minute Cloudflare outage...</title><link>https://wirez.top/posts/route-leak-lessons-what-the-25-minute-cloudflare-outage/</link><pubDate>Fri, 23 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/route-leak-lessons-what-the-25-minute-cloudflare-outage/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">A single automation error triggered a 25-minute &lt;a href="https://datatracker.ietf.org/doc/html/rfc4271" target="_blank" rel="noopener noreferrer">BGP&lt;/a> route leak that disrupted &lt;a href="https://datatracker.ietf.org/doc/html/rfc8200" target="_blank" rel="noopener noreferrer">IPv6&lt;/a> traffic across &lt;a href="https://www.cloudflare.com/" target="_blank" rel="noopener noreferrer">Cloudflare&lt;/a>&amp;#039;s Miami infrastructure on January 22, 2026. &lt;a href="https://blog.cloudflare.com/route-leak-incident-january-22-2026/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s route leak incident january 22 2026&lt;/a> This incident highlights that despite industry progress, manual configuration errors remain a critical vulnerability in global routing stability. Readers will learn the precise mechanics of &lt;strong>RFC 7908 violations&lt;/strong>, analyze the specific AS path anomalies involving &lt;strong>AS13335&lt;/strong>, and explore how &lt;strong>RFC 9234&lt;/strong> adoption offers a viable path toward automated prevention.&lt;/p></description></item><item><title>Iran Network Blackout: Routing Withdrawn Fast</title><link>https://wirez.top/posts/iran-network-blackout-routing-withdrawn-fast/</link><pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/iran-network-blackout-routing-withdrawn-fast/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Iran&amp;#039;s internet traffic collapsed by nearly 90% on January 8 as the state executed a near-total digital blackout. This event marks a strategic pivot from temporary censorship to permanent &lt;strong>digital isolation&lt;/strong>, effectively severing the domestic network from global infrastructure to crush dissent. Cloudflare Radar data confirms that connectivity did not merely degrade; it was surgically dismantled through coordinated protocol suppression. &lt;a href="https://blog.cloudflare.com/iran-protests-internet-shutdown/" target="_blank" rel="noopener noreferrer">Cloudflare&amp;#039;s iran protests internet shutdown&lt;/a>&lt;/p></description></item><item><title>Route leak mechanics: Not spyware, just code</title><link>https://wirez.top/posts/route-leak-mechanics-not-spyware-just-code/</link><pubDate>Tue, 06 Jan 2026 00:00:00 +0000</pubDate><guid>https://wirez.top/posts/route-leak-mechanics-not-spyware-just-code/</guid><description>&lt;meta charset="utf-8">
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">Eleven distinct route leak events since December confirm &lt;strong>AS8048&lt;/strong> instability, not espionage.&lt;/p>
&lt;!-- /wp:paragraph -->
&lt;!-- wp:paragraph {"className":"std-text"} -->
&lt;p class="std-text">The January 2 anomaly involving &lt;strong>Nicolás Maduro&amp;#039;s&lt;/strong> arrest was merely the latest symptom of &lt;strong>CANTV&lt;/strong>&amp;#039;s chronic misconfiguration rather than a targeted intelligence operation. Instead of malicious interception, the data points to a systemic failure to restrict &lt;strong>route propagation&lt;/strong> beyond intended business relationships.&lt;/p></description></item></channel></rss>