🇨🇦

  • 2 Posts
  • 17 Comments
Joined 1 year ago
cake
Cake day: July 1st, 2023

help-circle







  • That’s not end to end encryption, it’s two seprate ssl connections both terminated at cloudflare. One from client to cloudflare, one from cloudflare to your server. Cloudflare is still a MITM inspecting your traffic in that scenario.

    They do however let you disable their proxy(WAF) service, acting as pure DNS so clients connect directly to your IP instead of theirs. But they can at any point toggle that back on and intercept your traffic, nothing really stopping them except morals and T&Cs, but that’s not exactly bullet proof. T&Cs can be rewritten and corporations with Morals? Right…




  • Have you purchased and are using a public domain? Or is it just self-hosted DNS within your LAN?

    If it’s a publicly registered domain, they’ll get the same thing you will: the IP you’ve set in your DNS records. If that’s a local ip (192.168.x.x, 10.x.x.x) it’ll be useless. If it’s your public IP, well it points at your router and someone can use it to try and connect to you. Unless you’ve forwarded ports, that connection will likely fail.

    If you’ve only setup local DNS, someone outside you network will either get nothing back from querying your domain or, if the domain you’ve chosen also happens to have a public counterpart that you don’t own: they’ll get an IP unrelated to you.




  • Last I’d checked (a couple years ago), they don’t permit media streaming via a free account, just serving static files. (I mean… Fair.)

    I had several issues with emby/plex not loading streams through cloudflare connections, or really struggling to do so. Disabling cloudflare proxying for that subdomain solved that.

    Now I just have cloudflare proxying my static file server and Ombi. Emby is a direct connection and everything else is behind OpenVPN.



  • I just just use my public domain internally with a separate sub domain assigned to each device and each service. Pihole serves the local IPs for all of those instead of querying the public servers. Anything that’s meant to be internal only, doesn’t have a public DNS record and isn’t directly accessible from WAN.

    I then host openVPN to keep my mobile devices within my network and behind pihole, able to access my internal services. The public records/domain is just for services I share with others and so that I can reach my VPN.

    I’ve always considered ‘domain.tld’ to refer to the network (my lan in this case) and ‘subdomain.domain.tld’ to refer to the specific service/device within that network. Whether or not you can actually resolve that name and reach its service/device, plus how you’re actually routed there depends on where you’re connecting from (LAN/WAN/VPN).