this post was submitted on 19 Oct 2023
2 points (100.0% liked)
Self-Hosted Main
511 readers
1 users here now
A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.
For Example
- Service: Dropbox - Alternative: Nextcloud
- Service: Google Reader - Alternative: Tiny Tiny RSS
- Service: Blogger - Alternative: WordPress
We welcome posts that include suggestions for good self-hosted alternatives to popular online services, how they are better, or how they give back control of your data. Also include hints and tips for less technical readers.
Useful Lists
- Awesome-Selfhosted List of Software
- Awesome-Sysadmin List of Software
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The only thing a CF tunnel does is protect your home IP. Doesn’t protect the app or server you’re exposing.
Well it does slightly more than just obfuscating your home IP, in that it will also do automatic bot, DDOS prevention, etc...
Nothing will stop a general scan from happening. Especially if it’s a slow scan.
Scans won’t trigger dos/ddos alerts.
Well yeah, that would get your host IP...if they're doing a general scan of whole ISP IP ranges (Which nothing could really stop, except for a good firewall). But there is much more low-hanging fruit for hackers than to scan tens of thousands of unoccupied subnets.
Ilulz. Automated scans cost nothing in resources. That would not find a host IP, it’d find the public Ip and open port.
I would consider time a pretty major resource....and yes, you are correct I misspoke/typed. I meant public IP, not host IP...
Anyway, the point is not to prevent all attack vectors (which is impossible, unless you're totally offline/air-gapped/etc), OP wants to minimize the probability of infiltration. So to get back to the question, yes CF tunnels help with that when implemented correctly.