this post was submitted on 10 Nov 2023
1 points (100.0% liked)

Homelab

371 readers
3 users here now

Rules

founded 11 months ago
MODERATORS
 

In my case, it's a NetGear ReadyNAS 2100, but generally speaking I haven't seen much discussion on this. What could go wrong?

top 10 comments
sorted by: hot top controversial new old
[–] fakemanhk@alien.top 1 points 10 months ago

If you can completely isolate it so that only management network+ unRAID are reachable, then it's fine.

Outside network is one attack domain, however don't forget that if your PC or other mobile devices on network are infected by virus or malware, they can initiate attack from inside, look at the case of WannaCry in the past.

[–] avaacado_toast@alien.top 1 points 10 months ago

Not very. I run an enterprise NAS from 2009. Software hasn't been updated since 2012.

[–] jmartin72@alien.top 1 points 10 months ago

As long as you don't exspose it to the interwebs, you're fine.

[–] Chipmunk_Nuts@alien.top 1 points 10 months ago

I have an old ReadyNAS I use for offline backups. Only turn it on to xfer already encrypted folders to it, then turn it off.

You should be able to even unplug the CAT and xfer with usb

[–] Wdrussell1@alien.top 1 points 10 months ago

It is only as risky as it is attackable.

If you use it internally and segment things so that only your server can reach it, then it is essentially impossible to attack.

Then on the other hand, is your network secure? How easy would it be to get in? Where is the weak point? You have to remember that this is a home. It is not likely to be a large target and generally as long as you have any kind of intelligence you will be fine.

So realistically, you will be fine as long as you don't host it out to the internet in any ways.

[–] RagnarLunchbox@alien.top 1 points 10 months ago

You will be fine with just a few simple things to make sure of:

  • The hardware will probably be just fine.
  • Just dont hang your data out on the internet . If you just need remote access to manage the NAS then a jump sever like Gucamole in a DMZ or container somhow will be great. If you want remote access to your actual data over SMB and such then options like Tailscale may be useful to you.
  • Look into other backup methods like Backblaze or similar if the data has any value. You could even setup rync to another location.
[–] ScrimpyMitten@alien.top 1 points 10 months ago

You can update that to v6 that should be safe enough, there are guides online

[–] johnklos@alien.top 1 points 10 months ago
[–] bufandatl@alien.top 1 points 10 months ago

As long as it is not reachable from any untrusted network like the Internet. It’s as safe as your home network is.

[–] MoneyVirus@alien.top 1 points 10 months ago

Give it a hardening so that it has a resilient configuration. Allow only internal access from needed devices only. No security updates don’t means that your are affected from the next vulnerability