VP wrote:
Hi Stuart,

Does this mean that if you are using the latest _Enterprise_ edition of Real VNC that tunnelling through a VPN or SSH connection becomes unnecessary?

Thanks


Please reply to the group list, not to individuals.
</lecture>

I have never used RealVNC Enterprise or Personal editions, so the only information I can give you would come directly from RealVNC's web-site. Try http://www.realvnc.com/products/features.html for a start.

RealVNC offer a trial on both Personal and Enterprise Editions, so you can find out for yourself if that will suit your needs before making a financial commitment. The Enterprise and Personal editions of RealVNC offer built in encryption types, meaning that they CAN have encrypted connections IF YOU TELL THEM TO DO SO. This would make the encryption offered by a VPN or an SSH connection unnecessary. However, encryption is not the be-all and end-all of security. There are other factors to consider about whether a system (like VNC) is "safe enough" to be used over the internet, for which you will have to make your own judgement.

HTH,

Stewart


At 08:58 PM 28-09-06, you wrote:

Adrian Powell wrote:

Is Real VNC considered current safe enough (generally) to use across the
internet ?.


Free edition: NO! It is not encrypted, and although the password is checked securely, you can only have a password of a maximum length of 8 characters. Any keypresses (for typing passwords, etc.) you send within the session are send "in the clear." Similarly, if the work you are doing on screen is sensitive, that is not encrypted. However, you can tunnel VNC through a VPN or SSH connection. Try googling "VNC and SSH HOWTO" or "VNC and VPN HOWTO" for details on how to go about this.

It is my understanding that RealVNC Personal edition and Enterprise edition address these issues. There are also variants on different versions of RealVNC Free edition that have encryption added in, such as VeNCrypt, maintained by myself and Martin Koegler. See http://sourceforge.net/projects/vencrypt for details.

Googling for VNC exploits appears to imply that there have been many
vulnerabilities
in the past,  and having free source code available only compounds the
security risk.


Open source does not make it any more/less secure than any other solution. Many security schemes are open, either from open source implementations or the algorithm is publicly known. There is no security in hiding your method - considerably less in fact, since that means fewer people can analyse the situation. For example, ssh is open source but considered a very secure mechanism.

Stewart Becker
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to