Mike,

Neither worms nor viruses can propagate via a VNC connection, since the
protocol contains no scripting or executable elements.

The main issues with opening a firewall  to allow VNC access are to do with
session snooping, tampering and impersonation attacks, which are pretty
rare.  VNC Enterprise and Personal Editions (http://www.realvnc.com) have
in-built security to protect from such attacks, or you can tunnel your VNC
connections via a secondary protocol such as SSH.

Regards,

Wez @ RealVNC Ltd.


> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of mbrown
> Sent: 16 August 2005 20:04
> To: vnc-list@realvnc.com
> Subject: VNC security
> 
> We are behind a firewall, but want to get VNC to allow consultants we
> trust to have remote access to our computers (and vice versa).  Past
> posts to this list convinced me that opening a port in the 
> firewall for
> specific users is a secure activity, but our IT guys are now 
> saying that
> it doesn't necessarily protect our systems from worms or viruses that
> may already inhabit the trusted user's computers.
> 
> Does anyone have a response to this?  It seems logical.  Would we want
> to require that any remote user that traverses our firewall 
> via VNC have
> an acceptable virus scan before doing so?  Are there particular VNC
> products that would be best for both us and our clients?  Can our
> clients use the free version?
> 
> 
> Mike Brown
> Salt Lake City
> _______________________________________________
> VNC-List mailing list
> VNC-List@realvnc.com
> To remove yourself from the list visit:
> http://www.realvnc.com/mailman/listinfo/vnc-list
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to