thoughts on Seagate Exos 16TB Enterprise HDD ??

Status
Not open for further replies.
I've looked at the various configurations re price, and for me this seems like a good deal.
You should spend as much as the value of your data and your risk tolerance justify. Nothing is free. Better HW, SW, networking, security, updates all cost money. Some people like to cut corners and take risks, some people like to invest in more security.
 
I've looked at the various configurations re price, and for me this seems like a good deal.

For multi-bay Synology NAS and their price I could buy the 1-bay NAS and 2 x16 TB drives. I could use the 2nd drive as a backup, which I would need anyway
I don't know what or how you are going to achieve what you want with a 1 bay NAS. Are you going to create a backup via USB or are you going to copy all the data to a drive, then eject it and repeat with the second drive?

No offence, sounds like a terrible backup system. Worse that just using a USB connected drive.
yes I know that the NAS is out of date and (from what I've read) won't have future upgrades. (That's a plus for me!)

for the longer term it's trueNas for me, since it's open source. Plus I can buy better spec hardware for less money than Synology

Question for Synology users...will the box need to "phone home"? I really don't want to by any products, if I can help it, which need to do this
I don't believe they need to phone home. Can easily setup a firewall rule to block outgoing connection attempts from the internal IP address set to it.
Any thoughts or suggestions?\
I don't believe the DS120j supports BTRFS. I did a basic Google search which suggested it does not but I have never used Synology so I could be incorrect. Either way, I feel this is a silly solution but I would have to re-read the thread to understand your use case.
thanks

Here is what I'm thinking of:
WD or newegg:

$249 .99 WD Red Pro WD161KFGX 16TB 7200 RPM 512MB Cache SATA 6.0Gb/s 3.5" Internal Hard Drive

https://www.newegg.com/red-pro-wd161kfgx-16tb/p/N82E16822234429
 
They all need software updates. If they don't phone home no updates. If the computer is off the net 100% of the time maybe this is okay. But if you're connecting your machine to the net even occasionally you'll want to google all the attacks on various NAS products. Every one I think depended on old unpatched systems.
I don't think that statement is accurate at all. They don't NEED software updates.

Correct me if I am wrong but the malware that specifically targets NAS devices either rely on a factor like a weak SMB password being set or having the NAS exposed to the internet so that the user can use it as their own personal cloud storage.
 
They all need software updates. If they don't phone home no updates. If the computer is off the net 100% of the time maybe this is okay. But if you're connecting your machine to the net even occasionally you'll want to google all the attacks on various NAS products. Every one I think depended on old unpatched systems.
I don't think that statement is accurate at all. They don't NEED software updates.

Correct me if I am wrong but the malware that specifically targets NAS devices either rely on a factor like a weak SMB password being set or having the NAS exposed to the internet so that the user can use it as their own personal cloud storage.
Most NAS devices are Linux based servers. Freenas was freebsd originally, and others were opensolaris, but same point applies. Vulnerabilities are continuously identified and closed with updates. The smaller the OS profile (package install count), the smaller the exposure, but the kernel is still a giant portion of them.

A NAS not exposed to the internet is still exposed to the windows desktops in the home network, so it's as safe as the behavior of those desktop users allow it to be.
 
yes I know that the NAS is out of date and (from what I've read) won't have future upgrades. (That's a plus for me!)
why is this a plus?
  • BTFRS file system, which is compatable with Linux
what's the attraction here?

btrfs has been in this "production ready RSN" for years. Seems to have lost its momentum. Redhat deprecated it 4 years ago.

For both zfs and btrfs, much of the value is lost with a single drive volume.

> the 16 TB red pro...how noisy is it?

at idle, it's fine, but even then it clicks too occasionally to me. Def better than the Exos, however. If you stick it away, doesn't matter, pick the cheaper one.
 
They all need software updates. If they don't phone home no updates. If the computer is off the net 100% of the time maybe this is okay. But if you're connecting your machine to the net even occasionally you'll want to google all the attacks on various NAS products. Every one I think depended on old unpatched systems.
I don't think that statement is accurate at all. They don't NEED software updates.

Correct me if I am wrong but the malware that specifically targets NAS devices either rely on a factor like a weak SMB password being set or having the NAS exposed to the internet so that the user can use it as their own personal cloud storage.
Most NAS devices are Linux based servers. Freenas was freebsd originally, and others were opensolaris, but same point applies. Vulnerabilities are continuously identified and closed with updates. The smaller the OS profile (package install count), the smaller the exposure, but the kernel is still a giant portion of them.

A NAS not exposed to the internet is still exposed to the windows desktops in the home network, so it's as safe as the behavior of those desktop users allow it to be.
I probably have a greater understanding of the security relating to Linux than you are aware of. Regardless if a box is running Linux or not, a vulnerability in the kernel does not automatically mean the device is vulnerable. There still needs to be an attack vector for that vulnerability to be exploited. CVE are constantly being identified and many of them do not grant RCE.....

Saying a non-internet facing NAS is as venerable as a desktop user allows it to be is a stupid statement. At the end of the day that is all security. Hence my previous comment about a weak SMB password.
 
I probably have a greater understanding of the security relating to Linux than you are aware of.
not when you say linux based devices don't need software updates.
Saying a non-internet facing NAS is as venerable as a desktop user allows it to be is a stupid statement.
see above.
I can pretty much guarantee that the majority of people in this thread do not keep all their Linux based devices fully patched and up to date. Case in point, routers. All SOHO routers that I know of run a reduced version of Linux and it is not common for people to update their router's firmware.

Obviously I can't know for certain because I do not everyone in the thread, but we can assume that general trends hold true. Therefore, if we assume this is true, by your logic everyone's networks are at critical risk of being compromised.......

Also, you didn't provide a reason for your argument, you just blindly said I was incorrect because I disagreed with you.

Your logic was that all NAS (unless air gapped) need to be updated due to protect against the various attacks that have occurred. I stated, this isn't accurate and never stated that it isn't good practice to keep your system up to date.

StealthWorker was known to target NAS devices by brute forcing accounts with weak passwords. So even if you did have an up to date system, if your password was weak and an internal computer was compromised you were at risk. Firmware update magic bullet: NO

https://www.trendmicro.com/en_us/re...-users-NAS-devices-from-evolving-threats.html Many more important things to do to secure your NAS before updating your firmware.

So while I agree that it is good practice, it is not the only thing that will protect your NAS and nor should it be the only thing you do. Well before updating your firmware, a user should follow many other best practices when it comes to security. The first and most basic thing is not exposing it to the internet unless this is a hard requirement of your use case.

By you over simplifying security of a NAS device to "NAS devices NEED firmware updates" for security while technically true, is very dangerous advise because those that are less tech savy will assume that they are secure because they conform to your false narrative.
 
I can pretty much guarantee that the majority of people in this thread do not keep all their Linux based devices fully patched and up to date. Case in point, routers. All SOHO routers that I know of run a reduced version of Linux and it is not common for people to update their router's firmware.
So before, you asserted that people who use good passwords and don't open their NAS up to WAN access are safe, but now you assert that most people don't maintain the router that keeps the LAN safely isolated.

This feels like an own goal, Colin. You're not making me change my assessment of your security knowledge.
Obviously I can't know for certain because I do not everyone in the thread, but we can assume that general trends hold true. Therefore, if we assume this is true, by your logic everyone's networks are at critical risk of being compromised.......
How did you jump from "lots of people never update their router firmware" to EVERYONE has vulnerable routers?
Also, you didn't provide a reason for your argument, you just blindly said I was incorrect because I disagreed with you.
Nah, I said that because you made a claim that is so obviously incorrect. Not patching is stupidly unsafe. And security is a multi layered approach. No one in the field would ever propose that having one good layer means you can completely ignore the others.

I have to explain to auditors from multiple regulatory organizations 3x/year how I protect customer data at my company. If I told them we don't need to patch because we have a good router in front and rotate passwords often, we'd lose our PCI and Fedramp certifications and lose a lot of business.
Your logic was that all NAS (unless air gapped) need to be updated due to protect against the various attacks that have occurred. I stated, this isn't accurate and never stated that it isn't good practice to keep your system up to date.
Maybe you should spend more time reading the CVEs....
StealthWorker was known to target NAS devices by brute forcing accounts with weak passwords. So even if you did have an up to date system, if your password was weak and an internal computer was compromised you were at risk. Firmware update magic bullet: NO
Definitely need to spend more time reading the various attacks on Syn/Qnap devices.

BTW, one of the changes that came with firmware updates is stricter password requirements.
https://www.trendmicro.com/en_us/re...-users-NAS-devices-from-evolving-threats.html Many more important things to do to secure your NAS before updating your firmware.

So while I agree that it is good practice, it is not the only thing that will protect your NAS and nor should it be the only thing you do. Well before updating your firmware, a user should follow many other best practices when it comes to security. The first and most basic thing is not exposing it to the internet unless this is a hard requirement of your use case.
Unless it's airgapped, it risks exposure to the internet when there are windows users in the network. THAT WAS THE ACTUAL STATEMENT I MADE. If you fall for a malware scheme and they gain control of your desktop, there are no longer any network protection for your NAS.
By you over simplifying security of a NAS device to "NAS devices NEED firmware updates" for security while technically true, is very dangerous advise because those that are less tech savy will assume that they are secure because they conform to your false narrative.
I don't have any empathy for idiots that create such a strawman. At least you seem to admit now that the need for patching is "technically true." Snort.
 
I can pretty much guarantee that the majority of people in this thread do not keep all their Linux based devices fully patched and up to date. Case in point, routers. All SOHO routers that I know of run a reduced version of Linux and it is not common for people to update their router's firmware.
So before, you asserted that people who use good passwords and don't open their NAS up to WAN access are safe, but now you assert that most people don't maintain the router that keeps the LAN safely isolated.

This feels like an own goal, Colin. You're not making me change my assessment of your security knowledge.
I couldn't locate where I ever said someone was safe. I would avoid making such a claim as it is impossible to achieve. What I believe is that good password hygiene and limiting the attack surface to an internal attack provides a greater security gain that just updating firmware hurr durr.
Obviously I can't know for certain because I do not everyone in the thread, but we can assume that general trends hold true. Therefore, if we assume this is true, by your logic everyone's networks are at critical risk of being compromised.......
How did you jump from "lots of people never update their router firmware" to EVERYONE has vulnerable routers?
I didn't make that jump, NickZ2016 did. Their logic was if your computer connects to the internet even occasionally then you need to make sure your NAS's firmware is patched else bad things can happen. Using that same logic, it is even worse if you don't patch your router (which many don't) because it is public facing.
Also, you didn't provide a reason for your argument, you just blindly said I was incorrect because I disagreed with you.
Nah, I said that because you made a claim that is so obviously incorrect. Not patching is stupidly unsafe. And security is a multi layered approach. No one in the field would ever propose that having one good layer means you can completely ignore the others.
I am not suggesting that at all. My original statement is that someone doesn't NEED to update their system. If it's kept internal to their home network (as the OPs would be) then it isn't the end of the world if they don't. Of course it is good practice but as you know security is a trade off with convivence and that may be a trade off the OP is willing to accept.
I have to explain to auditors from multiple regulatory organizations 3x/year how I protect customer data at my company. If I told them we don't need to patch because we have a good router in front and rotate passwords often, we'd lose our PCI and Fedramp certifications and lose a lot of business.
Completely different scenario. If you are working in that environment then I am sure you have many policies and procedures in place for all types of things. I am sure you have honeypots setup, a DMZ and multiple other security measures. Does that mean every single person should replicate this in their home environment?
Your logic was that all NAS (unless air gapped) need to be updated due to protect against the various attacks that have occurred. I stated, this isn't accurate and never stated that it isn't good practice to keep your system up to date.
Maybe you should spend more time reading the CVEs....
I admit when I wrote this I was confusing you with a different user in the thread.
StealthWorker was known to target NAS devices by brute forcing accounts with weak passwords. So even if you did have an up to date system, if your password was weak and an internal computer was compromised you were at risk. Firmware update magic bullet: NO
Definitely need to spend more time reading the various attacks on Syn/Qnap devices.
I was pointing out that when the other user stated that EVERY attack on a NAS depended on an unpatched system, that this wasn't correct.
BTW, one of the changes that came with firmware updates is stricter password requirements.
Sure the firmware update may have introduced a stricter password policy but this isn't a fix to the root of the problem, that is the type of user that is happy to employee weak passwords. Why do you think that security awareness training is an ongoing thing? Because regardless of the tech put in place the human is always a very weak link.
https://www.trendmicro.com/en_us/re...-users-NAS-devices-from-evolving-threats.html Many more important things to do to secure your NAS before updating your firmware.

So while I agree that it is good practice, it is not the only thing that will protect your NAS and nor should it be the only thing you do. Well before updating your firmware, a user should follow many other best practices when it comes to security. The first and most basic thing is not exposing it to the internet unless this is a hard requirement of your use case.
Unless it's airgapped, it risks exposure to the internet when there are windows users in the network. THAT WAS THE ACTUAL STATEMENT I MADE. If you fall for a malware scheme and they gain control of your desktop, there are no longer any network protection for your NAS.
True, but if someone gains control of your desktop and wants to attack your NAS then a firmware update is going to do little to protect you. Will it add some protection? Sure, possibly but it doesn't completely mitigate the risk.
By you over simplifying security of a NAS device to "NAS devices NEED firmware updates" for security while technically true, is very dangerous advise because those that are less tech savy will assume that they are secure because they conform to your false narrative.
I don't have any empathy for idiots that create such a strawman. At least you seem to admit now that the need for patching is "technically true." Snort.
No I do not agree there is a need for patching systems in every single situation. As mentioned previously, if coming at it from a security point of view then yes, it is good practice however, we often trade security away for convivence. You obviously have experience working with business so you must be aware that part of the way to handle risk is risk retention. And that's my whole point, if the user wants to retain risk then it's not the end of the world especially if the system is only internal facing.

You are not wrong that if an internal system is compromised then it is possible that the attacker can pivot towards the NAS but even if the NAS was fully updated, there is still that risk.
 
I am not suggesting that at all. My original statement is that someone doesn't NEED to update their system. If it's kept internal to their home network (as the OPs would be) then it isn't the end of the world if they don't. Of course it is good practice but as you know security is a trade off with convivence and that may be a trade off the OP is willing to accept.
So cutting out all of the other fluff and getting back to the core element....this is wrong, and a foolish trade-off choice to make. The evidence is far too abundant on the consequences of leaving their device stale.

One might get away with it using an obscure product rather than Syn/Qnap, but the script kiddie routines aren't just targeting those brands, they're targeting the vulns. And with nearly all of them using the same kernel, openssl, openssh, samba packages, that is the problem. I've been seeing a high rate of samba fixes with cvss scores over 7.
 
I probably have a greater understanding of the security relating to Linux than you are aware of.
not when you say linux based devices don't need software updates.
Saying a non-internet facing NAS is as venerable as a desktop user allows it to be is a stupid statement.
see above.
any device that needs updates, has an expiration date, since eventually it won't be supported

as a society, we need devices that can reliably work for 10-20-30-50+ years, overwise we're commited to "planned obselesence"

what is more secure...a modern refridgerator or a 50 year old refridgerator?

well the modern one comes with hidden microphones to listen to everything said and ship it off into the internet...and how long before that refridgerator "doesn't work so well anymore" and needs to be replaced?

https://arstechnica.com/tech-policy...tory-labeling-for-products-with-mics-cameras/
 
I am not suggesting that at all. My original statement is that someone doesn't NEED to update their system. If it's kept internal to their home network (as the OPs would be) then it isn't the end of the world if they don't. Of course it is good practice but as you know security is a trade off with convivence and that may be a trade off the OP is willing to accept.
So cutting out all of the other fluff and getting back to the core element....this is wrong, and a foolish trade-off choice to make. The evidence is far too abundant on the consequences of leaving their device stale.

One might get away with it using an obscure product rather than Syn/Qnap, but the script kiddie routines aren't just targeting those brands, they're targeting the vulns. And with nearly all of them using the same kernel, openssl, openssh, samba packages, that is the problem. I've been seeing a high rate of samba fixes with cvss scores over 7.
the main problem is software trying to do too much. And the fact that the industry profits thru constant updates

and now with the recent release of modern AI, the list of vulnerabilities has increased exponentially

I'm not even sure it's possible to "air-gap" any more.

what am I going to do?

I'm getting busy rewriting the world into old-school pdp-8e matrix basic. That was sweet! on a 12-bit word, only 4k memory, it time-shared 16 terminals each running interpreted basic doing matrix operations for the engineering students!

sweet!!
 
This thread has gotten too nasty. Locked.
 
Status
Not open for further replies.

Keyboard shortcuts

Back
Top