Donate for the Cryptome archive of files from June 1996 to the present

5 April 2013

About the CloudFlare Logs on Barrett Brown Site


Daniel Brandt, cloudflare-watch.org, writes:

The subpoena served on CloudFlare, requesting all information on a specific domain related to Barrett Brown, raises a huge question about CloudFlare's internal procedures. As far as I can tell, CloudFlare has made no statements in their terms of service, nor in their privacy and security policy, regarding the issue of access-log retention.

If they have logs of IP addresses that visited the pages on the echelon2.org domain as they were served through CloudFlare, and if the subpoena stands, CloudFlare will have to produce such logs. The wording in the subpoena is very broad. There is no Section 230 "safe harbor" immunity for service providers under the 1996 Communications Decency Act in this case, because Section 230 does not apply to federal criminal law. The case against Barrett Brown is a criminal case.

But there is also no legal requirement in the U.S. to retain such logs. If you have them and they are subpoenaed, then you have to produce them. If you destroy them at that point, this would be suppression of evidence. But if you routinely delete old logs, and no longer have them when the subpoena arrives, then you've done nothing wrong.

Does CloudFlare rotate their logs periodically, and delete their old access logs? Since CloudFlare takes pride in allowing their customers to hide behind their proxy, one thing they should have done when they started their service would be to announce a clear access-log retention policy.

The fact that I cannot find such a statement makes me suspicious. I added a new box at the bottom of the home page on www.cloudflare-watch.org that raises a similar issue. If it turns out that the prosecutor gets old logs from CloudFlare about visitors to echelon2.org, then this will increase my suspicions, and I may expand that box.