this post was submitted on 18 Aug 2023
15 points (82.6% liked)

Selfhosted

40296 readers
319 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

Hey guys, For my home server I am using a Cloudflare domain name to access it, but I noticed today that my connections are secured using the Google Trust Services LLC certs, rather than the Let's Encrypt certs Nginx Proxy Manager uses.. so I'm assuming that cloudflare is having a ball sniffing all my traffic before forwarding my requests to my server...

Is there a way around this? Do other registrars do this??

Thanks!

top 7 comments
sorted by: hot top controversial new old
[–] [email protected] 19 points 1 year ago (1 children)

Are you using cloudflares protection or proxy? That orange toggle next to the a record?

If so, then cloudflare is acting as a middle man and will use their SSL certs.

[–] beppi 5 points 1 year ago* (last edited 1 year ago) (1 children)

Ohhh wow I can't believe I forgot about that, I feel so dumb hahaha.

Are there any benefits to keeping this switched on? Other than than the security I mean, is the tradeoff between privacy and security worth it in your opinion?

[–] [email protected] 7 points 1 year ago (1 children)

That's something you'd have to decide in your threat model.

Do you think cloudflare, which is trusted by many, many large organizations would do anything malicious with your traffic? It's unlikely, but if that is something your concerned about them turn it off. I don't think for most self hosted services it's necessary but I also don't think it matters either way.

[–] beppi 2 points 1 year ago

Good point, I'll leave it on then. Thanks for your help!

[–] [email protected] 11 points 1 year ago (1 children)

You can disable cloudflare's tls termination by setting the DNS record to DNS only. Be aware that this then bypasses their cdn, probably making things slower, and bypasses most of the security they put in place for you.

Other cdns may or may not do similar. It's hard to do WAF when you can't see the traffic.

Note that a registrar and a cdn are different things. It's possible to remain on cloud flare for your domain registration and DNS while using a different cdn.

[–] beppi 1 points 1 year ago (1 children)

Ah I see, thank you for the reply!

What would you recommend? I like the idea of the privacy but having that security does also sound good...

[–] [email protected] 1 points 1 year ago

The way I see it, using their Zero Trust tunnels and such, the benefits out weigh any perceived threat from them. They handle so much traffic anymore, my little bit of data isn't even going to be a small blip in their infrastructure. They assess the traffic for threats on the fly, they aren't going to attempt to keep a copy of everything their system see's, that would be just way to much to deal with. Hell of a lot better than a marketing company (Google) holding your email and the like.