Not entirely. CF can protect you from DDOS of up to a few millions of calls per minute. Your home router would melt with that traffic. They also act as a firewall if you enable the proxy dns feature. They do a sanity check before forwarding the call. Also a home router cannot do this. And there’s more.
Comment on Cloudflare is bad. Youre right.
Darkassassin07@lemmy.ca 4 months ago
Unless you are behind CGNAT; you would have had the same plug+play experience by using your own router instead of the ISP supplied one, and using DDNS.
At least, I did.
f2sfljLhdtTZ@lemmy.world 4 months ago
lemmyvore@feddit.nl 4 months ago
Both your ISP and CF will drop you like a hot potato if you’re ever under that kind of attack.
CF has other features that are nice like, like WAF, bot detection, geo blocking, caching etc. But it’s only a taste.
All their real services are paid and the whole reason they offer a free tier is to upsell you to their paid services.
Auli@twit.social 4 months ago
@lemmyvore @f2sfljLhdtTZ You can geoock without CloudFlare.
whydoesnothingwork@mastodon.social 4 months ago
@lemmyvore @f2sfljLhdtTZ cloud flare doesn't drop you in that situation, I've been using them for years and seen them quietly and contently mitigate attacks for my clients
Auli@twit.social 4 months ago
@f2sfljLhdtTZ @Darkassassin07 Eveyone so worried about DDoS. They are not going to DDoS a resedential Ip address. Sure if youbpiss someone off they well they're going to do it even without selfhosting anything.
DaPorkchop_@lemmy.ml 4 months ago
I can assure you that before I set up Cloudflare, I was getting hit by SYN floods filling up the entire bandwidth of my home DSL2 connection multiple times a week.
Darkassassin07@lemmy.ca 4 months ago
Sure, cloudflare provides other security benefits; but that’s not what OP was talking about. They just wanted/liked the plug+play aspect, which doesn’t need cloudflare.
Those ‘benefits’ are also really not necessary for the vast majority of self hosters. What are you hosting, from your home, that garners that kind of attention?
The only things I host from home are private services for myself or a very limited group; which, as far as ‘attacks’ goes, just gets the occasional script kiddy looking for exposed endpoints. Nothing that needs mitigation.
IsThisAnAI@lemmy.world 4 months ago
No. You are skipping DNS.
lemming741@lemmy.world 4 months ago
I didn’t skip it, I installed ddclient.
Cloudflare is the devil!
Darkassassin07@lemmy.ca 4 months ago
and using DDNS
As in, running software to update your DNS records automatically based on your current system IP. Great for dynamic IPs, or just moving location.
qaz@lemmy.world 4 months ago
Yes, but it does expose your own IP address and thus where you live. Tunnels don’t.
Lem453@lemmy.ca 4 months ago
True, but the downside of cloudflare is that they are a reverse proxy and can see all your https traffic unencrypted.
qaz@lemmy.world 4 months ago
Yes, but if you host a public blog it might be a better option, the content is public anyway and you won’t get doxed if you publish something controversial.
Aux@lemmy.world 4 months ago
Your IP changes all the time, it doesn’t matter. The best someone can deduct from your IP is the country.
qaz@lemmy.world 4 months ago
Absolutely not, my IP has remained the same since I moved in, and a geoip lookup results in a coordinate less than a kilometer away.
Aux@lemmy.world 4 months ago
I guess you live in a country with loads of spare IP addresses. Here in the UK they change every few days and IPs get rotated between all ISPs, so you can’t even deduct which ISP I’m using. And sometimes my IP is not even a mainland UK IP, but some weird shit from across the world, because Empire, lol.
Auli@twit.social 4 months ago
@qaz @Aux now you’ve just exposed where you live not your ipaddress. Nobody would have thought it was that close now they do.
pirat@lemmy.world 4 months ago
When looking up my static ip, the location I get is the one of my ISP, not my address. Do you happen to live nearby some central infrastructure of your ISP? (If it seems otherwise, I’m not trying to debunk what you said - I’m just asking curious questions!)
Auli@twit.social 4 months ago
@qaz @Darkassassin07 what are you even saying? Ip address doesn’t expose where you live. And better get off the internet right now if your concern is exposing your ip cause it was never secret to begin with.
Tunnels stop you from opening a port so nothing is exposed openly to the internet but it does not keep your ip private.
qaz@lemmy.world 4 months ago
This is incorrect, CF tunnels (and services like it e.g. ngrok) rely on proxy servers that forward traffic based on HTTP host headers. The IP of the site will therefore have the IP of the company’s proxy server instead of your own.
princessnorah@lemmy.blahaj.zone 4 months ago
How do you imagine that geoblocking content works if IP addresses don’t expose where you live?
qaz could be using any of dozens of different methods to obfuscate their IP from the wider internet to write their comment, Tor or a VPN to name just a couple.