You should NOT use Cloudflare Tunnel (if you do this...)

  Рет қаралды 222,785

Christian Lempa

Christian Lempa

Күн бұрын

Are you interested in Remote Access for your Homelab? In this KZbin video, I will explain the potential implications and problems with Cloudflare Tunnel, and when you should NOT use it. I’ll also discuss the architecture of the service, the security and privacy implications, and the legal and regulatory implications. Tune in to find out more! #RemoteAccess #Homelab #CloudflareTunnels
Related Videos/Links
• How to use Cloudflare ...
________________
💜 Support me and become a Fan!
→ christianlempa.de/patreon
💬 Join our Community!
→ christianlempa.de/discord
________________
Read my Tech Documentation
christianlempa.de/docs
My Gear and Equipment-*
christianlempa.de/kit
________________
All links with "*" are affiliate links.

Пікірлер: 345
@jasenwar
@jasenwar Жыл бұрын
Why does every video with these tech KZbinrs require me to grab a drink?
@dejangegic
@dejangegic Ай бұрын
They're paid by the Big Drink lobby that wants you hydrated, and your piss translucent
@tmanley1985
@tmanley1985 28 күн бұрын
Just once, I'd like to see a video start with: "So get ready, grab yourself a five course dinner and let's figure this out together!"
@redwind3475
@redwind3475 25 күн бұрын
Great question. Why don't we talk more about it....over a cup of coffee!
@xConundrumx
@xConundrumx 10 сағат бұрын
to be honest I wouldn't be able to sit through most of them without a stiff one.
@jasenwar
@jasenwar 9 сағат бұрын
@@xConundrumx for me I need a stiffy
@LAWRENCESYSTEMS
@LAWRENCESYSTEMS Жыл бұрын
Yup, these are the same issues I brought up in my Cloudflare Tunnel video.
@clixt984
@clixt984 Жыл бұрын
I honestly don't mind all the cons of Cloudflare Tunnel, and I definitely agree. Don't just expose all your services without another form of security like Cloudflare Access. That's the first thing I did after setting up Tunnels, and it's been great.
@kanarie93
@kanarie93 10 ай бұрын
basic auth is indeed not allways working as first level security, so cloudflare acces is a godsend. I was finnicking with Authelia but dammn cloudflare acces "just works"
@IanCliveKerrCoelho
@IanCliveKerrCoelho Жыл бұрын
Hi Christian. I have one public IP with all ports available to my homelab. Obviously with a good firewall. In this configuration, I can do all I need. But here in Brazil, this type of service is very scarce, mainly due to the lack of available public IP. I've been testing the use of CHR for a few months now and I'm really enjoying it. First, the fact that I use an Amazon IP here in Brazil, where I host the mikrotik CHR, and also because I can create a tunnel with a server that is behind a restrictive firewall. What for me is very interesting due to the unavailability of public IP. Another interesting point is that I can configure my Hurricane Electrics IPv6 range in this CHR and distribute it to servers via tunnel. Great content.
@jacksoncremean1664
@jacksoncremean1664 Жыл бұрын
Excellent video, this is something home labbers often get wrong. Cloudflare isn't a silver bullet to your security woes, sure it helps but it comes with it's own issues. if your using a free plan then I'd argue it doesn't provide much value at least compared to using something like ModSecurity/Coraza, CrowdSec or a hardware firewall appliance.
@AlexWard94
@AlexWard94 11 ай бұрын
This is a great video that got me thinking - especially while I was mulling the obvious home network security advantages of using a Cloudflare Tunnel. But, as with everything, there has to be a catch - you have to trust Cloudflare will handle your data carefully and hopefully not leave it open to exposure. The thing is - this is inherently a problem with Cloudflare itself (as well as AWS, Azure, Google, Apple and any other public cloud offering). And in reality, so much of the internet relies on these big players - there's practically no way you can use the internet without at least some of your important data ending up in the hands of these players.
@sphbecker
@sphbecker 5 ай бұрын
Very good point. You could always put the Cloudflare endpoint in its own vlan so that you can still build firewall rules for the traffic.
@maximusdecimus2350
@maximusdecimus2350 Жыл бұрын
thanks for sharing your knowledge, planning my home lab and use your videos as a research.
@BlitzFingers
@BlitzFingers 4 ай бұрын
Vielen Dank Christian! I've been considering haproxy or the CF tunnel. This helped me make my decision.
@scottibyte
@scottibyte Жыл бұрын
Well stated. The folks that have approached me interested in Cloudflare Tunnels are those that want to have services reachable from their CGnat. In situations where I have played with Cloudflare tunnel it has been inside of a dedicated VLAN on my network and I think that your concerns are valid. When CGNat folks want to host non-web applications, I tell them to manage their own VPS endpoint server outside of their network. This takes care of being able to host UDP connections or TCP connections to non-web ports which I don't really see a way to do on Cloudflare Zero Trust.
@henrysowell
@henrysowell Жыл бұрын
Great video. I’m a huge fan of Cloudflare and think they’ve done a ton for the world on making the internet more secure. That said, having a reasonable, fair, and open analysis on the risks vs. benefits is something the homelab community should do more of. And frankly, there are a ton of packages and projects that we all install that should get the same scrutiny. Thanks again the the level headed analysis!
@jenniferw8963
@jenniferw8963 9 ай бұрын
6:00 one thing you could do with a cloudflare tunnel setup is put the server which the connector daemon is running on, into its own VLAN. Then setup firewall rules in pfsense to route that VLAN traffic to the appropriate servers and ports on other subnets.
@stefanfelder9413
@stefanfelder9413 Жыл бұрын
Little workaround about the firewall issue: Put the cloudflare tunnel vm or container in a dedicated /30 vlan with only internet access to the external ips of cloudflare and create rules to internal services you want to expose via inter vlan routing
@xavierlarosa8235
@xavierlarosa8235 Жыл бұрын
new to home lab here, are you saying to basically segment your internal network and all your exposed services will be on an isolated network along with your cloudflare tunnel vm running?
@stefanfelder9413
@stefanfelder9413 Жыл бұрын
@@xavierlarosa8235 Yeah, you could do it like this. This would limit the devices cloudflare would be able to reach to this vlan. I have gone even further, got a server vlan with my internal services and an dedicated vlan for the cloudflare tunnel VM. So i get maximum control over the services cloudflare is able to reach by creating a default drop between the vlans and only dedicated allow rules for services i want to expose
@rb-max
@rb-max Жыл бұрын
This is what i am doing already to prevent cf tunnel gets access to whole my network. Cf tunnel limited to its own vlan, then get access to only the services what really need cloudflare tunnel.
@tonyho4512
@tonyho4512 Жыл бұрын
@@rb-max Could you share how this can be done?
@stefanfelder9413
@stefanfelder9413 Жыл бұрын
@@tonyho4512 Depends on your firewall. What firewall do you have?
@rocket01666
@rocket01666 Жыл бұрын
I use and rely on CF Tunnels for exposing resources, though they are heavily restricted and require you to have the WARP client present on your device and have authorization to my team. With WARP it creates a WireGuard tunnel connection into my network allowing me to pass UDP traffic or NON HTML traffic, It's actually a great VPN alternative since M$ has deprecated auth prompts which make OpenVPN with MFA impossible with NPS, Now you must pay for expensive services such as Duo :( P.S. Love your content and what you provide for the IT community, Thank you!
@Glatze603
@Glatze603 Жыл бұрын
Hi Christian and thank you for this critical and informative video. You do not bypass your firewall, if you set up the cloudflared-server (or cloudflare docker-container) in a separate dmz/vlan. I can't see any difference from other VPN solutions that ends directly in the internal network. This is a general problem that can either be improved by well-documented descriptions of possible extensions or you have the necessary expertise yourself to be able to operate such solutions relatively safely. So you are right, not only the route between the endpoints has to be secure, but espesially the endpoints itself and the networks behind those endpoints always has to be secured. Your argument is still absolutely valid and many manufacturers of such solutions promise easy and secure installations, what can be very deceptive. In my opinion, Cloudflare offers one of the best and most secure solutions for accessing internal services (no published ports, MFA for accessing the Cloudflare dashboard and separate MFA and other web application rules for accessing the actual services). In addition, the actual application that you want to reach via Cloudflare Tunnel should also have its own authentication - I only use applications that can handle MFA on their own, such as Guacamole. But it always depends on how you implement it :-) If large companies trust Microsoft by running an Azure AD (most have little choice), you can trust Cloudflare for your homelab services for sure.
@ShaferHart
@ShaferHart 8 ай бұрын
If you can't see "any difference" between a VPN server that you run and this then you are ignorant about the topic or just plain daft. The alternative to cloudfared (from a privacy perspective) isn't tailscale or twingate or whatever tf. Let's concede that cloudfare gives you all of those features as securely as any third party can, that's really beside the point, you're getting all those "freebies" in exchange of putting a middle man in all the traffic you tunnel through them (technically they can establish any connection they wish from inside your network since they are running an agent inside yours). Obviously a lot of very technically inclined people are willing to do this but let's not be stupid about the trade-offs here.
@Glatze603
@Glatze603 8 ай бұрын
@@ShaferHart Hosting a VPN server primarily just means having an encrypted connection between 2 points, nothing else!
@erichb.1396
@erichb.1396 Жыл бұрын
Hmm.... Your video confirms my amateur understanding of Cloudflare tunnels. Thank you very much! I'll think more about it, get info and probably tip my tunnels and switch to a practical in-house VPN solution. I hope I can do that. Best regards.
@TheJoaolyraaraujo
@TheJoaolyraaraujo Жыл бұрын
Thank you. I was wondering the implications of using it
@mrcolo.
@mrcolo. Жыл бұрын
Please do a video about best pratices to setup Sophos XG, secure the net, expose safely services, ecc. Or a video where you show us your Sophos setup. Thanks man!
@chrisumali9841
@chrisumali9841 11 ай бұрын
Thanks for the info and video, have a great day
@DavidMedinets
@DavidMedinets 5 ай бұрын
Thanks for pointing out this issue.
@MiFonito
@MiFonito Жыл бұрын
Beutifull video. Thank you for addressing this (actually, I was close to writing you and asking about this after seeing your CloudFlare video; you were just faster). Services like this are great, but they come at a cost. At the end of the day, this is all about whom we trust. Thank you, Christian; following your channel has been worth it since the day I discovered it. You gave me a lot of nice home projects to implement in my home lab (I still have to implement reverse proxy, lol).
@MikelManitius
@MikelManitius 3 ай бұрын
This is a good balanced look at it. One thing you forgot to mention are mitigations, such as being careful where in your network to deploy the tunnel endpoint. For example, a “DMZ” *(or similar) area where you provide services from but that does not have access to the rest of your network… in order to minimize the crash surface.
@BrentFreyEsq
@BrentFreyEsq Жыл бұрын
Great video! I think homelabbers should talk more about who you trust with your data, but also the various attack surfaces these services open up. I'd be interested in a deeper dive and comparison between Cloudflare Tunnels, Twingate and Tailscale (and Headscale), as they all do similar things with subtle--but important--differences.
@homepc293
@homepc293 5 ай бұрын
You forgot zerotier. Would really love to see an in depth comparison of these
@RobertAnthonyPitera
@RobertAnthonyPitera 6 ай бұрын
Was about to deploy Cloudflare and thanks to searching for deployment tutorials, the algorithm served me this video. Score one for YT - this was an excellent video I'd likely have otherwise missed. I still think it's right for my use case, but this video was invaluable towards a better understanding of what I was doing.. It was thoughtfully laid out well explained with just enough humor to make it fun to watch. Nice job; I subbed after watching it. Thanks!
@olafschermann1592
@olafschermann1592 Жыл бұрын
Good point. I had to decide between zerotier which is more convenient for my application and cloudflare. I decided for cloudflare because i trust them (more). But shutting down a service is also a valid complaint.
@rexjuggler19
@rexjuggler19 Жыл бұрын
I try to avoid using someone else's cloud services. I'm not 100% opposed, but I prefer to manage my own stuff with my own stuff.
@GabrielAcosta00
@GabrielAcosta00 Жыл бұрын
Hi Christian, excellent video. I'm using cloundlare tunnel to expose a web application (Django + React) to a handful of clients. I don't care about the data, I found cloudflared easy to do what I wanted, I should look for another approach?. To access my homelab I still use wireguard + adguardhome + npm.
@mobimb
@mobimb Жыл бұрын
Thank you christian for the video.. kindly we need to know what the alternative’s solutions in your opinion?
@Movies4118
@Movies4118 Жыл бұрын
Thanks for another great video as usual!
@christianlempa
@christianlempa Жыл бұрын
You're welcome! Thanks for watching :)
@RK-ly5qj
@RK-ly5qj Жыл бұрын
I have tested CF, and i didn't choose it for a few reasons - trust, protocol limitation, and L7 protection (threath protection, AV, IPS, webfilter etc), which i can do on my SophosXG(WAF). Maybe i didnt test it well, but... ;)
@Ecker00
@Ecker00 Жыл бұрын
Thank you Christian for taking a critical take on this. 👍
@erichb.1396
@erichb.1396 Жыл бұрын
Hi Christian, I have been thinking about it again, especially with regard to my self-hosted 'Vaultwarden' which is accessible externally via Cloudflare tunnel. As far as I know - and I am a layman - Vaultwarden encrypts the data locally. When synchronising with an external client via the CF tunnel, the data should actually be securely encrypted. CF doesn't know the key of my Vaultwarden. Or am I wrong?
@mariof.1941
@mariof.1941 Жыл бұрын
I have enough options with my FortiGate firewall to share certain parts of my network. I looked into the Cloudflare solution, but the fact that all my traffic would go through their servers stopped me from using it. However, once you have made the right settings in your firewall, it is easy to quickly provide someone with a service from the HomeLab.
@samuelhuang7769
@samuelhuang7769 Жыл бұрын
Hi Christian, thanks for all of your awesome video that explains complicated things in a easily way. But after following your previous video on setting up my homelab with Traefic, Cloudflare tunnel, and Zero Trust Authentication on a bare-metal Truenas Scale Server, I was worried about getting ban from cloudflare by having high bandwidth and other security issues. I'm planning to let my family in Taiwan to use Nextcloud and PhotoPrism remotely and share family video, photos, or probably sensitive documents as well. So will VPN like Tailscale be the best solution here? Or is there a better solution in my case? Thanks in advance!!
@canadianwildlifeservice8883
@canadianwildlifeservice8883 Жыл бұрын
Agreed with this post. With most cloud providers, you give up your privacy for security (well, security is subjective... providing no three letter agencies haven't already backdoored it like they did with L2TP and Juniper).
@garypaulson5202
@garypaulson5202 Жыл бұрын
This was very informative, danke sehr
@PowerUsr1
@PowerUsr1 Жыл бұрын
To be clear, at around 6:16 when firewalls might become useless because they are not intergrated into the firewall and punches a hole.... 1. If an enterprise employs applicaiton whitelisting on their laptops/servers/desktops then this will never have a chance at being deployed. 2. if an enterprises chooses to do SSL decryption, this would never have a chance at being deployed 3. If using some form of application identification {appid} this would never have a chance at being deployed 4. if you deny the outgoing port of 7844 then this will never get deployed If you choose to have lax rules or a lax security model then yeah you can bypass the network security but this isnt as easy as one would think it is.
@urzalukaskubicek9690
@urzalukaskubicek9690 20 күн бұрын
Great explanation, thanks!
@christianlempa
@christianlempa 20 күн бұрын
Thank you 😊
@RobertMizen
@RobertMizen Жыл бұрын
I think one of the main issues for me is the centralising of important internet infrastructure. Cloudflare offer some great services which are important. But i do not feel comfortable with so many eggs of the internet being in so few baskets. Awesome video btw dude as usual
@pavelperina7629
@pavelperina7629 Жыл бұрын
I see it in the opposite way: cloudflare removes many points of failure. Of coarse it depends how much time, money and (electric, your) energy are you willing to invest into your infrastructure. For accessing your personal blog, nextcloud, git ... running on low power pc/sbc i'd say it's perfect.
@niravraychura
@niravraychura Жыл бұрын
Thanks for the video. It actually makes sense. But I would like to add something here, "home lab is for learning" right? Yes, we can check out some tools but I think ppl who have a home lab should expose their services and do some kind of research about how to secure it, for example, use some kind of firewall, ids/ips, etc. See the logs regularly, and automate some things. Maybe I am wrong, it's just my thought. Correct me if I am wrong.
@romayojr
@romayojr Жыл бұрын
i just recently deployed cloudflare tunnel with my home lab services and it’s been working fantastic but after watching this i’m very conflicted
@christianlempa
@christianlempa Жыл бұрын
Like I said, it's not a bad service at all. Just depends on what matters most to you, simplicity, or privacy :)
@MichaelWDietrich
@MichaelWDietrich 6 ай бұрын
Thanks for the great vid. But on 9:15 no "two endpoints" will ever be under your "full controll" not even physically (but even one endpoint could be disagreed about how much it is under your "full controll" as soon as any network connection - not allone wireless network connection is involved).
@madsjensen8094
@madsjensen8094 Жыл бұрын
Glad someone else finally said it!
@maniratanpratapsingh0
@maniratanpratapsingh0 Жыл бұрын
Was Waiting For Someone To Make This Video Great To See Someone Talking About This . We Should See Both Sides.
@ultravioletiris6241
@ultravioletiris6241 Жыл бұрын
Same here
@kevinhughes9801
@kevinhughes9801 Жыл бұрын
Great insight thanks
@dbishop9085
@dbishop9085 Жыл бұрын
is this a segue to setting up a VPN with traefik? I definitely hope so! I am not sure if tailscale would be the same situation or if wireguard would be the better choice for privacy. a video about that would be a nice addition.
@MorpheusLewis
@MorpheusLewis Жыл бұрын
OMG Where did you get your animated matrix wallpaper?? also thanks for this, I've been looking at using Cloudflare due to KZbin videos etc.
@uuu12343
@uuu12343 Жыл бұрын
Cloudflare tunnel is a tunneling protocol that does a peer-to-peer connection through a "middle-man" server such as cloudflare tunnel, same as zerotier and tailscale Using another server inherently means you have a dependency that you need to be aware of
@darrennotfound7740
@darrennotfound7740 Жыл бұрын
For tailscale if it can do P2P no middle man If it can't it will use a middle man
@josephwagner6682
@josephwagner6682 3 ай бұрын
Very good video. I was especially interested in the security concerns to bypass you companies firewall by using such a reserve tunnel. I guess no enterprise will want to have such a thing set up by individual user. I could imagine an enterprise set up done locally with trusting Cloudflare but it's security nightmare when everyone can start a docker container and punch holes into the whole firewall setup. I would even assume that some companies block those hosts and port per default.
@christianlempa
@christianlempa 3 ай бұрын
Thank you man! :)
@subnumeric
@subnumeric Жыл бұрын
Pro tip: You can still use the SSH tunnel and do a reverse port tunnel trough that. Cloudflare cannot see/MITM that, since only you have your certificate, which the server verifies and is thus able to perform an authenticated Diffie-Hellman exchange and guarantee your communication is confidential! (See the SSH2 protocol and TOFU security model) Also, I thought it was obvious that it works as essentially a MITM? They even advertise it as such! How else would they be able to magically HTTPSify all your services? Obviously, keep this in mind....
@sergefedorow8430
@sergefedorow8430 Жыл бұрын
Thank you! Just in time, as for me.
@chaosen3
@chaosen3 Жыл бұрын
Regarding your point about serving non-HTML content, I always found it was a good practice to bypass the caching with a page rule. I use the tunnel and a reverse proxy to host my plex server using a custom server access URL and the first month I had it running with no page rules I was a bit unsettled to see how much data had been cached, but nothing came of it anyway.
@pcklubas
@pcklubas Жыл бұрын
They said in the discord that this rule applies to ANYTHING that goes through cloudflare the network, they don't care if you cache it or not. So you can still get booted if you don't cache a thing. However they probably wont bother you if you not pushing many terabytes of data.
@canes4ever162
@canes4ever162 4 ай бұрын
This is what I am thinking about doing. Do are you doing a CF tunnel to nginx to then forward to plex? Any security concerns? I feel like it is better than exposing ports on my ip
@GrantSR
@GrantSR 5 ай бұрын
What if you ran cloudflare on a small separate machine, outside of your firewall? So that all cloudflare traffic still had to go through your firewall?
@mihaigalos279
@mihaigalos279 Жыл бұрын
Just use a reverse SSH tunnel to the device hosting the cloudflared, that's encrypted end-to-end.
@xxgg
@xxgg 7 ай бұрын
So what method do you recommend for remote access to home network? VPN?
@telosxian
@telosxian 6 ай бұрын
Not only do CF tunnels convey your data unencrypted through CF, but if you use their traditional DNS and choose CF proxy to "hide" your IP, your data is again in clear text within the proxy handling path.
@JasonsLabVideos
@JasonsLabVideos Жыл бұрын
Another good video sir !!
@christianlempa
@christianlempa Жыл бұрын
Thank you so much :)
@muhammedsaqibazam3035
@muhammedsaqibazam3035 11 ай бұрын
Very informative, but what will be the alternative of VPN, if we are not willing to use Cloudflare as an alternative of VPN. Is there is any Web Application Firewall, which fulfill all the requirement of a secure tunnel.
@stevebryant3723
@stevebryant3723 8 ай бұрын
I set up a DMZ vLan with Cloudflare and pf-Sense it's much more complicated to admin but at least the cloudflare vm doesn't have full network access by default just cost a bit of hair ripping during troubleshooting and setup lol
@sashasimkin
@sashasimkin Ай бұрын
Hi! Thank you for this very important piece of information about CF tunnels, I'm now considering to use it in a business environment. I'm trying to understand how using CF might be violating GDPR here? As I understand GDPR is all about handling any PII data carefully, as needed and be transparent in how you're using it. So AFAIR CF has SOC2 compliance, and listing it as one of data processors should be enough to fit GDPR criteria. Would appreciate your insight on whether I'm correct here.
@ijustwanttoeatcookie
@ijustwanttoeatcookie Жыл бұрын
I applaud you for also pointing out the drawbacks of CF tunnels. What is your opinion on exposing something like vaultwarden on CF tunnels?
@semirauthsala6001
@semirauthsala6001 Жыл бұрын
I wonder what make you stop creating simple VPN setup with trusted provider and expose it securely. If you able to host vaultwarden locally, you should be able to setup VPN as well
@ijustwanttoeatcookie
@ijustwanttoeatcookie Жыл бұрын
@@semirauthsala6001 There are situations where the device you want to connect from can’t connect over a vpn because it is managed by someone else. A company device for example.
@rashshawn779
@rashshawn779 Жыл бұрын
Does Cloudflare allow connecting to local service with only subdomain setup? I was setting up my service through Cloudflare tunnel(free tier), then I realized I cannot add subdomain only to Cloudflare for the public hostname. I don't want to do full setup for the zone because of the way my setup works. Quite wasted my time, I wish they will be clearer on the in the documentation very early on. So annoying to do until the end, only to realize it doesn't work for subdomain only setups.
@nordexo
@nordexo Жыл бұрын
sounds like a thing that needs to be isolated on it's on network segment and all traffic coming out from the agent still going through the main firewall
@thomastupper2594
@thomastupper2594 Жыл бұрын
What's the alternative to it though? If the option is either opening a port or using cloudflare, is that really a viable alternative?
@damiendye6623
@damiendye6623 6 ай бұрын
IPv6
@yaroslav7328
@yaroslav7328 Жыл бұрын
The only app I expose to the external internet is Portainer, which is protected by a very strong password. As far as I understand, Portainer does have a built-in lock-in mechanism. Additionally, I use fail2ban to block suspicious connection attempts. All incoming connections are denied by firewall rules. However, is there still a risk?
@kodream316
@kodream316 7 ай бұрын
Could you make video with alternative way to expose internal services without public IP(CGNAT)? I currently rent VPS with public IP and with ZeroTier (will setup my own WireGuard at some point) connect to dedicated VM at home. then on that VPS I redirect all traffic on ports 80 and 443 to my reverse proxy VM with IPtable rules. It was a bit of a pain to get it working at first before I figured out the correct IPtable rules. But works fine since then.
@djKenpLan09
@djKenpLan09 Жыл бұрын
First! Thanks for keeping sharing your knowledge Christian!
@christianlempa
@christianlempa Жыл бұрын
Thank you so much :)
@soubinan
@soubinan 9 ай бұрын
The reason why self-hostable solutions like boundary or teleport in a free tier cloud are way better to use. When you want to businees things.
@myusrngml
@myusrngml Жыл бұрын
why use cloudflare tunnels, aka reverse proxy, if your router supports port forwarding?
@trix7450
@trix7450 Ай бұрын
Great video, I have a question if I use cloudflare proxy on my website does that mean my website is not gdpr?
@RuiFungYip
@RuiFungYip 10 ай бұрын
Personally, my deployment of cloudflare tunnels is by deploying it as a sidecar container on my external ingress traefik instances. I run 2 sets of traefik deployments in my local k8s cluster, one that's exposed to internet via cloudflare tunnels, and one that's local only. Gives me pretty good control of what gets exposed where by setting the correct ingressClassName and external-dns annotations on my ingress resources. Security is enforced by the CNI via Network Policies, and the cloudflared daemon isn't initialized with cloud config, just a straight "direct all traffic to traefik on localhost" rule static configuration. It's pretty good for punching through CGNAT while being directly accessible online. Similar things would be ngrok I guess. Tailscale funnel is nice, but a bit restrictive since you can't use your own domains. As for bypassing the network firewalls and whatnot, that's a pretty easy workaround. Deploy the cloudflared tunnel on a separate VLAN/subnet where it has to go through the router to reach the services, then it's traffic will be monitored by the firewall / security appliance. (Though in most homelab setups it does mean the traffic will transit the router twice so... tradeoffs.)
@Alex-un5tl
@Alex-un5tl 6 ай бұрын
amazing as always
@christianlempa
@christianlempa 6 ай бұрын
Thank you! Cheers!
@GottaHache
@GottaHache Жыл бұрын
You should do a video about Twingate. Very cool tool
@user-hx9be2hl1r
@user-hx9be2hl1r 6 ай бұрын
do you have any videos on how to set up a webserver on a raspberry pi and have secure certificates etc that can be accessed externally and not open up your home to potential cyber attack?
@jlickliter502
@jlickliter502 Жыл бұрын
I like how he kept a neutral stance but provided info so we can make our own choice.
@fisunerd
@fisunerd 5 ай бұрын
Well, I guess that one should not use this kind of services without security layers in mind. Mostly because in certain, given scenario, one could use their service's trustworthy reputation to stealthy exfiltrate data from a company's network, or gain reverse access to it. Either by somehow abusing it or installing it on purpose in a post-exploitation phase. This is a great option when your security's strategy is mature enough and capable of containing threats as mentioned before.
@00000a0009
@00000a0009 9 ай бұрын
So if I have a wordpress container with a small website and I run the tunnel inside the docker I should be safe. Am I right?
@moetocafe
@moetocafe 3 ай бұрын
It's literally a description of how a malware would work :) Whether one trusts CF or not is up to everyone to decide for themselves.
@kkho7616
@kkho7616 5 ай бұрын
Is this tunnel recommend to use for proxmox server for remote access ? Thank you.
@pnewman1112
@pnewman1112 11 ай бұрын
Has anyone measured, from the web browser's standpoint, how much latency CF adds to the round-trip transaction? Is it 10s or 100s of milliseconds?
@alphenit
@alphenit Жыл бұрын
Not so sure about that firewall punching you talk about Christian..I have PFSense and could not get the cloudflare pod to properly connect to cloudflare because my pfsense was blocking port 7844 to the outside world. Once I created a rule that allowed the traffic, the CloudFlare tunnel started working but no way it worked "automagically" :)
@bobby07241
@bobby07241 10 ай бұрын
so which on is the best, zerotier, twingate or cloudfare ?
@CarlosDiaz-fl4jl
@CarlosDiaz-fl4jl 3 ай бұрын
The big takeaway should be that if you don't understand the security implications, then don't use it. Goes for all systems though. Not fair to aim at cloudflare, but certainly fair to respond to your own content to provide better clarification.
@jribeiro1792
@jribeiro1792 Жыл бұрын
hey Christian thanks for your videos. Does the same thing applies for Twingate? Any insights on this solution? Thanks
@christianlempa
@christianlempa Жыл бұрын
Thank you! As far as I know, Twingate uses a different protocol, and does not hook into TLS, however, it also likes to punch a hole into your firewall, so while the 1st and 3rd problem won't apply, 2nd will...
@jribeiro1792
@jribeiro1792 Жыл бұрын
@@christianlempa That's great!!! It's my own hole, so fine!!! :))))) Unfortunately my IP address is not public, so I can't use any port forwarding solutions. Thanks a lot for your reply
@vidx9
@vidx9 Жыл бұрын
"... customers can serve video and other large files using the CDN so long as that content is hosted by a Cloudflare service like Stream, Images, or R2." - Cloudflare's blog. That is for the removal of section 2.8 in the Cloudflare Terms of Service, which essentially means nothing to most people unless you are paying to use their services.
@MyAnimeForLife
@MyAnimeForLife 10 ай бұрын
Can you point out some other options similar to cloudflare tunnel which have similar services.
@linuxbasics7060
@linuxbasics7060 Жыл бұрын
can you do a video on PfSense or something similar and how we would go about securing our home lab?
@tester246
@tester246 5 ай бұрын
What about cloudflare Zero Trust with WARP Would that be better than tunnels?
@JaysScript
@JaysScript 3 ай бұрын
Okay what other option do we have for game servers? Great video btw
@szymex22
@szymex22 Жыл бұрын
Another thing I would like to mention that most KZbinrs don’t is that if you are using cloudflare you should setup dns overwrites on your dns server on your lan so that stuff doesn’t go through cloudflare and works offline when just accessing it from lan
@jayzn1931
@jayzn1931 10 ай бұрын
How do you do that? And if you use something like pihole, is this still a concern or especially then?
@szymex22
@szymex22 10 ай бұрын
@@jayzn1931 Pihole is the dns server I used, just add in local dns the address of the website and the server ip
@damiendye6623
@damiendye6623 6 ай бұрын
​@@jayzn1931Google split dns
@jerbear0348
@jerbear0348 Жыл бұрын
I use their warp client, i added in the local domain fallback, my local subdomain to route those requests to my bind9 dns, i then have A and CNAME records that sends those requests to traefik. Traefik serves ssl certs using let's encrypt, that way i get ssl certs both locally and remotely using traefik and warp client. For me my biggest concern was opening ports in my firewall. Until i can find a better solution it's perfect 👌.
@francoismartineau2519
@francoismartineau2519 4 ай бұрын
A few hours after setting up a cloud flare tunnel, Windows defender found a threat. It usually never does. On top of disabling the tunnel and removing the threat, do you have suggestions to fix my problem?
@szymonagiewka4513
@szymonagiewka4513 Жыл бұрын
Today they posted on Cloudflare Blog: "Goodbye, section 2.8 and hello to Cloudflare’s new terms of service". This is part of their Developer Week announcement. You need their services like Stream to serve video though.
@YoRaulAndrei
@YoRaulAndrei 3 ай бұрын
It`s any posibility to expose tcp or ssh over claudflare tunel?
@ericesev
@ericesev 10 ай бұрын
I've been burned too many times by cloud hosted services. As more and more folks use their free tier, I suspect they'll eventually need to start charging for it or discontinue it entirely. I've been basically doing the same Zero Trust thing with a reverse proxy on my own network. It'll always be free, it'll always be more private, and a direct connection will always be faster and more reliable. I've never understood how they can market their product as having end-to-end encryption when it only has point-to-point encryption.
@romandrajer6609
@romandrajer6609 Жыл бұрын
Hey Christian. Can you make video about Twingate service?
@user-ve9kt1ee5u
@user-ve9kt1ee5u 27 күн бұрын
Simple: set the cloudflaretunnel to a dedicated vlan - so you can still control the connection to your internal ips
@alexandragroza2611
@alexandragroza2611 9 ай бұрын
Brilliant!
@christianlempa
@christianlempa 9 ай бұрын
Thanks
@MyAeroMove
@MyAeroMove Жыл бұрын
Any luck with publishing SSH via Cloudflare? I tried couple months ago and it was simply not publishing anything. Any link to video guide will be much appreciated.
@thomasvdalen
@thomasvdalen 4 ай бұрын
Exactly the video is was searching for!!! Thanks alot fo making this and everything you say totally makes sense!
@christianlempa
@christianlempa 4 ай бұрын
thank you so much :)
What's the BEST home server operating system?
17:35
Christian Lempa
Рет қаралды 591 М.
Chips evolution !! 😔😔
00:23
Tibo InShape
Рет қаралды 42 МЛН
когда достали одноклассники!
00:49
БРУНО
Рет қаралды 3,5 МЛН
Black Magic 🪄 by Petkit Pura Max #cat #cats
00:38
Sonyakisa8 TT
Рет қаралды 25 МЛН
Dynamic #gadgets for math genius! #maths
00:29
FLIP FLOP Hacks
Рет қаралды 18 МЛН
How to start your HomeLab journey?
17:32
Christian Lempa
Рет қаралды 38 М.
No more Cloudflare Tunnels for me...
11:56
Raid Owl
Рет қаралды 35 М.
How I'd make $1000 with a new newsletter in 28 days (3 strategies)
7:04
This web UI for Ansible is so damn useful!
20:07
Christian Lempa
Рет қаралды 447 М.
Cloudflare Tunnel Setup Guide - Self-Hosting for EVERYONE
16:11
How to use Cloudflare Tunnel in your Homelab (even with Traefik)
23:34
Christian Lempa
Рет қаралды 137 М.
STOP using VPN, embrace Zero-Trust networking!
24:11
Christian Lempa
Рет қаралды 86 М.
Building My ULTIMATE, All-inOne, HomeLab Server
17:21
Techno Tim
Рет қаралды 85 М.
Chips evolution !! 😔😔
00:23
Tibo InShape
Рет қаралды 42 МЛН