←back to thread

311 points eustoria | 1 comments | | HN request time: 0.203s | source
Show context
jorams ◴[] No.45949508[source]
> after frustration with Tailscale in environments where it couldn’t properly penetrate NAT/firewall and get a p2p connection, I decided to invest some time into learning something new: Cloudflare Zero Trust + Warp

...which doesn't even try to get a p2p connection. Instead you always get the thing you didn't want. If you're okay with that you could've just ignored how Tailscale connected those devices, that's kind of the point. You've also in the process converted your entire security model to Cloudflare's idea of "Zero Trust" which involves 100% trusting Cloudflare.

The rest of the blog post is fine, but the motivation is honestly baffling.

replies(2): >>45949670 #>>45950123 #
stingraycharles ◴[] No.45950123[source]
The difference is that Cloudflare has their own high quality network and PoPs everywhere, so the quality is generally even better than P2P.

This is my experience, we are a fully remote world-wide company and we recently migrated away from Tailscale to Cloudflare and it has been much better.

replies(1): >>45961968 #
1. o11c ◴[] No.45961968[source]
Eh, kind of.

Peering in Europe is such a mess that even Cloudflare can be pretty bad. Sometimes you have to manually calculate "okay, there's a colo in this particular city that will force the correct route if we proxy all our traffic through it ..."