this post was submitted on 20 Nov 2023
2 points (100.0% liked)

Self-Hosted Main

517 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

For Example

We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.

Useful Lists

founded 2 years ago
MODERATORS
 

Regardless of whether or not you provide your own SSL certificates, cloudflare still uses their own between their servers and client browsers. So any SSL encrypted traffic is unencrypted at their end before being re-encrypted with your certificate. How can such an entity be trusted?

top 50 comments
sorted by: hot top controversial new old
[–] Quique1222@alien.top 4 points 1 year ago (1 children)

A lot of people in this thread have never been ddosed and it shows. You don't need to host a super popular thing to get ddosed.

When you host game servers there are gonna be salty 16 years old that go to a free stresser and hit you with 1gbps.

And you might think "well yeah but it's not like cloudflare's free plan protects that much".

It does, believe me. I've done tests with people who have access to botnets and without cloudflare with 1gbps our connection was dead. With cloudflare it didn't go down and reported more than 50gbps on the cloudflare dashboard.

Also another thing is that a lot of these people are 16 year old script kiddies, and not seeing your IP directly discourages them.

[–] spottyPotty@alien.top 1 points 1 year ago

nginx can be configured to throttle connections and fail2ban to refuse them to mitigate this

[–] Cybasura@alien.top 3 points 1 year ago (3 children)

Thats not what a MITM is

A MITM is a Man-in-the-Middle Attack, someone whom you dont trust or dont know has hijacked your network connection to either read, remove or modify data from your network packets and then proxy-send it to your initial intended target

Cloudflare is a proxy server, a person you TRUST and designated to passthrough first to scan and check for network security before it redirects and pass your packets through to your intended target, like a gatekeeper

What, you gonna call all your gatekeepers, your bouncers, your proxy servers a MITM?

load more comments (3 replies)
[–] fellipec@alien.top 3 points 1 year ago

If you want then to cache your content to reduce the load of your servers, they have to decrypt the traffic. This is how a reverse proxy works.

And, well, you have to trust them before contract their services. The same way people trust vpns to route their traffic. If I was from some 3 letter agency and want to spy on potential illegal content, I would tap into a vpn server.

[–] rollinghunger@alien.top 3 points 1 year ago (3 children)

Yes, you’re right that there’s a certain amount of trust you need to have in CF… but what are you trusting it to do? And if they fail, what are the consequences?

Honest question - even if you are sending your Vaultwarden traffic over CF, and they are watching or attacking, you have to trust that the e2e encryption of Vaultwarden is what’s keeping you safe, right? Not the SSL certs. Does the auth mechanism rely on the SSL certs not to be compromised? I would hope not.

For me, it’s about trade offs.

https://www.troyhunt.com/cloudflare-ssl-and-unhealthy-security-absolutism/

https://serverfault.com/questions/662946/does-cloudflare-know-the-decrypted-content-when-using-a-https-connection

These two data sources kinda sum it up for me - “If you are concerned that cloudflare can read your data - don't use cloudflare.”

But I do want to be sure that any e2e encrypted app doesn’t rely on SSL for its “end-to-end”.

Thanks for the link, it's an interesting read with more detail than I've ever heard (not having used cloudflare for this myself).

[–] spottyPotty@alien.top 1 points 1 year ago

Thanks for the links

load more comments (1 replies)
[–] teem@alien.top 3 points 1 year ago (1 children)

What is it you're afraid cloudflare is doing? This is a company trusted by tons of corporations who have legit secrets to protect. Why would they care about intercepting your traffic? To what end?

Cyber attacks are goal-oriented and based on attack cost, basically how much effort for how much reward. Is your selfhost traffic super valuable? So valuable that someone would hack cloudflare to get it?

In reality, other than commodity malware that your security suite should easily pick up, there isn't much threat in my opinion.

[–] spottyPotty@alien.top 2 points 1 year ago

The question was a more general one, and not specific to my personal data needs.

The existence of such a ubiquitous centralised service that actually IS a MITM, whether they are malicious or not, seems curious to me.

As they say, if the product is free, then you are the product. If people accept, but recognise, a loss of privacy when using free services from Google and meta, for example, knowing that the data they provide is used for personalised ads, then how come CF's free tier isn't viewed with the same level of scrutiny?

[–] s3r3ng@alien.top 2 points 1 year ago

Yeah. I believe Cloudflare basically has its heart in the right place but it is is still a dangerous central choke point.

[–] tschloss@alien.top 2 points 1 year ago

CF is not using „their own“! The certificates the client see must be provided and authorized by the provider of the service. Or put in other words: CF is acting as the hosting provider to the outside, to the clients.

The rest of journey is „inside“ the domain of the provider of the service. It is totally normal that traffic has some journey to go and often it never touches the premises of the provider or even a server owned by the provider.

The important thing that all the part which from a customer‘s view is „internal to the provider of the service“ (behind the CF address) is responsibility of the provider of the service, no matter what 3rd party services they use.

[–] SadMaverick@alien.top 2 points 1 year ago

My take is: Any data worth your while shouldn’t just rely on HTTPs anyway. You should have more layers of encryption. That’s how majority of the companies do it.

And for people who do not even know this, are better off using CF as MITM.

[–] AttackCircus@alien.top 1 points 1 year ago

It's all a matter of trust.
There are many reasons to selfhosting. Paranoia is just one of them.

[–] shellmachine@alien.top 1 points 1 year ago

Half of the people don't remotely understand the issue. The other half is aware that what's in behind isn't trustworthy anyways if it's "in da cloud" and just went all YOLO-mode.

[–] mrkesu@alien.top 1 points 1 year ago (1 children)

People go out of their way to de-Google their phones but them are ok with this situation.

I don't think this venn-diagram is a circle.

load more comments (1 replies)
[–] therealsimontemplar@alien.top 1 points 1 year ago

Cloudflare’s default setup is to proxy your traffic but that’s easily disabled with a click of the admin’s mouse. Of course disabling their proxy service exposes the origin IP’s, server certs, etc. but the point is that you use Cloudflare services the way you want to; it’s not a Boolean “cloudflare or no Cloudflare”.

[–] M4Lki3r@alien.top 1 points 1 year ago

Do you want to be blown off the internet by DDoS? How much bandwidth do you have/can you pay for?

[–] HumbledB4TheMasses@alien.top 1 points 1 year ago

Beyond what everyone else has said here about it being practically an industry standard now with insane levels of trust, it also foists a lot of the responsibility for security/uptime onto an external company with a good track record. That's great in the eyes of product management and likely the legal department too.

[–] wanze@alien.top 1 points 1 year ago

You could say the same about any cloud provider. "AWS can read all my data! The horror!"

[–] windows300@alien.top 1 points 1 year ago

The sites I expose to Cloudflare were already being publicly hosted for my friends. Anything actually private or sensitive I run via private DNS and Wireguard internally.

[–] Patient-Tech@alien.top 1 points 1 year ago

Don’t forget, for selfhosters, the value proposition of free is always pretty strong. I have tiers of data and not everything needs to be super private at all times.

[–] Initial-Repeat9146@alien.top 1 points 1 year ago (1 children)

OP, what you're describing is not the "big scary MITM" attack vector. It's how TLS/Reverse proxies work. Whether you are using Cloudflare or hosting your own reverse proxy somewhere with full control, it's still terminating TLS at the endpoint and passing back traffic in the clear to the backend.

Some people like Cloudflare for whatever reasons, and that's okay. I host my own reverse proxy out on a VPS and it works just fine.

You'll find that not all of the seflhosted community is super-focused on privacy as say r/privacy is.

load more comments (1 replies)
[–] Bagel42@alien.top 1 points 1 year ago (1 children)

Because it's everyones MITM. I trust them with security because it's the only thing they focus on, I focus on making my stuff stop randomly shutting down. If absolutely everyone is using it, I don't care too much if an issue appears- nobody cares about my tiny little thing when Discord goes through Cloudflare

[–] amunak@alien.top 1 points 1 year ago (8 children)

Because it's "everyone's MITM" it would make it a perfect spot for state actors to tap into in order to surveil pretty much everything without anyone being able to notice.

Hell, just the server logs (timestamps, IP addresses and exact URLs) would be unbelievably valuable.

I'd be really surprised if someone wasn't taking advantage of that.

Which is to say if you selfhost because you want more control and privacy, you probably want to avoid services like that.

[–] Patient-Tech@alien.top 1 points 1 year ago (1 children)

Depends what you’re putting on there. If it’s some blog that’s out there for the world to see, and if you’d like to have more traffic checking it out, then privacy isn’t your goal. Now your personal data, yeah that’s different. I have that stuff segregated.

load more comments (1 replies)
[–] jared252016@alien.top 1 points 1 year ago (1 children)

ThePirateBay, the most notorious site in the world, uses Cloudflare. This isn't China. Wiretapping is illegal in most circumstances, and that's essentially what it would be doing.

load more comments (1 replies)
load more comments (6 replies)

You need them if you really want to be secure from DDOS... well with knowledge of HTTP2 DOS is enought... :-)

[–] psychowood@alien.top 1 points 1 year ago (1 children)

I mean, we trust Root Certification Authorities, which are basically self-proclamed-as-trusted entities. At least CF became widespread and is community-trusted :)

[–] spottyPotty@alien.top 1 points 1 year ago (2 children)

Good point. Who's to say that LetsEncrypt doesn't keep a copy of my private keys?

[–] capecodcarl@alien.top 3 points 1 year ago (7 children)

A certificate authority doesn't have a copy of your private key, you send them a certificate signing request. The private key never leaves your system. That's the whole point of public key encryption.

load more comments (7 replies)
load more comments (1 replies)
[–] InsertNounHere88@alien.top 1 points 1 year ago

People go out of their way to de-Google their phones but them are ok with this situation.

people selfhost for many different reasons. you may self host so you can degoogle, but I selfhost so I can put Kubernetes/mqtt/zigbee/flask etc etc etc on my resume

[–] ndlogok@alien.top 1 points 1 year ago

Mostly they know how cf work but when asking simplicity cf do it

[–] Emiroda@alien.top 1 points 1 year ago (4 children)

In regard to enterprises, they don’t give a rats ass about any potential intellectual property theft. That risk has been written off. What matters is compliance and security.

Not having DDOS protection in place can potentially have legal consequences and can be very costly. DDOS protection is either investing millions of dollars in equipment or offloading that responsibility to a company like Cloudflare.

load more comments (4 replies)
load more comments
view more: next ›