[In a message on Tue, 19 Apr 2005 21:14:50 EDT,
  "Steve Bostedor" wrote:]
>I am wondering why expose VNC over the internet in the first place, really.

Exactly what I said.  VNC should *NOT* be exposed to the internet.

>It's my opinion that VNC is really only good for LAN's.  Why not use VPN to sec
>ure your connection to the remote network before starting VNC sessions?  It's 
>much easier to set up on a LAN where you need VNC access to 200 computers than
> setting up SSH over the Internet!

Uh. . . OK, the REALLY nice thing about VNC is that it beats LBX (Low
Bandwidth X) as a means of displaying applications remotely.  In fact,
having tried raw X, LBX, Serial Xpress, Timbuktu and VNC, I can safely
say it is the BEST to use over 28K dialup lines. ;-)

When you tunnel with SSH, you in effect are creating a VPN to your
remote network, only without all the hassled of setting up VPNs.  At
OsCon this year, they apparently (accidently?) blocked GRE traffic off
the wireless network -- of the three people from my (ex) company, I
was the only one who could still connect back to the office and fix
things. :-)

If you REALLY think it's easier to set up VNC to access 200 computers
(insane, if you ask me.  By the time you get to the high 10s of
computers, you had really better have set up alternative
administration mechanisms -- which is not to say that using VNC as a
diagnostic tool on those same 200 machines isn't a good idea) than
setting up an SSH tunnel, well, then, either you just have no
experience with SSH or you didn't read the docs well enough. This too
can be automated. :-)

Of course, if you're implying I set up a VNC connection over SSH for
each of 200 computers, yeah, you're right, that's insane.  But VNC is
MOSTLY good for spot-maintenance.  If you want to graphically control
200 machines simultaneously, no, SSH isn't a good fit.

>I can concede that VNC data should be encrypted in some way when traveling the
> Internet but why do people set up VNC over SSH on local networks?  That reall
>y makes very little sense to me.  If your network is so insecure that you're w
>orried about your VNC traffic being hacked, you've got some pretty big problem
>s!

OK, let's look at this statement.  You work for a large multinational
organization, with REAL privacy concerns (HIPPA anyone?  Banking?
Sarbanes-Oxley?).  You have people VNC'ing all over the place.  And
you have PC's indiscriminately running services on PC's acting as
servers that really shouldn't be.  Now you have PC's on server
networks that can be hacked.  You have people running sniffers on
their desktops.  You have basically *who knows what* between you and
the VNC desktop you're controlling.

Now, do you NEED encryption?  No.  Do you REALLY trust the routers and
switches to not have their buffers fill up and start broadcasting all
packets to every interface?  If so, you drank Cisco's Kool-Aid(tm).

Just like we completely phased out telnet and rsh (in favor of SSH),
why not phase out non-encrypted VNC connections?  Frankly, I have to
admit, I REALLY don't understand why RealVNC hasn't added either a
STARTTLS option to VNC, or otherwise added TLS a an option (OK, yeah,
it's a certificate problem, but still, you could incorporate your own
CA in your viewer).

Basically, if 80% of intrusions come from inside your network (and
they do, from your so-called "trusted" employees) why not do what you
can to prevent over-the-wire attacks?  It's cheap and easy.

>I connect to a network via VPN and others I connect using encrypted RDP sessio
>ns.  Once I've made those connections, I can safely use VNC on the remote netw
>orks.  Why waste all of this time with SSH on Windows computers all over the n
>etwork when VPN and RDP is so easy to set up?

Because some of us avoid Windows with a ferver you can only imagine.
I don't (I have a mild aversion to Microsoft, thought I abhore all
forms of Windows).  But I *DO* have to support Suns and Macs and a
bunch of other things.  And screwing around with a VPN connection from
my friends Mac when I'm playing with my band on Tuesday night just
doesn't cut it ("Hay, dude, can I load this stupid Cisco VNC client on
your Mac?  Don't worry, it will only take 5 minutes to download, about
10 to set up, about 2 to do what I need, and another 10 or so to
remove it").  Typing "ssh remotehost" in the terminal cuts it.

And, keep in mind, you can SSH to one host and forward to another.
So, you don't need to set up SSH on a Windows computer (Putty on the
client is all your need, if you're running Windows -- or, if you don't
want that, try MindTerm -- works great from internet cafes ;-)).  One
unix box on the remote end, and you can connect to anything on the
other side. :-)

Note, I'm not trying to be snippy here.  I know I might sound like
it. It's just that I fought (and lost, which is why it's my *ex*
company) for allowing SSH in remotely to my company.  They idiotically
expected every person to have a PC running Windows to connect
remotely.  I explained I had sun workstations and a Mac at home. They
said "We have clients for those".  I pointed out that the Mac needed
to have local network access, and not capture all traffic out the
internet, and that the Suns run OpenBSD.  They said "Have your manager
buy you a PC".  I said "What about when I'm away from home without my
computer".  They said "Ummmmmm.  But you have to use the VPN client,
it's more secure."  Someone pointed out it's so they can see what
you're doing.  I said "OK, set up a VPN client, and ssh after the
connection is made".  It's not more secure, it's not more
transparent.  It's just stupid.

Having said all that, VPNs *DO* have their place, and I've set up a
lot of them.  It's just that it's NOT the only solution, and sometimes
(often, for me) not the *RIGHT* solution.

OK, I'm done ranting.

Sean
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to