You should NOT use Cloudflare Tunnel (if you do this...)

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 มิ.ย. 2024
  • Are you interested in Remote Access for your Homelab? In this TH-cam video, I will explain the potential implications and problems with Cloudflare Tunnel, and when you should NOT use it. I’ll also discuss the architecture of the service, the security and privacy implications, and the legal and regulatory implications. Tune in to find out more! #RemoteAccess #Homelab #CloudflareTunnels
    Related Videos/Links
    • How to use Cloudflare ...
    ________________
    💜 Support me and become a Fan!
    → christianlempa.de/patreon
    💬 Join our Community!
    → christianlempa.de/discord
    ________________
    Read my Tech Documentation
    christianlempa.de/docs
    My Gear and Equipment-*
    christianlempa.de/kit
    ________________
    All links with "*" are affiliate links.

ความคิดเห็น • 350

  • @jasenwar
    @jasenwar ปีที่แล้ว +70

    Why does every video with these tech TH-camrs require me to grab a drink?

    • @dejangegic
      @dejangegic หลายเดือนก่อน

      They're paid by the Big Drink lobby that wants you hydrated, and your piss translucent

    • @tmanley1985
      @tmanley1985 หลายเดือนก่อน +5

      Just once, I'd like to see a video start with: "So get ready, grab yourself a five course dinner and let's figure this out together!"

    • @redwind3475
      @redwind3475 หลายเดือนก่อน

      Great question. Why don't we talk more about it....over a cup of coffee!

    • @xConundrumx
      @xConundrumx 17 วันที่ผ่านมา

      to be honest I wouldn't be able to sit through most of them without a stiff one.

    • @jasenwar
      @jasenwar 17 วันที่ผ่านมา

      @@xConundrumx for me I need a stiffy

  • @LAWRENCESYSTEMS
    @LAWRENCESYSTEMS ปีที่แล้ว +42

    Yup, these are the same issues I brought up in my Cloudflare Tunnel video.

  • @clixt984
    @clixt984 ปีที่แล้ว +102

    I honestly don't mind all the cons of Cloudflare Tunnel, and I definitely agree. Don't just expose all your services without another form of security like Cloudflare Access. That's the first thing I did after setting up Tunnels, and it's been great.

    • @kanarie93
      @kanarie93 11 หลายเดือนก่อน +11

      basic auth is indeed not allways working as first level security, so cloudflare acces is a godsend. I was finnicking with Authelia but dammn cloudflare acces "just works"

  • @IanCliveKerrCoelho
    @IanCliveKerrCoelho ปีที่แล้ว +1

    Hi Christian. I have one public IP with all ports available to my homelab. Obviously with a good firewall. In this configuration, I can do all I need. But here in Brazil, this type of service is very scarce, mainly due to the lack of available public IP. I've been testing the use of CHR for a few months now and I'm really enjoying it. First, the fact that I use an Amazon IP here in Brazil, where I host the mikrotik CHR, and also because I can create a tunnel with a server that is behind a restrictive firewall. What for me is very interesting due to the unavailability of public IP. Another interesting point is that I can configure my Hurricane Electrics IPv6 range in this CHR and distribute it to servers via tunnel. Great content.

  • @maximusdecimus2350
    @maximusdecimus2350 ปีที่แล้ว +1

    thanks for sharing your knowledge, planning my home lab and use your videos as a research.

  • @stefanfelder9413
    @stefanfelder9413 ปีที่แล้ว +83

    Little workaround about the firewall issue:
    Put the cloudflare tunnel vm or container in a dedicated /30 vlan with only internet access to the external ips of cloudflare and create rules to internal services you want to expose via inter vlan routing

    • @xavierlarosa8235
      @xavierlarosa8235 ปีที่แล้ว +4

      new to home lab here, are you saying to basically segment your internal network and all your exposed services will be on an isolated network along with your cloudflare tunnel vm running?

    • @stefanfelder9413
      @stefanfelder9413 ปีที่แล้ว +14

      @@xavierlarosa8235
      Yeah, you could do it like this. This would limit the devices cloudflare would be able to reach to this vlan.
      I have gone even further, got a server vlan with my internal services and an dedicated vlan for the cloudflare tunnel VM. So i get maximum control over the services cloudflare is able to reach by creating a default drop between the vlans and only dedicated allow rules for services i want to expose

    • @rb-max
      @rb-max ปีที่แล้ว +2

      This is what i am doing already to prevent cf tunnel gets access to whole my network. Cf tunnel limited to its own vlan, then get access to only the services what really need cloudflare tunnel.

    • @tonyho4512
      @tonyho4512 ปีที่แล้ว +1

      @@rb-max Could you share how this can be done?

    • @stefanfelder9413
      @stefanfelder9413 ปีที่แล้ว +1

      @@tonyho4512
      Depends on your firewall.
      What firewall do you have?

  • @AlexWard94
    @AlexWard94 ปีที่แล้ว +4

    This is a great video that got me thinking - especially while I was mulling the obvious home network security advantages of using a Cloudflare Tunnel. But, as with everything, there has to be a catch - you have to trust Cloudflare will handle your data carefully and hopefully not leave it open to exposure.
    The thing is - this is inherently a problem with Cloudflare itself (as well as AWS, Azure, Google, Apple and any other public cloud offering). And in reality, so much of the internet relies on these big players - there's practically no way you can use the internet without at least some of your important data ending up in the hands of these players.

  • @scottibyte
    @scottibyte ปีที่แล้ว +1

    Well stated. The folks that have approached me interested in Cloudflare Tunnels are those that want to have services reachable from their CGnat. In situations where I have played with Cloudflare tunnel it has been inside of a dedicated VLAN on my network and I think that your concerns are valid. When CGNat folks want to host non-web applications, I tell them to manage their own VPS endpoint server outside of their network. This takes care of being able to host UDP connections or TCP connections to non-web ports which I don't really see a way to do on Cloudflare Zero Trust.

  • @erichb.1396
    @erichb.1396 ปีที่แล้ว +1

    Hmm.... Your video confirms my amateur understanding of Cloudflare tunnels. Thank you very much! I'll think more about it, get info and probably tip my tunnels and switch to a practical in-house VPN solution. I hope I can do that. Best regards.

  • @BlitzFingers
    @BlitzFingers 4 หลายเดือนก่อน

    Vielen Dank Christian! I've been considering haproxy or the CF tunnel. This helped me make my decision.

  • @rocket01666
    @rocket01666 ปีที่แล้ว +1

    I use and rely on CF Tunnels for exposing resources, though they are heavily restricted and require you to have the WARP client present on your device and have authorization to my team. With WARP it creates a WireGuard tunnel connection into my network allowing me to pass UDP traffic or NON HTML traffic, It's actually a great VPN alternative since M$ has deprecated auth prompts which make OpenVPN with MFA impossible with NPS, Now you must pay for expensive services such as Duo :(
    P.S. Love your content and what you provide for the IT community, Thank you!

  • @jacksoncremean1664
    @jacksoncremean1664 ปีที่แล้ว +39

    Excellent video, this is something home labbers often get wrong.
    Cloudflare isn't a silver bullet to your security woes, sure it helps but it comes with it's own issues. if your using a free plan then I'd argue it doesn't provide much value at least compared to using something like ModSecurity/Coraza, CrowdSec or a hardware firewall appliance.

  • @chrisumali9841
    @chrisumali9841 11 หลายเดือนก่อน

    Thanks for the info and video, have a great day

  • @henrysowell
    @henrysowell ปีที่แล้ว +57

    Great video. I’m a huge fan of Cloudflare and think they’ve done a ton for the world on making the internet more secure. That said, having a reasonable, fair, and open analysis on the risks vs. benefits is something the homelab community should do more of. And frankly, there are a ton of packages and projects that we all install that should get the same scrutiny. Thanks again the the level headed analysis!

  • @sphbecker
    @sphbecker 5 หลายเดือนก่อน +1

    Very good point. You could always put the Cloudflare endpoint in its own vlan so that you can still build firewall rules for the traffic.

  • @TheJoaolyraaraujo
    @TheJoaolyraaraujo ปีที่แล้ว +1

    Thank you. I was wondering the implications of using it

  • @MiFonito
    @MiFonito ปีที่แล้ว +2

    Beutifull video. Thank you for addressing this (actually, I was close to writing you and asking about this after seeing your CloudFlare video; you were just faster). Services like this are great, but they come at a cost. At the end of the day, this is all about whom we trust.
    Thank you, Christian; following your channel has been worth it since the day I discovered it. You gave me a lot of nice home projects to implement in my home lab (I still have to implement reverse proxy, lol).

  • @jenniferw8963
    @jenniferw8963 10 หลายเดือนก่อน +3

    6:00 one thing you could do with a cloudflare tunnel setup is put the server which the connector daemon is running on, into its own VLAN. Then setup firewall rules in pfsense to route that VLAN traffic to the appropriate servers and ports on other subnets.

  • @Glatze603
    @Glatze603 ปีที่แล้ว +28

    Hi Christian and thank you for this critical and informative video. You do not bypass your firewall, if you set up the cloudflared-server (or cloudflare docker-container) in a separate dmz/vlan. I can't see any difference from other VPN solutions that ends directly in the internal network. This is a general problem that can either be improved by well-documented descriptions of possible extensions or you have the necessary expertise yourself to be able to operate such solutions relatively safely.
    So you are right, not only the route between the endpoints has to be secure, but espesially the endpoints itself and the networks behind those endpoints always has to be secured. Your argument is still absolutely valid and many manufacturers of such solutions promise easy and secure installations, what can be very deceptive.
    In my opinion, Cloudflare offers one of the best and most secure solutions for accessing internal services (no published ports, MFA for accessing the Cloudflare dashboard and separate MFA and other web application rules for accessing the actual services). In addition, the actual application that you want to reach via Cloudflare Tunnel should also have its own authentication - I only use applications that can handle MFA on their own, such as Guacamole. But it always depends on how you implement it :-)
    If large companies trust Microsoft by running an Azure AD (most have little choice), you can trust Cloudflare for your homelab services for sure.

    • @ShaferHart
      @ShaferHart 8 หลายเดือนก่อน

      If you can't see "any difference" between a VPN server that you run and this then you are ignorant about the topic or just plain daft. The alternative to cloudfared (from a privacy perspective) isn't tailscale or twingate or whatever tf. Let's concede that cloudfare gives you all of those features as securely as any third party can, that's really beside the point, you're getting all those "freebies" in exchange of putting a middle man in all the traffic you tunnel through them (technically they can establish any connection they wish from inside your network since they are running an agent inside yours). Obviously a lot of very technically inclined people are willing to do this but let's not be stupid about the trade-offs here.

    • @Glatze603
      @Glatze603 8 หลายเดือนก่อน

      @@ShaferHart Hosting a VPN server primarily just means having an encrypted connection between 2 points, nothing else!

  • @mrcolo.
    @mrcolo. ปีที่แล้ว +4

    Please do a video about best pratices to setup Sophos XG, secure the net, expose safely services, ecc. Or a video where you show us your Sophos setup. Thanks man!

  • @DavidMedinets
    @DavidMedinets 5 หลายเดือนก่อน +1

    Thanks for pointing out this issue.

  • @Movies4118
    @Movies4118 ปีที่แล้ว +2

    Thanks for another great video as usual!

    • @christianlempa
      @christianlempa  ปีที่แล้ว

      You're welcome! Thanks for watching :)

  • @RobertAnthonyPitera
    @RobertAnthonyPitera 6 หลายเดือนก่อน +1

    Was about to deploy Cloudflare and thanks to searching for deployment tutorials, the algorithm served me this video. Score one for YT - this was an excellent video I'd likely have otherwise missed.
    I still think it's right for my use case, but this video was invaluable towards a better understanding of what I was doing.. It was thoughtfully laid out well explained with just enough humor to make it fun to watch. Nice job; I subbed after watching it. Thanks!

  • @maniratanpratapsingh0
    @maniratanpratapsingh0 ปีที่แล้ว +38

    Was Waiting For Someone To Make This Video Great To See Someone Talking About This . We Should See Both Sides.

  • @BrentFreyEsq
    @BrentFreyEsq ปีที่แล้ว +12

    Great video! I think homelabbers should talk more about who you trust with your data, but also the various attack surfaces these services open up.
    I'd be interested in a deeper dive and comparison between Cloudflare Tunnels, Twingate and Tailscale (and Headscale), as they all do similar things with subtle--but important--differences.

    • @homepc293
      @homepc293 6 หลายเดือนก่อน +2

      You forgot zerotier. Would really love to see an in depth comparison of these

  • @GabrielAcosta00
    @GabrielAcosta00 ปีที่แล้ว +1

    Hi Christian, excellent video.
    I'm using cloundlare tunnel to expose a web application (Django + React) to a handful of clients. I don't care about the data, I found cloudflared easy to do what I wanted, I should look for another approach?. To access my homelab I still use wireguard + adguardhome + npm.

  • @MikelManitius
    @MikelManitius 3 หลายเดือนก่อน

    This is a good balanced look at it. One thing you forgot to mention are mitigations, such as being careful where in your network to deploy the tunnel endpoint. For example, a “DMZ” *(or similar) area where you provide services from but that does not have access to the rest of your network… in order to minimize the crash surface.

  • @Ecker00
    @Ecker00 ปีที่แล้ว +2

    Thank you Christian for taking a critical take on this. 👍

  • @olafschermann1592
    @olafschermann1592 ปีที่แล้ว

    Good point. I had to decide between zerotier which is more convenient for my application and cloudflare. I decided for cloudflare because i trust them (more). But shutting down a service is also a valid complaint.

  • @rexjuggler19
    @rexjuggler19 ปีที่แล้ว +6

    I try to avoid using someone else's cloud services. I'm not 100% opposed, but I prefer to manage my own stuff with my own stuff.

  • @mobimb
    @mobimb ปีที่แล้ว +1

    Thank you christian for the video.. kindly we need to know what the alternative’s solutions in your opinion?

  • @samuelhuang7769
    @samuelhuang7769 ปีที่แล้ว +2

    Hi Christian, thanks for all of your awesome video that explains complicated things in a easily way. But after following your previous video on setting up my homelab with Traefic, Cloudflare tunnel, and Zero Trust Authentication on a bare-metal Truenas Scale Server, I was worried about getting ban from cloudflare by having high bandwidth and other security issues.
    I'm planning to let my family in Taiwan to use Nextcloud and PhotoPrism remotely and share family video, photos, or probably sensitive documents as well.
    So will VPN like Tailscale be the best solution here? Or is there a better solution in my case? Thanks in advance!!

  • @RK-ly5qj
    @RK-ly5qj ปีที่แล้ว +2

    I have tested CF, and i didn't choose it for a few reasons - trust, protocol limitation, and L7 protection (threath protection, AV, IPS, webfilter etc), which i can do on my SophosXG(WAF). Maybe i didnt test it well, but... ;)

  • @madsjensen8094
    @madsjensen8094 ปีที่แล้ว +2

    Glad someone else finally said it!

  • @canadianwildlifeservice8883
    @canadianwildlifeservice8883 ปีที่แล้ว +1

    Agreed with this post. With most cloud providers, you give up your privacy for security (well, security is subjective... providing no three letter agencies haven't already backdoored it like they did with L2TP and Juniper).

  • @mariof.1941
    @mariof.1941 ปีที่แล้ว +1

    I have enough options with my FortiGate firewall to share certain parts of my network. I looked into the Cloudflare solution, but the fact that all my traffic would go through their servers stopped me from using it. However, once you have made the right settings in your firewall, it is easy to quickly provide someone with a service from the HomeLab.

  • @niravraychura
    @niravraychura ปีที่แล้ว +2

    Thanks for the video. It actually makes sense. But I would like to add something here, "home lab is for learning" right? Yes, we can check out some tools but I think ppl who have a home lab should expose their services and do some kind of research about how to secure it, for example, use some kind of firewall, ids/ips, etc. See the logs regularly, and automate some things. Maybe I am wrong, it's just my thought. Correct me if I am wrong.

  • @RobertMizen
    @RobertMizen ปีที่แล้ว +14

    I think one of the main issues for me is the centralising of important internet infrastructure. Cloudflare offer some great services which are important. But i do not feel comfortable with so many eggs of the internet being in so few baskets.
    Awesome video btw dude as usual

    • @pavelperina7629
      @pavelperina7629 ปีที่แล้ว +4

      I see it in the opposite way: cloudflare removes many points of failure. Of coarse it depends how much time, money and (electric, your) energy are you willing to invest into your infrastructure. For accessing your personal blog, nextcloud, git ... running on low power pc/sbc i'd say it's perfect.

  • @erichb.1396
    @erichb.1396 ปีที่แล้ว +2

    Hi Christian, I have been thinking about it again, especially with regard to my self-hosted 'Vaultwarden' which is accessible externally via Cloudflare tunnel. As far as I know - and I am a layman - Vaultwarden encrypts the data locally. When synchronising with an external client via the CF tunnel, the data should actually be securely encrypted. CF doesn't know the key of my Vaultwarden. Or am I wrong?

  • @kevinhughes9801
    @kevinhughes9801 ปีที่แล้ว +1

    Great insight thanks

  • @dbishop9085
    @dbishop9085 ปีที่แล้ว +1

    is this a segue to setting up a VPN with traefik? I definitely hope so! I am not sure if tailscale would be the same situation or if wireguard would be the better choice for privacy. a video about that would be a nice addition.

  • @garypaulson5202
    @garypaulson5202 ปีที่แล้ว +1

    This was very informative, danke sehr

  • @subnumeric
    @subnumeric ปีที่แล้ว +4

    Pro tip: You can still use the SSH tunnel and do a reverse port tunnel trough that. Cloudflare cannot see/MITM that, since only you have your certificate, which the server verifies and is thus able to perform an authenticated Diffie-Hellman exchange and guarantee your communication is confidential! (See the SSH2 protocol and TOFU security model)
    Also,
    I thought it was obvious that it works as essentially a MITM? They even advertise it as such! How else would they be able to magically HTTPSify all your services? Obviously, keep this in mind....

  • @MorpheusLewis
    @MorpheusLewis ปีที่แล้ว +1

    OMG Where did you get your animated matrix wallpaper?? also thanks for this, I've been looking at using Cloudflare due to TH-cam videos etc.

  • @uuu12343
    @uuu12343 ปีที่แล้ว +4

    Cloudflare tunnel is a tunneling protocol that does a peer-to-peer connection through a "middle-man" server such as cloudflare tunnel, same as zerotier and tailscale
    Using another server inherently means you have a dependency that you need to be aware of

    • @darrennotfound7740
      @darrennotfound7740 ปีที่แล้ว +2

      For tailscale if it can do P2P no middle man
      If it can't it will use a middle man

  • @sergefedorow8430
    @sergefedorow8430 ปีที่แล้ว

    Thank you! Just in time, as for me.

  • @romayojr
    @romayojr ปีที่แล้ว +6

    i just recently deployed cloudflare tunnel with my home lab services and it’s been working fantastic but after watching this i’m very conflicted

    • @christianlempa
      @christianlempa  ปีที่แล้ว +3

      Like I said, it's not a bad service at all. Just depends on what matters most to you, simplicity, or privacy :)

  • @PowerUsr1
    @PowerUsr1 ปีที่แล้ว +3

    To be clear, at around 6:16 when firewalls might become useless because they are not intergrated into the firewall and punches a hole....
    1. If an enterprise employs applicaiton whitelisting on their laptops/servers/desktops then this will never have a chance at being deployed.
    2. if an enterprises chooses to do SSL decryption, this would never have a chance at being deployed
    3. If using some form of application identification {appid} this would never have a chance at being deployed
    4. if you deny the outgoing port of 7844 then this will never get deployed
    If you choose to have lax rules or a lax security model then yeah you can bypass the network security but this isnt as easy as one would think it is.

  • @JasonsLabVideos
    @JasonsLabVideos ปีที่แล้ว +1

    Another good video sir !!

  • @chaosen3
    @chaosen3 ปีที่แล้ว +6

    Regarding your point about serving non-HTML content, I always found it was a good practice to bypass the caching with a page rule. I use the tunnel and a reverse proxy to host my plex server using a custom server access URL and the first month I had it running with no page rules I was a bit unsettled to see how much data had been cached, but nothing came of it anyway.

    • @pcklubas
      @pcklubas ปีที่แล้ว +1

      They said in the discord that this rule applies to ANYTHING that goes through cloudflare the network, they don't care if you cache it or not. So you can still get booted if you don't cache a thing. However they probably wont bother you if you not pushing many terabytes of data.

    • @canes4ever162
      @canes4ever162 5 หลายเดือนก่อน

      This is what I am thinking about doing. Do are you doing a CF tunnel to nginx to then forward to plex? Any security concerns? I feel like it is better than exposing ports on my ip

  • @josephwagner6682
    @josephwagner6682 3 หลายเดือนก่อน

    Very good video. I was especially interested in the security concerns to bypass you companies firewall by using such a reserve tunnel. I guess no enterprise will want to have such a thing set up by individual user. I could imagine an enterprise set up done locally with trusting Cloudflare but it's security nightmare when everyone can start a docker container and punch holes into the whole firewall setup. I would even assume that some companies block those hosts and port per default.

  • @xxgg
    @xxgg 7 หลายเดือนก่อน +1

    So what method do you recommend for remote access to home network? VPN?

  • @MichaelWDietrich
    @MichaelWDietrich 6 หลายเดือนก่อน +1

    Thanks for the great vid. But on 9:15 no "two endpoints" will ever be under your "full controll" not even physically (but even one endpoint could be disagreed about how much it is under your "full controll" as soon as any network connection - not allone wireless network connection is involved).

  • @RuiFungYip
    @RuiFungYip 11 หลายเดือนก่อน

    Personally, my deployment of cloudflare tunnels is by deploying it as a sidecar container on my external ingress traefik instances.
    I run 2 sets of traefik deployments in my local k8s cluster, one that's exposed to internet via cloudflare tunnels, and one that's local only. Gives me pretty good control of what gets exposed where by setting the correct ingressClassName and external-dns annotations on my ingress resources. Security is enforced by the CNI via Network Policies, and the cloudflared daemon isn't initialized with cloud config, just a straight "direct all traffic to traefik on localhost" rule static configuration.
    It's pretty good for punching through CGNAT while being directly accessible online. Similar things would be ngrok I guess. Tailscale funnel is nice, but a bit restrictive since you can't use your own domains.
    As for bypassing the network firewalls and whatnot, that's a pretty easy workaround. Deploy the cloudflared tunnel on a separate VLAN/subnet where it has to go through the router to reach the services, then it's traffic will be monitored by the firewall / security appliance. (Though in most homelab setups it does mean the traffic will transit the router twice so... tradeoffs.)

  • @mihaigalos279
    @mihaigalos279 ปีที่แล้ว +3

    Just use a reverse SSH tunnel to the device hosting the cloudflared, that's encrypted end-to-end.

  • @MyAnimeForLife
    @MyAnimeForLife 11 หลายเดือนก่อน

    Can you point out some other options similar to cloudflare tunnel which have similar services.

  • @fisunerd
    @fisunerd 6 หลายเดือนก่อน +1

    Well, I guess that one should not use this kind of services without security layers in mind.
    Mostly because in certain, given scenario, one could use their service's trustworthy reputation to stealthy exfiltrate data from a company's network, or gain reverse access to it. Either by somehow abusing it or installing it on purpose in a post-exploitation phase.
    This is a great option when your security's strategy is mature enough and capable of containing threats as mentioned before.

  • @stevebryant3723
    @stevebryant3723 8 หลายเดือนก่อน +1

    I set up a DMZ vLan with Cloudflare and pf-Sense it's much more complicated to admin but at least the cloudflare vm doesn't have full network access by default just cost a bit of hair ripping during troubleshooting and setup lol

  • @urzalukaskubicek9690
    @urzalukaskubicek9690 หลายเดือนก่อน

    Great explanation, thanks!

  • @telosxian
    @telosxian 6 หลายเดือนก่อน +1

    Not only do CF tunnels convey your data unencrypted through CF, but if you use their traditional DNS and choose CF proxy to "hide" your IP, your data is again in clear text within the proxy handling path.

  • @ijustwanttoeatcookie
    @ijustwanttoeatcookie ปีที่แล้ว +1

    I applaud you for also pointing out the drawbacks of CF tunnels. What is your opinion on exposing something like vaultwarden on CF tunnels?

    • @semirauthsala6001
      @semirauthsala6001 ปีที่แล้ว +1

      I wonder what make you stop creating simple VPN setup with trusted provider and expose it securely. If you able to host vaultwarden locally, you should be able to setup VPN as well

    • @ijustwanttoeatcookie
      @ijustwanttoeatcookie ปีที่แล้ว +1

      @@semirauthsala6001 There are situations where the device you want to connect from can’t connect over a vpn because it is managed by someone else. A company device for example.

  • @muhammedsaqibazam3035
    @muhammedsaqibazam3035 ปีที่แล้ว +1

    Very informative, but what will be the alternative of VPN, if we are not willing to use Cloudflare as an alternative of VPN. Is there is any Web Application Firewall, which fulfill all the requirement of a secure tunnel.

  • @GrantSR
    @GrantSR 5 หลายเดือนก่อน +2

    What if you ran cloudflare on a small separate machine, outside of your firewall? So that all cloudflare traffic still had to go through your firewall?

  • @szymonagiewka4513
    @szymonagiewka4513 ปีที่แล้ว

    Today they posted on Cloudflare Blog: "Goodbye, section 2.8 and hello to Cloudflare’s new terms of service". This is part of their Developer Week announcement. You need their services like Stream to serve video though.

  • @kkho7616
    @kkho7616 5 หลายเดือนก่อน

    Is this tunnel recommend to use for proxmox server for remote access ? Thank you.

  • @user-hx9be2hl1r
    @user-hx9be2hl1r 7 หลายเดือนก่อน +1

    do you have any videos on how to set up a webserver on a raspberry pi and have secure certificates etc that can be accessed externally and not open up your home to potential cyber attack?

  • @00000a0009
    @00000a0009 9 หลายเดือนก่อน

    So if I have a wordpress container with a small website and I run the tunnel inside the docker I should be safe. Am I right?

  • @bobby07241
    @bobby07241 10 หลายเดือนก่อน +1

    so which on is the best, zerotier, twingate or cloudfare ?

  • @djKenpLan09
    @djKenpLan09 ปีที่แล้ว

    First! Thanks for keeping sharing your knowledge Christian!

  • @ericesev
    @ericesev 11 หลายเดือนก่อน +1

    I've been burned too many times by cloud hosted services. As more and more folks use their free tier, I suspect they'll eventually need to start charging for it or discontinue it entirely. I've been basically doing the same Zero Trust thing with a reverse proxy on my own network. It'll always be free, it'll always be more private, and a direct connection will always be faster and more reliable.
    I've never understood how they can market their product as having end-to-end encryption when it only has point-to-point encryption.

  • @alphenit
    @alphenit ปีที่แล้ว

    Not so sure about that firewall punching you talk about Christian..I have PFSense and could not get the cloudflare pod to properly connect to cloudflare because my pfsense was blocking port 7844 to the outside world.
    Once I created a rule that allowed the traffic, the CloudFlare tunnel started working but no way it worked "automagically" :)

  • @jribeiro1792
    @jribeiro1792 ปีที่แล้ว +3

    hey Christian thanks for your videos. Does the same thing applies for Twingate? Any insights on this solution? Thanks

    • @christianlempa
      @christianlempa  ปีที่แล้ว +1

      Thank you! As far as I know, Twingate uses a different protocol, and does not hook into TLS, however, it also likes to punch a hole into your firewall, so while the 1st and 3rd problem won't apply, 2nd will...

    • @jribeiro1792
      @jribeiro1792 ปีที่แล้ว

      @@christianlempa That's great!!! It's my own hole, so fine!!! :))))) Unfortunately my IP address is not public, so I can't use any port forwarding solutions. Thanks a lot for your reply

  • @thomastupper2594
    @thomastupper2594 ปีที่แล้ว +5

    What's the alternative to it though? If the option is either opening a port or using cloudflare, is that really a viable alternative?

  • @rashshawn779
    @rashshawn779 ปีที่แล้ว +1

    Does Cloudflare allow connecting to local service with only subdomain setup? I was setting up my service through Cloudflare tunnel(free tier), then I realized I cannot add subdomain only to Cloudflare for the public hostname. I don't want to do full setup for the zone because of the way my setup works. Quite wasted my time, I wish they will be clearer on the in the documentation very early on. So annoying to do until the end, only to realize it doesn't work for subdomain only setups.

  • @jerbear0348
    @jerbear0348 ปีที่แล้ว

    I use their warp client, i added in the local domain fallback, my local subdomain to route those requests to my bind9 dns, i then have A and CNAME records that sends those requests to traefik. Traefik serves ssl certs using let's encrypt, that way i get ssl certs both locally and remotely using traefik and warp client. For me my biggest concern was opening ports in my firewall. Until i can find a better solution it's perfect 👌.

  • @linuxbasics7060
    @linuxbasics7060 ปีที่แล้ว +1

    can you do a video on PfSense or something similar and how we would go about securing our home lab?

  • @Alex-un5tl
    @Alex-un5tl 7 หลายเดือนก่อน

    amazing as always

  • @kodream316
    @kodream316 8 หลายเดือนก่อน +1

    Could you make video with alternative way to expose internal services without public IP(CGNAT)?
    I currently rent VPS with public IP and with ZeroTier (will setup my own WireGuard at some point) connect to dedicated VM at home. then on that VPS I redirect all traffic on ports 80 and 443 to my reverse proxy VM with IPtable rules. It was a bit of a pain to get it working at first before I figured out the correct IPtable rules. But works fine since then.

  • @GottaHache
    @GottaHache ปีที่แล้ว +1

    You should do a video about Twingate. Very cool tool

  • @pnewman1112
    @pnewman1112 11 หลายเดือนก่อน +1

    Has anyone measured, from the web browser's standpoint, how much latency CF adds to the round-trip transaction? Is it 10s or 100s of milliseconds?

  • @nordexo
    @nordexo ปีที่แล้ว +1

    sounds like a thing that needs to be isolated on it's on network segment and all traffic coming out from the agent still going through the main firewall

  • @soubinan
    @soubinan 9 หลายเดือนก่อน +1

    The reason why self-hostable solutions like boundary or teleport in a free tier cloud are way better to use. When you want to businees things.

  • @vidx9
    @vidx9 ปีที่แล้ว +1

    "... customers can serve video and other large files using the CDN so long as that content is hosted by a Cloudflare service like Stream, Images, or R2." - Cloudflare's blog.
    That is for the removal of section 2.8 in the Cloudflare Terms of Service, which essentially means nothing to most people unless you are paying to use their services.

  • @electronicstv5884
    @electronicstv5884 ปีที่แล้ว +1

    Well, I do use Cloudflare for a lot of my services and it works great. But I'm also using it for my selfhosted Vaultwarden-instance 😅. So... Yeah. I don't know if it's that good ...

  • @Sean_Cockrell
    @Sean_Cockrell ปีที่แล้ว +2

    I think when other content creators talk about Cloudflare being a VPN killer they talking about WARP / access which is setup in the same Cloudflare portal page, zero trust. Tunnels though is no means a VPN killer I agree.

  • @szymex22
    @szymex22 ปีที่แล้ว +1

    Another thing I would like to mention that most TH-camrs don’t is that if you are using cloudflare you should setup dns overwrites on your dns server on your lan so that stuff doesn’t go through cloudflare and works offline when just accessing it from lan

    • @jayzn1931
      @jayzn1931 10 หลายเดือนก่อน

      How do you do that? And if you use something like pihole, is this still a concern or especially then?

    • @szymex22
      @szymex22 10 หลายเดือนก่อน

      @@jayzn1931 Pihole is the dns server I used, just add in local dns the address of the website and the server ip

    • @damiendye6623
      @damiendye6623 6 หลายเดือนก่อน

      ​@@jayzn1931Google split dns

  • @trix7450
    @trix7450 หลายเดือนก่อน

    Great video, I have a question if I use cloudflare proxy on my website does that mean my website is not gdpr?

  • @sashasimkin
    @sashasimkin หลายเดือนก่อน

    Hi! Thank you for this very important piece of information about CF tunnels, I'm now considering to use it in a business environment.
    I'm trying to understand how using CF might be violating GDPR here? As I understand GDPR is all about handling any PII data carefully, as needed and be transparent in how you're using it.
    So AFAIR CF has SOC2 compliance, and listing it as one of data processors should be enough to fit GDPR criteria.
    Would appreciate your insight on whether I'm correct here.

  • @tester246
    @tester246 6 หลายเดือนก่อน +1

    What about cloudflare Zero Trust with WARP
    Would that be better than tunnels?

  • @myusrngml
    @myusrngml ปีที่แล้ว +3

    why use cloudflare tunnels, aka reverse proxy, if your router supports port forwarding?

  • @alexandragroza2611
    @alexandragroza2611 10 หลายเดือนก่อน

    Brilliant!

  • @yaroslav7328
    @yaroslav7328 ปีที่แล้ว

    The only app I expose to the external internet is Portainer, which is protected by a very strong password. As far as I understand, Portainer does have a built-in lock-in mechanism. Additionally, I use fail2ban to block suspicious connection attempts. All incoming connections are denied by firewall rules. However, is there still a risk?

  • @alphonsemarcus3650
    @alphonsemarcus3650 11 หลายเดือนก่อน +1

    why not just add an extra layer of encryption before sending stuff through cloudflare? excellent video btw

  • @lupinsky2009
    @lupinsky2009 ปีที่แล้ว +1

    Great video! Are the same problems exist in Twingate? I asked Bard (the AI tool of Google) the following same question (can XXXXXX read my password?) for cloudflare the bottom line was YES and for twingate NO.

    • @christianlempa
      @christianlempa  ปีที่แล้ว

      Twingate doesn't hook into the connections, it acts as a "broker", but does not route them through their servers.

  • @JaysScript
    @JaysScript 3 หลายเดือนก่อน

    Okay what other option do we have for game servers? Great video btw

  • @DigitalIndependent
    @DigitalIndependent ปีที่แล้ว +7

    This is exactly what I was thinking. That’s why I run a VPS with a site2site VPN connection home to my self hosted services. It’s basically a jump box or traffic forwarder. There’s two ways for this: terminating your SSL at your VPS (which I am doing now) or forwarding the SSL traffic home (with HAProxy, experiments running as I am typing this).
    Video coming up in this, too

    • @MrOnePieceRuffy
      @MrOnePieceRuffy ปีที่แล้ว

      But why? xD Setup SSH Access via certificate on your VPS, use autossh on your machine, forward the ports you want to expose, write a startup rule in your .rc, done.
      Setup SSH Access via certificate on your VPS, create a new Service, ssh to your vps, forward the ports you want to expose, systemctl daemon-reload, service xxx enable, done.

    • @szymex22
      @szymex22 ปีที่แล้ว

      @@MrOnePieceRuffy because ssh reduces the performance by a lot because it’s double tcp encapsulation

    • @mistakek
      @mistakek ปีที่แล้ว

      This is actually what I do too, also gets around CGNAT for my backup 4G internet connection

    • @ramiboutas
      @ramiboutas 10 หลายเดือนก่อน

      I would love to check out that video! I use Cloudflare tunnel for hosting some sites from a mini pc that I have. But I would feel more secure if the traffic is forwarded direct from a cheap server that I can fully control.

  • @thomasvdalen
    @thomasvdalen 5 หลายเดือนก่อน

    Exactly the video is was searching for!!! Thanks alot fo making this and everything you say totally makes sense!

    • @christianlempa
      @christianlempa  4 หลายเดือนก่อน

      thank you so much :)

  • @YoRaulAndrei
    @YoRaulAndrei 4 หลายเดือนก่อน

    It`s any posibility to expose tcp or ssh over claudflare tunel?

  • @romandrajer6609
    @romandrajer6609 ปีที่แล้ว

    Hey Christian. Can you make video about Twingate service?

  • @UNgineering
    @UNgineering ปีที่แล้ว +1

    do you have a video on what to use instead of cloudflare tunnels to access my homelab applications?

    • @christianlempa
      @christianlempa  ปีที่แล้ว +2

      There will be more videos about these topics. Currently I can recommend tailscale or teleport videos.