2019-02-25 03:09:59 +01:00
# Instructions
--------------
2018-10-11 15:00:30 +02:00
2019-02-25 03:09:59 +01:00
## Website is using Cloudflare
2018-10-11 15:00:30 +02:00
2019-05-07 11:49:47 +02:00
**Cloudflare users** | [**List Directory** ](cloudflare_users/ )
2019-05-06 14:13:39 +02:00
2018-10-11 15:00:30 +02:00
| List name | Description |
2018-10-11 15:04:44 +02:00
| -------- | -------- |
2019-08-11 16:18:35 +02:00
| ** /domain/cloudflare_?.txt** | **Split files (base domain)** |
2019-02-25 03:20:36 +01:00
| ex_cloudflare_users.txt | Domains which used Cloudflare in the past, not anymore |
2019-05-10 07:07:38 +02:00
| cloudflare_supporter.txt | who is using Cloudflare or endorsing Cloudflare. (URL only) |
2019-05-06 14:13:39 +02:00
2019-05-07 11:49:47 +02:00
**Cloudflare Corporation** | [**List Directory** ](cloudflare_inc/ )
2019-05-06 14:13:39 +02:00
| List name | Description |
| -------- | -------- |
2019-02-25 03:20:36 +01:00
| cloudflare_CIDR_v4.txt | IPv4 CIDR owned by Cloudflare |
| cloudflare_CIDR_v6.txt | IPv6 CIDR owned by Cloudflare |
| cloudflare_range_v4.txt | IPv4 range owned by Cloudflare |
| cloudflare_owned_ASN.txt | AS network owned by Cloudflare |
2019-03-02 04:41:09 +01:00
| cloudflare_owned_NS.txt | Name Server owned by Cloudflare |
2018-10-11 15:17:40 +02:00
| cloudflare_owned_domains.txt | Domains owned by Cloudflare |
| cloudflare_owned_onions.txt | Tor .onions owned by Cloudflare |
2019-05-07 11:53:24 +02:00
| cloudflare_members.txt | Cloudflare employer & employee |
2018-10-11 15:00:30 +02:00
2018-10-11 15:12:11 +02:00
1) How to detect Cloudflare
2018-10-11 15:00:30 +02:00
2019-03-03 00:01:42 +01:00
There are many ways to detect it:
2018-10-11 15:12:11 +02:00
- [These add-ons ](what-to-do.md ) will help your Cloudflare collection.
- Visit a website via Tor or VPN, and you will be greeted by "Attention Required! Cloudflare" webpage.
2019-03-03 00:01:42 +01:00
- Dig "[NS record](https://www.digwebinterface.com/?hostnames=emsisoft.com& type=NS& ns=resolver& useresolver=8.8.4.4& nameservers=)" of the domain.
2019-03-03 00:02:09 +01:00
2019-03-03 00:01:42 +01:00
```
emsisoft.com. 21599 IN NS bella.ns.cloudflare.com.
emsisoft.com. 21599 IN NS dom.ns.cloudflare.com.
```
2019-03-03 00:02:09 +01:00
2019-03-03 00:01:42 +01:00
- Dig "[A record](https://www.digwebinterface.com/?hostnames=dev.qubes-os.org& type=A& ns=resolver& useresolver=8.8.4.4& nameservers=)" of the FQDN, then [check the IP's owner ](https://ipinfo.io/104.18.228.122 ).
2019-03-03 00:02:09 +01:00
2019-03-03 00:01:42 +01:00
```
dev.qubes-os.org. 299 IN A 104.18.228.122
ASN AS13335 Cloudflare, Inc.
Organization Cloudflare, Inc.
Route 104.18.224.0/20
```
2018-10-11 15:00:30 +02:00
2019-04-02 04:11:43 +02:00
2019-08-25 02:17:03 +02:00
2) How to add your data
2019-04-02 01:11:34 +02:00
2019-07-11 15:17:30 +02:00
1. Log in to *Codeberg.org* .
2019-02-25 03:09:59 +01:00
2. Click "*Fork*" button. (top-left corner)
2018-10-11 15:12:11 +02:00
3. Edit text file.
2019-02-25 03:09:59 +01:00
4. Click *Double-arrow* button to create a *new pull request* .
2018-10-11 15:00:30 +02:00
2018-10-11 15:12:11 +02:00
```
2019-02-25 03:14:30 +01:00
IMPORTANT: Please add only "Base Domain"
2018-01-17 20:10:29 +01:00
2019-02-25 03:09:59 +01:00
if "community.example.com" is using Cloudflare
2019-02-25 03:14:30 +01:00
add "example.com"
if "www.example.co.uk" is using Cloudflare
add "example.co.uk"
2018-01-17 20:10:29 +01:00
2019-02-25 03:09:59 +01:00
if "example.net" is using Cloudflare
2019-02-25 03:14:30 +01:00
add "example.net"
... to /split/cloudflare_e.txt
2019-02-25 03:09:59 +01:00
```
2018-01-17 20:10:29 +01:00
2019-05-08 02:16:56 +02:00
3) If the website *no longer using Cloudflare* , *remove* it from /split/ list and *add* to "[ex_cloudflare_users.txt](cloudflare_users/ex_cloudflare_users.txt)".
2018-01-17 20:10:29 +01:00
2018-04-18 18:27:14 +02:00
2019-02-25 03:09:59 +01:00
--------------
2018-04-18 18:25:19 +02:00
2019-02-25 03:09:59 +01:00
## Website is NOT using Cloudflare (& blocking you)
2018-04-18 18:25:19 +02:00
2019-05-07 11:49:47 +02:00
**Anti-Tor users** (formerly "*TorBlocker Hall of Shame Part I*") | [**List Directory** ](not_cloudflare/ )
2019-03-05 03:35:07 +01:00
| List name | Description |
| -------- | -------- |
2019-08-11 16:16:41 +02:00
| ** /cidr_data/?.txt** | **other CDN IPv4 CIDR files** |
| **list_othercdn_domain.txt** | **domains behind these CDN (Not Cloudflare)** |
2019-08-09 17:54:09 +02:00
| list_http_error.txt | Websites that instantly and unconditionally deny service to Tor visitors by returning an HTTP error. HTTP 403 is the most common but this list catalogs all HTTP responses that entail DoS (i.e. not HTTP 200). File format is: < FQDN> < http error code> |
2019-08-09 17:01:04 +02:00
| list_customerror.txt | Custom error message renders for Tor visitors generally without HTTP error. |
| list_other.txt | Any other form of tor-hostility or mistreatment. This includes sites somewhat functional for Tor users to some extent but sneaky and unexpected adverse retalitory actions are taken against Tor visitors. |
2019-08-11 16:18:35 +02:00
| list_formerly_tor-hostile.txt | _was_ previously on one of the above tor-hostile lists |
2019-03-05 03:35:07 +01:00
2019-08-15 08:47:32 +02:00
![](image/siteground.jpg)
Above is how Siteground-hosted(INAP) sites often appear to Tor visitors when timeouts/tarpitting doesn't occur.
If you see this please update `list_othercdn_domain.txt` . (CDN ID: Z7)
2019-04-04 01:23:12 +02:00
2019-08-11 16:31:31 +02:00
```
list_othercdn_domain.txt
{domain} {CDN code}
{CDN code}:
'amazon.txt':'Z1'
'akamai.txt':'Z2'
'imperva.txt':'Z4'
'google.txt':'Z5'
'microsoft.txt':'Z6'
'inap.txt':'Z7'
2019-08-15 08:47:32 +02:00
'sucuri.txt':'Z8'
2019-08-11 16:31:31 +02:00
```
2019-03-05 03:37:27 +01:00
```
2019-05-09 00:48:08 +02:00
IMPORTANT: Please add only "FQDN" or "FQDN[space](comment here)"
2019-03-11 00:44:36 +01:00
if "community.example.com" is blocking Tor
2019-05-09 00:48:08 +02:00
add "community.example.com"
2019-03-11 00:44:36 +01:00
2019-05-09 00:48:08 +02:00
if "example.co.uk" is blocking Tor
2019-03-11 00:44:36 +01:00
add "example.co.uk Error message: Anonymous not allowed"
2019-03-05 03:37:27 +01:00
```
2019-03-05 03:35:07 +01:00
2019-02-25 03:09:59 +01:00
Some websites use other companies with the CloudFlare business model.
2018-04-18 18:25:19 +02:00
2019-02-25 03:09:59 +01:00
This is a collection of websites that ban Tor exits, other than through Cloudflare(e.g. showing access denied pages, systematic timing out connections, ...).
2019-03-05 03:38:30 +01:00
2019-07-11 15:17:30 +02:00
---
2019-08-29 11:33:45 +02:00
# How to setup git
This procedure will give you a cloudflare-tor fork with a
privacy-respecting configuration to do pushes with SSH over Tor using
codeberg.org ("CDB"). This procedure is designed for ** *linux***.
The first step covers Windows too, but these instructions probably
need more adaptations for Windows and other platforms.
- Linux: `aptitude install git tor ssh`
- Windows: Download `https://github.com/git-for-windows/git/releases/PortableGit-2.21.0-64-bit.7z` & run `git-bash.exe`
1. install Git, SSH(Not Windows), and Tor (if you haven't already)
1. create a `codeberg.org` account (username "snowden" will be used for this example)
1. create an SSH key pair `$ ssh-keygen -t rsa -N '' -C 'snowden at codeberg' -f "$HOME"/.ssh/id_rsa_codeberg-snowden`
1. edit `$HOME/.ssh/config` :
```
host codeberg-*
hostname codeberg.org
ForwardX11 no
ProxyCommand connect -4 -S 127.0.0.1:9050 $(tor-resolve %h 127.0.0.1:9050) %p
host codeberg-snowden
IdentityFile /home/user/.ssh/id_rsa_codeberg-snowden
```
1. copy `"$HOME"/.ssh/id_rsa_codeberg-snowden.pub` to clipboard
1. codeberg.org > settings > SSH/GPG Keys > add key (paste from clipboard)
1. $ `firefox https://codeberg.org/crimeflare/cloudflare-tor`
1. fork it (top right corner)
1. go to the directory you want the project to be rooted in (hereafter we'll call it `$project_root` ).
1. anonymously download your fork: $ `git clone git@codeberg-snowden:crimeflare/cloudflare-tor.git`
1. edit `$project_root/cloudflare-tor/.git/config` to include the account name and email address that will be on every commit, as well as the URL:
```
[user]
email = BM-yadayadayada6fgnLfybVnCcWf25AGZcgg@bitmessage.ch
name = snowden
[remote "origin"]
url = git@codeberg-snowden:snowden/cloudflare-tor.git
fetch = +refs/heads/*:refs/remotes/origin/*
[remote "upstream"]
url = git@codeberg-snowden:crimeflare/cloudflare-tor.git
fetch = +refs/heads/*:refs/remotes/origin/*
[branch "master"]
remote = origin
merge = refs/heads/master
```
1. make your first change
1. (from `$project_root` ) $ `git add . -u -n`
1. check that the files listed are what you changed and intend to push upstream
1. if yes: `$ git add . -u`
1. $ `git commit -m 'description of first change'`
1. $ `git push origin master`
1. $ `firefox https://codeberg.org/crimeflare/cloudflare-tor`
1. make a new pull request
Whenever git operates on the cloudflare-tor project, all connections
to codeberg are automatically over Tor with this configuration
(because the `url` in `.git/config` references the virtual host
`codeberg-snowden` in `~/.ssh/config` ).
2019-07-11 15:17:30 +02:00