
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 16 Apr 2026 02:34:56 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Q2 FY 18 Product Releases, for a better Internet “end-to-end”]]></title>
            <link>https://blog.cloudflare.com/better-internet-end-to-end/</link>
            <pubDate>Thu, 26 Jul 2018 18:35:23 GMT</pubDate>
            <description><![CDATA[ In Q2, Cloudflare released several products which enable a better Internet “end-to-end” — from the mobile client to host infrastructure. Now, anyone from an individual developer to large companies and governments, can control, secure, and accelerate their applications from “perimeter” to “host.” ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@allenliu?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Liu Zai Hou</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>In Q2, Cloudflare released several products which enable a better Internet “end-to-end” — from the mobile client to host infrastructure. Now, anyone from an individual developer to large companies and governments, can control, secure, and accelerate their applications from the “<a href="https://www.cloudflare.com/learning/access-management/what-is-the-network-perimeter/">perimeter</a>” back to the “host.”</p><p>On the client side, <a href="https://www.cloudflare.com/products/mobile-sdk/">Cloudflare’s Mobile SDK</a> extends control directly into your mobile apps, providing visibility into application performance and load times across any global carrier network.</p><p>On the host side, <a href="https://www.cloudflare.com/products/cloudflare-workers/">Cloudflare Workers</a> lets companies move workloads from their host to the Cloudflare Network, reducing infrastructure costs and speeding up the user experience. <a href="https://www.cloudflare.com/products/argo-tunnel/">Argo Tunnel</a> lets you securely connect your host directly to a Cloudflare data center. If your host infrastructure is running other TCP services besides HTTP(S), you can now protect it with Cloudflare’s DDoS protection using <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a>.</p><p>So for end-to-end control that is easy and fast to deploy, these recent products are all incredible “workers” across the “spectrum” of your needs.</p>
    <div>
      <h3>But there’s more to the story</h3>
      <a href="#but-theres-more-to-the-story">
        
      </a>
    </div>
    <p>End users want richer experiences, such as more video, interactivity, and images. Meeting those needs can incur real costs in bandwidth, hardware, and time. Cloudflare addresses these with three products that improve video delivery, reduce paint times, and shrink the round-trip times.</p><p>Cloudflare now simplifies and reduces delivery cost of video with <a href="https://www.cloudflare.com/products/stream-delivery/">Stream Delivery</a>. Pages using plenty of Javascript now have faster paint times and wider mobile-device support with <a href="/we-have-lift-off-rocket-loader-ga-is-mobile/">Rocket Loader</a>. If you’re managing multiple origins and want to ensure fastest delivery based on the shortest round-trip time, Cloudflare Load Balancer now supports <a href="/i-wanna-go-fast-load-balancing-dynamic-steering/">Dynamic Steering</a>.</p><p>Attackers are shifting their focus to the application layer. Some security features, like CAPTCHA and Javascript Challenge, give you more control and reduce false-positives when blocking rate-based threats at the edge, such as layer 7 DDoS or brute-force attacks.</p><p>Finally, Cloudflare extended privacy to consumers through the launch of our DNS resolver <a href="https://1.1.1.1">1.1.1.1</a> on 4/1/2018! Now users who set their DNS resolvers to 1.1.1.1 can browse faster while protecting browser data with Cloudflare’s privacy-first consumer DNS service.</p>
    <div>
      <h3>Here is a recap from April to June of the features we released in Q2</h3>
      <a href="#here-is-a-recap-from-april-to-june-of-the-features-we-released-in-q2">
        
      </a>
    </div>
    
    <div>
      <h4>Dynamic Steering</h4>
      <a href="#dynamic-steering">
        
      </a>
    </div>
    <p><i>Tue, July 10, 2018</i>Dynamic steering is a load balancing feature that automates traffic steering across origins in multiple geographic regions. <a href="https://www.cloudflare.com/learning/cdn/glossary/round-trip-time-rtt/">Round-trip time (RTT)</a> for health checks is calculated across multiple pools of load balanced servers and origins to determine the fastest server pools. This RTT data enables the load balancers to identify the fastest pools, and to direct user requests to the most responsive origins.</p><ul><li><p><a href="/i-wanna-go-fast-load-balancing-dynamic-steering/">Blog Post</a></p></li><li><p><a href="https://www.cloudflare.com/load-balancing/">Product Page</a></p></li><li><p><a href="https://support.cloudflare.com/hc/en-us/articles/360006900952">Support Article</a></p></li></ul>
    <div>
      <h4>Support for New DNS Record Types</h4>
      <a href="#support-for-new-dns-record-types">
        
      </a>
    </div>
    <p><i>Thu, July 5, 2018</i>Cloudflare's Authoritative DNS now supports the following record types: CERT, DNSKEY, DS, NAPTR, SMIMEA, SSHFP, TLSA, and URI via the web and API.</p>
    <div>
      <h4>Developer Portal Q2 Update</h4>
      <a href="#developer-portal-q2-update">
        
      </a>
    </div>
    <p><i>Mon, June 11, 2018</i>The Developer Portal has been updated in Q2 to include improved search, documentation for new products, and listings of upcoming Cloudflare community events.</p><ul><li><p><a href="https://developers.cloudflare.com/">Developer Portal</a></p></li></ul>
    <div>
      <h4>Rocket Loader Upgrade</h4>
      <a href="#rocket-loader-upgrade">
        
      </a>
    </div>
    <p><i>Fri, June 1, 2018</i>Rocket Loader has been updated to deliver faster performance for website paint &amp; load times by prioritizing website content over JavaScript. Majority of mobile devices are now supported. Increased compliance with strict content security policies.</p><ul><li><p><a href="https://support.cloudflare.com/hc/en-us/articles/200168056-What-does-Rocket-Loader-do-">Support</a></p></li><li><p><a href="/we-have-lift-off-rocket-loader-ga-is-mobile/">Blog</a></p></li></ul>
    <div>
      <h4>Stream Delivery</h4>
      <a href="#stream-delivery">
        
      </a>
    </div>
    <p><i>Thu, May 31, 2018</i>Cloudflare’s Stream Delivery solution offers fast caching and delivery of video content across our network of 150+ global data centers.</p><ul><li><p><a href="https://www.cloudflare.com/products/stream-delivery/">Product Page</a></p></li></ul>
    <div>
      <h4>Deprecating TLS 1.0 and 1.1 on api.cloudflare.com</h4>
      <a href="#deprecating-tls-1-0-and-1-1-on-api-cloudflare-com">
        
      </a>
    </div>
    <p><i>Tue, May 29, 2018</i>On June 4, Cloudflare will be dropping support for TLS 1.0 and 1.1 on <a href="http://api.cloudflare.com/">api.cloudflare.com</a>. Additionally, the dashboard will be moved from <a href="http://www.cloudflare.com/a">www.cloudflare.com/a</a> to <a href="http://dash.cloudflare.com/">dash.cloudflare.com</a> and will require a browser that supports TLS 1.2 or higher.</p><ul><li><p><a href="https://www.cloudflare.com/ssl/">Product Page</a></p></li><li><p><a href="/deprecating-old-tls-versions-on-cloudflare-dashboard-and-api/">Blog Post</a></p></li></ul>
    <div>
      <h4>Rate Limiting has new Actions and Triggers</h4>
      <a href="#rate-limiting-has-new-actions-and-triggers">
        
      </a>
    </div>
    <p><i>Mon, May 21, 2018</i>Rate Limiting has two new features: challenges (CAPTCHA and JS Challenge) as an Action; and matching Header attributes in the response (from either origin or the cache) as the Trigger. These features give more control over how Cloudflare Rate Limiting responds to threshold violations, giving customers granularity over the types of requests to "count" to fit their different applications. To learn more, go to the blog post.</p><ul><li><p><a href="https://www.cloudflare.com/rate-limiting/">Product Page</a></p></li><li><p><a href="/rate-limiting-delivering-more-rules-and-greater-control/">Blog Post</a></p></li></ul>
    <div>
      <h4>Support purge-by-tag for large tag sizes</h4>
      <a href="#support-purge-by-tag-for-large-tag-sizes">
        
      </a>
    </div>
    <p><i>Thu, May 10, 2018</i>The Cache-Tag header now supports up to 1000 tags and a total header length of 16kb. This update simplifies file purges for customers who deploy websites with Drupal.</p><ul><li><p><a href="https://support.cloudflare.com/hc/en-us/articles/206596608-How-to-Purge-Cache-Using-Cache-Tags-Enterprise-only-">Support article</a></p></li></ul>
    <div>
      <h4>Multi-User Access on dash.cloudflare.com</h4>
      <a href="#multi-user-access-on-dash-cloudflare-com">
        
      </a>
    </div>
    <p><i>Wed, May 2, 2018</i>Starting May 2 2018, users can go to the new home of Cloudflare’s Dashboard at <a href="http://dash.cloudflare.com/">dash.cloudflare.com</a> and share account access. This has been supported at our Enterprise level of service, but is now being extended to all customers.</p><ul><li><p><a href="/expanding-multi-user-access/">Blog Post</a></p></li></ul>
    <div>
      <h4>Support full SSL (Strict) mode validation for CNAME domains</h4>
      <a href="#support-full-ssl-strict-mode-validation-for-cname-domains">
        
      </a>
    </div>
    <p><i>Thu, April 12, 2018</i>Cloudflare is now able to validate origin certificates that use a hostname's CNAME target in Full SSL (Strict) mode. Previously, Cloudflare would not validate any certificate without a direct match of the HTTP hostname and the certificate's Common Name or SAN. This update allows SSL for SaaS customers to more easily enable end-to-end security.</p><ul><li><p><a href="https://support.cloudflare.com/hc/en-us/articles/200170416-What-do-the-SSL-options-mean-">Support</a></p></li><li><p><a href="https://www.cloudflare.com/ssl-for-saas-providers">SSL for SaaS</a></p></li></ul>
    <div>
      <h4>Cloudflare Spectrum</h4>
      <a href="#cloudflare-spectrum">
        
      </a>
    </div>
    <p><i>Thu, April 12, 2018</i>Spectrum protects TCP applications and ports from volumetric DDoS attacks and data theft by proxying non-web traffic through Cloudflare’s Anycast network.</p><ul><li><p><a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Product Page</a></p></li><li><p><a href="/spectrum/">Blog Post</a></p></li></ul>
    <div>
      <h4>Workers Can Control Cache TTL by Response Code</h4>
      <a href="#workers-can-control-cache-ttl-by-response-code">
        
      </a>
    </div>
    <p><i>Wed, April 11, 2018</i>Cloudflare workers can now control cache TTL by response code. This provides greater control over cached assets with Cloudflare Workers.</p><ul><li><p><a href="https://developers.cloudflare.com/workers/reference/cloudflare-features/">Documentation</a></p></li></ul>
    <div>
      <h4>Argo Tunnel</h4>
      <a href="#argo-tunnel">
        
      </a>
    </div>
    <p><i>Thu, April 5, 2018</i>Argo Tunnel ensures that no visitor or attacker can reach your web server unless they first pass through Cloudflare. Using a lightweight agent installed on your origin, Cloudflare creates an encrypted tunnel between your host infrastructure and our nearest data centers without opening a public inbound port. It’s more secure, more performant, and easier to manage than exposing your services publically.</p><ul><li><p><a href="https://developers.cloudflare.com/argo-tunnel/quickstart/">Developer Doc</a></p></li><li><p><a href="https://www.cloudflare.com/products/argo-tunnel/">Read More</a></p></li></ul> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Mobile SDK]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Load Balancing]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Spectrum]]></category>
            <category><![CDATA[Rocket Loader]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Cloudflare Tunnel]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">30mcTficRd4F27mbRddmAS</guid>
            <dc:creator>Timothy Fong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Rate Limiting - Insight, Control, and Mitigation against Layer 7 DDoS Attacks]]></title>
            <link>https://blog.cloudflare.com/rate-limiting/</link>
            <pubDate>Thu, 13 Apr 2017 20:34:00 GMT</pubDate>
            <description><![CDATA[ Today, Cloudflare is extending its Rate Limiting service by allowing any of our customers to sign up. Our Enterprise customers have enjoyed the benefits of Cloudflare’s Rate Limiting offering for the past several months.  ]]></description>
            <content:encoded><![CDATA[ <p>Today, Cloudflare is extending its <a href="https://www.cloudflare.com/rate-limiting/">Rate Limiting</a> service by allowing any of our customers to sign up. Our Enterprise customers have enjoyed the benefits of Cloudflare’s Rate Limiting offering for the past several months. As part of our mission to build a better internet, we believe that everyone should have the ability to sign up for the service to protect their websites and <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">APIs</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XnkcibsLLCJF6rpgPqksN/083f6b9aca04a2f0129a862cea15c263/benjamin-child-16017.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC-BY 2.0</a> <a href="https://unsplash.com/photos/IGqMKnl6LNE">image</a> by <a href="https://unsplash.com/@bchild311">Benjamin Child</a></p><p>Rate Limiting is one more feature in our arsenal of tools that help to protect our customers against denial-of-service attacks, brute-force password attempts, and other types of abusive behavior targeting the application layer. Application layer attacks are usually a barrage of HTTP/S requests which may look like they originate from real users, but are typically generated by machines (or bots). As a result, application layer attacks are often harder to detect and can more easily bring down a site, application, or API. Rate Limiting complements our existing DDoS protection services by providing control and insight into Layer 7 DDoS attacks.</p><p>Rate Limiting is now available to all customers across <a href="https://www.cloudflare.com/plans/">all plans</a> as an optional paid feature. The first 10,000 qualifying requests are free, which allows customers to start using the feature without any cost .</p>
    <div>
      <h4>Real world examples of how Rate Limiting helped Cloudflare customers</h4>
      <a href="#real-world-examples-of-how-rate-limiting-helped-cloudflare-customers">
        
      </a>
    </div>
    <p>Over the past few months, Cloudflare customers ranging from <a href="https://www.cloudflare.com/ecommerce/">e-commerce companies</a> to high-profile, ad-driven platforms have been using this service to mitigate malicious attacks. It made a big difference to their business: they’ve stopped revenue loss, reduced infrastructure costs, and protected valuable information, such as intellectual property and/or customer data.</p><p>Several common themes have emerged for customers who have been successfully using Rate Limiting during the past couple months. The following are examples of some of the issues those customers have faced and how Rate Limiting addressed them.</p>
    <div>
      <h4>High-volume attacks designed to bring down e-commerce sites</h4>
      <a href="#high-volume-attacks-designed-to-bring-down-e-commerce-sites">
        
      </a>
    </div>
    <p>Buycraft, <a href="https://www.cloudflare.com/case-studies/buycraft/">a Minecraft e-commerce platform</a>, was subjected to denial-of-service attacks which could have brought down the e-commerce stores of its 500,000+ customers. Rate Limiting addresses this common attack type by blocking offending IP addresses at its network edge, so the malicious traffic doesn’t reach the origin servers and impact customers.</p>
    <div>
      <h4>Attacks against API endpoints</h4>
      <a href="#attacks-against-api-endpoints">
        
      </a>
    </div>
    <p>Haveibeenpwned.com <a href="https://www.cloudflare.com/case-studies/troy-hunt/">provides an API</a> that surfaces accounts that have been hacked to help potential victims identify whether their credentials have been compromised. Troy Hunt (the service’s creator), decided to use Cloudflare’s Rate Limiting to protect his API from malicious traffic, leading to <a href="https://www.cloudflare.com/solutions/ecommerce/optimization/">improved performance</a> and reduced infrastructure costs.</p>
    <div>
      <h4>Brute-force login attacks</h4>
      <a href="#brute-force-login-attacks">
        
      </a>
    </div>
    <p>After IT consulting firm 2600 Solutions, which manages Wordpress sites for clients, was brute-forced over 200 times in a month, owner Jeff Williams decided to use Cloudflare Rate Limiting. By blocking excessive failed login attempts, they were able to not only protect their clients’ sites from being compromised, they also ensured legitimate users were not impacted by slower application performance.</p>
    <div>
      <h4>Bots scraping the site for content</h4>
      <a href="#bots-scraping-the-site-for-content">
        
      </a>
    </div>
    <p>Another Cloudflare customer saw valuable content being scraped from their site by competitors using bots. Competitors then used this scraped content to boost their own search engine ranking at the expense of the targeted site. Our customer lost tens of thousands of dollars before using Cloudflare’s Rate Limiting to <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">prevent the bots from scraping content</a>.</p>
    <div>
      <h4>How do I get started with Rate Limiting?</h4>
      <a href="#how-do-i-get-started-with-rate-limiting">
        
      </a>
    </div>
    <p>Anyone can start utilizing the benefits of Cloudflare’s Rate Limiting. With the Cloudflare Dashboard, go to the Firewall tab, and within the Rate Limiting card, click on “Enable Rate Limiting.”</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QLMfHzGF2J1ju4dLTmP6C/a6826edb544bb1a66b6a0cde5bd0a2d4/Screen-Shot-2017-04-13-at-1.17.47-PM.png" />
            
            </figure><p>Even though you will be prompted to enter a payment method to start using the service, you will not be charged for <a href="https://support.cloudflare.com/hc/en-us/articles/115000272247-Billing-for-Cloudflare-Rate-Limiting">the first 10,000 qualifying requests</a>. Once done, <a href="https://support.cloudflare.com/hc/en-us/articles/115001635128-Configuring-Rate-Limiting-from-UI">you’ll be able to create rules</a>.</p><p>If you are on an Enterprise plan, contact your Cloudflare Customer Success Manager to enable Rate Limiting.</p>
    <div>
      <h4>Tighter control over the type of traffic to rate limit</h4>
      <a href="#tighter-control-over-the-type-of-traffic-to-rate-limit">
        
      </a>
    </div>
    <p>As customers begin to understand attack patterns and their own application’s potential vulnerabilities, they can tighten criteria. All customers can create path-specific rules, using wildcards (for example: <a href="http://www.example.com/login/\">www.example.com/login/\</a>* or <a href="http://www.example.com/\*/checkout.php">www.example.com/\*/checkout.php</a>). Customers on a Business or higher plan can specify to rate limit only certain HTTP request methods.</p>
    <div>
      <h4>Simulate traffic to tune your rules</h4>
      <a href="#simulate-traffic-to-tune-your-rules">
        
      </a>
    </div>
    <p>Customers on the Pro and higher plans will be able to ‘simulate’ rules. A rule in simulate mode will not actually block malicious traffic, but will allow you to understand what traffic will be blocked if you were to setup a ‘live’ rule. All Customers will have analytics (coming soon) to let them gain insights into the traffic patterns to their site, and the efficacy of their rules.</p>
    <div>
      <h4>Next Steps</h4>
      <a href="#next-steps">
        
      </a>
    </div>
    <ul><li><p>If you haven’t enabled Rate Limiting yet, go to the <a href="https://www.cloudflare.com/a/firewall/">Firewall App</a> and enable Rate Limiting</p></li><li><p><a href="https://support.cloudflare.com/hc/en-us/articles/115001635128-Configuring-Rate-Limiting-from-UI">Create your first rule</a></p></li><li><p>For more information, including a demo of Rate Limiting in action, visit <a href="http://www.cloudflare.com/rate-limiting/">www.cloudflare.com/rate-limiting/</a>.</p></li></ul><p></p> ]]></content:encoded>
            <category><![CDATA[Rate Limiting]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Mitigation]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">3jJX6AKmlz33ZH8YTcMMpa</guid>
            <dc:creator>Timothy Fong</dc:creator>
        </item>
        <item>
            <title><![CDATA[Rate Limiting: Live Demo]]></title>
            <link>https://blog.cloudflare.com/traffic-control-live-demo/</link>
            <pubDate>Fri, 30 Sep 2016 19:56:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare helps customers control their own traffic at the edge. One of two products that we introduced to empower customers to do so is Cloudflare Rate Limiting. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare helps customers control their own traffic at the edge. One of two <a href="/cloudflare-traffic/">products that we introduced</a> to empower customers to do so is <a href="https://www.cloudflare.com/traffic-control/">Cloudflare Rate Limiting</a>*.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4NtFQrwczwJFS6c5ko0bUk/08f0544ed11c6d802aa08ad234d79a71/speed-limit-10.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/brhefele/6553028503/">image</a> by <a href="https://www.flickr.com/photos/brhefele/">Brian Hefele</a></p><p>Rate Limiting allows a customer to rate limit, shape or block traffic based on the rate of requests per client IP address, cookie, authentication token, or other attributes of the request. Traffic can be controlled on a per-URI (with wildcards for greater flexibility) basis giving pinpoint control over a website, application, or API.</p><p>Cloudflare has been <a href="https://en.wikipedia.org/wiki/Eating_your_own_dog_food">dogfooding</a> Rate Limiting to add more granular controls against Layer 7 DOS and brute-force attacks. For example, we've experienced attacks on cloudflare.com from more than 4,000 IP addresses sending 600,000+ requests in 5 minutes to the same URL but with random parameters. These types of attacks send large volumes of HTTP requests intended to bring down our site or to crack login passwords.</p><p>Rate Limiting protects websites and APIs from similar types of bad traffic. By leveraging our massive network, we are able to process and enforce rate limiting near the client, shielding the customer's application from unnecessary load.</p><p>To make this more concrete, let's look at a live demonstration rule for cloudflare.com. Multiple rules may be used and combined to great effect -- this is just a limited example.</p><p>Read on, and then test it yourself.</p>
    <div>
      <h3>Creating the rule</h3>
      <a href="#creating-the-rule">
        
      </a>
    </div>
    <p>Imagine an endpoint that is resource intensive. To maintain availability, we want to protect it from high-volume request rates - like those from an aggressive bot or attacker.</p><p><b>URL</b> <code>*.cloudflare.com/rate-limit-test</code></p><p>Rate Limiting allows for * wildcards to give more flexibility. An API with multiple endpoints might use a pattern of <code>api.example.com/v2/*</code></p><p>With that pattern, all resources under <code>/v2</code> would be protected by the same rule.</p><p><b>Threshold</b>We set this demonstration rule to 10 requests per minute, which is too sensitive for a real web application, but allows a curious user refreshing their browser ten times to see Rate Limiting in action.</p><p><b>Action</b>We set this value to <code>block</code> which means that once an IP addresses triggers a rule, all traffic from that IP address will be blocked at the edge and served with a default 429 HTTP error code.</p><p>Other possible choices include <code>simulate</code> which means no action taken, but analytics would indicate which requests would have been mitigated to help customers evaluate the potential impact of a given rule.</p><p><b>Timeout</b></p><p>This is the duration of the mitigation once the rule has been triggered. In this example, an offending IP address will be blocked for 1 minute.</p><p><b>Response body type</b></p><p>This type was set to <code>HTML</code> in the demo so that Rate Limiting returns a web page to mitigated requests. For an API endpoint, the response body type could return JSON.</p><p><b>Response body</b></p><p>The response body can be anything you want. Refresh the link below 10 times very quickly to see our choice for this demonstration rule.</p><p><a href="https://www.cloudflare.com/rate-limit-test"><b>https://www.cloudflare.com/rate-limit-test</b></a></p>
    <div>
      <h3>Other possible configurations</h3>
      <a href="#other-possible-configurations">
        
      </a>
    </div>
    <p>We could have specified a <b>Method</b>. If we only cared to rate limit POST requests, we could adjust the rule to do so. This rule could be used for a login page where high frequency of POSTs by the same IP is potentially suspicious.</p><p>We also could have specified a <b>Response Code</b>. If we only wanted to rate limit IPs which were consistently failing to authenticate, we could create the rule to trigger only after a certain threshold of 403’s have been served. Once an IP is flagged, perhaps because it was pounding a login endpoint with incorrect credentials, that client IP could be blocked from hitting either that endpoint or the whole site.</p><p>We will expand the matching criteria, such as adding headers or cookies. We will also extend the mitigation options to include CAPTCHA or other challenges. This will give our users even more flexibility and power to protect their websites and API endpoints.</p>
    <div>
      <h3>Early Access</h3>
      <a href="#early-access">
        
      </a>
    </div>
    <p>We'd love to have you try Rate Limiting. Read more and <a href="https://www.cloudflare.com/traffic-control">sign up for Early Access</a>.</p><p>**Note: This post was updated 4/13/17 to reflect the current product name. All references to Traffic Control have been changed to Rate Limiting.*</p> ]]></content:encoded>
            <category><![CDATA[Traffic]]></category>
            <category><![CDATA[Rate Limiting]]></category>
            <category><![CDATA[Reliability]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mitigation]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5jRNF30iNz47tFcZ7hvNoY</guid>
            <dc:creator>Timothy Fong</dc:creator>
        </item>
        <item>
            <title><![CDATA[iOS 9 — How did the launch really go?]]></title>
            <link>https://blog.cloudflare.com/ios-9-how-did-the-launch-really-go/</link>
            <pubDate>Tue, 22 Sep 2015 22:53:00 GMT</pubDate>
            <description><![CDATA[ On September 16 2015 at 10:00AM PST, Apple released their latest update to the iPhone: iOS 9. For several days after the announcement, ISPs and customers reported problems downloading iOS 9 due to overloaded servers. ]]></description>
            <content:encoded><![CDATA[ <p>On September 16 2015 at 10:00AM PST, Apple released their latest update to the iPhone: iOS 9. For several days after the announcement, ISPs and customers reported problems downloading iOS 9 due to overloaded servers. Obviously, the demand for iOS 9 was higher than even Apple anticipated, but how much higher? Few organizations outside of Apple have any idea what the actual iOS 9 adoption rates look like.</p><p>By analyzing the user agent strings of requests passing through the CloudFlare network, we were able to piece together a pretty good picture of iOS 9 uptake. Here’s an hour-by-hour look at requests from iOS 8 devices (blue) and iOS 9 devices (orange) for the first 24 hours after the announcement.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2evKuvfY86P7afmY5e1I1/305d979b400f4d66f3fee1aed100b63f/image_0-1.jpg" />
            
            </figure><p>We started seeing small amounts of iOS 9 usage <i>before</i> it was officially released, followed by a spike immediately after the launch (times are shown in UTC, so the 10:00AM announcement shows up as hour 18). You can also see a second spike at 10:00 UTC when Europe started waking up.</p>
    <div>
      <h3>What about iOS 9.1?</h3>
      <a href="#what-about-ios-9-1">
        
      </a>
    </div>
    <p>Even though the official release was for iOS 9.0, we also found beta iOS 9.1 in the wild. Curious about the comparative traffic between the two?</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6k72S5uVWVMg9eFUOPbRE/34a49bebad7df0c18e97953f1361b724/image_1.jpg" />
            
            </figure><p>iOS 9.0 is shown in blue, while 9.1 is shown in orange. As you can see, 9.0 adoption exploded after Apple’s official launch, while the 9.1 beta requests remained steady.</p>
    <div>
      <h3>Current Adoption Rates</h3>
      <a href="#current-adoption-rates">
        
      </a>
    </div>
    <p>Fast-forward five days, and it’s clear that iOS 9 adoption didn’t slow down after the launch. As of September 21st, the relative traffic of iOS 9 (orange) to iOS 8 (blue) on the CloudFlare network is around 30-35%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7mPQ7f7gXseuluOTyxNdIa/01eb29509017d42b9fb9c5557e4efc28/image_2-2.png" />
            
            </figure>
    <div>
      <h3>IPv6 and iOS 9</h3>
      <a href="#ipv6-and-ios-9">
        
      </a>
    </div>
    <p>A key part of the iOS 9 announcement was that all iOS apps running on 9.0+ will require IPv6 support. The IPv4 address space is nearly exhausted, and switching to IPv6 is the only way to keep adding more devices to the global Internet.</p><p>iOS 9’s IPv6 requirement compliments CloudFlare’s mission to make a better Internet. We’ve been doing our part to encourage IPv6 adoption by providing <a href="https://www.cloudflare.com/ipv6">free IPv6 support</a> to all web properties on our network.</p><p>Although it’s still pretty early, we can already see an uptick in IPv6 requests due to iOS 9:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/CUgWWvcpZYinzb6e4h4ds/ff46afadf69fac1dea24d2421c7828ea/image_3.png" />
            
            </figure><p>The first chart shows the number of IPv4 vs. IPv6 requests for iOS 8, while the second shows iOS 9. Even after only a few days, we’re seeing a 1.07% increase in IPv6 requests thanks to iOS 9.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Seeing over 5% of global Internet requests gives us an interesting perspective on current events. We get to watch the worldwide impact of everything from product launches like iOS 9 to hiccups in the Internet infrastructure like the <a href="/the-internet-is-a-cooperative-system-dns-outage-of-6-july-2015/">Dyn outage</a> of last July and even <a href="/how-syria-turned-off-the-internet/">governments turning off the Internet</a>. We try our best to use our unique vantage point to better the Internet as a whole and raise awareness for critical technologies like IPv6.</p> ]]></content:encoded>
            <category><![CDATA[iOS]]></category>
            <category><![CDATA[Data]]></category>
            <category><![CDATA[Analytics]]></category>
            <guid isPermaLink="false">vQNdhSnKWFxlfJahe1PK8</guid>
            <dc:creator>Timothy Fong</dc:creator>
        </item>
    </channel>
</rss>