On Mon 11 Oct, 1999, Steve Kennedy <[EMAIL PROTECTED]> wrote:
>Yup, use it to look after remote NT boxes siting behind CheckPoint
>with no problem.

concentrating on the security/resiliency aspects, rather than general
pros and cons

good points:
        authentication is a challenge/response with shared secret 
        on NT doesn't hook in at the low levels that pc-duo,
         pc-anywhere, etc do (so doesn't contribute to NT stability problems)
        protocol is completely documented, and straightforward to filter/pass
        implementation comes with complete source

bad points:
        no encryption of traffic in the standard build
        if anyone finds/determines the password (eg repeated guessing)
         they have your vnc desktop, (and, by implication, your
         windows/nt box if you're using that)

several people have built modified versions that will enable easier/safer
tunnelling over other systems such as ssh - see the VNC mailing list archives

James.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to