luca2 Posted July 17, 2021 Share Posted July 17, 2021 (edited) Hi, I am running on latest stable. I am reviewing security in general of my setup(unraid). I am running a linux vm and from there I am accesing an unraid share(called ISOS). I did this to access ISOS: -within the xml: -within the vm: sudo -s nano /etc/fstab isos /home/ws1/isos 9p trans=virtio,version=9p2000.L,_netdev,rw 0 0 Now, I realised I do not need to create a user equivalent to my vm user to access this share. So I guess it means if I get ransomware infected it has direct access to my ISOS share. Can I setup the same I do have in my windows vm where my share is only accesible if I enter a user/password matching the windows user/password? In this scenario I can setup in the USER tab the following: SMB Security Settings> "export": yes + "security": private SMB User Access> "user"=read only Rgds Edited July 31, 2021 by luca2 Quote Link to comment
ljm42 Posted July 18, 2021 Share Posted July 18, 2021 If you want to enforce SMB share permissions, have the Linux VM connect to Unraid using SMB instead of 9p Quote Link to comment
luca2 Posted July 31, 2021 Author Share Posted July 31, 2021 On 7/18/2021 at 7:04 PM, ljm42 said: If you want to enforce SMB share permissions, have the Linux VM connect to Unraid using SMB instead of 9p thx for support!!! I had some trouble due to some missing packages in XFCE. After I installed them the SMB shares were visible. Quote Link to comment
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.