- Joined
- Jul 12, 2019
It's amazing to ponder how far this has come.Yeah it's great. Fuck cloudflare. Kiwiflare for the win.
And to think all of this was ultimately started by an autistic man's love of Pokemon and Sonic.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
It's amazing to ponder how far this has come.Yeah it's great. Fuck cloudflare. Kiwiflare for the win.
Now what the fuck am i supposed to do with my eveningConnected!
Chat server is down.
Connection lost. Please wait - attempting reestablish
This is happening on Tor as well, which is a FireFox fork.People in Telegram are complaining that using Google Chrome / Chrome browsers causes a white screen, can confirm it's also happening to me
Both work for me. Are supplying a session cookie or any headers? What TLS version do you see in the output?curl --http2 -v https://kiwifarms.net gives me a blank page.
curl --http1.1 -v https://kiwifarms.net is OK.
Http fuckery on the server side?
No cookies, just a quick test with curl, the website is also now working if I disable http/2 in my browser. I'm using librewolf a firefox fork.Both work for me. Are supplying a session cookie or any headers? What TLS version do you see in the output?
* Trying 103.114.191.1:443...
* Connected to kiwifarms.net (103.114.191.1) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS handshake, Client hello (1):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Server hello (2):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Certificate (11):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, CERT verify (15):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Finished (20):
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
* subject: CN=*.kiwifarms.net
* start date: Dec 25 00:00:00 2022 GMT
* expire date: Dec 25 23:59:59 2023 GMT
* subjectAltName: host "kiwifarms.net" matched cert's "kiwifarms.net"
* issuer: C=LV; L=Riga; O=GoGetSSL; CN=GoGetSSL RSA DV CA
* SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* h2h3 [:method: GET]
* h2h3 [:path: /]
* h2h3 [:scheme: https]
* h2h3 [:authority: kiwifarms.net]
* h2h3 [user-agent: curl/7.87.0]
* h2h3 [accept: */*]
* Using Stream ID: 1 (easy handle 0x5593fef89fd0)
> GET / HTTP/2
> Host: kiwifarms.net
> user-agent: curl/7.87.0
> accept: */*
>
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
< HTTP/2 200
< server: openresty
< date: Fri, 03 Feb 2023 11:24:53 GMT
< content-type: text/html; charset=utf-8
< content-length: 0
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< last-modified: Fri, 03 Feb 2023 11:24:52 GMT
< expires: Thu, 19 Nov 1981 08:52:00 GMT
< cache-control: private, no-cache, max-age=0
< set-cookie: xf_dbWriteForced=1675423493; path=/; secure; HttpOnly
< x-sneed: CHUCK
<
* Connection #0 to host kiwifarms.net left intact
* Connected to kiwifarms.net (103.114.191.1) port 443 (#0)
* ALPN: offers http/1.1
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
} [5 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [25 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4503 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted http/1.1
* Server certificate:
* subject: CN=*.kiwifarms.net
* start date: Dec 25 00:00:00 2022 GMT
* expire date: Dec 25 23:59:59 2023 GMT
* subjectAltName: host "kiwifarms.net" matched cert's "kiwifarms.net"
* issuer: C=LV; L=Riga; O=GoGetSSL; CN=GoGetSSL RSA DV CA
* SSL certificate verify ok.
} [5 bytes data]
> GET / HTTP/1.1
> Host: kiwifarms.net
> User-Agent: curl/7.87.0
> Accept: */*
>
{ [5 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [265 bytes data]
* [CONN-0-0][CF-SSL] TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [265 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200
< server: openresty
< date: Fri, 03 Feb 2023 11:20:55 GMT
< content-type: text/html; charset=utf-8
< vary: Accept-Encoding
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< expires: Fri, 03 Feb 2023 11:20:59 GMT
< cache-control: private, no-cache, max-age=0
< x-xf-cache-status: HIT
< set-cookie: xf_csrf=38MQ_nF47AfdmbEA; path=/; secure
< x-sneed: CHUCK
< transfer-encoding: chunked
Can you please pull the site 3 times and give me the value of x-sneed for all three?Whatever you did, its somehow working for now, thanks much, I can sneed comfily again.
Sneeding over http/2 fine now.
Sure, all three says x-sneed: CHUCK.Can you please pull the site 3 times and give me the value of x-sneed for all three?
Clearnet still error within less than 1 min after login, says the "address cannot be found", regardless the VPN. TOR seems still viable. What's happening?Ok, I encountered the error myself and was able to do some diagnostics. I've applied something I think may fix it. Let me know if you encounter the error on clearnet.