Mole vpn
memes
Community rules
1. Be civil
No trolling, bigotry or other insulting / annoying behaviour
2. No politics
This is non-politics community. For political memes please go to !politicalmemes@lemmy.world
3. No recent reposts
Check for reposts when posting a meme, you can only repost after 1 month
4. No bots
No bots without the express approval of the mods or the admins
5. No Spam/Ads/AI Slop
No advertisements or spam. This is an instance rule and the only way to live. We also consider AI slop to be spam in this community and is subject to removal.
A collection of some classic Lemmy memes for your enjoyment
Sister communities
- !tenforward@lemmy.world : Star Trek memes, chat and shitposts
- !lemmyshitpost@lemmy.world : Lemmy Shitposts, anything and everything goes.
- !linuxmemes@lemmy.world : Linux themed memes
- !comicstrips@lemmy.world : for those who love comic stories.
I unfortunately use cloudflare. They apparently charge the same price they pay for domain names.
What better options do we have? I really want to know.
Though I'm not a big fan of centralization, I use cloudflare. Their DDoS protection is unmatched, they have scraping protection, and just in case they decide to screw their users over, switching to another service is trivial.
I don’t know what cloud flare is and at this point im afraid to ask
Basically they work as a bouncer in front of your website and stop all the undesirables getting in. I.e. AI scrapers. Also if somebody decides they want to try and hack you or otherwise cause problems the bouncer beats them up and you never have to hear about it.
If you use a VPN the bouncer is very suspicious of you and you have to jump through all sorts of hoops to get in, which is why some people don't like websites using it. Unfortunately there isn't really a solution since there are a lot of illegitimate uses for having a VPN connection as well, so you have to be suspicious of them.
You use it as reverse proxy, to not expose your hosting servers (e.g. websites, Lemmy instances or what not) directly to the Internet. The idea is that they take care of a lot of security concerns for you, which can otherwise be very demanding if you are self hosting
Yeah well if it weren't for all of the LLM bots and scrapers in general and of course all the Russian and Chinese hackers (they may mostly be script kitties, but they're still annoying), we wouldn't need cloud flare. But they do exist so we don't really have a choice.
if you can provide me a better way to keep my homelab from getting DDoSed every five minutes then by all means, please share it
@DaPorkchop_@lemmy.ml @memes@lemmy.world Is that an actual issue or a hypothetical one? I've never had an attack in 10 years of publicly hosting stuff.
As someone else who used to host via an open port, you get random connections all the time. Almost constantly and the request paths make it obvious they are scanning for vulnerabilities. Via cloud flare the number of those requests is much lower, as they have to know at least the DNS to do so, (and can't guess it from a presented SSL cert.)
Yeah, I see random https and other connections all the time blindly scanning for vulnerabilities. Not enough to cause any real problems though. One time I publicly exposed redis or rabbitmq (can't remember which) and didn't set a password, so someone set a password for me :). That's about the worst that's happened to me.
Just put it behind a wireguard server and don't expose any ports?
If you absolutely must expose some stuff, get a cheap 3$/mo vps that connects via wireguard to your home and setup a reverse proxy? They almost all come with DDoS protection.
How do I stop a DDOS attack of my website without having port 80 or 443 open, so you can access the website?
You don't need Cloudflare.
Awesome project, but that's just one of many features CF offers. Most people I suspect rely on tunnels more than bot protection.
Is you homelab getting ddosed constantly?
I had had it for years and never ever got ddosed.
Are you sure it's actually ddos and not just the typical bots scanning for vulnerabilities? Which are easy defended for by keeping updated.
It's weird as a DDOS is not something that's just happens, it's a targeted attack. It's a rare occurrence that someone decided to attack a homelab.
I spent multiple days getting SYN flooded to the point my router would crash and reboot over and over, and it stopped the moment I set up cloudflare and asked my ISP to change my IP. This was the instance which pushed me over the edge, but there had been smaller attacks lasting a few minutes each for years leading up to this.
What kind of router to you have? A good router should not crash from any amount WAN traffic. But yes, if you host anything you will get scanned even harder than usual.
Anubis:3
I deadass got a cloudflare error after reopening this post:
the people on selfhost would be very upset if they could read this.
cloudflare ddos protection is cetralization?
About 20% of global traffic is routed through Cloudflare so unfortunately Cloudflare is very much a massive case of centralization.
A Cloudflare outage would affect a huge number of websites and services and they have some degree of control over the way you host your and use their services.
Yeah, did people forget the last big Cloudflare outage already? A good chunk of all big services went down simultaneously. Discord, Amazon, Twitter and even the PS and Xbox consoles networks lmao.
Isn't it pretty easy to just disable cloudflare?
How long before a website not behind something Cloudflare is considered suspicious or unwanted
Source? Or is this just fearmongering?
It's definitely speculation, but I'd say it's warranted.
The same thing applies when trying to sign up for a service without a big-name email address.
Yes, use a competitor at least.
I mean I don't really have a choice because i don't see a better way to put my home server on a url because I live in a dorm and can't port forward or get a static ip
This is what I use: https://github.com/fosrl/pangolin
Creates a wireguard connection from your home server to a vps, which then exposes it to the public using a traefik reverse proxy.
If you don't have a static IP, how did you get a domain?
I use cloudflares tunneling service cloud flared which allowes me to have the service running on my home server and then cloudflare will automatically make the subdomains point towards the ip
That's what they're saying. They're dependent on cloudflare who offer a DNS service that routes traffic to one of their static ips, down a tunnel initiated by the server without an IP address.
I'd like to know how to create a tunnel; do you have the docs? I need to host my home server and noip isn't working for me.
Don't forget your SSL certificate to prevent man-in-the-middle attacks. 🤪
Don't forget to have the SSL certificate supplied and managed by Cloudflare, of course 🤫