Wez:
        I agree that exponential back-off for failed authentication
attempts is a good way to prevent dictionary attacks from being
viable. Here's my concern: your software's blacklisting isn't
actually "tripped" by failed authentication attempts -- it's tripped
by *any connection at all*. That's not the best solution, IMO,
for two reasons:

1. It makes things tricker for (ahem) ISV's who write 3rd
   party tools that, say, auto-detect VNC Servers on a LAN.
   Of course, I understand that making their lives easier is
   pretty low on your list of concerns, but it's worth a
   mention.

2. It overly exposes VNC to DoS attacks. With nmap running on
   a PC with access to raw sockets, I could:

% nmap -sT -p 5900 my.lan.ip.address/24 -S ip.address.to.block
% <repeat once a minute>

   This will transmit spoofed packets to all RealVNC servers on
   the LAN, effectively blacklisting any IP address I choose.

        I'm hopeful for those 2 reasons, you'll at least consider
modifying the blacklist "trip" mechanism in your future releases,
so that it activates *after* multiple password attempts have
actually failed. That's much more resilient to spoofed connections,
as it actually requires a real protocol exchange.

cheers,
Scott

The blacklisting algorithm uses exponential back-off, so it really *does*
prevent dictionary attacks from being viable.

As regards the possibility of DoS attacks - yes, they are possible but the
DoS attack you describe prevents anyone on the attacking host from accessing
it, while a dictionary attack would actually grant the attacker access to
that server, which is clearly worse!
<snip>
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to