Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. serious Cloudflare goof

serious Cloudflare goof

Scheduled Pinned Locked Moved Solved Support
cloudflare
21 Posts 6 Posters 4.7k Views 7 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jdaviescoatesJ jdaviescoates

    @girish said in serious Cloudflare goof:

    Cloudflare can read everything.

    Exactly.

    I really don't get why so many people want to use Cloudflare or think it's a good idea to do so.

    NetwarSystemN Offline
    NetwarSystemN Offline
    NetwarSystem
    wrote on last edited by
    #5

    @jdaviescoates

    This isn't a complex issue and I'm amazed in 2023 to find anyone that admits they don't understand the problem.

    When a client registers a domain, they use the proxy registration service. This protects them from malicious prosecution attempts, frivolous litigation, and the like. I have clients who've faced this sort of thing in the last year.

    When establishing hosting for the domain, the system is protected with the Cloudflare CDN. This interdicts not just denial of service, it also thwarts a lot of intrusion attempts. A little more care in the form of static routing for just what needs to be reached raises the bar even higher.

    So when Cloudron just haphazardly exposes an actual public IP in connection with a DNS name, simply turning proxy back on doesn't solve the problem, because that information is then available in tools like Farsight or RiskIQ.

    The negative outcomes from the exposure of the hosting IP are numerous. An attacker intending DDoS goes directly at the actual IP, and the system quickly wilts under a barrage of packets.

    Starting with just that IP, the attacker will look for "fellow travelers" on the same IP address. If the set is small, they've identified a small hosting provider. If that doesn't produce a result, they'll expand the search to the entire /24. Vulnerable systems get cracked and they all catch that barrage of packets from a shell booter. Then person renting the VPS or dedicated system gets expelled from their hosting provider.

    Given some public IPs, some domains, and a little bit of poking around, it's easy to profile the site builder, and find a service address for them.

    None of that is at all exotic. I get requests every week or so to identify who is operating a given site. I have not yet encountered someone using Cloudron, but given what I've seen of the system, it's a soft target that is completely unfit for any hazardous duty.

    If you want a concrete example of how one little DNS goof produces a catastrophe, I'd be happy to share the study I did on Josh Moon and the digital cesspool known as Kiwi Farms. One mistake, one day, a long time ago was enough of an opening for me to find everything that he was doing.

    Cloudron's offering of Cloudflare as a DNS provider without a big fat flashing WE CAN'T DO THIS SECURELY disclaimer is a serious hazard. Right now I've got it running for one project, in a low conflict area, on a system that is not quartered with anything else I do. There's no way I would use Cloudron for anything else, the inability to handle Cloudflare setups in a secure fashion is a deal killer for me.

    necrevistonnezrN 1 Reply Last reply
    2
    • girishG Offline
      girishG Offline
      girish
      Staff
      wrote on last edited by
      #6

      I am not a Cloudflare customer, so I don't know the expectations of Cloudflare customers. Your recommendation is clear. Any other cloudflare customers here? Do you always proxy your sites via Cloudflare? Maybe we should add a checkbox to allow "proxied" setup at domain setup time.

      nichu42N benborgesB 2 Replies Last reply
      1
      • girishG girish

        I am not a Cloudflare customer, so I don't know the expectations of Cloudflare customers. Your recommendation is clear. Any other cloudflare customers here? Do you always proxy your sites via Cloudflare? Maybe we should add a checkbox to allow "proxied" setup at domain setup time.

        nichu42N Offline
        nichu42N Offline
        nichu42
        wrote on last edited by nichu42
        #7

        @girish said in serious Cloudflare goof:

        I am not a Cloudflare customer, so I don't know the expectations of Cloudflare customers. Your recommendation is clear. Any other cloudflare customers here? Do you always proxy your sites via Cloudflare? Maybe we should add a checkbox to allow "proxied" setup at domain setup time.

        Cloudflare Domain customer here. Not using proxy. I have doubts about GDPR compliancy.

        Matrix: @nichu42:blueplanet.social

        1 Reply Last reply
        3
        • NetwarSystemN NetwarSystem

          @jdaviescoates

          This isn't a complex issue and I'm amazed in 2023 to find anyone that admits they don't understand the problem.

          When a client registers a domain, they use the proxy registration service. This protects them from malicious prosecution attempts, frivolous litigation, and the like. I have clients who've faced this sort of thing in the last year.

          When establishing hosting for the domain, the system is protected with the Cloudflare CDN. This interdicts not just denial of service, it also thwarts a lot of intrusion attempts. A little more care in the form of static routing for just what needs to be reached raises the bar even higher.

          So when Cloudron just haphazardly exposes an actual public IP in connection with a DNS name, simply turning proxy back on doesn't solve the problem, because that information is then available in tools like Farsight or RiskIQ.

          The negative outcomes from the exposure of the hosting IP are numerous. An attacker intending DDoS goes directly at the actual IP, and the system quickly wilts under a barrage of packets.

          Starting with just that IP, the attacker will look for "fellow travelers" on the same IP address. If the set is small, they've identified a small hosting provider. If that doesn't produce a result, they'll expand the search to the entire /24. Vulnerable systems get cracked and they all catch that barrage of packets from a shell booter. Then person renting the VPS or dedicated system gets expelled from their hosting provider.

          Given some public IPs, some domains, and a little bit of poking around, it's easy to profile the site builder, and find a service address for them.

          None of that is at all exotic. I get requests every week or so to identify who is operating a given site. I have not yet encountered someone using Cloudron, but given what I've seen of the system, it's a soft target that is completely unfit for any hazardous duty.

          If you want a concrete example of how one little DNS goof produces a catastrophe, I'd be happy to share the study I did on Josh Moon and the digital cesspool known as Kiwi Farms. One mistake, one day, a long time ago was enough of an opening for me to find everything that he was doing.

          Cloudron's offering of Cloudflare as a DNS provider without a big fat flashing WE CAN'T DO THIS SECURELY disclaimer is a serious hazard. Right now I've got it running for one project, in a low conflict area, on a system that is not quartered with anything else I do. There's no way I would use Cloudron for anything else, the inability to handle Cloudflare setups in a secure fashion is a deal killer for me.

          necrevistonnezrN Offline
          necrevistonnezrN Offline
          necrevistonnezr
          wrote on last edited by
          #8

          @NetwarSystem said in serious Cloudflare goof:

          @jdaviescoates

          None of that is at all exotic. I get requests every week or so to identify who is operating a given site. I have not yet encountered someone using Cloudron, but given what I've seen of the system, it's a soft target that is completely unfit for any hazardous duty.

          If you want a concrete example of how one little DNS goof produces a catastrophe, I'd be happy to share the study I did on Josh Moon and the digital cesspool known as Kiwi Farms. One mistake, one day, a long time ago was enough of an opening for me to find everything that he was doing.

          I don’t believe Cloudron‘s main objective is to be „fit for any hazardous duty“ or to cater to customers of the „Kiwi Farms“ type - but rather legitimate businesses who have to and don’t have a problem with being public.

          1 Reply Last reply
          2
          • girishG Offline
            girishG Offline
            girish
            Staff
            wrote on last edited by
            #9

            Oh well, I added a checkbox to set the proxying flag for new DNS records. I was in two minds but "security" is plastered all over cloudflare's marketing and docs about this feature. So, people will always have whatever opinion that cannot be changed (including mine 🙂 ).

            It's disabled by default. From Cloudron's point of view, this is the secure default.

            382c4658-ae69-4f75-b017-7fc1ae82893d-image.png

            benborgesB 2 Replies Last reply
            5
            • girishG girish marked this topic as a question on
            • girishG girish has marked this topic as solved on
            • girishG girish

              I am not a Cloudflare customer, so I don't know the expectations of Cloudflare customers. Your recommendation is clear. Any other cloudflare customers here? Do you always proxy your sites via Cloudflare? Maybe we should add a checkbox to allow "proxied" setup at domain setup time.

              benborgesB Offline
              benborgesB Offline
              benborges
              wrote on last edited by benborges
              #10

              @girish I'm using cloudron + CF for osintukraine.com, these consideration are super important in adversarial environments, (the question here is not about CF ethics etc..I'm fully aware of them, but still had to use CF for a bunch of very valid reasons)

              So yes, the proxy at setup of the app itself would definitely help CF users, I can confirm that every installed app in a CF handled domains, requite to login to CF and manually set proxy enabled.

              Since cloudron has full access to CF via the API it would be perfect to allow to set the proxy from the get go, including for the my subdomain.

              The problem I'm seeing is that my subdomain is also the MX dns entry
              so even if all apps get proxied properly from the start, the MX entry in itself almost render the use of CF + Cloudron useless in a very critical environment.

              OSINTukraine will be moved back to registrar DNS because ultimately, my domain is already burned, the only thing that kinda save me is that I setup a system that redirect any direct targeting of the box IP back to CF, but again, my IP is burned.

              1 year after, I can say that the environment does not seem to be that dangerous for the project I'm running, hence considering to move back.

              BenB

              girishG 1 Reply Last reply
              1
              • benborgesB benborges

                @girish I'm using cloudron + CF for osintukraine.com, these consideration are super important in adversarial environments, (the question here is not about CF ethics etc..I'm fully aware of them, but still had to use CF for a bunch of very valid reasons)

                So yes, the proxy at setup of the app itself would definitely help CF users, I can confirm that every installed app in a CF handled domains, requite to login to CF and manually set proxy enabled.

                Since cloudron has full access to CF via the API it would be perfect to allow to set the proxy from the get go, including for the my subdomain.

                The problem I'm seeing is that my subdomain is also the MX dns entry
                so even if all apps get proxied properly from the start, the MX entry in itself almost render the use of CF + Cloudron useless in a very critical environment.

                OSINTukraine will be moved back to registrar DNS because ultimately, my domain is already burned, the only thing that kinda save me is that I setup a system that redirect any direct targeting of the box IP back to CF, but again, my IP is burned.

                1 year after, I can say that the environment does not seem to be that dangerous for the project I'm running, hence considering to move back.

                girishG Offline
                girishG Offline
                girish
                Staff
                wrote on last edited by
                #11

                @benborges you can also consider moving the mail server to a separate Cloudron instance. There's no reason for all of it to be on a single server.

                benborgesB 2 Replies Last reply
                2
                • girishG girish

                  @benborges you can also consider moving the mail server to a separate Cloudron instance. There's no reason for all of it to be on a single server.

                  benborgesB Offline
                  benborgesB Offline
                  benborges
                  wrote on last edited by
                  #12

                  @girish true, haven't explored that part yet, but I'll have a look and report back

                  BenB

                  1 Reply Last reply
                  0
                  • girishG girish

                    @benborges you can also consider moving the mail server to a separate Cloudron instance. There's no reason for all of it to be on a single server.

                    benborgesB Offline
                    benborgesB Offline
                    benborges
                    wrote on last edited by benborges
                    #13

                    @girish on another note, I'm noticing serious issues with the cloudron mail server when used in conjunction with CF, emails sent to me bounce back and the contacts have no way to alert me that their email bounced back, it's still unclear to me why they bounce back, but Cloudron + CF + Self-hosted email server is definitely not working as it should : thunderbird or outlook autodiscovery of email setting fails and even they don't (not sure why in some case they fail and some case they don't) it's impossible to use thunderbird with CF + Cloudron, there is just no way to add the mailbox user.

                    no issue sending emails, no issue with app emails sending emails to emails hosted by the cloudron, no issues sending emails outside.

                    problem seems to be getting them. Took me months to notice this problem for instance because i wasn't keeping an eye on the Mail log.

                    BenB

                    1 Reply Last reply
                    0
                    • girishG girish

                      Oh well, I added a checkbox to set the proxying flag for new DNS records. I was in two minds but "security" is plastered all over cloudflare's marketing and docs about this feature. So, people will always have whatever opinion that cannot be changed (including mine 🙂 ).

                      It's disabled by default. From Cloudron's point of view, this is the secure default.

                      382c4658-ae69-4f75-b017-7fc1ae82893d-image.png

                      benborgesB Offline
                      benborgesB Offline
                      benborges
                      wrote on last edited by
                      #14

                      @girish just thinking out loud but if this is implemented, then other areas where an action create a subdomain on the fly should also have this proxying option available, such as 4483cb84-3995-462f-b9b5-75a511c28e2b-image.png that is, if the domain is handled by CF dns.

                      BenB

                      girishG benborgesB 2 Replies Last reply
                      0
                      • benborgesB benborges

                        @girish just thinking out loud but if this is implemented, then other areas where an action create a subdomain on the fly should also have this proxying option available, such as 4483cb84-3995-462f-b9b5-75a511c28e2b-image.png that is, if the domain is handled by CF dns.

                        girishG Offline
                        girishG Offline
                        girish
                        Staff
                        wrote on last edited by
                        #15

                        @benborges Setting the default proxying value in Domains view will essentially set up the domain in Cloudflare with/without proxying for new subdomains. The flag was added only because it's considered a "security" issue. I think adding options to add/remove CF settings per subdomain level should be done in CF itself. It will complicate things too much for us to add things in subdomain level (unless there is a good reason for this).

                        benborgesB 1 Reply Last reply
                        0
                        • girishG girish

                          @benborges Setting the default proxying value in Domains view will essentially set up the domain in Cloudflare with/without proxying for new subdomains. The flag was added only because it's considered a "security" issue. I think adding options to add/remove CF settings per subdomain level should be done in CF itself. It will complicate things too much for us to add things in subdomain level (unless there is a good reason for this).

                          benborgesB Offline
                          benborgesB Offline
                          benborges
                          wrote on last edited by
                          #16

                          @girish Yes that's I'm currently doing, I mean, heading to CF dns dashboard each time I add a new sub domain/app but this means that during a brief period of time, the IP leaks without being proxied.

                          I understand if Cloudron does not want to head that way but this means that for high-threat level environments, cloudron should not be used behind CF.

                          BenB

                          girishG 1 Reply Last reply
                          0
                          • benborgesB benborges

                            @girish Yes that's I'm currently doing, I mean, heading to CF dns dashboard each time I add a new sub domain/app but this means that during a brief period of time, the IP leaks without being proxied.

                            I understand if Cloudron does not want to head that way but this means that for high-threat level environments, cloudron should not be used behind CF.

                            girishG Offline
                            girishG Offline
                            girish
                            Staff
                            wrote on last edited by
                            #17

                            @benborges said in serious Cloudflare goof:

                            I understand if Cloudron does not want to head that way but this means that for high-threat level environments, cloudron should not be used behind CF.

                            I am confused. The default option which we added for next release should allow you to hide the IP of the server from the get go, no? Can you tell me which workflow it doesn't work for?

                            1 Reply Last reply
                            0
                            • girishG girish

                              Oh well, I added a checkbox to set the proxying flag for new DNS records. I was in two minds but "security" is plastered all over cloudflare's marketing and docs about this feature. So, people will always have whatever opinion that cannot be changed (including mine 🙂 ).

                              It's disabled by default. From Cloudron's point of view, this is the secure default.

                              382c4658-ae69-4f75-b017-7fc1ae82893d-image.png

                              benborgesB Offline
                              benborgesB Offline
                              benborges
                              wrote on last edited by
                              #18

                              @girish said in serious Cloudflare goof:

                              Oh well, I added a checkbox to set the proxying flag for new DNS records. I was in two minds but "security" is plastered all over cloudflare's marketing and docs about this feature. So, people will always have whatever opinion that cannot be changed (including mine 🙂 ).

                              It's disabled by default. From Cloudron's point of view, this is the secure default.

                              382c4658-ae69-4f75-b017-7fc1ae82893d-image.png

                              I think this one is great, it will already improve CF + Cloudron for tons of use cases

                              BenB

                              1 Reply Last reply
                              0
                              • benborgesB benborges

                                @girish just thinking out loud but if this is implemented, then other areas where an action create a subdomain on the fly should also have this proxying option available, such as 4483cb84-3995-462f-b9b5-75a511c28e2b-image.png that is, if the domain is handled by CF dns.

                                benborgesB Offline
                                benborgesB Offline
                                benborges
                                wrote on last edited by benborges
                                #19

                                @benborges said in serious Cloudflare goof:

                                @girish just thinking out loud but if this is implemented, then other areas where an action create a subdomain on the fly should also have this proxying option available, such as 4483cb84-3995-462f-b9b5-75a511c28e2b-image.png that is, if the domain is handled by CF dns.

                                Maybe I'm confused, but unless this logic isn't build at the app deployment too, then yes for the main deployment it will work, but not for individual app additions ?

                                Ideally, if the domain is handled by CF, having a check box to directly proxy the sub-domain installations through CF would be great, but I understand that would add to much CF specific things to the app deployment at cloudron level ?

                                BenB

                                girishG 1 Reply Last reply
                                0
                                • benborgesB benborges

                                  @benborges said in serious Cloudflare goof:

                                  @girish just thinking out loud but if this is implemented, then other areas where an action create a subdomain on the fly should also have this proxying option available, such as 4483cb84-3995-462f-b9b5-75a511c28e2b-image.png that is, if the domain is handled by CF dns.

                                  Maybe I'm confused, but unless this logic isn't build at the app deployment too, then yes for the main deployment it will work, but not for individual app additions ?

                                  Ideally, if the domain is handled by CF, having a check box to directly proxy the sub-domain installations through CF would be great, but I understand that would add to much CF specific things to the app deployment at cloudron level ?

                                  girishG Offline
                                  girishG Offline
                                  girish
                                  Staff
                                  wrote on last edited by
                                  #20

                                  @benborges said in serious Cloudflare goof:

                                  Maybe I'm confused, but unless this logic isn't build at the app deployment too, then yes for the main deployment it will work, but not for individual app additions ?

                                  Ah yes, that's what that flag does. I see now that the screeshot is not "complete". That UI is the domains view. If you set the flag, then when Cloudron adds a new domain to Cloudflare, it will set the proxying based on that value. Essentially, it's the default value of the proxying cloudflare bit for new subdomains (so, not just installation time). If you want to turn this off later, you can do so by going to the Cloudflare dashboard. Cloudron won't interfere with the "proxying" flag after the domain has been added (for the lifecycle of the app).

                                  benborgesB 1 Reply Last reply
                                  2
                                  • girishG girish

                                    @benborges said in serious Cloudflare goof:

                                    Maybe I'm confused, but unless this logic isn't build at the app deployment too, then yes for the main deployment it will work, but not for individual app additions ?

                                    Ah yes, that's what that flag does. I see now that the screeshot is not "complete". That UI is the domains view. If you set the flag, then when Cloudron adds a new domain to Cloudflare, it will set the proxying based on that value. Essentially, it's the default value of the proxying cloudflare bit for new subdomains (so, not just installation time). If you want to turn this off later, you can do so by going to the Cloudflare dashboard. Cloudron won't interfere with the "proxying" flag after the domain has been added (for the lifecycle of the app).

                                    benborgesB Offline
                                    benborgesB Offline
                                    benborges
                                    wrote on last edited by
                                    #21

                                    @girish Oh great, that seems good then, happy to test it when it's available !

                                    BenB

                                    1 Reply Last reply
                                    1
                                    Reply
                                    • Reply as topic
                                    Log in to reply
                                    • Oldest to Newest
                                    • Newest to Oldest
                                    • Most Votes


                                    • Login

                                    • Don't have an account? Register

                                    • Login or register to search.
                                    • First post
                                      Last post
                                    0
                                    • Categories
                                    • Recent
                                    • Tags
                                    • Popular
                                    • Bookmarks
                                    • Search