Cloudflare Completely Blocks HTTP for APIs

21 March 2025 2 minutes Author: Newsman

Cloudflare is officially ending support for all HTTP ports for api.cloudflare.com to address potential data leakage risks caused by unencrypted traffic. All API requests are now allowed only over HTTPS, which protects API tokens from interception.

The company explains that even with automatic redirection from HTTP to HTTPS, sensitive data could be transmitted over unencrypted channels for a short time. This created a vulnerability that could potentially be exploited by attackers, ISPs, or even public Wi-Fi networks.

To prevent such threats, Cloudflare is implementing HTTP connection blocking at the transport protocol level using iptables, rather than simply using standard HTTP responses such as 403 Forbidden. This means that no TCP connection will be established at all.

At this time, the block only affects api.cloudflare.com, but in Q4 2025, Cloudflare will provide customers with the ability to disable HTTP ports for their own domains via the control panel or API.

Despite the widespread practice of redirecting HTTP to HTTPS, approximately 2-3% of real users and 16% of automated traffic still used HTTP requests to Cloudflare servers. In response to these risks, the company decided to completely abandon HTTP ports. The HTTP block also includes the gradual removal of static IP addresses for api.cloudflare.com, as well as disabling support for non-SNI clients, which account for only 0.55% of all connections.

This step by Cloudflare represents a significant increase in security across the global network, eliminating vulnerabilities associated with unencrypted API requests. In the future, the company plans to provide this protection to all its customers. Administrators are advised to monitor HTTP requests in Cloudflare Analytics before activating the block.

Other related articles
News
Read more
Over 900,000 Accounts at Risk in Collectibles.com Data Leak
Collectibles.com data leak: over 900,000 users at risk due to open Elasticsearch server. The database contains names, transaction data, email addresses, which can lead to fraud and theft of personal information. How to protect your account? Experts advise: change passwords, activate 2FA, and be careful with suspicious messages.
184
News
Read more
Ukraine Prepares Drone Swarms for the Front
Swarms of drones in Ukraine can turn the tide of hostilities. Engineers are developing drones with autonomous navigation and electronic warfare bypass systems. Ukraine is preparing for the mass use of FPV drones, and new technologies provide rapid training of operators. Will this be a turning point in the military sphere?
192
Found an error?
If you find an error, take a screenshot and send it to the bot.