…without snark or jumping down my throat. I genuinely want to know why it’s so unsafe.

I’m running a Synology DS920+, with my DSM login exposed through a Cloudflare tunnel. I have 2FA enabled, Synology firewall enabled with these rules in place. I also have this IP blocklist enabled.

After all of this, how would someone be able to break in via the DSM login?

  • DarkChoomba@alien.topB
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    The other risk to that is they’d possibly gain access to your internal network through your NAS. No telling what a bad actor would do.

      • norrisiv@alien.topB
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        The NAS runs its own OS and is just as vulnerable as a desktop or smartphones. They’re all computers.

        • HoustonBOFH@alien.topB
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 year ago

          Yes, but the other computers I listed have a person behind them that will click things. Like a “close” button that actually installs malware. A NAS does not click things.

          • NOAM7778@alien.topB
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 year ago

            True, but, what if you host VMs on the NAS? Or data for some application? Those can result in an attacker running code on them, and from there, in most homelab networks, i assume is a short way from owning everything in your network