On Mon 11 Oct, 1999, Steve Kennedy <[EMAIL PROTECTED]> wrote:
>Yup, use it to look after remote NT boxes siting behind CheckPoint
>with no problem.
concentrating on the security/resiliency aspects, rather than general
pros and cons
good points:
authentication is a challenge/response with shared secret
on NT doesn't hook in at the low levels that pc-duo,
pc-anywhere, etc do (so doesn't contribute to NT stability problems)
protocol is completely documented, and straightforward to filter/pass
implementation comes with complete source
bad points:
no encryption of traffic in the standard build
if anyone finds/determines the password (eg repeated guessing)
they have your vnc desktop, (and, by implication, your
windows/nt box if you're using that)
several people have built modified versions that will enable easier/safer
tunnelling over other systems such as ssh - see the VNC mailing list archives
James.
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]