I finally understand Cloudflare Zero Trust tunnels

Cloudflare tunnels explained—fans cheer, Tailscale crowd calls it overkill

TLDR: A hands-on guide champions Cloudflare’s Zero Trust tunnels for easier remote access, even if traffic goes through Cloudflare’s network. Commenters clash over speed, lock-in, and privacy: some push cheap self-hosted fixes or Tailscale’s new peer relays, while others worry Cloudflare ends encryption at their edge.

An impatient network tinkerer says they’ve finally cracked Cloudflare’s Zero Trust + Warp, swapping from Tailscale when home routers blocked direct connections. Their pitch: Cloudflare tunnels stitch together home labs and servers, let you share private stuff on a public address, add fine‑grained rules, and even log into SSH without keys. It’s the “everything goes through Cloudflare” model: more hops, fewer headaches with tricky routers. They also tout private IP spaces that only appear when Warp is on.

Comments lit up. One camp cheered the clear walkthrough—“CF should license this,” joked a fan—while skeptics asked the big question: what’s the actual win? Plantinthebok says a $3 server running Headscale (a self‑hosted Tailscale) dodges the complexity and vendor lock‑in. Privacy alarms rang too: jchw warns Cloudflare terminates TLS (the padlock part of web security), meaning traffic hits Cloudflare before your box.

Meanwhile, Tailscale loyalists brought heat: yuvadam claims peer relays now punch through stubborn routers, so “forget those DERP servers.” Devs tossed alternatives like tuns.sh for quick one‑off sharing. The vibe: speed vs reliability, DIY vs one‑vendor, and a dash of “please don’t put your home router on the public internet.” Entertaining, informative, and just chaotic enough to keep us refreshing.

Key Points

  • Cloudflare Zero Trust with Warp routes most traffic through Cloudflare’s edge, avoiding NAT issues; warp-to-warp supports p2p.
  • Argo tunnels enable connecting private networks, exposing private services publicly, and creating private IP networks accessible via Warp.
  • Granular access policies control authentication methods, identities, and bot/server exceptions using service access tokens.
  • Warp Client connects devices to Zero Trust, enforces policies, runs on clients or servers, and supports p2p between Warp nodes.
  • Cloudflared creates and manages tunnels, can run on servers or clients, supports ‘cloudflared access,’ and can make one-time test tunnels.

Hottest takes

"a $3 VPS running Headscale seems simpler" — plantinthebok
"it acts as a termination point for TLS" — jchw
"forget about all those DERP servers" — yuvadam
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.