Another PFSense+FreeNAS argument
-
I'd like to request the full integration of pfsense and freenas into a single unified project. I believe this would provide the following benefits:
Fork them both, merge them, and start a new FOSS project? Might I suggest pfNAS as a name?
-
I'd like to request the full integration of pfsense and freenas into a single unified project. I believe this would provide the following benefits:
Fork them both, merge them, and start a new FOSS project? Might I suggest pfNAS as a name?
I thought that this issue was fairly well addressed by the majority of the following text. Any single user or group of users forking either project to these ends would NOT result in the majority of the most important benefits, which stem from the joining of the developer base and the doubling of eyes on the various critical sections.
As much as I appreciate that anybody can fork an existing FOSS project, I believe that using that ability over-generously, as has been done in the past results in a thinning of the various communities developer bases, and increased repetition of code. A problem that currently plagues both pfSense and FreeNAS.
As an example, I cite two features that are currently under development: zfs root support on pfSense and Packages on FreeNAS. Each of these features has been fully developed and flushed out by one platform and is now under development by it's counterpoint. zfs root support has been working perfectly in FreeNAS for several versions now, whereas pfSense is just developing it, reproducing the code and effort performed by the FreeNAS people. Similarly, FreeNAS just started working on packages support a few revisions ago, yet packages have been a working feature of pfsense since before the 2.0RC branches at least (I remember packages back in the 1x days).
-
While I can understand the ease of use this would provide. A security device (firewall/router) should not also be a file storage/server device.
I would stop using pfsense if this was built in, talk about a security nightmare.
-
While I can understand the ease of use this would provide. A security device (firewall/router) should not also be a file storage/server device.
I would stop using pfsense if this was built in, talk about a security nightmare.
You don't have enable the file server components … and I can see benefits for the typical home user?
However, I myself will probably not use the NAS components as I don't like placing such critical information on a WAN facing device.
As for ZFS, can't that be put into pfSense independent of FreeNAS? ZFS is just a file system no?
-
This will never be built in, and is highly unlikely to be added as a package. It just does not make sense to put a role with known security issues onto an edge firewall. And if it exists, people will do that even though they are guided not to.
If absolutely require a NAS and pfSense on the same hardware, virtualize it.
-
Perhaps it would be beneficial to explain my setup a little. I have 4 pfsensei, all virtual. Two of them provide redundant, failover, QOS'd internet gateway/firewall/multi-lan router. These two do exactly what a security device should, and that's NOTHING except the single security intensive task for which it was purposed.
Separately, I have two other pfsensei that run networking services. DHCP, DNS, radius, and a few incidentals for the multiple LANs that the other two route and firewall for. These two systems are behind a secure firewall, and also have their own internal firewall. I would consider these secondary system as a candidate for hosting additional file services as well. web server, WINS server, and a couple others which belong in each LAN, but do not belong on the edge device.
Furthermore, virtualizing a full fledged NAS service (Providing large scale data storage to the network) is a VERY BAD idea, especially for home users as it requires expensive special hardware to do it properly.
-
As for ZFS, can't that be put into pfSense independent of FreeNAS? ZFS is just a file system no?
As I pointed out for the general case, this is another instance of replication of code and labour. FreeNAS already has this fully fleshed out and working. It would be better for everyone to use the existing single working codebase (Fewer bugs, less chance for security related bugs to creep in).
Replication of Code/Functionality and diverging developer bases are one of the few problems still plaguing free software today. It's exactly that attitude that's contributing to the problem.
-
A security device (firewall/router) should not also be a file storage/server device.
However, a file storage/server device should most definitely be a security device.
I would stop using pfsense if this was built in, talk about a security nightmare.
Obviously you didn't read the entirety of my post. I clearly thing that by default, none of the NAS stuff should be installed on a router, and none of the router stuff on a NAS device, but available through the package system and developed atop a strong common base
-
A security device (firewall/router) should not also be a file storage/server device.
However, a file storage/server device should most definitely be a security device.
Absolutely not.
A security device should not be accessible by end users. Your NAS is a file server, and is protected by a firewall to ensure that only the traffic you want to reach it is allowed through to that zone. You may also have user level access on the NAS itself tied in with an LDAP server, this is to prevent users from attempting to authenticate directly to the NAS.
Of course I'm coming at this from a commercial POV and not home user, but the basis for that is still the same.
I would stop using pfsense if this was built in, talk about a security nightmare.
Obviously you didn't read the entirety of my post. I clearly thing that by default, none of the NAS stuff should be installed on a router, and none of the router stuff on a NAS device, but available through the package system and developed atop a strong common base
If you want it as a package… Go for it! Start coding... :)
-
developed atop a strong common base
If you want it as a package… Go for it! Start coding... :)
It's not just that I believe everything should just be a package. There needs to be a single unified base upon which all packages are built. Common to the two largest projects that share a large set of features and requirements. The greatest benefit is to be seen by merging of developer base and reduced lines of total code. Simply adding features to one or the other as packages almost completely mitigates the greatest strengths of the concept of a merger.
-
Why FreeNAS? Why not NAS4Free?
-
Why FreeNAS? Why not NAS4Free?
I'm most familiar with FreeNAS, and I know it to be generally accepted to be the "best" freebsd/pf NAS solution.
If NAS4Free developers want to get in on the whole PFSense+FreeNAS Integration to make it into a PF4NAS mega-conglomerate, there's no reason even more experienced developers wouldn't improve the overall end user experience and contribute to feature maturity, security, and polish
-
There's some general concepts that all suggest this is a bad (dangerous) idea:
-
Security vs. Convenience. They're inversely related. If people want more convenience, usually security is then sacrificed, and vice versa. By incorporating more roles onto a security appliance, it's increasing the convenience; as a result, security is decreased.
-
Attack Surface. By adding more roles, you only dramatically increase the attack service of the device, server, or appliance. Something that is a specialist then becomes a generalist. We're adding more windows and doors to the house, making it easier for just one of them to be compromised and an attacker to gain entry and own the entire box.
-
Security by Isolation concept.
NAS is a storage device, usually for personal, private, or sensitive information. Even for a home user, the data includes personal documents, finances, family photos and videos. Putting those on a a perimeter/edge device such as a router or firewall is putting all that precious data closer to the Internet, when it should be the opposite: protected and as internal as possible from the WAN.
Heck, one could argue that even pfSense with a ton of packages installed is "too much" of an all-in-one solution, for convenience. Traditional firewall, proxy, content filter, IDS/IPS, DNS, DHCP, VPN endpoint, RADIUS. Some have these roles all on separate devices.
It seems OK to me to harden each server however, including NAS. Host-based firewall like FreeBSD's pf running on FreeNAS or Suricata running on a server. I mean, all our Windows devices have a basic host-based firewall enabled, Linux has iptables, etc. So it's fine to have host-based firewalls running on a NAS appliance and other servers, but something with a role of firewall/router should really be as isolated and simple as possible to reduce attack surface.
-
-
"Furthermore, virtualizing a full fledged NAS service (Providing large scale data storage to the network) is a VERY BAD idea, especially for home users as it requires expensive special hardware to do it properly."
What? I run my pfsense virtual - seems so do you, so you think it ok to turn it into a NAS - so then what it shouldn't be a vm then?
A NAS is network attached storage - what would be full fledged vs say not full fledged? What OS you use to provide access to your storage seems irreverent , be it freenas, nas4free, unraid, openfiler, windows anything, etc..
As to special expensive hardware? Again pure poppycock.. My very reasonable priced N40L provides me both my router via vm, and my nas - currently just windows 7 running drivepool from stablebit to make it easier to share out multiple drives as one share vs having to raid them in anyway, etc. This currently provides my network with 6+ TB which can easily expand to 16 in the same box by just plugging in the drives if so desired, more if I used the esata or usb connections, etc.
Anyone with the desire can bring up a very cheap a NAS be it the os is virtual, or they just buy a premade one - there are plenty of OS'es out there that are designed to be NASes - I don't see a reason to try and combine a nas OS with my edge router/firewall..
-
Furthermore, virtualizing a full fledged NAS service (Providing large scale data storage to the network) is a VERY BAD idea, especially for home users as it requires expensive special hardware to do it properly.
Perhaps you could elaborate on that. What sort of performance do you require that can't be achieved by a virtalised solution? It seems there are plenty of pfSense users doing exactly that, running it as a VM together with a NAS VM, and seeing good results.
Steve
-
A "very bad" idea solution of using a VM is still more secure than the "atrocious horrendous ghastly abhorrent lurid terrible horrible no good very bad" idea of putting a storage server on your firewall.
If you want to shoot your own foot, we won't be handing you the gun.
-
A "very bad" idea solution of using a VM is still more secure than the "atrocious horrendous ghastly abhorrent lurid terrible horrible no good very bad" idea of putting a storage server on your firewall.
If you want to shoot your own foot, we won't be handing you the gun.
LOL.
Well said.
-
A "very bad" idea solution of using a VM is still more secure than the "atrocious horrendous ghastly abhorrent lurid terrible horrible no good very bad" idea of putting a storage server on your firewall.
If you want to shoot your own foot, we won't be handing you the gun.
I apparently haven't said loudly enough that I don't actually want any of my edge routers to also be NAS devices, and some people apparently can't read.
-
Furthermore, virtualizing a full fledged NAS service (Providing large scale data storage to the network) is a VERY BAD idea, especially for home users as it requires expensive special hardware to do it properly.
Perhaps you could elaborate on that. What sort of performance do you require that can't be achieved by a virtalised solution? It seems there are plenty of pfSense users doing exactly that, running it as a VM together with a NAS VM, and seeing good results.
Steve
Any sufficiently competent NAS needs access to RAW disks, not encapsulated disks, or disks behind a translation layer, but for optimal error recovery the NAS needs access to raw disks. This usually means direct access to the associated controller, such that either the NAS OS is on bare metal, or the Controller is passed through to the Virtual Machine. Passing the Controller through to a virtual machine requires expensive controllers, expensive motherboards, and either Limits the user to an AMD processor, or requires a Xeon processor.
As for performance, passing your NAS RAW DISKS is not about performance, it's about reliability. Certainly any data you don't care about can be on a virtualized disk NAS. Make sure you take good backups.
As for defining "Fully Fledged", a fully fledged NAS is one that's providing the primary storage for a network. The system with the massive storage that hosts the backups and large scale multimedia. The system that hosts VM images and exports them to VM hosts. It's the Fully Fledged NAS, as opposed to the lightweight NAS that someone might virtualize to provide a limited amount of space to something that needs to be available more easily. I'm picturing, well, Pictures, or a website, or a UPNP media server…
-
There is an issue here that I've talked about before (as have others) but probably worth going into again.
pfSense has become sufficiently popular and is sufficiently flexible that it's install base encompasses a very wide range deployment scenarios. For example it was originally conceived as a direct replacement for Cisco ASA boxes but it's now installed in maybe greater numbers as a SOHO router where a WRT54 would once have been. Think about the difference between those two pieces of equipment and how wildly your expectations would vary between them. Users are coming to pfSense expecting everything both of those can provide.
Now think about adding NAS capability. In the world of the SOHO router this already exists. There are numerous NAS type add-on packages for OpenWRT for instance and you don't see people complaining about it. However if you went to Cisco complaining about not having file sharing capability on your new firewall you'd get short shrift.
Now you could argue that having it as a package allows both requirements to be satisfied but the fact is that if it were possible to do it someone would install a full NAS package on a perimeter firewall. That may then get hacked and that would be very bad for the project.I might suggest that if you are setting up a fairly serious NAS as you describe then why not just run a separate machine?
I hadn't considered that direct disk access was such an issue though. Do you have a link to any discussion on that?
Steve
-
Some of us can read fine and still don't buy the arguments.
If you cared at all about speed/resilience/security then you would not be combining a firewall with a NAS. You're talking about making a compromise to have them both on the same unit, and compromises mean sacrifices. You'll sacrifice a bit of everything to shoehorn them into the same device.
But that's the problem with Bikeshed arguments, everyone wants them to be different colors.
-
"Any sufficiently competent NAS needs access to RAW disks"
And who said my NAS didn't have raw access to the disks?
Raw Device Mapping is simple enough in esxi that anyone can do it. You don't need exp controllers either.
http://www.vm-help.com/esx40i/SATA_RDMs.phpSo yes my nas creates the file system on these disks, they are not vmdks that are given too the vm.. But even so - that could also be done as well. Sorry but you DONT need raw access to provide access to storage.
My nas also has access to the smart info on the disks, etc. etc.
Your trying to overcomplicate a simple thing like access to storage over a network.
-
jimp,
Any chance you can port pfsense to be a Windows based appliance? I want to play Solitaire.
-
Ha! ;D
https://github.com/qpleple/solitaire/tree/master/src/Cli
Steve
-
Ha! ;D
https://github.com/qpleple/solitaire/tree/master/src/Cli
Steve
I guess this might not be appropriate to build into the base system :-\ but maybe somebody will make it package ;)
-
So obviously nobody cares about the benefits that I've identified and pointed out.. Improved security, reliability, and reduced attack footprint. I'm forced to question the strength of those attributes when the community diverts attention away from the subject at hand when those issues are challenged.
-
It's not that people don't care about those things obviously security and reliability are high priorities for pfSense users.
I could imagine a product that was configurable as either a firewall or a NAS at install using a shared base. It should not be possible to install both on one system IMHO. I don't know how FreeNAS people would feel about that but presumably there is a reason they haven't included any firewall/router features.
I cannot imagine combining the two projects at this stage though. It may have been possible when both projects were in their infancy but the work required to do it now would be huge. Would it be worth it?
The other thing is that if you ran a diff against both projects to find the commonality between them what is left is pretty much just FreeBSD. Just how much code could be combined between the two usefully? Webgui? Package system? Both projects contribute code back to FreeBSD so code is shared that way.Steve
-
I can understand where you're coming from. I've beeen a pfsense user since early 2.0.x and also run a local NAS. I would never think of combining my firewall/router w/ my NAS as many others have said. That being said, I understand that you think combining pfsense and a Nas appliance into one would allow multiple deployable scenarios. While true there would have to be a common base, as someone pointed out, and lord knows what that would mean, not only security wise or otherwise. Yes having both on 1 iso to choose from would be convenient, but the old saying goes - security or convenience, pick one.
I will say though, your proposal was nice. Try to take some of what everyone has said to heart - they're all very knowledgable people with good points. Look around, there aren't any other top notch fw/router appliances with a file server onboard - that has to tell you something. -
So obviously nobody cares about the benefits that I've identified and pointed out.. Improved security, reliability, and reduced attack footprint. I'm forced to question the strength of those attributes when the community diverts attention away from the subject at hand when those issues are challenged.
The problem is the gains are all one sided. For a NAS, they are all gains – improved security from having a firewall, reliability is questionable but possible.
For pfSense, they are all losses. Security is reduced by having more services. Reliability is reduced. Attack footprint is increased.
-
I would rather see a pfCenter application that will allow multiple pfSense boxes to be managed and configured from one application/appliance
My two cents.
-
I mean, Windows Server 2008 R2 can host both a Domain Controller role and an Exchange Server role, but it'd be silly to combine the two.
Regarding firewalling FreeNAS, I plan on using a dedicated "Server" interface to connect all internal servers to pfSense, separate from my "LAN" interface which I'm only using for clients. That way FreeNAS still has a network-based firewall (pfSense) it just doesn't have an onboard host-based firewall. There might be a way to use the FreeBSD pf firewall (sans pfSense), but not sure how that would work.
-
That is not even close to the same thing - and yes many companies use DC as their exchange box - SBS is designed to do that.
Lets talk apples to apples here for gosh sake.
-
I loved the idea of pfsense + freenas since it kills 2 birds with one stone, but even I have to admit pfsense requires to be simple and kept as a firewall.
Adding features like Nas or further addons can complicate it and no doubt leave it more open to attacks and instability.
Pfsense is best kept as Pfsense
If people require a Nas, freenas is free or take a look at XPEnology which is a free version of synology nas os, and combine it with the HP G7-N54L which you can still get good cash back deals on I think roughly around £130. The unit can take a modded bios to uncap the satas to full speed and accept 3tb or 4tb hdds I hear also.
Beats paying £500 for synology nas and job done in £130, so fraction of the cost.
-
I'm late to the party, and I'm a nobody but I think the idea of combining projects is a terrible one.
1. In a firewall / router type situation, wasting all that ram/CPU on ZFS seems like a dumb idea. I want nothing to do with ZFS on my firewall. I want all resources dedicated to providing network services, and as fast as possible.
2. doesn't FreeNAS allow jails now? Seems like you could attack this problem a lot easier from the other direction.
3. combining projects does not guarantee everyone will stay. Some of the people working on FreeNAS probably want nothing to do with network services, and may see the combination OS as a dilution, and therefore leave.It seems the idea of combining projects is appealing to people having to run two VM's at home. Those of us not using these projects in a home setting do not want them combined.
-
I run vms at home - and I am against such a joining as well. Don't see any reason that makes sense. It makes more sense to just fire up a VM and use an OS/Distro geared towards being a NAS vs using my firewall to provide my storage.
I just can not see a reason why anyone would do or want such a thing to be honest.
If they want such a box maybe they should look to something like http://www.clearfoundation.com/Software/overview.html which is one of those Do everything Distros - acts as your gateway while also being your storage, LDAP, email server, etc.. etc..
Just because pfsense and freenas share a common core OS freebsd does not mean they need to join forces ;)