-
-
Notifications
You must be signed in to change notification settings - Fork 65
Description
I’d like to propose a feature that allows the Dockflare controller to run separately from the Cloudflare Tunnel agent, with communication over a defined HTTP API (Not just mount Docker socket over TCP).
Why this matters
In my environment, any service exposed to the public internet is treated as a high-risk zone and is placed in a dedicated VLAN for isolation.
The Dockflare controller currently has access to both:
- Cloudflare API keys with high privileges
- The Docker socket, which effectively provides root-level control even in ro mode.
If the host running public-facing services is compromised, the attacker could leverage Dockflare’s access to gain control over Cloudflare tunnels or DNS records, creating a significant security risk.
By separating the control plane (Dockflare controller) from the public service plane (Cloudflare Tunnel agent), we could deploy Dockflare in a secure management VLAN while running the tunnel agent in the exposed VLAN, significantly reducing the blast radius of any potential compromise.