On Fri, 2008-08-15 at 15:09 -0500, Peter Bunn wrote:
> Hello again:
> 
> I'm very grateful for all the suggestions I received from my last post, 
> but still have not implemented an SSH tunnel or a 'Hamachi-like' solution.
> 
> What I *have* done - until I adopt a more secure tunnel of some sort... 
> until I'm comfortable adding another layer of complexity to the 
> connection - is the following:
> 
> (Recall that the operable VNC port is always open and the VNC server 
> always running in Service Mode when the computer is on... presently only 
> about 6-12 hours per week.)
> 
> - Set the VNC server port to something non-standard in the 5 digit range.
> 
> - Closed the HTTP 'outgoing' port.
> 
> - Obfuscated the description of the listening service in the ICF firewall.
> 
> - Limited permitted access to the subnet block (abc.xyz.0.0) that my own 
> ISP assigns me when I dialup to the Internet.
> 
> - Slightly strengthened the 8 character password that the free version of 
> RealVNC allows.
> 
> -----
> 
> At this point, with my very limited knowledge of how an open port exploit 
> might be achieved, I'm thinking a hacker must go through (roughly) this 
> process to do something nasty:
> 
> - Randomly (or purposefully) scan the IP address and find an open port.
> 
> - Guess the nature of the listening service (if it isn't explicitly 
> reported by his scanning software).
> 
> - Spoof the IP address to mimic an address within the permitted access 
> subnet (as above).
> 
> - Break the 'non-dictionary' 8 character password.
> 
> -----
> 
> I guess I would ask first if I'm (roughly) correct in my thinking... and 
> then ask how easy it would be to achieve the sequence of steps in the 
> hack.
> 
> At the moment, I'm actually less concerned about an unencrypted VNC 
> session than I am about the 'everyday' vulnerability of the open port and 
> the always on VNC server... the latter two being (almost) necessary for 
> reliable access to my Father's computer.
> 
> My Dad does little or no web commerce, has little or no sensitive data on 
> his computer (that I'm aware of), and during one of my maintenance 
> sessions, there is little or no sensitive data passed between the two 
> machines.
> 
> So... can I rest easy for the moment or should I - with all due haste - 
> try to implement a more secure connection method?
> 
> -----
> 
> Once again, an awfully long-winded post, but still hoping for additional 
> insights.

I would not be comfortable with this setup, except temporarily... and...
It really is pretty easy to setup a secured tunnel that uses public key
private key encryption.  Even on Windoze now a days! 

If on Windoze (as the server), install CopSSH on the Windoze box then
generate a key pair, install the public key on the the server side in
the .ssh directory,  configure ssh to disallow password authentication,
and listen on a non-standard port (something in the 5 digit range which
you then open through the router with port forwarding).  

With public/private key encryption (and password authentication
disabled), there is no way someone can get in, unless they have your
private key, and your key's password, or the find a vulnerability in SSH
that they can exploit.  SSH has been very solid for a very long time.

When I want to connect to my fathers PC (which has this setup on it),
and VNCServer running at startup... I simply ssh into his box as
follows: (this creates the tunnel)

     ssh -l my_username dads.dyndns.address \
          -p port_number -L 5900:localhost:5900'

Then on my local box, I run:

     vncviewer localhost

It works great!

Get basic ssh working first.  Then this is easy.

Lincoln
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to