Cloudflare Email Service: private beta

Integrated email on Cloudflare: appeal and use cases

  • Many developers welcome built-in transactional email in Workers to avoid juggling SES/SendGrid/Resend for simple things like signups, password resets, and contact forms.
  • People using Cloudflare’s developer stack (Workers, KV, R2, Queues, Durable Objects) see this as another step toward Cloudflare as a full-stack “AWS-like” cloud with much better DX.
  • Some like that Cloudflare will auto-handle SPF/DKIM/DMARC and hope for features like idempotency keys and simple APIs/SMTP so existing apps can swap providers easily.

Alternatives, pricing, and “root” providers

  • Thread compares this to SES, SendGrid, Mailgun, Postmark, Resend, Mailgun/Mailjet, Zeptomail, smtp2go, etc. Many want SES-level pricing with Resend-level ergonomics.
  • Small projects are very sensitive to fixed monthly plans; pay‑per‑use or very low tiers are strongly requested.
  • Several mention that most “modern” email services are just wrappers around a small number of underlying MTAs; some welcome Cloudflare as another “root” sender.

Self‑hosting vs middlemen

  • Long debate: some say email is now too hostile and reputation‑driven for ordinary people to self‑host, forcing everyone to use intermediaries.
  • Others with long-running personal mailservers insist deliverability is fine if you have clean IPs, correct DNS (SPF/DKIM/DMARC, rDNS), and modest volume; tools like docker-mailserver, mailu, mox are cited.
  • Consensus: bulk or marketing traffic from fresh or cheap VPS IPs is very likely to be treated as spam; low‑volume personal mail is much more feasible.

Centralization, MITM, and governance concerns

  • Strong worries about Cloudflare becoming a single chokepoint: already fronting a huge share of HTTP(S) traffic, now potentially a big email sender too.
  • Critics describe Cloudflare as de facto MITM for web and soon mail, an attractive asset for intelligence services and censorship regimes, and a “protection racket” securing business traffic while reshaping the internet around commercial norms.
  • Some argue such critical infrastructure should be regulated like a utility or even nationalized; others mistrust governments more than corporations and instead advocate decentralization and multiple independent providers.

UX, blocking, and bot defense

  • Many users complain about Cloudflare CAPTCHAs, “infinite challenges,” and opaque blocking, especially from VPNs, CGNAT, Tor, niche browsers, and privacy setups (heavy adblocking/JS blocking).
  • Site operators counter that bot/DDoS traffic is overwhelming and Cloudflare dramatically cuts load and cost; they see CAPTCHAs as an unpleasant but necessary tradeoff.

Deliverability, reputation, and reliability questions

  • Some are skeptical Cloudflare can maintain clean IP/sender reputation at scale, given potential abuse and their “libertarian” compliance stance.
  • Others point out that email deliverability is already dominated by a few big providers (Google, Microsoft); Cloudflare may simply become another large, trusted origin.
  • There’s lingering distrust from the earlier Workers–MailChannels integration that vanished, stranding some users; people want assurances this is a long‑term, first‑party product.

Vendor lock‑in and “eggs in one basket”

  • Some worry that moving DNS, hosting, and email to Cloudflare concentrates too much risk (downtime, policy change, account bans).
  • Others argue Cloudflare’s ubiquity actually makes them a “safe” dependency, and lock‑in for stateless/static use cases is relatively low compared to traditional clouds.