Hello.

I'm a network and security analyst for the OSC (Ohio Supercomputer
Center) in Columbus, Ohio, USA.  First off, let me say that I and my
organization generally has been very impressed with the functionality
of VNC.  We've been using VNC to share a desktop in seminars -- a
"master" who demonstrates something, and some number of slaves who are
simply spectators, viewing what's going on.  We've used this in the
past for multi-location conferences, to permit people all over the
world to view our desktop as we give multicast audio/video
presentations across the Internet.  See www.accessgrid.org for more
information on our approach.

Unfortunately, VNC does not really support any kind of (enforced)
seperation of these two kinds of users.  The underlying issue, from a
security standpoint, is that VNC doesn't differentiate between
authentication and authorization: if you authenticate at all, you're
authorized (as far as VNC is concerned) to do whatever you want on the
server.  From a security standpoint, it'd be useful to see
segmentation between the "view" mode and the "modify" mode (where your
input is actually processed by the server).

To faciliate "online seminars" it'd be useful to post a VNC password
and port at a host on, say, a web page.  Unfortunately, once you've
got that password, you're able to run whatever you want on the server,
so a vandal could claim to be a "master" during the seminar and
disrupt the sessions, or could come in just before or just after the
seminar and run arbitrary code, disrupting the security of the host
and the network we operate.

To resolve this problem, it would be helpful if there could be some
way to specify a different "view-only" password that would be
different from a "full control" password.  Then, master sessions could
run over an SSH tunnel and protect the password of anyone who's
capable of changing the running session in any way, and all viewers
could run without SSH for better performance and without a threat to
the security of the host and network the VNC server is on.

I've only passingly scanned the protocol: it's not clear to me that
the protocol itself supports this kind of functional seperation.

Might it be possible to see this seperation as an extension in future
versions of VNC, should I be working on patches, or is it going to be
more advantageous to build chroot'd and highly restrictive X
environments for the server?

Thanks in advance,

       -Bill
-- 
William Yang
[EMAIL PROTECTED]
---------------------------------------------------------------------
To unsubscribe, send a message with the line: unsubscribe vnc-list
to [EMAIL PROTECTED]
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to