You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/privacy-gateway/privacy-proxy-onboarding.mdx
+66-1Lines changed: 66 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,9 +6,74 @@ sidebar:
6
6
7
7
---
8
8
9
+
## System overview
10
+
9
11
The Cloudflare Privacy Proxy consists of a generic HTTPS CONNECT (and CONNECT-UDP ) proxy.
10
12
These may be used to ensure that knowledge of sensitive user information leaked in web traffic is not only available to those that need it to function.
11
13
12
14
A high level overview of the system is shown below. Control plane services are shown in orange, whereas dataplane services are shown in blue.
13
15
14
-
test
16
+

17
+
18
+
The following components comprise the Privacy Proxy system:
19
+
20
+
-**Client**: The end-user making HTTP requests via the Privacy Proxy from within a web browser and/or other supported client.
21
+
-**Attester**: The client-facing service that authenticates the validity of end-user accounts, validates entitlements, and requests a PAT from the issuer on behalf of the end-user. Not operated by Cloudflare.
22
+
-**Privacy API**: Cloudflare service that issues PATs to the client for redemption against the Privacy Proxy service. This service mints Private Access Tokens (PATs) using the RSA blind signature protocol.
23
+
-**Privacy Proxy**: The HTTP CONNECT-based proxy service running on Cloudflare’s edge. This service validates the PAT passed by the client, enforces any double spend prevention necessary for the token. The service handles proxying of the wrapped HTTP request, as well as selection of the egress path and IP.
24
+
-**Origin**: The external (target) website for the end-user request.
25
+
26
+
DNS resolution uses [Cloudflare’s public resolver (1.1.1.1)](/1.1.1.1/) infrastructure for name resolution.
A client requires configuration data (the region public key) to request tokens. The key is used to initialize the request for blinded tokens from the Privacy API.
35
+
36
+
The client should periodically refresh this public key, especially after IP address changes, since Cloudflare will use the IP address to map to the region.
37
+
38
+
This key should be kept in the client session across multiple requests.
After the client is configured, it will need privacy tokens in order to make requests.
45
+
46
+
When the token pool is low/empty, the client can use the stored region public key to create a batch of new blinded token requests to send to the Privacy API through the Token Proxy.
47
+
48
+
The Privacy API signs the tokens and returns them to the client, which can store them in a pool for later use.
Cloudflare will provide access to a MASQUE client, which can be used in mobile client code to connect to the MASQUE proxy provided by Cloudflare. For example:
55
+
56
+
```sh
57
+
cargo run --bin quiche-client -- \
58
+
--no-verify \
59
+
--connect-to masque-relay.cloudflare.com \
60
+
--connect-type=HTTP \
61
+
https://example.com
62
+
```
63
+
64
+
### HTTP (Web) request flow
65
+
66
+
Once the client needs to make a connection to a new server, it can connect to the Cloudflare Proxy service and request a connection to the origin with a token in the ` Proxy-Authorization ` HTTP request header.
67
+
68
+
This connection can be kept alive for multiple requests/responses from the server.
0 commit comments