frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

The purpose of Continuous Integration is to fail

https://blog.nix-ci.com/post/2026-02-05_the-purpose-of-ci-is-to-fail
1•zdw•2m ago•0 comments

Apfelstrudel: Live coding music environment with AI agent chat

https://github.com/rcarmo/apfelstrudel
1•rcarmo•2m ago•0 comments

What Is Stoicism?

https://stoacentral.com/guides/what-is-stoicism
3•0xmattf•3m ago•0 comments

What happens when a neighborhood is built around a farm

https://grist.org/cities/what-happens-when-a-neighborhood-is-built-around-a-farm/
1•Brajeshwar•3m ago•0 comments

Every major galaxy is speeding away from the Milky Way, except one

https://www.livescience.com/space/cosmology/every-major-galaxy-is-speeding-away-from-the-milky-wa...
2•Brajeshwar•3m ago•0 comments

Extreme Inequality Presages the Revolt Against It

https://www.noemamag.com/extreme-inequality-presages-the-revolt-against-it/
1•Brajeshwar•4m ago•0 comments

There's no such thing as "tech" (Ten years later)

1•dtjb•4m ago•0 comments

What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work

https://medium.com/@aglaforge/what-really-killed-flash-player-a-six-year-campaign-of-deliberate-p...
1•jbegley•5m ago•0 comments

Ask HN: Anyone orchestrating multiple AI coding agents in parallel?

1•buildingwdavid•6m ago•0 comments

Show HN: Knowledge-Bank

https://github.com/gabrywu-public/knowledge-bank
1•gabrywu•12m ago•0 comments

Show HN: The Codeverse Hub Linux

https://github.com/TheCodeVerseHub/CodeVerseLinuxDistro
3•sinisterMage•13m ago•2 comments

Take a trip to Japan's Dododo Land, the most irritating place on Earth

https://soranews24.com/2026/02/07/take-a-trip-to-japans-dododo-land-the-most-irritating-place-on-...
2•zdw•13m ago•0 comments

British drivers over 70 to face eye tests every three years

https://www.bbc.com/news/articles/c205nxy0p31o
14•bookofjoe•13m ago•5 comments

BookTalk: A Reading Companion That Captures Your Voice

https://github.com/bramses/BookTalk
1•_bramses•14m ago•0 comments

Is AI "good" yet? – tracking HN's sentiment on AI coding

https://www.is-ai-good-yet.com/#home
1•ilyaizen•15m ago•1 comments

Show HN: Amdb – Tree-sitter based memory for AI agents (Rust)

https://github.com/BETAER-08/amdb
1•try_betaer•16m ago•0 comments

OpenClaw Partners with VirusTotal for Skill Security

https://openclaw.ai/blog/virustotal-partnership
2•anhxuan•16m ago•0 comments

Show HN: Seedance 2.0 Release

https://seedancy2.com/
2•funnycoding•16m ago•0 comments

Leisure Suit Larry's Al Lowe on model trains, funny deaths and Disney

https://spillhistorie.no/2026/02/06/interview-with-sierra-veteran-al-lowe/
1•thelok•17m ago•0 comments

Towards Self-Driving Codebases

https://cursor.com/blog/self-driving-codebases
1•edwinarbus•17m ago•0 comments

VCF West: Whirlwind Software Restoration – Guy Fedorkow [video]

https://www.youtube.com/watch?v=YLoXodz1N9A
1•stmw•18m ago•1 comments

Show HN: COGext – A minimalist, open-source system monitor for Chrome (<550KB)

https://github.com/tchoa91/cog-ext
1•tchoa91•18m ago•1 comments

FOSDEM 26 – My Hallway Track Takeaways

https://sluongng.substack.com/p/fosdem-26-my-hallway-track-takeaways
1•birdculture•19m ago•0 comments

Show HN: Env-shelf – Open-source desktop app to manage .env files

https://env-shelf.vercel.app/
1•ivanglpz•23m ago•0 comments

Show HN: Almostnode – Run Node.js, Next.js, and Express in the Browser

https://almostnode.dev/
1•PetrBrzyBrzek•23m ago•0 comments

Dell support (and hardware) is so bad, I almost sued them

https://blog.joshattic.us/posts/2026-02-07-dell-support-lawsuit
1•radeeyate•24m ago•0 comments

Project Pterodactyl: Incremental Architecture

https://www.jonmsterling.com/01K7/
1•matt_d•24m ago•0 comments

Styling: Search-Text and Other Highlight-Y Pseudo-Elements

https://css-tricks.com/how-to-style-the-new-search-text-and-other-highlight-pseudo-elements/
1•blenderob•26m ago•0 comments

Crypto firm accidentally sends $40B in Bitcoin to users

https://finance.yahoo.com/news/crypto-firm-accidentally-sends-40-055054321.html
1•CommonGuy•26m ago•0 comments

Magnetic fields can change carbon diffusion in steel

https://www.sciencedaily.com/releases/2026/01/260125083427.htm
1•fanf2•27m ago•0 comments
Open in hackernews

Exposing a web service with Cloudflare Tunnel (2022)

https://erisa.dev/exposing-a-web-service-with-cloudflare-tunnel/
110•sturza•7mo ago

Comments

44za12•6mo ago
I absoltuley love it. Recently used this to host my blog along with multiple hobby projects on my 5-6 years old Raspberry Pi, more on it here:

https://aazar.me/posts/reincarnating-a-raspberry-pi

j45•6mo ago
This is awesome, makes me want to try out a Pi for this.
44za12•6mo ago
Would 100% recommend, cheapest bare metal you can get, AFAIK.
j45•6mo ago
Likely, minus those great little used units.
kramer2718•6mo ago
This looks AMAZING! Will be doing this for an upcoming project.
Dachande663•6mo ago
(2022)
j45•6mo ago
Still relevant, and always new to someone.
ahofmann•6mo ago
Posts on hn that are not from the current year should have that information in the title. If it is missing, users post the year in parentheses.
j45•6mo ago
That’s a fair thing to include for posts from a prior year.

A post that is new to everyone vs new to some might save a few clicks.

I was commenting on the post still having relevance despite the age, or without the year.

Edit: typo

jekwoooooe•6mo ago
I love CF tunnels I use it to “expose” some internal services that are gated with google auth and other zero trust protections. I don’t have to worry about exposing ports or using a vpn.
teiferer•6mo ago
I'm sorry, I don't get the point. Perhaps I'm missing something.

If I open a single port to my home server, then anybody can send any traffic to my server on that port. The attack surface is exactly the process running on my home server, listening on that port.

If I use the cloudflare tunnel, anybody using my web service connects to some cloudflare server which transparantly forwards, through the tunnel, everything to the process running at home. The attack surface is ... exactly the process running on my home server, receiving everything coming into the tunnel, effectively listening on the port opened on the cloudflare server.

Where is the difference? Any security issue in the process running on my server that can be exploited by sending traffic to it is attackable in either case.

Does cloudflare filter the traffic in any way? How does it know what's good and what's bad traffic?

hotpocket777•6mo ago
I was personally using tailscale funnel (similar?) because my isp didn’t give me a static ip moreso than for any security reason.
iLoveOncall•6mo ago
Yeah the point of CloudFlare tunel is absolutely not what is shown in this article. It's to privately expose services on the web without opening ports.

You can out auth, georestrictions, etc. so that people are authorized before they ever reach your computer.

I expose a lot of services on my NAS via CloudFlare tunels, but every single one of them is behind an authentication screen managed by CloudFlare and running on their servers.

toast0•6mo ago
> If I open a single port to my home server, then anybody can send any traffic to my server on that port. The attack surface is exactly the process running on my home server, listening on that port.

If you open a single port on your home server, you're exposing that port, sure. But you're also exposing your IP, and with that comes attacks on your IP stack, if you're worried about that. Presumably cloudflare proxies application traffic, but likely normalizes fragmentation and tcp flags and what nots.

Additionally, when you're exposing your IP, you're subject to volumetric attacks on your IP. High volume DDoS is often spoofs your IP to UDP servers that will respond, generating high volumes of traffic that overwhelm either your system in general, or the bandwidth on your connection. If you're behind a tunnel, the tunnel endpoint will get that traffic, and Cloudflare seems to manage that well. If you manage to attract a DDoS at your application level, that could very well make it through the tunnel and overwhelm your service. I think Cloudflare does offer some filters for that, but my knowledge is limited. IMHO, most of the value is from avoiding non-application traffic; but I just host most of my stuff in cheap hosting and if someone wants to DDoS me, my server will go down and that's fine.

teiferer•6mo ago
Sure, DDoS protection sounds useful, but that's not at all what the article is about.
toast0•6mo ago
The article is mostly about the how, and not the why. It briefly mentions the why with:

> you might be worried about forwarding your IP and connections to the world without properly securing them. Setting it all up sounds like a hassle, right?

If I were to do this, it would be because I didn't want expose my IP to the world. And the two big reasons not to expose your IP are so you can't be DDoSed, and to reduce the privacy impact. Other people have chimed in that they do it because their IP is not static, and I think you can run the CF tunnel client behind CGNAT, which is also valuable.

nirav72•6mo ago
Cf also allows adding authentication. Everything from OTP to third party OIDC. Including major providers like google , github etc. In edition blocking access by region or country.

Also not everyone can simply open a port on their router. Lot of people have ISPs that prohibit that or are behind CGNAT. So CF tunnels makes it lot easier for them to selfhost and expose those apps.

topspin•6mo ago
> I'm sorry, I don't get the point.

The point is the problem of exposing a port, as opposed to the additional problem of whatever security concerns you imagine your backend "process" may have.

I suppose you may not imagine that exposing a port is somehow problematic. However, it is. First, an open port reveals many things[1] about your operation you would likely prefer not to reveal. Second, it requires Internet service that permits control over open ports, and the authority to utilize it, either or both of which may not be available to you.

I have no trouble appreciating the value of this, both for personal and commercial purposes. The inherent DDOS protection alone is a huge benefit.

[1] Off the top of my head: a.) The ASN and, ultimately, the ISP you're using. b.) The approximate physical location of your system. c.) Through fingerprinting, your firewall device, and whatever problems it has.

Ingon•6mo ago
Endpoints visible to the internet is one of the main reasons I created connet [1] - with it you can choose when and where to realize the other end. Another benefit is that endpoints talk to each other directly (under many conditions) without traffic ever hitting the cloud.

[1] https://github.com/connet-dev/connet

csomar•6mo ago
I might be wrong but I think with Cloudflare tunnel (same with tailscale), you don't need to open that port to the public? That is at least my understanding. Still, Cloudflare must communicate somehow with the external world and if that is compromised, then so is your service too.
mgerdts•6mo ago
The missing part of this recipe is to make it so that when your internet exposed app gets compromised the attacker doesn’t have easy access to your home network.
topspin•6mo ago
I greatly appreciate the fact that solutions to the real concern you point out are not somehow bundled into this. There are many ways to deal with isolating the backend, and I prefer my own, and evolving them as and when I wish. Cloudflare Tunnel is a primitive that solves the part I can't without much greater effort and expense.
speerer•6mo ago
The big - really big - downside for me is the CF termsofservice which suggest that any data pushed through their service is perpetually licensed to them:

> 2. LICENSE GRANT TO CLOUDFLARE

> By submitting, posting, or publishing your content, suggestions, enhancement requests, recommendations, feedback, information, data, or comments (“Content”) to any Website or Online Service, you are granting Cloudflare a perpetual, irrevocable, worldwide, non-exclusive, royalty-free right and license (with the right to sublicense) to use, incorporate, exploit, display, perform, reproduce, distribute, and prepare derivative works of your Content.

https://www.cloudflare.com/en-gb/website-terms/

vntok•6mo ago
That's incorrect. See:

> THESE TERMS DO NOT APPLY TO YOUR ACCESS AND USE OF THE CLOUDFLARE PRODUCTS AND SERVICES THAT ARE PROVIDED UNDER THE SELF-SERVE SUBSCRIPTION AGREEMENT, THE ENTERPRISE SUBSCRIPTION AGREEMENT, OR OTHER WRITTEN AGREEMENT SIGNED BETWEEN YOU AND CLOUDFLARE (IF APPLICABLE).

ZTNA tunnels only work with a cloudflare account, so they're subject to the self-serve subscription agreement.

> You and your End Users (as such term is defined in the Privacy Policy) will retain all right, title and interest in and to any data, content, code, video, images or other materials of any type that you or your End Users transmit to or through the Services (collectively, “Customer Content”) in the form provided to Cloudflare. Subject to the terms of this Agreement, you hereby grant us a non-exclusive, fully sublicensable, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of Customer Content, in each case to the extent necessary to provide the Services.

jimmydoe•6mo ago
I think you might be confused by the two licenses applied to different type of services:

https://www.cloudflare.com/terms/

https://www.cloudflare.com/website-terms/ <- this one you quoted explicitly said it does not cover the one above, which applies to CDN/tunnel/etc

speerer•6mo ago
True - wrong quote. But the other has equivalent terms, albeit with a service based restriction. It indicates a lack of confidentiality in the data.
vntok•6mo ago
No it does not. Twice already you've written false information, and thrice already you've been corrected by others. Why not read the actual texts before posting?
theyknowitsxmas•6mo ago
Old guide. These days it's a copy and paste from the dash. You can also PIN protect the subdomain with Access.
jinglemansweep•6mo ago
Pangolin
miloschwartz•6mo ago
Pangolin could be a great open source alternative if you prefer to self host the server component. You could even set up WAF with CrowdSec which is awesome
password4321•6mo ago
Show HN: Pangolin – Open source alternative to Cloudflare Tunnels

https://news.ycombinator.com/item?id=44526015 (yesterday, ~120 comments so far)

yegle•6mo ago
AFAIKT it violates CF ToS if you host a service that streams media traffic via Cloudflare Tunnel.

I was worried about this and had to expose my Plex on the internet protected by oauth2-proxy.

theoreticalmal•6mo ago
Does violating ToS change your decision making?
blurrybird•6mo ago
Being banned from Cloudflare would break my personal email (they’re the registrar) and portfolio site.

So, yes.

Maybe it would be different if you were exclusively using it as a tunnel service.

Hikikomori•6mo ago
I do this for my services at home, and added Zero Trust auth for some services. Also created a Python script that adds my compose containers automatically fo cloudflare/Zero Trust based on annotations.
ajd555•6mo ago
I've been using this for years. There's even a kubernetes deployment to directly point your tunnel to your local kubetnetes network. Cloudflare's free tier is very generous. I've never experienced any issues with this solution.
s09dfhks•6mo ago
Do they have an operator to create the ingress rules and what not? I’m running their tunnel docker container but I still have to do some clicking around in the UI
ajd555•6mo ago
I'm not aware of one. You do raise a good point, there still is some things to configure in the UI. My understanding is this can all be automated by API, but I haven't seen a full k8s automation yet. I'll post here if I find anything
jz10•6mo ago
I use CF tunnels all the time at work and for my side projects but I've always found the web ui for remotely managed tunnels a bit hard to use. I recently asked Claude to help me build a TUI so I can easily create and manage them:

https://github.com/justingosan/tunnelman

Just yesterday I added support for adding a traefik reverse proxy that has (just) basic auth (for now) for a little bit of added protection

cedws•6mo ago
Has anybody used this to run a private email server?
jgalt212•6mo ago
I'm pretty sure you cannot do so with this Cloudflare tunnels, or similar as MX records must expose a public IP address.
cedws•6mo ago
You can have Cloudflare forward traffic via a tunnel I think.
agnishom•6mo ago
Can you do the same thing with tailscale funnel?
koinedad•6mo ago
This is great, will definitely have to try this out