More than a year ago, we started researching the available encryption options in off the shelf network attached storage devices. We started with Synology devices, followed by Asustor, TerraMaster, Thecus, and finally Qnap. The manufacturers exhibit vastly different approaches to data protection, with different limitations, security implications and vulnerabilities. Today we are publishing the aggregate results of our analysis.
Before we begin the comparison, let’s review the available encryption methods as well as the options the different manufacturers use to store the encryption keys.
While all manufacturers advertise AES-256 encryption, the details can differ greatly. There are three different types of encryption commonly used by major NAS manufacturers. These are:
Most NAS manufacturers allow storing encryption keys on the device in order to facilitate automatic, non-interactive unlock of encrypted data at boot (or on a certain event, such as inserting or removing a USB flash drive). There are several options for managing the encryption keys:
Time for the actual comparison! Abbreviations:
Notes:
We have tested network storage appliances made by five different manufacturers, and discovered five very different approaches to data protection.
Qnap has the most comprehensive protection options by far. In select models (which includes even some mid-range consumer units), it offers the unrestricted choice of SED, volume encryption (LUKS) and shared folder encryption (eCryptFS) in all possible combinations, including the stacking of the three layers on top of one another. However, the company’s reliance on security-through-obscurity when it comes to storing the encryption keys for auto-mounting the encrypted data, the lack of proper documentation, and the extremely slow speed of managing encrypted volumes (up to 5 minutes to mount or unmount the volume, about 10 minutes to change the password) make us wish for more. Still, taking the three-layer approach and never storing the encryption keys on the device can deliver sufficient security for the encrypted data.
Asustor offers the choice of full-disk encryption (LUKS) on My Archive volumes and folder-based encryption (eCryptFS) for regular volumes. The documentation is poor, especially when it comes to the two methods of auto-mounting encrypted data: storing encryption keys for regular volumes, or ‘binding’ My Archive volumes to USB flash drives. We discovered a weakness in the second method, which we will describe in detail at a later time; however, we did not look for the place on the NAS where the keys for auto-mounted encrypted shares are stored when it comes to regular volumes. The company’s reliance on eCryptFS for encrypting shares stored on regular volumes does not look sufficient to protect sensitive information, while the lack of ability to change passwords or revoke compromised encryption keys makes encryption on regular volumes dubious. My Archive volumes, on the other hand, are encrypted with LUKS, which is a proven and secure standard. However, the ‘USB binding’ feature that can be used to automatically unlock My Archive volumes on Asustor NAS when a flash drive with a given serial number is present does present a significant weakness, effectively breaking security provided by LUKS encryption.
Synology deserved a lot of attention from our side. The company has the most comprehensive (but still lacking) documentation. Just like everyone else, Synology relies on “security through obscurity”, hiding the location of the encryption keys if these are stored on the disk volume, and using a fixed wrapping passphrase “$1$5YN01o9y”. Things like that, should they be properly documented, should have never made it to production. The company’s sole reliance on eCryptFS does not look sufficient to protect sensitive information, while the lack of ability to change passwords or revoke compromised encryption keys makes Synology’s encryption a rather vague attempt.
TerraMaster is a fresh contender. Traditionally for NAS vendors, the company lacks any sort of technical documentation on its encryption method of choice. TerraMaster uses eCryptFS, a shared folder based encryption scheme, with all caveats of such encryption. The implementation is rudimentary, and looks more of an afterthought than a serious attempt to secure data. The lack of possibility to automatically mount encrypted data at least removes the associated security weakness.
Thecus is a classic manufacturer of NAS devices. It excels in not making the encryption understandable with or without documentation. What type of encryption is used? What is the user provided password used for? (Mind you, it’s not needed for mounting encrypted volumes.) What is the encryption key that’s stored on the USB drive? Lots of unknowns, with only one thing on the bright side: Thecus, in addition to its proprietary encryption, supports SED encryption in some of their units.
Detailed information about each manufacturer’s encryption methods is available in our research articles: