Response intertwined with original message:

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> Behalf Of Jack Beglinger
> Sent: Tuesday, December 10, 2002 8:13 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Ultra VNC born (again)?
>
> I hope they do not add a new back door into the unix systems
> as Ultra is
> adding to its windows client.

What back door?  File transfer ability would be nice for windows - cut and
paste is a pain to copy data where no ftp server exists.

> By adding this function, you
> made it so
> network admins will be forced to protect their systems by not
> allowing *ANY*
> traffic of VNC.  It is hard enough to get them to agree to
> allow desktop
> access but to include a new vector to attack to steal
> information though...
>
Where do security holes come into play?  On any system, the VNC user has no
more access than the account they are logged in to.  Sounds like your
network admins are not too bright and a little education is in order!

> If Ultra installed (or RealVNC) installed with a option to
> load a mini-FTP
> server, then issue is lowered.  Because is using a known
> vector - firewalling
> will work.  Also for windows users FTP client has been
> available in the
> browsers.

If by mini-ftp client you mean using port 21 and the ability to connect with
any standard ftp client, then you are increasing exposure.  The transfer is
no longer controlled by the rfb connections userid/password.  How will
firewalling be more effective for port 21 than port 5900?  Allow any on port
21 will get the windows machine probed by bots all the time and if you allow
anonymous, watch out! I run 3 Unix ftp servers for my company using a very
restricted ProFTPd setup that get many more invalid requests than valid
ones.  Checking my Xerror logs on Unix (before going to ssh), I have never
seems any attempts from an unknown IP address to gain access!  FTP is a
known vector alright!

> Lastly, if a company is support VPN/SSH tunnels - then two
> traffics travel the same pipe.
>
If a company supports VPN/ssh, you should hope all data travels the same
pipe!  After all that's what it is for.  WinVNC over ssh with a file
transfer built in would be infinitely more desirable that running a clear
text ftp session to port 21 directly.  And technically it is still the same
pipe (bandwidth) anyway, just less secure.

I am now forced to run VNC over ssh into my servers and desktop from the
internet - OK.  Our external firewall does not allow any VNC traffic. Yet
the auditors and network admins have no problem with allowing telnet (port
23) with external access.  When they locked down VNC, I argued that although
the VNC password is sent with fairly weak encryption for challenge/response,
telnet is a far more significant exposure.  But like your guys, because it
is a "known vector", telnet was deemed an acceptable risk!

I am not really complaining about running over ssh as it really is the right
thing to do.  It caused me a bit of work to set up and I now have a floppy I
carry with me that runs a script that puts my puTTY defaults into the
registry, starts puTTY, then removes the puTTY session from the registry
when I close the client if I'm on a "foreign" PC.

> So why rebuild the wheel?  And possible close VNC ports for an added
> function that already exists?
>
Hopefully the wheel will remain the same -- I think they are just changing
the tread pattern to get better performance!

Regards,  Glenn
_______________________________________________
VNC-List mailing list
[EMAIL PROTECTED]
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to