I’ve migrated from cloudflare pages to cloudflare tunnels as I wanted to do a little bit more.

I can’t segregate my network as my ISPs router is rather limited, which means no vLANs. Connecting another router would introduce a double nat as they don’t allow bridging. So I’m running my website basically “raw” in a hyperV virtual machine. the website is semi-static and made out of flatfiles, therefore it’s is quite impossible to login into it. as stated before i’m using cloudflare tunnels to expose a nginx server to the interner. what are the chances someone or something (bot) inflataring my network? 100% safety is not possible but how safe am i?

  • trisanachandler@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    Do you have any auth in cloudflare? If so, that mitigates a lot of zero-days. First they have to get past cloudflare, then a zero-day in your nginx.

  • amizzo@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    You’ve already taken a great step by setting up Cloudflare tunnels, as that will obfuscate your WAN IP, but a common mistake I see a lot is having another random device on a network that is perhaps using a DDNS that doesn’t obfuscate A records or something like that.

    Basically, just make sure everything that is public/internet-facing is going through CF tunnels and you’re as protected as you can (reasonably) can be - from that angle at least.

    Keep in mind though, this just (largely) prevents one vector of attack - through your WAN IP - depending on your set-up, you could (and likely do) have other ways of penetration to get into your network.

    I am a big proponent of getting something like a Firewalla to mitigate many other vectors. They’re bit pricey (though for their capabilities relative to other “off the shelf” devices, not really, I suppose) but largely hands-off.

    • pastelstocking@alien.topOPB
      link
      fedilink
      English
      arrow-up
      0
      ·
      11 months ago

      Everything has some sort of vulnerability, the qestion is will someone be assed to abuse it.(rheotical question)

      • djgizmo@alien.topB
        link
        fedilink
        English
        arrow-up
        0
        ·
        11 months ago

        Not so much will someone be assed about it, it’s whether a script will pick you up your server. There’s a ton of aggregation search engines that scan most IPv4 addresses and list them on what ports are open etc. such as Shodan.io

        Like I said, safeish.

        • weeman45@alien.topB
          link
          fedilink
          English
          arrow-up
          0
          ·
          11 months ago

          As far as i understood it a cloudflare tunneled service should not be visible when port scanning. Or am i completely wrong here? I started using tunnels just so i can avoid opening ports to the internet. I also restricted the access to my services to specific countries.

          • djgizmo@alien.topB
            link
            fedilink
            English
            arrow-up
            0
            ·
            11 months ago

            The only thing a CF tunnel does is protect your home IP. Doesn’t protect the app or server you’re exposing.

            • amizzo@alien.topB
              link
              fedilink
              English
              arrow-up
              0
              ·
              11 months ago

              Well it does slightly more than just obfuscating your home IP, in that it will also do automatic bot, DDOS prevention, etc…

              • djgizmo@alien.topB
                link
                fedilink
                English
                arrow-up
                0
                ·
                11 months ago

                Nothing will stop a general scan from happening. Especially if it’s a slow scan.

                Scans won’t trigger dos/ddos alerts.

                • amizzo@alien.topB
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  11 months ago

                  Well yeah, that would get your host IP…if they’re doing a general scan of whole ISP IP ranges (Which nothing could really stop, except for a good firewall). But there is much more low-hanging fruit for hackers than to scan tens of thousands of unoccupied subnets.

                • pastelstocking@alien.topOPB
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  11 months ago

                  tunnels are reverse-portforwarding. ports aren’t open on my network but on theirs.

                  anyways i moved back on VPS because im not 100% sure what is my ISPs stance lmao. and since i cant have much control with my internal network for now, id rather stay away but i def wanna host at home eventually