Indeed I’ve just clicked on one of them but it dodn’t sim to du anythunk deoispkdn sdjsbosbd s’s kdksb aidbkakbd kdvgkpsnskcn €€ nrs £££ loipodeis $$$$$$$$$.
.stn
Indeed I’ve just clicked on one of them but it dodn’t sim to du anythunk deoispkdn sdjsbosbd s’s kdksb aidbkakbd kdvgkpsnskcn €€ nrs £££ loipodeis $$$$$$$$$.
.stn
You were brave. Our forum needs to be protected, so should someone from moderation check this out properly?
I have replaced the hyperlinks with preformatted text.
Thanks Martin. Better safe than sorry👍
My QNAP was also hacked into and I lost all my files. I can feel your pain. QNAP contacted me and got the files back, but file names were lost. I cleaned out the PC, but did not have the courage to add the folder for Roon to check if metadata was intact.
So I re-ripped the music again, took a while as I had to find time for this. Sometimes I wish I had just paid the hacker, but glad I did not. They would just do it again
I have a full backup at home and in the cloud.
That is a very goog point. This hack does not discriminate and just stop at just one place. It will go after every document, photo, music, video on the local and the network.
I surely hope not but it does not bow well for him. Surely wish him well if it is indeed true.
–MD
This is not a hack, this is someone who either left the door wide open by misconfiguring his network, or who installed the software themselves and found out the hard way what a lack of anti-malware protection can result in. Either way, no one hacked anything.
I am inclined to agree and he says it’s not the first time either
My rock/nucleus arc ports are constantly tested as are remote nas access but my router has a firewall and blocks the attempts
I too have a good deal of background in security and internet based attacks
Yea I know what you mean about that. Poor choice [of words] on my part. It’s just that I refer to any intrusion as a hack or even when I mod something I call it a hack.
–MD
Bottom line is every routable Ip address on the planet is under constant attacks/probes from unknown sources- this is unfortunately the internet these days.
Go run some GRC.COM shields up tests against your own connection and get some idea of what ports you have exposed
Most NAS will expose a port and Roon ARC will too
Perhaps we should update Benjamin Franklin’s quote to read “…nothing in this world can be said to be certain, except death, taxes, and grc.com.”
I can only speak to Synology, which is the NAS platform I have experience with. Synology doesn’t require an open port to use their apps. They operate a reflector service. When you use the reflector service, everything is done through outbound-only connections initiated by the NAS.
I’m of the opinion that Roon should have done something similar to improve usability, reliability, and security. It’s possible to build something like ARC such that the LAN-based service provider walks backwards from “is a port open” to “can I open a port with UPnP” to “I’ll use a reflector”. They would have to eat the cost of reflecting when the other strategies don’t work and, of course, there would be some additional latency which I don’t think would be an actual issue for most users. Had they done this, those of us that don’t want open ports to our cores wouldn’t be worried about them and we wouldn’t be in the ongoing midst of the IPv6 / NAT / etc. issues that still pester users. Oh well.
… then we’d still be waiting for ARC.
Roon made a comment to this effect, but I can’t [be bothered to
] find it.
Having no Synology experience: Does that include streaming from the NAS?
I doubt it. It’s a general solution that significantly reduces the need to solve NAT traversal across all of the permutations of ISPs, routers, etc.
I’ve built systems like this. It’s not fair to call them trivial, but they are pretty darn simple in today’s world of AWS/Azure and the volume of available and re-usable references and open source. Redis as a discovery / directory service and Node for the hanging connections / reverse proxy and you’re a large part of the way there. The elasticity of AWS/Azure gets you scale. Over time, solve for more direct-connect permutations and decrease the number of users who rely on the cloud proxy as a cost-reduction strategy.
It’s so, so easy for Roon (or anyone) to dismiss the idea they didn’t have or the strategy they didn’t pursue with a blanket statement such as “you’d still be waiting.” In this case, I sincerely doubt they’re right.
I believe so. I’ve used it for some scenarios but not streaming. The documentation suggests that it is a complete solution.
Thanks ![]()
I disabled port forwarding on my router after I detected that ARC shows open ports in grc.com testing tool. I want full stealth operation and the only thing I need to find a solution for the darn port 113. So no ARC for me no matter what Roon tells me about the security of their solution. Way too much risk for the uninitiated to open the doors wide…
Of course it does. You are forwarding the ARC port through your router’s firewall to your Roon Core. What did you expect it to show?
exactly that and that I don’t want. Port forwarding is off for me.