I've come to the conclusion that external hackers are finding my DNS-323 and accessing it. And I'm not sure what to do about it other than not use the FTP functionality, which is one of the key reasons I bought the product.
After a few days of having my firewall setup to forward port 21 to the NAS, the drive activity starts increasing and occurring almost constantly. The drive activity goes away immediately if I unplug the ethernet from the back of the NAS, showing its not due to internal NAS activity such as refreshing UPnP directories, etc. The drive activity also goes away immediately if I disconnect my home network from the external internet, showing its not due to an internal computer on my home network. And when I login to the FTP server the login messages tell me that I am user 2, 3, or 4, telling me that other people are somehow logged into my NAS. Note that when I first turn the NAS on and the drive light is not blinking, I always show as user 1.
It usually takes a day or two of leaving port 21 forwarded to the NAS before I start seeing the external access drive activity. So I am thinking there are hackers out there port scanning the internet that eventually find the open port, recognize the DNS-323, and hack in. What they do once they are inside, I have no idea. My data looks intact. But I don't feel like my data is secure under these circumstances.
So I have two comments/suggestions:
(1) I think this device needs some logging of FTP server access. I'm kinda operating in the blind here with no ability to investigate who is logging in. What user are they logging in as? From what IP address? Did they read or write data, if so, how much? Unfortunately my router doesn't have that capability either. Its a WRT54G so maybe I'll install one of the customized firmwares such as Tomato that has more tracking/logging capability.
(2) I think there may be some serious security holes that allow hackers to easily break into this device. This is very bad if its true. There really is nothing more I can do to provide security to this device if it is easily hackable. I have to forward an FTP port to it and trust that it can protect itself. All I can do is move it to a non-standard FTP port other than 21 to increase the difficulty of hackers finding the open port.
Has anyone else seen this? I'm I missing something in my debug of the issue?
Thanks.