At 08:56 AM 3/5/2003, William Hooper wrote:
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of vocaro.com
>
[snip]
> Unfortunately, when I'm at work, I can't use the VNC client
> on my Windows
> workstation. This is because our corporate network uses a proxy server
> that only allows incoming and outgoing connections on
> standard ports (such
> as port 80 for web browsing). My network admin won't open any
> other ports
> because I don't use VNC for work-related stuff, just personal projects
> when I'm on break.

The proxy is the problem.  Most proxies just talk HTTP (and/or FTP).  This
will not work because VNC doesn't use either of these protocols.

> I've been told that the VNC server can send and receive its
> RFB packets
> through port 80, which presumably would allow the VNC client
> to go through
> the proxy.
[snip]

Running on port 80 might get you past a firewall, but not a proxy.

You can try an HTTP tunneling program, but considering you don't have the
support of the Network Admin be prepared to deal with the consequences of
trying to by-pass their network policy.

[-- following text ripped from a previous post of mine --]


There are definitely ways to pierce a firewall given a proxy.

I'd suggest using bouncer to get through the proxy, with stunnel on your home computer, listening at 443 (some proxies won't let you "CONNECT" to other ports). So, the connection would be like this:

work-vncviewer ->
work-stunnel ->
work-bouncer -> (through firewall)
home-stunnel ->
home-winvnc

A bit convoluted, but this way they don't get to see your traffic.

Bouncer is pretty sweet, and it will do normal http authentication (but not the NTLM crap that some Windows shops use).

Links:
http://www.stunnel.org/  <- stunnel
http://www.r00t3d.org.uk/  <- bouncer

[-- end ripped bit --]

When the network admin doesn't do something because "there is no business reason", it's usually because he's a big slacker, and knows you can't /make/ him do it. If they don't do something because "this aspect of it makes us vulnerable to thus-and-so attacks", then they actually have a reason.

At any rate, depending on how close a watch he keeps on your system, they'll probably never know anything other than that you are connecting to your home HTTPS port, and sending a lot of traffic. Ah, the beauty of encryption.

Jordan
_______________________________________________
VNC-List mailing list
[EMAIL PROTECTED]
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to