this post was submitted on 23 Nov 2023
6 points (100.0% liked)

Homelab

914 readers
1 users here now

Rules

founded 2 years ago
MODERATORS
 

...without snark or jumping down my throat. I genuinely want to know why it's so unsafe.

I'm running a Synology DS920+, with my DSM login exposed through a Cloudflare tunnel. I have 2FA enabled, Synology firewall enabled with these rules in place. I also have this IP blocklist enabled.

After all of this, how would someone be able to break in via the DSM login?

you are viewing a single comment's thread
view the rest of the comments
[–] HoustonBOFH@alien.top 1 points 2 years ago (4 children)

Much more likely to gain access via a compromised desktop, or smart phone.

[–] norrisiv@alien.top 1 points 2 years ago (3 children)

The NAS runs its own OS and is just as vulnerable as a desktop or smartphones. They’re all computers.

[–] HoustonBOFH@alien.top 1 points 2 years ago (2 children)

Yes, but the other computers I listed have a person behind them that will click things. Like a "close" button that actually installs malware. A NAS does not click things.

[–] NOAM7778@alien.top 1 points 2 years ago (1 children)

True, but, what if you host VMs on the NAS? Or data for some application? Those can result in an attacker running code on them, and from there, in most homelab networks, i assume is a short way from owning everything in your network

[–] HoustonBOFH@alien.top 1 points 2 years ago

When you turn your NAS into a hosting platform, it is no longer just a NAS.