No video

Full Volume Encryption - The MOST Exciting Feature on Synology DSM 7.2

  Рет қаралды 21,357

SpaceRex

SpaceRex

Күн бұрын

Пікірлер: 82
@Ozwel
@Ozwel Жыл бұрын
We either need a TPM chip on the next Synology NAS or we need to manually mount the volume at boot with a password derivated key while the OS isn't encrypted to allow for a remote boot/reboot. That's that simple. @SpaceRex did you contact Synology to raise your concerns? I think your voice is worth thousands of support tickets to them :)
@char3tek
@char3tek 10 ай бұрын
Very excited that you did the challenge with a reward to find the exploit so you could give us a more informed opinion on it. Honestly, I was worried you weren't taking this stuff seriously enough for me to rely on you as much as I have been for my Synology edification. Huge kudos. This helped me a lot.
@SpaceRexWill
@SpaceRexWill 10 ай бұрын
Thanks man!
@TWARDOWSKY.
@TWARDOWSKY. 7 ай бұрын
Does soft reset also delete/flush keys for share folders?
@jbslv
@jbslv Жыл бұрын
I started the video with a "FINALLY!" , but soon became a "not yet". A solution is not hard for Synology to implement though and maybe there are already hacks from the CLI.
@courtcounselor
@courtcounselor Жыл бұрын
Nothing as awesome as your shirt. Definitely my favorite so far.
@thecaribbean8615
@thecaribbean8615 10 ай бұрын
If Synology included the latest TPM, all would work fine.
@droneforfun5384
@droneforfun5384 11 ай бұрын
Hi Will! If using a NAS for remote backup in hyperbackup, would you rather go for ”encrypt backup file” in hbk, or make a full volume encryption on the backup nas? Thanks
@elg3la
@elg3la Жыл бұрын
Is there a guide on how to migrate my existing volumes so I can do a fully encrypted volume?
@markvos2565
@markvos2565 5 ай бұрын
Why not simply export the key to a USB drive rather than store it on the Synology? Achieves two things. The key is then never stored on the Synology, and it also means that you have to enter the USB drive plus password to mount the encrypted volume on boot up every time. Otherwise, encrypting the volume and having it automatically mount on boot up is fairly useless if physical theft is involved. Let me be more specific in the steps: 1. Export the Encryption Key: When you set up volume encryption on your Synology NAS, you'll be given the option to download or export the encryption key. Save this key to a USB drive instead of storing it directly on the NAS or any network location. 2. Use the USB Drive to Mount the Encrypted Volume: (a) After a system reboot or when the encrypted volume is unmounted, you'll need the encryption key to mount the volume again. (b) Connect the USB drive to a computer or the NAS (if it has USB ports and supports this functionality). (c) Through the DSM interface, navigate to the section where you mount the encrypted volume. You'll be prompted to provide the encryption key. (d) Select the encryption key file from the USB drive. This process is similar to entering a password, as it requires physical possession of the USB drive to access the encrypted data. 3. Enhancing Security: Keeping the encryption key on a USB drive and physically separate from the NAS adds a layer of security. It ensures that even if the NAS is stolen or accessed by unauthorised individuals, they cannot mount the encrypted volume without also having the USB drive. 4. Best Practices: (a) Keep the USB drive in a secure, accessible location to ensure you can easily mount the encrypted volume when needed. (b) Consider making multiple copies of the encryption key and storing them in different secure locations to prevent loss. (c) Regularly test the USB drive and the backup copies of the encryption key to ensure they are not corrupted. This method combines the convenience of having a "physical key" with the robust encryption capabilities of the Synology NAS, offering a good balance between security and usability for accessing encrypted volumes.
@Noobcake-mm3vd
@Noobcake-mm3vd 5 ай бұрын
I think you missed the point that there is no way to unmount the encrypted volume with Synology NAS other than the soft reset mentioned in this video. Unless you have a 2nd NAS and make use of KMIP, the key will always be stored on the NAS without question. Placing the recovery key on a USB drive does not change the fact that the key always remains on the NAS itself unless a soft reset is performed. Only a soft reset clears the key from the vault (which in turn unmounts the volume at next restart). At that point, you could then use your recovery key (stored on USB drive or wherever) to decrypt the volume manually. But as Rex said in his video, this is a pretty clunky method because you have to essentially break the vault stored on the NAS (i.e. not repair the vault).
@24killen
@24killen Жыл бұрын
What happens if for example the motherboard on the NAS dies and I need to replace the NAS with a new one. If my volume is encrypted with full volume encryption, can I restore it from the new NAS without needing the old one as long as I have the key and the drives of course. Or is it tied to any hardware key as well?
@kiddy1kiddo270
@kiddy1kiddo270 9 ай бұрын
To prevent auto mount on startup, I think it is possible to deselect the "Enable Encryption Key Vault" under "Global Settings". This will require that you activate the encrypted volumes manually upon restart without the need to reset the NAS. Worth to try.
@lerlerler1
@lerlerler1 6 ай бұрын
Thank you so much for this video. You saved me so much time and nerves.
@maggusm86
@maggusm86 Жыл бұрын
Your video tutorial is great! However, I am very disappointed that there is no possibility to manually mount the volume without having the keys stored on the Synology NAS. And I don't want to use a KMIP server. Just download the encryption key, save it in the preferred password vault and manually mount the volumes on each NAS startup. It could be that simple. And I guess this would be the preferred way for at least 25% of all Synology users: It would be the preferred way for all enterprise levels and for all sensitive data levels.
@supernumex
@supernumex Жыл бұрын
It would be cool if they supported using hardware security keys with the usb port. So basically a 2FA rather than the encryption key stored in a usb stick. this way you could even use the same admin login + the security key. Then you could register multiple security keys. I don't know of the security implications of this, though.
@DarkSider667
@DarkSider667 Жыл бұрын
Thanks for the video. While the facts are correct, I highly disagree with the statement that decrypt on boot is ok for most usecases. If a person does break into your home, they either are after your data or just your hardware. In the first case expect them to have the expertise to decrypt the data with the current implementation. Usually users want to protect their data from LEA and other officials - usually those institutions are capable to recover the keys stored for „unlock on boot“. The only secure way is to have a password (and maybe a second token) required AFTER boot.
@jlimozin
@jlimozin Жыл бұрын
Volume encryption is designed to protect from theft, as you mention. But... What if someone robs the whole unit, and simply boots it? the volume will be automatically mounted, and shares will happily share the data, and the thief can mount them and read the data. What's the point of encryption if the unit automatically mounts the volume at boot?
@AlexDraconian
@AlexDraconian Жыл бұрын
Theft still have to know username and password unless they have some exploit to access files. Theft can't directly read from HDD and that's the point of NAS encryption.
@supernumex
@supernumex Жыл бұрын
I think you'd still need the an account password to log in to the web portal to access the files. Also things like SMB shares can require a password for authentication.
@mealloc
@mealloc Жыл бұрын
Yeah it pretty much defeat the entire purpose. The Synology for home users is in a small form factor, thieves will steal the entire unit, they won't steal individual drives. The key should never live on the drives, an decryption key should be entered by hand on every boot or loaded via USB. On Windows BitLocker also automatically decrypt and remount the drives but at least you can use groupPolicies to force a pin on boot instead of letting it decrypt automatically.
@Ozwel
@Ozwel Жыл бұрын
@@supernumex I second that. Yes it will be decrypted and the key will be in the RAM, but you still need a user account with the right rights to access the shared folders through SMB or anything else to access the data. As Rex says, there is still a way to find the key and access the files without a user account but it requires some skills most thieves haven't. Yet, in the case my NAS is stolen I will never be 100% sure the thief won't access my files. There is small chance but it's still a chance. As for the police, they will easily access the key with their IT guys so it's not a protection against them if you store "sensitive" files.
@redheelerdog
@redheelerdog Жыл бұрын
What are your thoughts using FVE and Yubikey 2FA? In your video you mentioned using a hardware key, USB, etc. for another layer of protection. I am currently using a Yubikey for 2FA access for both of my NAS devices and I feel it is very secure along with a STRONG password. Thanks for a great summary of Synology FVE 😊
@Ozwel
@Ozwel Жыл бұрын
Hi, I'm not Rex but I'm a security engineer. Yubikeys or 2FA will not prevent at all to find your key on the hard drives while it's running and mounted. Yubikeys will only add some protection to the authentication layer but won't add anything to the encryption layer. At this time the only protection you will find is to make sure the volume isn't automatically mounted at boot and you have to enter the key manually so that when the police or a thief will come and get your NAS and shut down the NAS to take it to another place they won't be able to "scan" the RAM or the hard drives for the key.
@theterriblegamer1228
@theterriblegamer1228 Жыл бұрын
I have a RS1619xs+. Updated to the new DSM 7.2 and the Encrypt option does not display when creating volume. any ideas?
@TWARDOWSKY.
@TWARDOWSKY. 7 ай бұрын
Does soft reset also delete/flush keys for share folders?
@user-um3ul9lk1d
@user-um3ul9lk1d Жыл бұрын
It seems that it is not possible to encrypt existing volume. Can you help with some video instructions how to create new encrypted volume if we have one unencrypted and MIGRATE all data to new one. Thanks in advance.
@BikeGremlinUS
@BikeGremlinUS Жыл бұрын
So... one of the leading NAS manufacturers has made full volume encryption but implemented it by storing the key on the very device that is encrypted. Was that designed and approved by people with zero imagination? Positive thoughts only - LOL. I was hoping they've made an out-of-the-box simple solution for securing your data (even in case of the whole device theft).
@robo7464
@robo7464 Жыл бұрын
I love your investigation and your comments on how people would like to have it used. Just to allow self-improvement: the information would be far better consumed if you didn't repeated same items soooooo often. Telling something in 2 different ways and maybe at the end as wrap-up is more than enough. While trying to be very clear you're overdoing it and it's becoming more difficult for listeners to keep following you.
@unoblaster
@unoblaster 10 ай бұрын
i always enjoy your videos and you really know what you are talking about. i second you on the point where you mentioned that the lack of option to NOT mount volume encryption on restart (the same way it does when sof reseting) when its not mounted there.. so how hard could that be to have that behaviour as an option :) From security point of view.. poweroutage isnt normaly happening on company NAS if you have secret information usage on it... so to auto mount on restart is a really a BIG NO.
@outforbeer
@outforbeer 27 күн бұрын
Example. I have 1 storage pool of SHR with two volumes. Volume 1 - no encryption. Volume 2 - encryption. Do I have to worry about the encryption volume having a disk failure and not being able to get the encryption repaired
@iamagi
@iamagi 7 ай бұрын
I likely am missing something, if the volumes are automatically decrypted on a reboot how is this a protection att all? if the power is cut does this make a difference? A smart actor (with time, i.e Law enforcement) will likely not power it of so I would rely on security via www, samba, ssh etc. I assume i can run a key server on my encrypted computer in a VM in a vera crypt container that I only boot when needed. An episode to hardening the NAS would be internering.
@newsmansuper2925
@newsmansuper2925 Жыл бұрын
really finaly - this is the main reason I would buy QNAP. I will wait a bit though until its stable. Also qnap can encypt usb drive.
@k-box.stream
@k-box.stream 3 ай бұрын
I love you Will. Your videos about Synology NAS are the best out there. Keep bringing new content please!
@DavidMaciasPhoto
@DavidMaciasPhoto 2 ай бұрын
Hi Will, I set this up in the Global Settings as you suggested however, I didn't get an encryption key to download. Where can I download it so I can save it. Also, my volume does not show being encrypted. Oh, when I created my initial setup, I used the MAX volume available, so can that be encrypted? Thanks in advance for your response.
@xellaz
@xellaz Жыл бұрын
Anorher great Synology NAS video! I'm interested though how you will repair a full encrypted volume if one of the drives fails and how long will it take. I'm worried that if I have a full encrypted volume and one of the drives fails and I have to replace it, the whole encrypted volume may get corrupted during repair resulting in me loosing all my data. 😬
@megandavidson1357
@megandavidson1357 8 ай бұрын
Hi, love the channel and it's been super helpful, nice and clear :) I've recently bought a DS423+ with currently 2 drives (about to add another 2 more drives). At the time I never enabled full volume encryption, it's not clear from the UI or their help docs as to whether if I enabled this once I have data already on the drives that it won't wipe the data already on there to encrypt it? I'm guessing like other implementations for example FileVault on the Mac, it allows you to encrypt the drives at a later date without losing the data? I'm backing up using HyperBack Up to S3 compatible "cloud" storage, but if it doesn't then I will also be getting an external drive for easier backups.
@pitchayach9480
@pitchayach9480 5 ай бұрын
I reset my NAS synology DS923+ and deleted encrypted volume File now it warning Volume Critical and I can not assess to any folders or file what should i do?...
@hooman008
@hooman008 Жыл бұрын
Hello, would you please make a video on why the synology is not hibernating ? I am a home user and my nas is connected to wifi, but it keep spining the discks even if i dont use it for days at times, its really annoying cause of the noise and the power usage , what seetings should i check and what can i do about it ? Im on ds411j and ds412+ , thank you in advance
@leexgx
@leexgx Жыл бұрын
Unless you unplug the network cable basic os operations is likely to keep the drives active
@stever6252
@stever6252 Жыл бұрын
Time to look at alternatives to Synology? I have used Synology since CS406e and for the last 18 years, still seem to be waiting for Synology to catch up on the options needed to make it a practical solution. DSM 7.2 looks great, but the full volume encryption isn't secure, an almost there solution. Repication - to have 2 systems each in geographically different offices but synced - limitations on numbers of files etc. makes it unusable. Great to run as a server, but my 920+ can't power much more than windows in a virtual environment. Just reset my 918+ to use the full volume encrypt - but that ones not supported - erased that for nothing (Where was that mentioned in bold! Bet I'm not the only one not realising that until after the system has been erased! 2FA - great, but I can't see how I can use Microsofts or Googles Authenticators, need to add another propriatory app.... For some reason I still love Synology, but there are just so many small limitations that add up to - just use it as a standard NAS and don't try anything advanced and you'll be OK. Just hurts to keep paying the advanced cash for what ends up as basic usecase....
@sylvainHZT
@sylvainHZT Жыл бұрын
Think i'll stick for a while to shared folder encryption. As i remember, in case a reset happens, the key is flushed from the key manager. I'm ok with the performances of encrypted volumes though.
@SpaceRexWill
@SpaceRexWill Жыл бұрын
So volume encryption also flushes the key. But anytime you have the key in the key manager, someone can exploit it to get the key
@sylvainHZT
@sylvainHZT Жыл бұрын
@@SpaceRexWill Ah ok, go it ! Thanks for the clarification.
@reinaldy2615
@reinaldy2615 Жыл бұрын
Worm shared folder, cannot be selected in synology drive admin, please help, how to add the worm folder
@guillaumegirod8043
@guillaumegirod8043 5 ай бұрын
Thanks for the video :) Does it affact performance ?
@alanjohnson7374
@alanjohnson7374 4 ай бұрын
I'm not sure advertising to the internet that you hold your clients encryption keys is a good security move.
@kateydrummer
@kateydrummer 2 ай бұрын
Hi, I am trying to find the answer... If I encrypt a Volume does it mean that I will not be able to open this Disc and the Volume on a different Synology if mine fails? I also do not know how to check if my existing Volume is encrypted (I cannot remember what I set up).
@mattmaas5790
@mattmaas5790 2 ай бұрын
Ask chat gpt I think
@jaredm5510
@jaredm5510 6 ай бұрын
Great video, one question. I had to soft reset our DS1522 and then I found out I did not have the recovery key anymore. Is there any hope for me getting the data back?
@henningsplace
@henningsplace 8 ай бұрын
So, I haven't understood whether the following method is available: after reboot, log in from remote, enter password to unlock the pool, done? In other words, is it possible to have a user-defined password rather than a keyfile to unlock a volume or pool?
@alozborne
@alozborne Жыл бұрын
With full volume encryption enabled, when I configure a Hyper Backup job to backup to an Azure blob storage account, DSM 7.2 warns that the encrypted volume needs to be unlocked before running the backup. Is this accurate?
@the_tux
@the_tux 7 ай бұрын
Seriously by saving the encryption key on the disk is like putting the key of your car into a secret place in your garage right next to it. That's simply not how you implement it right but just security by obscurity. Qnap can do it the way it's done right - so why not Synology?
@TheJoaolyraaraujo
@TheJoaolyraaraujo Жыл бұрын
I wish there’s is option to not auto mount
@Learningwhileonline
@Learningwhileonline 8 ай бұрын
Do you know if you encrypt the Nas during setup, can you un-encrypt it, and just start over?
@matador7013
@matador7013 Жыл бұрын
Can you create encrypted shared folder on an encrypted volume? Encryption on top of encryption. Is this possible? The only reason I would attempt to encrypt a volume is to be able to have the WORM share folder natively encrypted since at the folder level it is not possible.
@fabioamado6725
@fabioamado6725 Жыл бұрын
Regarding to encryption: can I change the key or the password after creating the volume? How to proceed if the key or password gets compromised? Can it be changed? And regarding to the key, if I select keeping it in the nas, can I change this later? Do I have to generate a new one, if it’s possible? Thank you. 😅
@Nick0n
@Nick0n Жыл бұрын
Wait... So the system itself is not encrypted, right? Only the volumes, not the HDDs? So if you keep your data in Syno's key manager, then it is not protected at all and is fully hackable while mounted somewhere even outside the Synology? I thought they will provide full system encryption with 7.2... Current solution is sooo disappointing. Best solution so far is using encrypted folders... Or I'm missing something?
@FreestylerAlbert
@FreestylerAlbert Жыл бұрын
So basically 2 reason I can't use Full encryption: It's not safe enough for PII data. And you can't convert an existion volume to encrypted, you need to create a new one. :( Freakin synology....
@erice5025
@erice5025 Жыл бұрын
Thanks
@Fun-me3cx
@Fun-me3cx Жыл бұрын
Does that mean a stolen encrypted Synology Nas start freely sharing the shared fodlers through ethernet as soon as booted?
@marklewus5468
@marklewus5468 Жыл бұрын
Great video, but I think you meant KMIP server, not KIMP server, yes?
@SpaceRexWill
@SpaceRexWill Жыл бұрын
haha yes, I flipped it a couple of times
@someuser4166
@someuser4166 Жыл бұрын
I just got me a 40tb synology nas but I have like 20tb worth of files on my pc. What's the fastest way to get them onto the NAS?
@SpaceRexWill
@SpaceRexWill Жыл бұрын
If you have them on an ExFAT drive you can just plug that into a USB port and copy via DSM
@tamingilman7281
@tamingilman7281 Жыл бұрын
It seems Synology has blocked the ability to use a 3rd party KMIP server and requires another Synology to be the KMIP server. I have an existing AKeyless KMIP server on my network that I use with my VMWare infrastructure already and the Synology will not play nicely with it. Severely disappointed with this limitation. Enterprise customers looking at Synology and volume encryption will be disappointed. If anyone gets a Synology talking to a 3rd part KMIP please post!
@EuroPC4711
@EuroPC4711 Жыл бұрын
I think, I’ll give it a try. Only thing is, that I have to wipe my NAS and make a full new install. Is there a smarter way? I thought about making hyper Backup of my apps, especially docker, where by now some containers reside, setting up the NAS as if it’s new and then restore hyper backuped data. I only own d ds1621+ and a ds220+, not enough for testing.
@supernumex
@supernumex Жыл бұрын
My solution is to save up and buy a new nas lol.
@EuroPC4711
@EuroPC4711 Жыл бұрын
@@supernumex thx. Great idea. Lol.
@Ivan_1986
@Ivan_1986 Жыл бұрын
So if a full volume encryption can be overcome if Synology is stolen… Hmm - how safe is it really? If somebody offered you a method to get through the encryption if Synology is stolen - for sure bad actors would be able to buy the solution on the dark web and thus access any Synology NAS that they are after. And that, basically, hardly makes it secure in case of a physical theft. Sounds like a Windows login password on a non-encrypted hard drive, where by simply taking out the drive and placing it into an external case - you can get to all the data straight away. It is clear that the case with Synology Full Volume Encryption it not as easy… but it does not sound like it is really hard either.
@xellaz
@xellaz Жыл бұрын
Synology should really just give users the option to choose where the keys are installed and not automatically in the NAS itself for encrypted volumes. I get it that it's for convenience but they should give their users more credit on knowing what they want from their NAS'es. 😩
@justinknash
@justinknash Жыл бұрын
How can I migrate? I have one share that is encrypted and all the rest of my shares are non-encrypted. I have hyper backup going to Backblaze, can I just delete the root volume, re-create it with full-volume encryption and then import the Backblaze hyper backup? Would love to see a video on this.
@pincombe
@pincombe Жыл бұрын
depends how much data you have and how long you can deal with the data being unavailable. If you data size is small enough then it might be easier to copy the data to another NAS / external drive. Backblaze and Amazon have the ability to hire large ones which could be used for the purpose. Otherwise as you suggested you could upload everything to Backblaze and then redownload it but it could be expensive to do.
@justinknash
@justinknash Жыл бұрын
@@pincombe It’s like 1.5 TB so nothing crazy.
@newsmansuper2925
@newsmansuper2925 Жыл бұрын
but whats the advantage to an encrypted folder?
@droneforfun5384
@droneforfun5384 11 ай бұрын
Will is covering this in the intro of the video 👍👍
@jonathanmariscal6969
@jonathanmariscal6969 Жыл бұрын
DSM 7.2 does not support the Itunes server.
@johnmccurdy1251
@johnmccurdy1251 Жыл бұрын
@SpaceRexWill Unless I have misunderstood, you CAN now directly restore snapshots of an encrypted folder on DSM 7.2. I just did it. You have to unmount the encrypted folder first, but there is an option in the Recovery Actions to "Restore to this snapshot" which now works on encrypted folders. Is this new recently, as you seem to say this is not possible? You still cannot browse an encrypted snapshot, or make it visible for users, but you can certainly restore encrypted shared folder snapshots without making a clone. I'd be interested in your feed back on this.
@acdmonteiro
@acdmonteiro 10 ай бұрын
What a piece of garbage of a solution. I will keep using Veracrypt and store the file on my NAS. Doubt anyone will hack that...
@pgotze
@pgotze Жыл бұрын
Its really that simple to get full access to whole NAS, just to make soft reset?
@SpaceRexWill
@SpaceRexWill Жыл бұрын
Yes, if you want to disable that you can select 'leave admin password unchanged' in DSM settings
@pgotze
@pgotze Жыл бұрын
@@SpaceRexWill And its related to only that default "admin" user account or somehow to all accounts with administration permissions? Generally, default accounts like "admin" i dont use, i have them all deactivated.
COMPLETE BEGINNER’S GUIDE for Synology NAS - 2023 DSM 7.2
46:08
Ransomware Protection: The Complete Guide for Synology NAS
37:22
❌Разве такое возможно? #story
01:00
Кэри Найс
Рет қаралды 2,2 МЛН
SCHOOLBOY. Последняя часть🤓
00:15
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 13 МЛН
Pool Bed Prank By My Grandpa 😂 #funny
00:47
SKITS
Рет қаралды 20 МЛН
The NAS That Permanently Changed My Privacy Life
15:26
Techlore
Рет қаралды 28 М.
TOP 6 Synology MISTAKES New Users Make
16:19
SpaceRex
Рет қаралды 52 М.
EVERY Synology Feature Explained
36:09
SpaceRex
Рет қаралды 71 М.
My Synology NAS was ATTACKED!
8:01
WunderTech
Рет қаралды 49 М.
Which RAID Type Should You Use on your Synology NAS?
13:51
WunderTech
Рет қаралды 8 М.
Why every iPhone user needs a Synology
8:40
The Apple Circle
Рет қаралды 355 М.
Synology DS923+ NAS... 12 Months Later - Still Worth it?
16:22
NASCompares
Рет қаралды 54 М.
Synology DSM 7.2 Review - Should You Buy?
1:00:26
NASCompares
Рет қаралды 18 М.
❌Разве такое возможно? #story
01:00
Кэри Найс
Рет қаралды 2,2 МЛН