Since I already have my own experience with this, I skipped the other
responses so you can know what I know simply enough. Useful comments
appreciated.
In article <453cfe9b$0$88705$***@news.sonic.net>,
jeff <***@spam.invalid> wrote:
" I've got a VNC server running on my home desktop Linux box, and I'd
" like to be able to occasionally access it from a remote hotspot on a
" Windows laptop. Doing this without encryption would be nuts, so I'm
" looking for a reasonable approach, and the two that I've come up
" with use SSH or VPN tunneling.
"
" First question: If I enable Sonic's VPN on both the desktop and
" laptop, will that ensure that my VNC session will be encrypted
" end-to-end? If so...
Nope. Sonic.net's VPN is only between you and Sonic. Between Sonic
and whereever else, it is not encrypted. This includes from
Sonic.net's VPN to your host machine, even if just via the Public
Switched Network's ATM cloud (all of which is assembled in big spy
databases run by untrustworthy entities, so quite the opposite of
secure).
OTOH if you VPN from both hosts to Sonic.net's VPN computer, the only
connection unencrypted would be from the VPN computer at Sonic.net to
the VPN computer at Sonic.net, then back again in the other direction.
The benefit there is that that connection is most likely pretty short
(although that's not guaranteed??) and should be harder to hack.
" Second question: Is either of the two approaches markedly better
" from a security point of view? (From a *simplicity* point of view,
" VPN would be my first choice.)
Odd. I found SSH easier. I already had it configured and knew how it
worked, so that probably made a big difference.
VPN is REALLY easy to accidentally do insecurely: simply forget, or if
VPN shuts off, it just reverts to no VPN without much (or any) notice
at all. SSH will kill your connection along with the tunnels you are
depending on, thus causing security within the connection to be
preserved almost no matter what. (That's why I do alwaysshared so
that I can simply reconnect again whenever the connection goes away,
and my session is saved, much like "screen -xRR" in tty sessions.)
" Thanks for any insights!
"
" Jeff
vncserver :1 -geometry 1000x740 -alwaysshared -httpport 8080
A second sshd with sshd_config line "Port 80" helps to get around many
library port filters.
U.ARIZONA.EDU
your.ip.number.or.host.name:80
login
password
Options -- encryption
Options -- SSH2
Options -- compression
Options -- simple forwardings ... 5901:127.0.0.1:5901
Options -- simple forwardings ... 8080:127.0.0.1:8080
New window: 127.0.0.1:8080
PASSWORD PROTECT YOUR VNC!!!! There is a flaw here: if you have bad
passwords, that can be broken sometimes, but not always.
All you need is JAVA in your Browser -- gets around filters, and is
encrypted. COULD BE HACKED by libary personnel, though, since your
security is in the library computer. (This is why bringing your own
laptop is good.)
Ok, let's say you have your own computer with XP, and you can install
your own programs. Putty SSH. Options: SSH2, compression, forwarding
5901:127.0.0.1:5901 or 5903:127.0.0.1:5903 or whatever. You can
usually do something like 5905:127.0.0.1:5902. Connect and log in.
(Sounds like put pot on oven and cook.)
Then, get the XP version of VNC (look for Google VNC download XP). Do
VNC Viewer, e.g., :1. :1 is alias for 127.0.0.1:1. Of course that
goes via SSH tunnel.
Security ideas: only allow connections from local host, since SSH is
the only protocol going interhost. You only allow from local host in
both VNC (server) and SSH (both sides since doing forwarding). Read
both documents for how to do this, as well as /etc/hosts.allow and
/etc/hosts.deny. Use all methods, and TEST each breach method (both
before and after to see what it does).
VPN? That would also work. What I know is SSH since it's so easy.