Don’t let someone bypass Cloudflare protection and misuse your origin server!
Cloudflare is one of the popular CDN and security platform, powering millions of sites from small to enterprise. When you implement Cloudflare for your website, all the traffic is secured and accelerated. But this is true when a site is accessed using a domain name. How about if someone finds out the actual server IP (Origin) and misuse it?
Finding server IP for the site behind Cloudflare doesn’t take much. You can find out how, as explained here and here. You see, just implementing CDN and Cloud-based WAF is not enough. You should also consider protecting origin.
So, what’s the solution?
Argo Tunnel – a smart solution by Cloudflare to protect the origin server from direct attack.
It is a daemon that you need to install on your server that creates an encrypted tunnel between server to Cloudflare network. There is zero complicated ACL/IP table configuration.
The good news is you don’t need to be under PRO or higher plan. You can get it started even you are under the FREE plan. All you pay is for Argo subscription, which starts from $5 per month.
Let’s get it started with installation and setup.
Installing Cloudflare daemon
- Login to the origin server with root or sudo privilege
- Download the latest stable package. I am on Ubuntu so, .deb file for other OS, check out the official download page.
- Install the downloaded package
dpkg -i cloudflared-stable-linux-amd64.deb
- Let’s verify the version to ensure it has installed
[email protected]:~# cloudflared --version cloudflared version 2020.2.0 (built 2020-02-07-1653 UTC) [email protected]:~#
Next would be to authenticate to Cloudflare using the daemon. Run the below command
cloudflared tunnel login
- It will prompt you the URL which you can use to login to Cloudflare and authorize the site.
[email protected]:~# cloudflared tunnel login Please open the following URL and log in with your Cloudflare account: https://dash.cloudflare.com/argotunnel?callback=https%3A%2F%2Flogin.argotunnel.com%XXXXX-XXX-XXXXXX%3B Leave cloudflared running to download the cert automatically. INFO Waiting for login... INFO Waiting for login... INFO Waiting for login... INFO Waiting for login... You have successfully logged in. If you wish to copy your credentials to a server, they have been saved to: /root/.cloudflared/cert.pem [email protected]:~#
- Once authorized, you should see something like this.
Starting the tunnel
Let’s start the tunneling below.
cloudflared tunnel --hostname [HOSTNAME] http://localhost:80
[email protected]:~# cloudflared tunnel --hostname tunnel.geekflare.com http://0.0.0.0:80 WARN Cannot determine default configuration path. No file [config.yml config.yaml] in [~/.cloudflared ~/.cloudflare-warp ~/cloudflare-warp /usr/local/etc/cloudflared /etc/cloudflared] INFO Version 2020.2.0 INFO GOOS: linux, GOVersion: go1.12.7, GoArch: amd64 INFO Flags hostname=tunnel.geekflare.com proxy-dns-upstream="https://126.96.36.199/dns-query, https://188.8.131.52/dns-query" INFO cloudflared will not automatically update when run from the shell. To enable auto-updates, run cloudflared as a service: https://developers.cloudflare.com/argo-tunnel/reference/service/ INFO Starting metrics server addr="127.0.0.1:35597" INFO Proxying tunnel requests to http://0.0.0.0:80 INFO Connected to LAX connectionID=0 INFO Each HA connection's tunnel IDs: map[0:xxx] connectionID=0 INFO Route propagating, it may take up to 1 minute for your new route to become functional connectionID=0 INFO Connected to LAX
Congratulations! origin is locked down now. Try to access your website using origin IP, and you should see the “connection refused” message.
Starting Argo Tunnel at Boot
Let’s ensure the Argo Tunnel is started when the server reboot. Run the below command on the server.
cloudflared service install
Cloudflare Argo Tunnel looks promising. Just in around 30 minutes, you can protect the origin server.