I posted something similar over on the freenas forums, as im using a freenas box in this (new) setup im doing at my home office. I figured i would rewrite most of the post here as i know there are more enterprise admins here vs at FN forums.
The meat of my question is, how do admins (including enterprise), deal with SAN/NAS security in terms of a exploited client device? (ie a client device, connected to SAN storage either via iSCSI or NFS, is exploited, how do you prevent attacker from pivoting into SAN/NAS storage spaces that the client box should not be allowed to access).
Are things like file level permissions and use of "nfsnobody" group enough? (maybe not, see example exploit:
How to exploit weak NFS permissions through Privilege Escalation?)
Assume that only iSCSI / NFS services are available to the dedicated NIC(s)/vlan/subnet connected to the exploited client box (ie no SSH nor web gui on dedicated nic).
I ask this as in my new build, i will be running a publicly accessible web server , and this site needs access to 4-6tb of storage, so as opposed to direct attaching 3 or 4x HDDs to this baremetal server, i was hoping to save power/heat and serve the 4-6TB from my FreeNAS box (via nfs or iscsi). But im concerned about unauth access to other parts of my NAS. (keep in mind, i most likely will just end up using a isolated, direct disk attached baremetal server for this public httpd server, bc of security nfs/iscsi sec. concerns - but wanted to ask as i know this has to be a issue for enterprises)
Another option:
As opposed to a baremetal web server (connected to SAN via NFS), Is it a better idea to run ESXi standalone on the baremetal box, and then have a single guest/VM for the public webserver (and provide a NFS backed 4-6tb datastore TO the guest, such that the guest VM does not even use/see NFS back to the SAN). ie the attacker would have to gain access to ESXi first, and then pivot from esxi into the SAN via NFS.
here is a rough sketch of how i would lay this out, if i did go the SAN/nas (vs direct attached HDDs) route:

thanks for any input.
EDIT some good links (i dont think theyw ill apply to me as FN does not fully support nfs v4 or v4.1 i think):
Red Hat Enterprise Linux 7 8.8. Securing NFS - Red Hat Customer Portal
The meat of my question is, how do admins (including enterprise), deal with SAN/NAS security in terms of a exploited client device? (ie a client device, connected to SAN storage either via iSCSI or NFS, is exploited, how do you prevent attacker from pivoting into SAN/NAS storage spaces that the client box should not be allowed to access).
Are things like file level permissions and use of "nfsnobody" group enough? (maybe not, see example exploit:
How to exploit weak NFS permissions through Privilege Escalation?)
Assume that only iSCSI / NFS services are available to the dedicated NIC(s)/vlan/subnet connected to the exploited client box (ie no SSH nor web gui on dedicated nic).
I ask this as in my new build, i will be running a publicly accessible web server , and this site needs access to 4-6tb of storage, so as opposed to direct attaching 3 or 4x HDDs to this baremetal server, i was hoping to save power/heat and serve the 4-6TB from my FreeNAS box (via nfs or iscsi). But im concerned about unauth access to other parts of my NAS. (keep in mind, i most likely will just end up using a isolated, direct disk attached baremetal server for this public httpd server, bc of security nfs/iscsi sec. concerns - but wanted to ask as i know this has to be a issue for enterprises)
Another option:
As opposed to a baremetal web server (connected to SAN via NFS), Is it a better idea to run ESXi standalone on the baremetal box, and then have a single guest/VM for the public webserver (and provide a NFS backed 4-6tb datastore TO the guest, such that the guest VM does not even use/see NFS back to the SAN). ie the attacker would have to gain access to ESXi first, and then pivot from esxi into the SAN via NFS.
here is a rough sketch of how i would lay this out, if i did go the SAN/nas (vs direct attached HDDs) route:

thanks for any input.
EDIT some good links (i dont think theyw ill apply to me as FN does not fully support nfs v4 or v4.1 i think):
Red Hat Enterprise Linux 7 8.8. Securing NFS - Red Hat Customer Portal
Last edited: