I’ve migrated from cloudflare pages to cloudflare tunnels as I wanted to do a little bit more.

I can’t segregate my network as my ISPs router is rather limited, which means no vLANs. Connecting another router would introduce a double nat as they don’t allow bridging. So I’m running my website basically “raw” in a hyperV virtual machine. the website is semi-static and made out of flatfiles, therefore it’s is quite impossible to login into it. as stated before i’m using cloudflare tunnels to expose a nginx server to the interner. what are the chances someone or something (bot) inflataring my network? 100% safety is not possible but how safe am i?

1 point

Run your hosting inside a docker container. If someone were to hack you they, in theory, would only have access to whatever is in that container and not your entire server. Someone with more expertise please feel free to correct me if I’m wrong. I am not an expert in this, just offering what I (think I) know.

permalink
report
reply
1 point

Exactly. Even if they make it into your network (which would be somewhat unlikely already, since CF obfuscates your home IP), as long as you don’t run your docker containers in “privileged” mode (or give the containers RW access to important directories on your server), you’d be fine except for the most end-of-world scenarios.

permalink
report
parent
reply
1 point

If you keep up to date with all the vulnerabilities for the software you use you should be generally pretty safe.

permalink
report
reply
1 point

Tbh… It’s just nginx and gunicorn and yeah i keep it updated :)

permalink
report
parent
reply
1 point

You should be fine then!

permalink
report
parent
reply
1 point

Do you have any auth in cloudflare? If so, that mitigates a lot of zero-days. First they have to get past cloudflare, then a zero-day in your nginx.

permalink
report
reply
1 point

no auth as personal blog is supposed to be public and accessible to everyone.

however, until i can have more control of my internal network, i moved back to a vps :)

permalink
report
parent
reply
1 point

Yeah, might be for the best.

permalink
report
parent
reply
1 point

Meh. Safeish. Until one of your servers has a zero day.

permalink
report
reply
1 point

Everything has some sort of vulnerability, the qestion is will someone be assed to abuse it.(rheotical question)

permalink
report
parent
reply
1 point

Not so much will someone be assed about it, it’s whether a script will pick you up your server. There’s a ton of aggregation search engines that scan most IPv4 addresses and list them on what ports are open etc. such as Shodan.io

Like I said, safeish.

permalink
report
parent
reply
1 point

As far as i understood it a cloudflare tunneled service should not be visible when port scanning. Or am i completely wrong here? I started using tunnels just so i can avoid opening ports to the internet. I also restricted the access to my services to specific countries.

permalink
report
parent
reply
1 point

You can’t get rid of the ISP router? Can you contact your ISP to put the router into bridge mode?

permalink
report
reply

Self-Hosted Main

!main@selfhosted.forum

Create post

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don’t control.

For Example

  • Service: Dropbox - Alternative: Nextcloud
  • Service: Google Reader - Alternative: Tiny Tiny RSS
  • Service: Blogger - Alternative: WordPress

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

Community stats

  • 1

    Monthly active users

  • 1.8K

    Posts

  • 11K

    Comments

Community moderators