On Tue, 6 Jun 2006, Alex Pelts wrote:

IMHO, VNC people did all they could to fix the problem and post the
update. It is up to the users to make sure they are up to date. If you
do not like RealVNC security record you are always free to run any other
software. There are really many choices you can make:
1. Run VPN with strong authentication and use your VNC over VPN.
2. Run ssh and tunnel over ssh, which is really equivalent to #1
3. Keep your VNC up to date if you insist on exposing it to the net.
4. Run any other software that you deem more secure.

These are good ideas, but we should note that #1 and #2 above would not protect you from attack unless VNC was not accepting connections from outside SSH or VPN. You must set the RealVNC server to "Only accept connections from the local machine":

http://www.realvnc.com/products/free/4.1/winvnc.html

Then use SSH port forwarding in combination with that so that an attacker would have to connect by SSH to get access to VNC. Otherwise, your use of SSH would have protected you from snooping, but it did not protect you from the major vulnerability that was discovered last month.

Mike
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to