Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Many alligators will be slain, but the swamp will remain.


computers / alt.comp.hardware.pc-homebuilt / Re: How does Synology BTRFS file format prevent ransomware again?

SubjectAuthor
* How does Synology BTRFS file format prevent ransomware again?RayLopez99
`* Re: How does Synology BTRFS file format prevent ransomware again?Paul
 +- Re: How does Synology BTRFS file format prevent ransomware again?RayLopez99
 `* Re: How does Synology BTRFS file format prevent ransomware again?RayLopez99
  `* Re: How does Synology BTRFS file format prevent ransomware again?Paul
   `- Re: How does Synology BTRFS file format prevent ransomware again?RayLopez99

1
How does Synology BTRFS file format prevent ransomware again?

<4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=828&group=alt.comp.hardware.pc-homebuilt#828

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
X-Received: by 2002:a5d:594b:0:b0:21a:7a2:4aed with SMTP id e11-20020a5d594b000000b0021a07a24aedmr6832138wri.231.1655420057014;
Thu, 16 Jun 2022 15:54:17 -0700 (PDT)
X-Received: by 2002:a81:f41:0:b0:313:4d6c:49db with SMTP id
62-20020a810f41000000b003134d6c49dbmr8345316ywp.384.1655420056128; Thu, 16
Jun 2022 15:54:16 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.128.87.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: alt.comp.hardware.pc-homebuilt
Date: Thu, 16 Jun 2022 15:54:15 -0700 (PDT)
Injection-Info: google-groups.googlegroups.com; posting-host=74.96.155.214; posting-account=fRZa_AkAAACE3nlFA9zM1Eq00OKq1Ycq
NNTP-Posting-Host: 74.96.155.214
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>
Subject: How does Synology BTRFS file format prevent ransomware again?
From: raylope...@gmail.com (RayLopez99)
Injection-Date: Thu, 16 Jun 2022 22:54:17 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: RayLopez99 - Thu, 16 Jun 2022 22:54 UTC

I have a Synology NAS and am learning it. Somewhere I briefly read that it is used to combat ransomware, since it has a file format "BTRFS" that's somehow immune (that was the implication).

But I can't figure it out.

From what I can tell, if you want to backup your Windows PC: 1) you set up a shared drive on the NAS in your local area network and then backup to it, using BTRFS file format on the NAS 2) you don't map the shared drive (i..e., it cannot be seen from your PC, this is a security safeguard) but instead you log into the shared drive using your browser 3) you use the Synology backup tools like Hyper Backup to backup 4) you keep the files (on the NAS) in the format "btrfs" 5) you use incremental backups and "snapshots" to take snapshots of your PC hard drive, with the snapshots rotating (data retention policy) of X times before overwrite.

Now your PC is infected with ransomware or a virus. However, somehow (it's not clear) the NAS has pristine copies of your PC (the snapshot) that you can use, after of course wiping clean your infected machine of malware/viruses, to log into the NAS shared drive, and restore.

Why is this foolproof? I guess it's because the ransomware cannot "see" the shared drive? Or is the BTRFS file format somehow immune to encryption?

Re: How does Synology BTRFS file format prevent ransomware again?

<t8gee4$3d0$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=829&group=alt.comp.hardware.pc-homebuilt#829

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nos...@needed.invalid (Paul)
Newsgroups: alt.comp.hardware.pc-homebuilt
Subject: Re: How does Synology BTRFS file format prevent ransomware again?
Date: Thu, 16 Jun 2022 19:30:12 -0400
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <t8gee4$3d0$1@dont-email.me>
References: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 16 Jun 2022 23:30:12 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="4e4f7fec0d5333d45bd6493d0f77c194";
logging-data="3488"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1820pBeI1LjCeWlFXuY5OFLM2kYCES4EfY="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:AJzW4Q7Hj3Pm8QC+pvmbmAKLZ/I=
In-Reply-To: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>
Content-Language: en-US
 by: Paul - Thu, 16 Jun 2022 23:30 UTC

On 6/16/2022 6:54 PM, RayLopez99 wrote:
> I have a Synology NAS and am learning it. Somewhere I briefly read that it is used to combat ransomware, since it has a file format "BTRFS" that's somehow immune (that was the implication).
>
> But I can't figure it out.
>
> From what I can tell, if you want to backup your Windows PC: 1) you set up a shared drive on the NAS in your local area network and then backup to it, using BTRFS file format on the NAS 2) you don't map the shared drive (i.e., it cannot be seen from your PC, this is a security safeguard) but instead you log into the shared drive using your browser 3) you use the Synology backup tools like Hyper Backup to backup 4) you keep the files (on the NAS) in the format "btrfs" 5) you use incremental backups and "snapshots" to take snapshots of your PC hard drive, with the snapshots rotating (data retention policy) of X times before overwrite.
>
> Now your PC is infected with ransomware or a virus. However, somehow (it's not clear) the NAS has pristine copies of your PC (the snapshot) that you can use, after of course wiping clean your infected machine of malware/viruses, to log into the NAS shared drive, and restore.
>
> Why is this foolproof? I guess it's because the ransomware cannot "see" the shared drive? Or is the BTRFS file format somehow immune to encryption?
>

Overhearing the conversation in a Linux group, BTRFS can make
snapshots very quickly, In the same way that Windows has VSS.
With Windows, there is a ten second quiescence period before
the snapshot is made.

I don't really know if that's much of a feature. In the sense
that if the NAS has any exploits the malware knows, it can just
climb on board the NAS OS and do whatever it wants.

The notion of a snapshot only makes sense if the device is
a "fortress" and is "impenetrable". And the typical home computer
room has none of that. Just about everything you own, has exploits.

That's why, unless you have offline backups and the offline backups
do not contain a "sleeping ransomware", you really don't have much
of anything to rely on.

One person in another group, fell for a phishing email, double-clicked
an attachment that claimed to be an invoice, the entire computer
room was wiped out by ransomware. It took months to reinstall stuff,
because his backup situation wasn't very good. Just like me,
he didn't know which license key belonged to which machine :-)

I don't know how everything in the computing world works, but
my assumption is, the things we use are going to fail, rather than
succeed. If you hire people to make backups every day, you might
get a little closer to building a survivable computer room.
Just because you set a schedule in Macrium and let it run,
does not mean on a given day when the room is attacked,
that you actually have a good backup in hand. Back when I had
RAM trouble on a machine here, testing several backups on
that machine indicated the backup was corrupt. The proper handling
of backups can be a full time job for someone.

Paul

Re: How does Synology BTRFS file format prevent ransomware again?

<a2df2069-f104-4162-8956-51631fe810a7n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=833&group=alt.comp.hardware.pc-homebuilt#833

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
X-Received: by 2002:a05:600c:3493:b0:39c:8731:84c3 with SMTP id a19-20020a05600c349300b0039c873184c3mr29453110wmq.45.1655626986982;
Sun, 19 Jun 2022 01:23:06 -0700 (PDT)
X-Received: by 2002:a25:1c83:0:b0:660:4a0f:fa56 with SMTP id
c125-20020a251c83000000b006604a0ffa56mr19759986ybc.297.1655626986413; Sun, 19
Jun 2022 01:23:06 -0700 (PDT)
Path: i2pn2.org!i2pn.org!aioe.org!news.mixmin.net!proxad.net!feeder1-2.proxad.net!209.85.128.87.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: alt.comp.hardware.pc-homebuilt
Date: Sun, 19 Jun 2022 01:23:06 -0700 (PDT)
In-Reply-To: <t8gee4$3d0$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=74.96.155.214; posting-account=fRZa_AkAAACE3nlFA9zM1Eq00OKq1Ycq
NNTP-Posting-Host: 74.96.155.214
References: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com> <t8gee4$3d0$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <a2df2069-f104-4162-8956-51631fe810a7n@googlegroups.com>
Subject: Re: How does Synology BTRFS file format prevent ransomware again?
From: raylope...@gmail.com (RayLopez99)
Injection-Date: Sun, 19 Jun 2022 08:23:06 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: RayLopez99 - Sun, 19 Jun 2022 08:23 UTC

On Thursday, June 16, 2022 at 7:30:16 PM UTC-4, Paul wrote:
> On 6/16/2022 6:54 PM, RayLopez99 wrote:
> > I have a Synology NAS and am learning it. Somewhere I briefly read that it is used to combat ransomware, since it has a file format "BTRFS" that's somehow immune (that was the implication).
> >
> > But I can't figure it out.
> >
> > From what I can tell, if you want to backup your Windows PC: 1) you set up a shared drive on the NAS in your local area network and then backup to it, using BTRFS file format on the NAS 2) you don't map the shared drive (i.e., it cannot be seen from your PC, this is a security safeguard) but instead you log into the shared drive using your browser 3) you use the Synology backup tools like Hyper Backup to backup 4) you keep the files (on the NAS) in the format "btrfs" 5) you use incremental backups and "snapshots" to take snapshots of your PC hard drive, with the snapshots rotating (data retention policy) of X times before overwrite.
> >
> > Now your PC is infected with ransomware or a virus. However, somehow (it's not clear) the NAS has pristine copies of your PC (the snapshot) that you can use, after of course wiping clean your infected machine of malware/viruses, to log into the NAS shared drive, and restore.
> >
> > Why is this foolproof? I guess it's because the ransomware cannot "see" the shared drive? Or is the BTRFS file format somehow immune to encryption?
> >
> Overhearing the conversation in a Linux group, BTRFS can make
> snapshots very quickly, In the same way that Windows has VSS.
> With Windows, there is a ten second quiescence period before
> the snapshot is made.
>
> I don't really know if that's much of a feature. In the sense
> that if the NAS has any exploits the malware knows, it can just
> climb on board the NAS OS and do whatever it wants.
>
> The notion of a snapshot only makes sense if the device is
> a "fortress" and is "impenetrable". And the typical home computer
> room has none of that. Just about everything you own, has exploits.
>
> That's why, unless you have offline backups and the offline backups
> do not contain a "sleeping ransomware", you really don't have much
> of anything to rely on.
>
> One person in another group, fell for a phishing email, double-clicked
> an attachment that claimed to be an invoice, the entire computer
> room was wiped out by ransomware. It took months to reinstall stuff,
> because his backup situation wasn't very good. Just like me,
> he didn't know which license key belonged to which machine :-)
>
> I don't know how everything in the computing world works, but
> my assumption is, the things we use are going to fail, rather than
> succeed. If you hire people to make backups every day, you might
> get a little closer to building a survivable computer room.
> Just because you set a schedule in Macrium and let it run,
> does not mean on a given day when the room is attacked,
> that you actually have a good backup in hand. Back when I had
> RAM trouble on a machine here, testing several backups on
> that machine indicated the backup was corrupt. The proper handling
> of backups can be a full time job for someone.
>
> Paul

Very good stuff Paul.

I just will say the entire Synology NAS thing is a bit overrated, in that I think, since I bought it for home use, some simple air-gapped USB external drives would be sufficient for me. That said, it's fun to go back to the Linux days (I played around with Linux around 25 years ago) and set permissions and some such.

I agree with everything you say, that Murphy's Law applies with restores. I do like the Synology concept of 'VM' virtual restores (so you can pick and choose from the various "snapshots' and backups what versions of files you want, and I am getting the hang of data retention rules) but you need powerful hardware which I don't have. Otherwise it takes forever. For example, with the ten year old Intel machines I have around the house, I found the wireless access speeds to transfer data to and from the Synology NAS to your PC are about 10 Mbps, which is I think a little slower than the USB 3.0 speeds I have in practice (which are I think about 30 Mbps or so). So Synology backups are actually slower than Macrium USB external HDD backups, with the only advantage is that you don't have to physically connect an external USB drive to a bunch of PCs and tablets to back them up, once the Synology NAS is set up (which is not trivial, since the Synology OS is seemingly Linux based, and accessed through your web browser and not IMO as easy as Windows). So a Synology NAS is for lazy people in most homes, unless you have a huge number of people.

The only other advantage of Synology from what I can tell is you can set up RAID (I have RAID 1 = mirroring) for your archived data. And the 220+ unit I have is very quiet and the processor in it, a Intel Celeron J4025 2-core 2.0 GHz, is energy efficient and doesn't overheat and run the fan much. But the Celeron setup is underpowered for Virtual Machine restores from what some people online say.

I'm trying to get Synology Photo working, without much success (they have a new version and documentation from Synology is non-existent) but honestly I don't see myself using Synology to share photos, since Google Photos is so much easier albeit more expensive. But you get what you pay for, and, as you say, if you don't pay for a full-time backup IT guy, you'll likely find your home "cloud" is inferior to what Google does professionally.

RL

Re: How does Synology BTRFS file format prevent ransomware again?

<9b2195ff-3d12-43fc-b2e5-67155ff78b34n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=834&group=alt.comp.hardware.pc-homebuilt#834

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
X-Received: by 2002:a5d:6484:0:b0:219:eb95:3502 with SMTP id o4-20020a5d6484000000b00219eb953502mr17068159wri.692.1655627415980;
Sun, 19 Jun 2022 01:30:15 -0700 (PDT)
X-Received: by 2002:a05:6902:70c:b0:660:6f22:ffaa with SMTP id
k12-20020a056902070c00b006606f22ffaamr19197216ybt.199.1655627415459; Sun, 19
Jun 2022 01:30:15 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: alt.comp.hardware.pc-homebuilt
Date: Sun, 19 Jun 2022 01:30:15 -0700 (PDT)
In-Reply-To: <t8gee4$3d0$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=74.96.155.214; posting-account=fRZa_AkAAACE3nlFA9zM1Eq00OKq1Ycq
NNTP-Posting-Host: 74.96.155.214
References: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com> <t8gee4$3d0$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <9b2195ff-3d12-43fc-b2e5-67155ff78b34n@googlegroups.com>
Subject: Re: How does Synology BTRFS file format prevent ransomware again?
From: raylope...@gmail.com (RayLopez99)
Injection-Date: Sun, 19 Jun 2022 08:30:15 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 3041
 by: RayLopez99 - Sun, 19 Jun 2022 08:30 UTC

On Thursday, June 16, 2022 at 7:30:16 PM UTC-4, Paul wrote:
> On 6/16/2022 6:54 PM, RayLopez99 wrote:
> > I have a Synology NAS and am learning it. Somewhere I briefly read that it is used to combat ransomware, since it has a file format "BTRFS" that's somehow immune
> >
> > Why is this foolproof? I guess it's because the ransomware cannot "see" the shared drive? Or is the BTRFS file format somehow immune to encryption?
> >
> Overhearing the conversation in a Linux group, BTRFS can make
> snapshots very quickly, In the same way that Windows has VSS.
> With Windows, there is a ten second quiescence period before
> the snapshot is made.
>
> I don't really know if that's much of a feature. In the sense
> that if the NAS has any exploits the malware knows, it can just
> climb on board the NAS OS and do whatever it wants.
>
> The notion of a snapshot only makes sense if the device is
> a "fortress" and is "impenetrable". And the typical home computer
> room has none of that. Just about everything you own, has exploits.
>
> That's why, unless you have offline backups and the offline backups
> do not contain a "sleeping ransomware", you really don't have much
> of anything to rely on.
> Paul

As you imply, I have read two different things about ransomware: one says ransomware works very quickly, encrypting files within ten seconds. The other says the opposite, that ransomware might take several weeks to infect your entire drive. Hence the need for frequent snapshots (in Synology). It makes sense that both things could be true, that ransomware can be both fast and slow. The slow kind is probably the worse, since it forces you to maintain lots of versions of your files.

RL

Re: How does Synology BTRFS file format prevent ransomware again?

<t8mpsc$ja3$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=835&group=alt.comp.hardware.pc-homebuilt#835

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nos...@needed.invalid (Paul)
Newsgroups: alt.comp.hardware.pc-homebuilt
Subject: Re: How does Synology BTRFS file format prevent ransomware again?
Date: Sun, 19 Jun 2022 05:22:19 -0400
Organization: A noiseless patient Spider
Lines: 48
Message-ID: <t8mpsc$ja3$1@dont-email.me>
References: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>
<t8gee4$3d0$1@dont-email.me>
<9b2195ff-3d12-43fc-b2e5-67155ff78b34n@googlegroups.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sun, 19 Jun 2022 09:22:20 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="79fbac1a5f5c1bb13ae7865211a86743";
logging-data="19779"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19g7grTzcYSN+0vKa8xVLEdLGSDN5ECcMk="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:Ek5LALBWilH6ljz30ZD/XsUhRUo=
In-Reply-To: <9b2195ff-3d12-43fc-b2e5-67155ff78b34n@googlegroups.com>
Content-Language: en-US
 by: Paul - Sun, 19 Jun 2022 09:22 UTC

On 6/19/2022 4:30 AM, RayLopez99 wrote:

> As you imply, I have read two different things about ransomware: one says ransomware works very quickly, encrypting files within ten seconds. The other says the opposite, that ransomware might take several weeks to infect your entire drive. Hence the need for frequent snapshots (in Synology). It makes sense that both things could be true, that ransomware can be both fast and slow. The slow kind is probably the worse, since it forces you to maintain lots of versions of your files.
>
> RL

Hard drives support encryption of contents.

If you carry out the operation to "change the key"
inside the drive, the data is instantly erased.

That's an example of a fast mechanism for a ransomware,
using the drive to make the data inaccessible instantly.

*******

You may look at your hard drive, and say to me "but my
drive does not encrypt". It does, but it uses the default
key. It's never apparent to you, that the data-bits on
the platter, do not match what you see outside the drive.

I have no documentation, but this is part of the reason,
that if a hard drive controller board fails today,
you transfer the ROM from the old controller board to
the new controller board. If the ROM is burned by
excessive voltage, you're screwed.

On older hard drives, you could change between
controller boards, with no soldering required. On
newer hard drives, you have to move the ROM from
the defective board, onto the new/working board.

I don't know if any of this is addressed in the
latest ATA/ATAPI spec or not (gives hints you would
need to back up assertions like this).

Also, something else I've seen in a news article, is
that the drive internal encryption method is buggy. Microsoft,
when doing BitLocker, offers an option to use the
drive crypto instead of the BitLocker algo. You should
not accept that kind offer, as the integrity of the
drive methods (hardware accelerated) are unknown.

These are some of the "vast unknowns" hiding in our
tech products. Features you might never suspect are
in there.

Paul

Re: How does Synology BTRFS file format prevent ransomware again?

<15d899a7-e732-4fca-8810-52f445a9b399n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=841&group=alt.comp.hardware.pc-homebuilt#841

  copy link   Newsgroups: alt.comp.hardware.pc-homebuilt
X-Received: by 2002:a7b:c389:0:b0:39c:49fe:25df with SMTP id s9-20020a7bc389000000b0039c49fe25dfmr23082656wmj.164.1655714107329;
Mon, 20 Jun 2022 01:35:07 -0700 (PDT)
X-Received: by 2002:a81:a242:0:b0:317:5a3b:3fc8 with SMTP id
z2-20020a81a242000000b003175a3b3fc8mr25774809ywg.424.1655714106647; Mon, 20
Jun 2022 01:35:06 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!proxad.net!feeder1-2.proxad.net!209.85.128.87.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: alt.comp.hardware.pc-homebuilt
Date: Mon, 20 Jun 2022 01:35:06 -0700 (PDT)
In-Reply-To: <t8mpsc$ja3$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=74.96.155.214; posting-account=fRZa_AkAAACE3nlFA9zM1Eq00OKq1Ycq
NNTP-Posting-Host: 74.96.155.214
References: <4113a465-f44f-4505-9d83-101235db73f1n@googlegroups.com>
<t8gee4$3d0$1@dont-email.me> <9b2195ff-3d12-43fc-b2e5-67155ff78b34n@googlegroups.com>
<t8mpsc$ja3$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <15d899a7-e732-4fca-8810-52f445a9b399n@googlegroups.com>
Subject: Re: How does Synology BTRFS file format prevent ransomware again?
From: raylope...@gmail.com (RayLopez99)
Injection-Date: Mon, 20 Jun 2022 08:35:07 +0000
Content-Type: text/plain; charset="UTF-8"
 by: RayLopez99 - Mon, 20 Jun 2022 08:35 UTC


Fascinating stuff Paul, thanks.
RL

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor