Is non HTTP traffic against TOS?
Is non HTTP traffic like Plex/Minecraft/arbitrary TCP/arbitrary UDP against TOS in Zero Trust? I'd like to setup tailscale-like network for my homeservers and family. I won't expose services to public internet, access will be only via cloudflared/warp clients. Is it acceptable?
9 Replies
is it now that the non-html/high bandwidth clause is under the cdn?
arbitrary udp/warp private networking should escape that, at the very least
for the other stuff: https://discord.com/channels/595317990191398933/1128753516081582192/1129499373722673243
private networking/udp doesn't
correct me if I'm wrong but through cdn will go traffic like proxied http traffic "organe cloud in dns" or services from cloudflare tunnels exposed to public endpoint. I'm talking here about warp -> warp and tunnel -> warp traffic
correct me if I'm wrong but through cdn will go traffic like proxied http traffic "organe cloud in dns" or services from cloudflare tunnels exposed to public endpoint.You're right yea, public hostnames and
cloudflare access tcp
both go over CDN
warp -> warpdef not cdn
tunnel -> warp trafficprivate networking? also not cdn
okay, so it wont be a problem as long I do not use cdn
Simple Question: Why not Tailscale?
only 3 free users, cloudflare gives 50
Ah I see.
you can self host tailscale and use same apps to connect.
https://headscale.net
Home
An open source, self-hosted implementation of the Tailscale control server.
Jim's Garage
YouTube
Build Your Own VPN with Headscale & Tailscale
Deploy Headscale to create your own VPN! I'm setting this up to create a mesh network so that I can create my own private cloud.
Docker-Compose: https://github.com/JamesTurland/JimsGarage/tree/main/Headscale2
Headscale Documentation:
https://github.com/juanfont/headscale/blob/main/docs/running-headscale-container.md
Headscale UI:
https://gith...