Why do you say that? Why can’t you put your HTTPS port on the WAN so you can share files directly? Using the SmartShare service is admittedly more secure, but it only runs through QNAP’s servers in Taiwan and is quite slow.
Seems like if you have a strong password, exposing the HTTPS port should be OK particularly if you make it an oddball port number (ie: not 443 or similar)…
So the QNAP runs with its user login on port 8081. If you just attempt to use the my-site.no, then your browser is attempting to go to port 80. There’s no way using browsers and DNS to map a port other than 80 to the straight domain name (ie: my-stie.no).
Not exposing your NAS to the web is the conventional wisdom. However, I have done it for years with now 7 NAS’s and never had an issue. It is faster and less complicated. Be aware; you must 1.disable the admin account. 2. enforce long complex passwords (Caps, smalls, numbers, and special characters. at least 12 long). 3.use weird ports. Also, 2FA would give further security. People will try to break in (one guy tried over 3000 times in one day, but he never even guessed one correct user name much less their password. In the last year, hardly any attemps since the old vulnerabilities were fixed. Hackers have figured out QNAP NAS’s are no longer fertile ground. I have this message on my log in screen: If you are trying to hack me, you are wasting time! Admin account disabled. You have to guess user + password + beat 2FA
It’s not OK. QNAP service authentication has traditionally been circumvented entirely (hackers crash the authentication service with malformed requests, then have access to whatever they want).
HTTPS doesn’t prevent hacking attempts. That’s not its job.
Changing the port number is irrelevant. Hackers can easily scan all ports.
QNAP decided to write their own software to do something that could already be done with tried-and-tested software.
Their track record with security hasn’t been good. It may have improved since the last ransomware outbreak, but those affected by hacks and those of us who helped deal with the aftermath are now reluctant to trust it.
Yowza! What a mess. I knew there had been security issues in the past related to QNAP devices but thought a lot of those had been solved. Hopefully, they have begun to plug a lot of those holes. Has there been any incidents since this last one? I can now see and understand the advice!
I didn’t read all 174 pages of posts (read about 10 or 11). What was finally determined as the attack vector?
The recent ones are either not significant or not wth QTS. The ones that caused issues were fixed a long time ago. Also, QNAP now takes great care to avoid these issues. Security Advisories | QNAP (US)