• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 16:13
CEST 22:13
KST 05:13
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL20] Ro24 Preview Pt2: Take-Off6[ASL20] Ro24 Preview Pt1: Runway132v2 & SC: Evo Complete: Weekend Double Feature4Team Liquid Map Contest #21 - Presented by Monster Energy9uThermal's 2v2 Tour: $15,000 Main Event18
Community News
Weekly Cups (Aug 18-24): herO dethrones MaxPax3Maestros of The Game—$20k event w/ live finals in Paris30Weekly Cups (Aug 11-17): MaxPax triples again!13Weekly Cups (Aug 4-10): MaxPax wins a triple6SC2's Safe House 2 - October 18 & 195
StarCraft 2
General
Weekly Cups (Aug 18-24): herO dethrones MaxPax Geoff 'iNcontroL' Robinson has passed away What mix of new and old maps do you want in the next 1v1 ladder pool? (SC2) : 2v2 & SC: Evo Complete: Weekend Double Feature The GOAT ranking of GOAT rankings
Tourneys
Maestros of The Game—$20k event w/ live finals in Paris RSL: Revival, a new crowdfunded tournament series Sparkling Tuna Cup - Weekly Open Tournament Monday Nights Weeklies Master Swan Open (Global Bronze-Master 2)
Strategy
Custom Maps
External Content
Mutation # 488 What Goes Around Mutation # 487 Think Fast Mutation # 486 Watch the Skies Mutation # 485 Death from Below
Brood War
General
Flash On His 2010 "God" Form, Mind Games, vs JD BGH Auto Balance -> http://bghmmr.eu/ [ASL20] Ro24 Preview Pt2: Take-Off BW General Discussion No Rain in ASL20?
Tourneys
[ASL20] Ro24 Group D [Megathread] Daily Proleagues [ASL20] Ro24 Group B [ASL20] Ro24 Group C
Strategy
Simple Questions, Simple Answers Fighting Spirit mining rates [G] Mineral Boosting Muta micro map competition
Other Games
General Games
Nintendo Switch Thread General RTS Discussion Thread Stormgate/Frost Giant Megathread Dawn of War IV Path of Exile
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread Vanilla Mini Mafia
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine The year 2050 European Politico-economics QA Mega-thread
Fan Clubs
INnoVation Fan Club SKT1 Classic Fan Club!
Media & Entertainment
Anime Discussion Thread Movie Discussion! [Manga] One Piece [\m/] Heavy Metal Thread
Sports
2024 - 2026 Football Thread TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion
World Cup 2022
Tech Support
High temperatures on bridge(s) Gtx660 graphics card replacement Installation of Windows 10 suck at "just a moment"
TL Community
The Automated Ban List TeamLiquid Team Shirt On Sale
Blogs
Evil Gacha Games and the…
ffswowsucks
Breaking the Meta: Non-Stand…
TrAiDoS
INDEPENDIENTE LA CTM
XenOsky
[Girl blog} My fema…
artosisisthebest
Sharpening the Filtration…
frozenclaw
ASL S20 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 4065 users

CloudBleed Traffic Leak (TL NOT affected)

Forum Index > General Forum
Post a Reply
Team Liquid's community sites and Liquipedia are not affected by this. We use Cloudflare only for DNS, at no time do any of your requests pass through their network. -R1CH
Uvantak
Profile Blog Joined June 2011
Uruguay1381 Posts
Last Edited: 2017-02-24 06:51:28
February 24 2017 06:50 GMT
#1
#Cloudbleed HTTPS Traffic Leak

Between 2016-09-22 - 2017-02-18 passwords, private messages, API keys, and other sensitive data were leaked by Cloudflare to random requesters. Data was cached by search engines, and may have been collected by random adversaries over the past few months.

"The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests), potential of 100k-200k paged with private data leaked every day" -- source

You can see some of the leaked data yourself in search engine caches: https://duckduckgo.com/?q= {"scheme":"http"} CF-Host-Origin-IP&t=h_&ia=web

Source

> The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests).

1) From the metrics I recalled when I interviewed there, and assuming the given probability is correct, that means a potential of 100k-200k paged with private data leaked every day.

2) What's the probably that a page is served to a cache engine? Not a clue. Let's assume 1/1000.

3) That puts a bound around a hundred leaked pages saved per day into caches.

4) Do the cache only provide the latest version of a page? I think most do but not all. Let's ignore that aspect.

5) What's the probably that a page contains private user information like auth tokens? Maybe 1/10?

6) So, that's 10 pages saved per day into the internet search caches.

7) That's on par with their announcement: "With the help of Google, Yahoo, Bing and others, we found 770 unique URIs that had been cached and which contained leaked memory. Those 770 unique URIs covered 161 unique domains." Well, not that we know for how long this was running.

8) Now, I don't want to downplay the issue, but leaking an dozen tokens per day is not that much of a disaster. Sure it's bad, but it's not remotely close to the leak of the millennia and it's certainly not internet scale leak.

9) For the record, CloudFlare serves over one BILLION human beings. Given the tone and the drama I expected way more data from this leak. This is a huge disappointment.

Happy Ending: You were probably not affected.


The list of affected sites is quite long, TL is there, so is Reddit, patreon, Yelp, stackoverflow and many others.

https://github.com/pirate/sites-using-cloudflare

We have got some very good Programmers here on TL, what insight can you guys give to the TL'ers?
@Kantuva | Mapmaker | KTVMaps.wordpress.com | Check my profile to see my TL map threads, and you can search for KTV in the Custom Games section to play them.
Grettin
Profile Joined April 2010
42381 Posts
Last Edited: 2017-02-24 09:38:06
February 24 2017 09:11 GMT
#2
Authy, Patreon, Uber, Stackoverflow(Apparently confirmed that not affected), Curse, Discord.. lots of sites that TLers most likely use fairly often.

Authy is what makes me a bit worried. Provides two-factor authentication for Twitch and Discord for example.


Here is the 'thread' by Tavis Ormandy, who found the vulnerability.

https://bugs.chromium.org/p/project-zero/issues/detail?id=1139

We fetched a few live samples, and we observed encryption keys, cookies, passwords, chunks of POST data and even HTTPS requests for other major cloudflare-hosted sites from other users. Once we understood what we were seeing and the implications, we immediately stopped and contacted cloudflare security.


Importantly though:

I worked with cloudflare over the weekend to help clean up where I could. I've verified that the original reproduction steps I sent cloudflare no longer work.


We've been trying to help clean up cached pages inadvertently crawled at Google. This is just a bandaid, but we're doing what we can. Cloudflare customers are going to need to decide if they need to rotate secrets and notify their users based on the facts we know.


I don't know if this issue was noticed and exploited, but I'm sure other crawlers have collected data and that users have saved or cached content and don't realize what they have, etc. We've discovered (and purged) cached pages that contain private messages from well-known services, PII from major sites that use cloudflare, and even plaintext API requests from a popular password manager that were sent over https (!!).


We keep finding more sensitive data that we need to cleanup. I didn't realize how much of the internet was sitting behind a Cloudflare CDN until this incident.

The examples we're finding are so bad, I cancelled some weekend plans to go into the office on Sunday to help build some tools to cleanup. I've informed cloudflare what I'm working on. I'm finding private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings. We're talking full https requests, client IP addresses, full responses, cookies, passwords, keys, data, everything.


And for the laughs:

Cloudflare pointed out their bug bounty program, but I noticed it has a top-tier reward of a t-shirt.

https://hackerone.com/cloudflare

Needless to say, this did not convey to me that they take the program seriously.


Fuck me, rofl.
"If I had force-fields in Brood War, I'd never lose." -Bisu
Acrofales
Profile Joined August 2010
Spain18017 Posts
February 24 2017 10:49 GMT
#3
I have no idea what this means. I googled what CloudFlare does exactly, and it sounds rather useful, but I'm not sure what this vulnerability means. Shouldn't https to cloudflare be the same encrypted jibberish as https to anywhere else? So unless cloudflare is dumping unencrypted data somewhere somehow, what does this mean?
Yurie
Profile Blog Joined August 2010
11864 Posts
Last Edited: 2017-02-24 11:14:15
February 24 2017 11:11 GMT
#4
On February 24 2017 19:49 Acrofales wrote:
I have no idea what this means. I googled what CloudFlare does exactly, and it sounds rather useful, but I'm not sure what this vulnerability means. Shouldn't https to cloudflare be the same encrypted jibberish as https to anywhere else? So unless cloudflare is dumping unencrypted data somewhere somehow, what does this mean?


The parser failed to correctly upgrade HTTP content to encrypted HTTPS, resulting in data being made available without any protections.


http://www.wired.co.uk/article/cloudflare-cloudbleed-passwords-leaked-online
ahswtini
Profile Blog Joined June 2008
Northern Ireland22208 Posts
February 24 2017 11:13 GMT
#5
a company of cloudflare's size and coverage offering a t-shirt for its bug bounty reward? lol
"As I've said, balance isn't about strategies or counters, it's about probability and statistics." - paralleluniverse
Nukeface
Profile Joined March 2014
Netherlands1 Post
February 24 2017 11:34 GMT
#6
Cloudbleed means that any site that had it's data (http or https, doesn't matter) might be affected.

The effect of the error in code is that the servers of CF had memory-leaks. Memory leaks are exactly what they sound like, bits of the RAM data gets "leaked", or, more explained, returned to the server/user that did the request "causing" the leak.

Thus, if I were a Google Server and requested all of the pages of Team Liquid (.net), and that data would go through CF, I might also get data returned that the TL host, through CF, might have accessed (and thus had placed in RAM on the server). It might not be all, could just be snippets of data. Just that... those snippets include: everything. (usernames, passwords, "secrets" from 2FA (two-factor-authentication), frames from video files, a corner of a .jpg file. Anything.

To make sure that, apart from any possible data that is now already "public" (ie., indexed by search engines) you (users and admins alike) change the following:
- database passwords
- server passwords
- SSH keys to/from servers/user accounts
- other encryption/authentication keys

Also change passwords to password managers! (like LastPass, confirmed was that 1Password was not affected, saw the link somewhere, cant find it in my history anymore though).

So yea, this is potentially very serious as ANY information that should've been kept secret "might" now be publicly available in a search engine index.

For example, some of the leaked data via this link: https://duckduckgo.com/?q= {"scheme":"http"} CF-Host-Origin-IP&t=h_&ia=web
Or run your own search on DDG using: {"scheme":"http"} CF-Host-Origin-IP

Happy changing your privates
Acrofales
Profile Joined August 2010
Spain18017 Posts
February 24 2017 11:42 GMT
#7
On February 24 2017 20:11 Yurie wrote:
Show nested quote +
On February 24 2017 19:49 Acrofales wrote:
I have no idea what this means. I googled what CloudFlare does exactly, and it sounds rather useful, but I'm not sure what this vulnerability means. Shouldn't https to cloudflare be the same encrypted jibberish as https to anywhere else? So unless cloudflare is dumping unencrypted data somewhere somehow, what does this mean?


Show nested quote +
The parser failed to correctly upgrade HTTP content to encrypted HTTPS, resulting in data being made available without any protections.


http://www.wired.co.uk/article/cloudflare-cloudbleed-passwords-leaked-online

Okay, that makes sense. Thanks. They link through to this site:
https://medium.com/@octal/cloudbleed-how-to-deal-with-it-150e907fd165#.xdw2fw4tq for what end users should do, but I don't understand the advice:
From an individual perspective, this is straightforward —the most effective mitigation is to change your passwords. While this might not be necessary (it is unlikely your passwords were exposed in this incident), it will absolutely improve your security from both this potential compromise and many other, far more likely security issues. Cloudflare is behind many of the largest consumer web services (Uber, Fitbit, OKCupid, …), so rather than trying to identify which services are on Cloudflare, it’s probably most prudent to use this as an opportunity to rotate ALL passwords on all of your sites. Best practice is to use a long random string for each password, unique for each site, and to manage that collection using a “password manager”, such as 1Password, LastPass, or the built-in password managers in modern web browsers. Users should also log out and log in to their mobile applications after this update. While you’re at it, if it’s possible to use 2FA or 2SV with sites you consider important (using something like TOTP/Google Authenticator or U2F), that’s a meaningful security upgrade, too.


2FA or 2SV makes sense. Obviously using unique passwords for different sites also makes sense. But because such passwords are impossible to remember (hell, I use about 6 different passwords and "obsolete" them every now and then by replacing them, yet still have problems remembering which password I used where), you would absolutely need one of those password managers. But doesn't this return us to a single point of failure? What if the service you happen to choose is insecure (lets say 1Password gets hacked)? Why is that better in any way, shape or form, than Google getting hacked?
So all it seems to do is add an extra way to hack my Google account (can go straight to Google, or go through 1Password). Either way they have access to my emails (and if they have full access, they can easily get access to most of my other accounts by having the password reset and sent to my email account). So what exactly is the point? Using the browser's password manager is a more secure solution (you'd need physical access to the machine), but also means that you can only log on from one machine, because there's no way you can remember a whole list of randomly generated unique passwords.
Yurie
Profile Blog Joined August 2010
11864 Posts
February 24 2017 11:48 GMT
#8
On February 24 2017 20:42 Acrofales wrote:
Show nested quote +
On February 24 2017 20:11 Yurie wrote:
On February 24 2017 19:49 Acrofales wrote:
I have no idea what this means. I googled what CloudFlare does exactly, and it sounds rather useful, but I'm not sure what this vulnerability means. Shouldn't https to cloudflare be the same encrypted jibberish as https to anywhere else? So unless cloudflare is dumping unencrypted data somewhere somehow, what does this mean?


The parser failed to correctly upgrade HTTP content to encrypted HTTPS, resulting in data being made available without any protections.


http://www.wired.co.uk/article/cloudflare-cloudbleed-passwords-leaked-online

Okay, that makes sense. Thanks. They link through to this site:
https://medium.com/@octal/cloudbleed-how-to-deal-with-it-150e907fd165#.xdw2fw4tq for what end users should do, but I don't understand the advice:
Show nested quote +
From an individual perspective, this is straightforward —the most effective mitigation is to change your passwords. While this might not be necessary (it is unlikely your passwords were exposed in this incident), it will absolutely improve your security from both this potential compromise and many other, far more likely security issues. Cloudflare is behind many of the largest consumer web services (Uber, Fitbit, OKCupid, …), so rather than trying to identify which services are on Cloudflare, it’s probably most prudent to use this as an opportunity to rotate ALL passwords on all of your sites. Best practice is to use a long random string for each password, unique for each site, and to manage that collection using a “password manager”, such as 1Password, LastPass, or the built-in password managers in modern web browsers. Users should also log out and log in to their mobile applications after this update. While you’re at it, if it’s possible to use 2FA or 2SV with sites you consider important (using something like TOTP/Google Authenticator or U2F), that’s a meaningful security upgrade, too.


2FA or 2SV makes sense. Obviously using unique passwords for different sites also makes sense. But because such passwords are impossible to remember (hell, I use about 6 different passwords and "obsolete" them every now and then by replacing them, yet still have problems remembering which password I used where), you would absolutely need one of those password managers. But doesn't this return us to a single point of failure? What if the service you happen to choose is insecure (lets say 1Password gets hacked)? Why is that better in any way, shape or form, than Google getting hacked?
So all it seems to do is add an extra way to hack my Google account (can go straight to Google, or go through 1Password). Either way they have access to my emails (and if they have full access, they can easily get access to most of my other accounts by having the password reset and sent to my email account). So what exactly is the point? Using the browser's password manager is a more secure solution (you'd need physical access to the machine), but also means that you can only log on from one machine, because there's no way you can remember a whole list of randomly generated unique passwords.


There are offline password managers where they have to snatch your file and then break your password on it. Most popular is Keepass. Many keep a copy of their file on dropbox so they can use it on different devices. Doesn't really matter if somebody gets the file since you have a very very strong master password memorised for it.
KOFgokuon
Profile Blog Joined August 2004
United States14896 Posts
February 24 2017 12:31 GMT
#9
So this reads like it's a big deal, but if it is, why isn't this being highlighted more strongly by TL management?
Yurie
Profile Blog Joined August 2010
11864 Posts
February 24 2017 12:35 GMT
#10
On February 24 2017 21:31 KOFgokuon wrote:
So this reads like it's a big deal, but if it is, why isn't this being highlighted more strongly by TL management?


Because it isn't a big deal and it has been hours since the story broke. It is at most a medium deal and TL still needs time to check the facts and come out with a statement that is correct and relevant.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2017-02-24 12:47:07
February 24 2017 12:46 GMT
#11
On February 24 2017 21:35 Yurie wrote:
Show nested quote +
On February 24 2017 21:31 KOFgokuon wrote:
So this reads like it's a big deal, but if it is, why isn't this being highlighted more strongly by TL management?


Because it isn't a big deal and it has been hours since the story broke. It is at most a medium deal and TL still needs time to check the facts and come out with a statement that is correct and relevant.


It is a big deal. The story broke a few hours ago, but the leak has been happening for months. Changing all your passwords is the least you can do the be somewhat safe. Enabling 2FA is another step that would be suited to be even safer.
LiquipediaWanderer
Grettin
Profile Joined April 2010
42381 Posts
February 24 2017 13:22 GMT
#12
"If I had force-fields in Brood War, I'd never lose." -Bisu
salle
Profile Blog Joined August 2010
Sweden5554 Posts
Last Edited: 2017-02-24 13:24:14
February 24 2017 13:23 GMT
#13
So I was 99% sure we weren't affected but I wanted to wait for R1CH to confirm.

Changed the thread title to reflect this.

EDIT: Still, changing passwords and using a password manager that creates a unique password for each website or service you use is highly recommended.
Administrator"Ambitious but rubbish!" - Jeremy Clarkson
Clubfan
Profile Blog Joined May 2013
Germany913 Posts
February 24 2017 13:23 GMT
#14
Looks like TL isn't affected, someone should probably re-name the thread:


The list on GitHub apparently lists all (or at least a lot of) Cloudflare's DNS users, but that service isn't really the problem for the data breach. Nonehteless, it's a good idea to use password managers and not re-use passwords.
LiquipediaLickyPiddy manager
Merano
Profile Joined January 2008
Austria105 Posts
February 24 2017 13:24 GMT
#15
R1CH already posted that TL is not affected:
https://www.reddit.com/r/DotA2/comments/5vwhkb/massive_password_leak_including_teamliquidnet/de5lel1/
flamewheel
Profile Blog Joined December 2009
FREEAGLELAND26781 Posts
February 24 2017 13:57 GMT
#16
R1CH \o/
Writerdamn, i was two days from retirement
Shock710
Profile Blog Joined December 2009
Australia6097 Posts
February 24 2017 14:09 GMT
#17
R1CH is the man i was worried there for a second phew... TL! TL! TL!
dAPhREAk gives Shock a * | [23:55] <Shock710> that was out of context -_- [16:26] <@motbob> Good question, Shock!
salle
Profile Blog Joined August 2010
Sweden5554 Posts
Last Edited: 2017-02-24 14:12:44
February 24 2017 14:12 GMT
#18
He tweeted this last night:


Administrator"Ambitious but rubbish!" - Jeremy Clarkson
Please log in or register to reply.
Live Events Refresh
RotterdaM Event
15:00
Rotti's All Random Finals
RotterdaM1318
IndyStarCraft 254
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
RotterdaM 1318
mouzHeroMarine 360
IndyStarCraft 254
Reynor 234
UpATreeSC 109
ProTech89
Dewaltoss 51
StarCraft: Brood War
Larva 415
Mini 389
Aegong 56
scan(afreeca) 38
HiyA 8
Beast 2
Dota 2
XaKoH 451
Pyrionflax212
capcasts116
Counter-Strike
fl0m1924
Stewie2K739
Foxcn482
kRYSTAL_57
PGG 34
Super Smash Bros
PPMD48
Heroes of the Storm
Liquid`Hasu517
Other Games
Grubby2835
FrodaN1498
C9.Mang0182
KnowMe160
Trikslyr79
ZombieGrub39
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 22 non-featured ]
StarCraft 2
• StrangeGG 56
• LUISG 16
• OhrlRock 1
• IndyKCrew
• sooper7s
• AfreecaTV YouTube
• intothetv
• Kozan
• Migwel
• LaughNgamezSOOP
StarCraft: Brood War
• 80smullet 23
• Pr0nogo 4
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• masondota22236
• WagamamaTV761
• Noizen47
League of Legends
• TFBlade1038
Counter-Strike
• imaqtpie1076
Other Games
• Scarra363
• Shiphtur199
Upcoming Events
Replay Cast
3h 47m
Afreeca Starleague
13h 47m
Rush vs TBD
TBD vs Mong
WardiTV Summer Champion…
14h 47m
Cure vs Classic
ByuN vs TBD
herO vs TBD
TBD vs NightMare
TBD vs MaxPax
OSC
15h 47m
PiGosaur Monday
1d 3h
Afreeca Starleague
1d 13h
herO vs TBD
Royal vs Barracks
Replay Cast
2 days
The PondCast
2 days
WardiTV Summer Champion…
2 days
Replay Cast
3 days
[ Show More ]
LiuLi Cup
3 days
MaxPax vs TriGGeR
ByuN vs herO
Cure vs Rogue
Classic vs HeRoMaRinE
Cosmonarchy
3 days
OyAji vs Sziky
Sziky vs WolFix
WolFix vs OyAji
BSL Team Wars
3 days
Team Hawk vs Team Dewalt
BSL Team Wars
3 days
Team Hawk vs Team Bonyth
SC Evo League
4 days
TaeJa vs Cure
Rogue vs threepoint
ByuN vs Creator
MaNa vs Classic
Maestros of the Game
4 days
[BSL 2025] Weekly
4 days
SC Evo League
5 days
Maestros of the Game
5 days
BSL Team Wars
5 days
Team Bonyth vs Team Sziky
BSL Team Wars
5 days
Team Dewalt vs Team Sziky
Monday Night Weeklies
6 days
Liquipedia Results

Completed

CSLAN 3
uThermal 2v2 Main Event
HCC Europe

Ongoing

Copa Latinoamericana 4
BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Qualifiers
ASL Season 20
CSL Season 18: Qualifier 1
Acropolis #4 - TS1
SEL Season 2 Championship
WardiTV Summer 2025
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1
BLAST.tv Austin Major 2025

Upcoming

CSL Season 18: Qualifier 2
CSL 2025 AUTUMN (S18)
LASL Season 20
BSL Season 21
BSL 21 Team A
Chzzk MurlocKing SC1 vs SC2 Cup #2
RSL Revival: Season 2
Maestros of the Game
EC S1
Sisters' Call Cup
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
MESA Nomadic Masters Fall
CS Asia Championships 2025
Roobet Cup 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.