When using weak ETag headers, disable Email Obfuscation and Automatic HTTPS Rewrites to ensure Cloudflare doesn’t remove the ETag headers set by your origin web server.
Just to conclude, Cloudflare Apps is not the same as options (or features which we can enable) like Email obfuscation, Automatic HTTPS Rewrites, Rocket Loader rather Apps from the Cloudflare App Center as follows on the link below:
I am sending ETag for resources like images, CSS, JS from my origin host/server, but using Origin Cache Control in a Page Rule (including Cache Level: Cache Everything).
The thing is, Cloudflare doesn’t remove the ETag headers set by our origin web server, it changes it. I’ve tried to disable Email Obfuscation and Automatic HTTPS Rewrites but those had no effect… Cloudflare was still interfering with the eTag.
My server responds with ETag: “cee089074d302bdcafa743f072923d3f”, but when using Cloudflare, the response contains etag: W/“cee089074d302bdcafa743f072923d3f”.
I have tried disabling “Email obfuscation” and “Automatic HTTPS rewrites”, but still no success.
How does one prevent Cloudflare from modifying the etag HTTP header?
Domains on Enterprise plans enable strong ETag headers via a Respect Strong ETags Page Rule. Otherwise, strong ETag headers are converted to weak ETag headers. Also, set a strong ETag header in quotes (Etag: “example”) or Cloudflare removes the ETag instead of converting it to a weak ETag.
Without a Page Rule, Cloudflare preserves strong ETags set by the origin web server if:
the content is gzipped on the origin server,
the origin sends the gzipped content with a strong ETag header, and
Rocket Loader, Minification, Email Obfuscation, and Railgun features are disabled.