Skip to main content Cloudflare DNS pointed to internal IP Address safe??? : r/homelab
r/homelab icon
Go to homelab

Cloudflare DNS pointed to internal IP Address safe???

Help

Hi guys,

I've setup a small server at home with a few docker services running. I've setup Traefik Reverse Proxy to create local domains for them and only access them via my local network or over my Wireguard Tunnel from other devices.

I've noticed that I can resolve the DNS names with Cloudflare by adding my servers local IP address to the DNS records. Are there any security vulnerabilities with this setup?

Thanks 🙂

r/homelab - Cloudflare DNS pointed to internal IP Address safe???
The numbers don't lie - there's a reason why 10,000+ customers rate monday.com 5 stars and use it as their work management platform. It’s the #1 platform to efficiently manage your team, work, and processes. Try it now!
Thumbnail image: The numbers don't lie - there's a reason why 10,000+ customers rate monday.com 5 stars and use it as their work management platform. It’s the #1 platform to efficiently manage your team, work, and processes. Try it now!
Sort by:
Best
Open comment sort options

Perfectly secure and might even confuse people that just ping everything to check for people with stuff open if they have a devices with that IP and it responds.

Point mail.homelaburl.com to localhost and watch script kids brute force their own machines.

More replies

Yeah that makes sense. I can only ping it if i'm on my LAN or wireguard tunnel. No ports are open and it's just used to resolve the domain names.

More replies

I've been using it for years.. its perfectly fine.

It’ll be fine. One thing to be aware of is that some ISP routers will have DNS rebinding protection enabled that will block resolution of the entry (or any private IP as per RFC1918).

not only ISP routers but also e.g. Google Wifi Home Router or any router running vanilla OpenWRT ....

I've struggled with this so many times. Really frustrating and can be pretty hard to debug.

More replies
More replies

Home environment? Fine. Enterprise environment? Absolutely not

Why not in enterprise environment?

More replies
More replies

Your internal caching DNS server should be configured to reject answers from public DNS servers with rfc1918 space in them due to the risk of DNS rebinding attacks: https://en.m.wikipedia.org/wiki/DNS_rebinding.

You can configure your DNS server to make an exception for your domain though, because you trust your own domain not to be hosting malware.

So yes, this is a perfectly valid configuration but the fact that this works out of the box means that your home network is not protected against DNS rebinding attacks.