I need VncAuth, because I use it to implement one-time password authentication (yet another piece of functionality I'd like to eventually get ported to TigerVNC.)
I also think that VncAuth is what users expect when they try to use VNC "out of the box." However, the ability for SysAdmins to globally disable VncAuth (or any other authentication/security method) in a config file is very useful, and it's something else that I want to port from Turbo to Tiger. As far as your authentication issue, it may be that you need to either 'chown root' on Xvnc or possibly 'chmod u+s', or both. I had those same problems with the PAM authenticator in TurboVNC-- on some systems, it's sufficient for Xvnc to be owned by root. On others, it has to be setuid root. On 2/10/11 4:24 PM, Robert Goley wrote: > First off, thanks to you and Martin on providing the condensed security > howto. I had been digging it up from older VNC lists when you sent it. > I knew options were available but was just not sure on the correct > syntax for passing them. I am now getting the right prompts for > username and password but it fails everytime when the correct one is > entered. I created the /etc/pam.d/vnc file. Are there any other steps > to this or maybe some permissions issues to deal with? I am doing this > on Debian Lenny 64 with a SVN compiled TigerVNC server with TLS > enabled. I am really looking forward to testing the 1.1 release. Would > love to do away with the VncAuth portion while I am at it... > > Robert > > > On 02/10/2011 05:11 PM, DRC wrote: >> On 2/10/11 3:39 PM, Robert Goley wrote: >>> What are the SecurityType options that must be passed to enable it? >>> This would be useful in benchmarking differences between TLS and non TLS >>> connections... >> On the server: >> >> -SecurityTypes=VeNCrypt,Plain -PlainUsers={comma-separated list of >> allowed users} >> >> You also have to create a new PAM service called "vnc". I did this by >> copying /etc/pam.d/passwd to /etc/pam.d/vnc, but different systems do >> this differently. Some systems may use a pam.conf file, in which case >> you'd copy the [passwd] stanza to a new stanza called [vnc]. >> >> on the viewer: >> >> -SecurityTypes=VeNCrypt,Plain >> >> (also controllable through the GUI.) >> >> One of the things I want to port over from TurboVNC is the per-session >> access control list. With that system, if user/password auth is >> enabled, then the creator of the Xvnc session is automatically granted >> access using that auth method. Then, he/she can use a special option to >> vncpasswd to grant additional user names either view-only or full >> control access (and subsequently revoke same) while the session is running. >> >> Another security extension we have is a centralized config file that >> allows the SysAdmin to globally disable reverse connections and to >> globally require that TurboVNC connections be made only to/from >> localhost (to force SSh tunneling to be used, which is a good idea in >> conjunction with the plain text user/password method.) It's not 100% >> hackproof, but in a reasonably "locked down" enterprise environment, it >> seems to work well enough. Users would basically have to build their >> own custom version of TurboVNC to circumvent it, and what's the impetus >> for doing so? If they want to compromise their own password, they could >> just post it up on the bulletin board down the hall and save themselves >> the trouble. >> >> I'm OK with requiring VeNCrypt for the time being to get the >> user/password functionality, but in the long term, it may be necessary >> to re-implement a method of doing this that doesn't require VeNCrypt. >> This is mainly because VeNCrypt is so difficult to work with on Windows >> (more on that in a subsequent e-mail.) >> >> ------------------------------------------------------------------------------ >> The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE: >> Pinpoint memory and threading errors before they happen. >> Find and fix more than 250 security defects in the development cycle. >> Locate bottlenecks in serial and parallel code that limit performance. >> http://p.sf.net/sfu/intel-dev2devfeb >> _______________________________________________ >> Tigervnc-devel mailing list >> Tigervnc-devel@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/tigervnc-devel > > -- > *Robert Goley* > > FOSS Implementation Specialist > Toll Free: (800) 338-4984 > Local: (770) 479-7933 > Fax: (770) 479-4076 > www.openrda.com > > /America's only Free & Open Source fund accounting software company./ > > > > ------------------------------------------------------------------------------ > The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE: > Pinpoint memory and threading errors before they happen. > Find and fix more than 250 security defects in the development cycle. > Locate bottlenecks in serial and parallel code that limit performance. > http://p.sf.net/sfu/intel-dev2devfeb > > > > _______________________________________________ > Tigervnc-devel mailing list > Tigervnc-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/tigervnc-devel ------------------------------------------------------------------------------ The ultimate all-in-one performance toolkit: Intel(R) Parallel Studio XE: Pinpoint memory and threading errors before they happen. Find and fix more than 250 security defects in the development cycle. Locate bottlenecks in serial and parallel code that limit performance. http://p.sf.net/sfu/intel-dev2devfeb _______________________________________________ Tigervnc-devel mailing list Tigervnc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tigervnc-devel