- Joined
- Jan 23, 2022
For the record, I can find no reason to believe that Archive actually uses Cloudflare. They may have at one point, but it looks like to me they just ripped CF's older captcha page. Look for the clues:And to make matters worse, whoever configured Archive's Tor address (http://archiveiya74codqgiixo33q62qlrqtkgmcitqx5u2oeqnmn5bpcbiyd.onion/) pointed it at the cloudflare frontend, which is completely wrong, and causes all the Tor visits to first go through cloudflare, which typically tries to block Tor users.
Tor addresses should ALWAYS point at the actual server IP, bypassing clownflare.
Pointing a Tor address to cloudflare breaks things.
- Use of reCAPTCHA. Even before the modern day, where CF's WAF options use Cloudflare Turnstile, Cloudflare started using hCaptcha, not reCAPTCHA.
- The "CF" page does not have any Ray IDs, your IP, or "Performance & security by Cloudflare". All the CF default pages have this. In addition, this is not what the CF challenge pages look like anymore.
- The HTTP responses have none of the typical Cloudflare headers.
- IPs in DNS aren't Cloudflare.
(also, as a side note: I obviously dislike Cloudflare because of our history with them. But in fairness, CF is not inherently rude to Tor. Where I have been forced to use the CF portal, their analytics are pretty detailed and you can see that Tor is generally allowed to pass. The issue is often retard site administrators who blindly enable their bot fight modes and the like, set the security level to high, etc. Like it or not, Tor is used for abusive traffic, and it can highly vary on how much abuse your specific exit node has. So enabling these modes without considering the consequences very well may disproportionately affect Tor. That's not really Cloudflare's fault, it's doing what you told it to do.)
Last edited: