TrueNAS shifts, at least from a SOHO/Workgroup perspective very desirably so, ever more from a pure local storage NAS to a NAS/Virtualization platform: Containers, Docker, VM.
With that however comes the need to manage things from the internet, because for as long as the NAS is just local storage, I can literally turn it off when I travel. But when it starts providing services, it needs to be up and maintained no matter where I am. Further, many of the services offered need to be exposed to the internet, be that Paperless NGX, Nextcloud, etc.
As of now, my NAS isn’t in production, still just toying around with it (waiting for some 26.04 critical bugs to be fixed). And already I get messages like these:
Warning
631 SSH login failures in the last 24 hours
New features like web sharing etc. will when properly used expose even more attack surface.
Now, I’m not advocating turning TrueNAS into a full-on firewall, but just like Apple presumes that Macs are used behind a firewall, and still has a software firewall in the OS that’s active, so I think some simple to use, basic firewall functionality is missing (or if it’s there, I can’t find it), because even if we for the moment assume, the LAN is protected by an ironclad firewall, attacks from the LAN side aren’t excluded: someone hacks into the WiFi, there are guests, employee/teenage kid feels adventurous and wants to see “what boss/daddy is hiding”, etc. So it seems the assumption that: it’s supposed to be behind a firewall and that’s enough will increasingly stop being applicable, the more things operate on the system beyond basic storage services.
Something like Fail2Ban, while not solving all problems, significantly slows down and locks out the vast majority of scripted/brute force attacks, and it’s optionally built into some services like Nextcloud and Stewart mailserver, so these people have recognized that just being behind a firewall doesn’t cut it.
How do people secure their systems that have/need services exposed to the public internet?