OK.  The registry setting AllowLoopback does not work when connecting WinVNC
to a VNCviewer.

Thanks.  Darn!

I might still have to have a custom compile.

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Scott C. Best
Sent: Thursday, January 17, 2002 4:26 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Providing (Windows) VNC support to clients that have
strict...


Chuck:
        Heya. You've probably already discovered this, but there's
a registry setting you need to make to your VNC server machine to
allow loopback:

        http://www.uk.research.att.com/vnc/winvnc.html

        Down at the bottom, AllowLoopback. Or, even more aggressive,
try LoopbackOnly (which appears to be specific to working well with
SSH tunneling). Hope one of them is what you're looking for!

-Scott


> Ok.  I have tested this scenario.  The tunneling works fine, but the total
> picture does not.
>
> When you make the connection from WinVNC to VNCviewer using the tunnel
> through SSH, the VNCviewer on the other end thinks it is an "internal
> loopback connection", and disconnects you.  This happens regardless of
which
> IP address you use on the WinVNC machine.
>
> Since VNCviewer states, "Internal loopback connections are not allowed",
the
> implication is that there is a setting that WILL allow them, either in the
> source, or in the GUI settings.  Is this the case?
>
> So the solution just got more complicated.
>
> To avoid the VNCviewer thinking the connection is a loopback, you have to
> run the SSH client on a completely separate machine on the same LAN, and
> have to allow it to receive connections on its local port from other
hosts,
> like so:
>
> WinVNC on ClientWS1 ---> SSH on ClientWS2 port 5500 --> Internet --> sshd
on
> MYFirewall port 443 --> VNCviewer on MyWS1 port 5500
>
> This I have tested, and it works, but presents the following major two
> problems:
>
>       1.  This is too complicated for the client.
>       2.  Opening the SSH connection from the client to the SSHD your
Linux
> firewall is effectively like creating a VPN connection from the client to
> your network.  This opens a huge security hole in your network, and gives
> someone on the client's network the ability to snoop around your network
> when the connection is made.
>
> I am concerned about tunneling VNC through SSH, because it gives the
client
> the ability to create more tunnels.  Is it really wise to secure the
client
> VNC connection, at the cost of exposing your own network to the client?
>
> Feedback is greatly appreciated.
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to