2
submitted 1 year ago by 80Ships@alien.top to c/main@selfhosted.forum

I've seen a post on here before about Cloudflare tunnels being unsafe for exposing your locally hosted services to the web which I totally get.

However I'm a bit of a noob with complex VPN set ups and I tried to get Wireguard working in Docker but couldn't. I got a tunnel configured and exchanged all the peer keys and things but I think my initial networking docker-compose stack was incorrect possibly. Also the windows client for it is a bit ugly but that's by the by.

I've also used Tailscale in the past which is great but it feels like a temporary solution to me as you still have to remember ports and things (there may be a way around that if I remember correctly but I'd rather stay away from Tailscale. I prefer having control myself or through my domain name - probably illogical I know).

Instead I decided to try to protect the Cloudflare tunnel to my home network and I've made a policy in Cloudflare Access that won't let you in without emailing you a code (only my email address works) and having you enter it. I'd also rather adjust that to my 2FA app but I can't seem to get that to work here.

My question is: is that secure enough? And if not, what would you all suggest as an alternative (preferably an alternative that is pretty easy and means I can use my domain name)?

you are viewing a single comment's thread
view the rest of the comments
[-] superglue_chute115@alien.top 2 points 1 year ago

One thing to keep in mind when using CF tunnels is that Cloudflare can see all of your server's traffic. If your goal is privacy I recommend staying away

[-] Boomam@alien.top 1 points 1 year ago

I wish people would stop making this statement.

There's a difference between "seeing traffic" and "being able to understand what it is and do something about it".

[-] EndlessHiway@alien.top 1 points 1 year ago

How could they not understand what it is, since it is all decrypted.

[-] KN4MKB@alien.top 1 points 1 year ago

Brother, there is no difference. I think you are confused. They can "understand your traffic and do something about it" it's unencrypted, and you agree to a fairly strict terms of service that allows them to basically do whatever they like. Maybe you should read the agreement, and if you're using the tunnels, maybe turn them off until you understand your security posture and exposure of your network

load more comments (1 replies)
this post was submitted on 24 Oct 2023
2 points (100.0% liked)

Self-Hosted Main

504 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 1 year ago
MODERATORS