They finally renewed it (or so they said).
Yep, back up. Next up in 2023, will be the same thing all over again.
Moderators/Leaders, could you lock this? OPās question has been solved.
We typically just let those topics close themselves. but thanks for considering!
Hi peeps! Iām back from my vacation.
I have monitoring set up which notifies me if one of the important SSL certificates is about to expire. Basically every three months Iāve had to tell them to renew their certificate because the automated renewal doesnāt work.
But I was away now so I wasnāt able to look into this.
Welcome back, Admin! Glad to see you back.
Hahaha
So much anticipation, like when children are waiting for Santa Claus
@admin Next time, make an IF-admin tracker for us so that it looks like this
Welcome back! I hope you enjoyed your vacation.
russian warplane crashed in RU (videos)
Should I do a name reveal here?
- Yes
- No
- Maybe
We know youāre Bill Gates - no need for a last name
Yes, I would love the ability to google you and learn absolutely everything I can
Youād be surprised what you can find out even without knowing it outright.
Another way to find out if a domain is hosted ācensoredā is to add /aes.js
to the address.
It also passes Cloudflare unless some action is taken.
Also because that script has a big priority, redirection ādoesnāt workā either if it is via .htaccess (on origin)
and not directly as a rule on CF.
Does anyone have an idea about an elegant solution without the CF FW rule Iām currently using that blocks access if the request matches the pattern?
The goal should be that this ājsā is never displayed (no REQ), and not to leave a trace through some redirection via CF, etc.
I took a quick look at these new betas
but I didnāt get an idea or Iām too tiredā¦
You are trying to completely block assess to aes.js?
Not sure if itās possible to do without FW, I canāt find another way on first glance, and while messing around in the betas before none allows you to block (stop, whatever) requests.
Yeah, block but so that it is never called (as if nothing had happened)
because redirections to another URL (RW) etc. leave a trace
if I didnāt use all 3 free rules in CF
I think I could take that aes.js into a āblack holeā there
So you want the file, if called, to return a 404 to the client?
By black hole
I meant completely drop the request (this is sometimes done in the case of DDoS defense)
but I donāt think such a thing is offered on CF
so
I think I succeeded this way
the fields ( rw to ) can also be left empty, but somehow itās better for me when it returns my 404 page
now I still need to test that some PowerShell or curl or wget is able or not to get aes.js
@Greenreader9 thanks for your help,
I requested aes on your domain several timesā¦ do not be mad
I needed an independent source for comparison
Hey! I should probably do something over on TTL to block that, honestly surprised nobody has DDoSed me yet.
EDIT: Done!