Free Essay

Remote Desktop

In:

Submitted By brenowrks
Words 7447
Pages 30
Remote Desktop Project ====================== (Work In Progress)

Mark McLoughlin (mark@skynet.ie) December 1st, 2003

1. Problem Description
======================

In enterprise installations system administrators typically have to deal with a large number of pretty basic problems on users' machines. Remotely taking control of a user's desktop to fix the problem while at the same time training the user as to how to resolve the problem for themselves is an effective and simple way to handle these types of support scenarios.

Currently there is no way to do this with GNOME.

2. Overview
===========

The basic requirement for such a tool is some method of sharing a desktop session between multiple users. The sysadmin sees what the user sees and the user sees what the sysadmin sees.

However, the technology behind this is obviously useful in other ways. Here in Sun, for example, we make widespread use of VNC for some basic collaboration. Targetting this project purely at the
Remote Assistance use case will leave some users wondering "why
... why on earth did you make it impossible for us to use this like
VNC?".

This project, therefore, also encompasses the use case of a simple form of collaboration by sharing access to a desktop session. There are various existing technologies in this area which all work in very similar ways. This project will follow those same basic architectural principals.

The core part of such a system is a protocol by which information about what is happening on the screen of the "host" machine (in this case, the user's machine) is sent to the "client" machine (the sysadmin's machine). The client also needs to be able to relay back key presses and pointer manipulation information to the host. There are several existing such protocols available - the RFB
(Remote FrameBuffer) protocol used by VNC, RDP (Remote Desktop
Protocol) used by Window's Remote Desktop and the Sun Ray protocol.

On the host machine a mechanism is needed by which all drawing primitives are proxied via the protocol to the client machine as well as a mechanism by which key/pointer events from the client are passed to the windowing system. Also needed is an authentication mechanism by which access to the host system can be restricted.

On the client machine an application which allows the user to connect to the host machine, authenticate, display the contents of the host display and forward input events to the host is required.

3. Task List, by Commonality and Frequency
==========================================

Below, each of the user tasks the project aims to facilitate is listed, grouped by the proportion of users who will perform the task and how often it will be performed. In the absence of personas to encapsulate our target user base, the groupings are judgement based.

Each task also has (C), (I) or (NTH) depicting whether support for that task is core, important or nice to have functionality.

First lets take a look at the "Remote Assistance" use case on the host side and then on the client side.

=> Host

* Frequent by Many:

1. Verify/approve a connection before it can be established. (C)

* Frequent by Few:

1. Request assistance from a colleague or system administrator. (I)

=> Client

* Frequent by Many:

1. View a desktop remotely. (C) 2. Interact with a remote desktop. (C) 3. Browse the network for a machine to connect to. (I) 4. Make the remote desktop occupy the entire local screen i.e. a fullscreen option. (NTH)

* Occasional by Many:

1. Open a connection to a user's desktop given only the hostname of the user's machine (C) 2. Open a connection to a user's desktop without having the user be aware of your connection. (I) 3. Receive a remote assitance request and open a connection to that user's desktop. (I)

Now, lets take a look at the additional tasks with a simple
VNC-like collaboration tool.

=> Host

* Frequent by Many:

1. Inform others how to connect to your desktop. (I)

* Frequent by Few:

1. View the number of and the details of established connections. (I) 2. Close established connections. (I) 3. Toggle established connections between interactive and non-interactive. (NTH)

* Occasional by Many:

1. Allow/dis-allow remote connections to the desktop. (C) 2. Allow/dis-allow interactive connections. (C) 2. Restrict remote access to your desktop in some way (e.g. set a password, specify specific users ...) (C)

=> Client

* Frequent by Many:

1. Open a connection to a remote desktop given some details from the host user (C)

4. Functional Requirements
==========================

=> Host

1. Ability to approve or reject a request to remotely connect to the desktop. (C)

2. Ability to request assistance from a pre-defined source. (I) 3. Ability to request assistance from a colleague. (I)

4. Ability to allow/dis-allow remote connections to the desktop. (C) 5. Ability to allow/dis-allow interactive connections. (C) 6. Ability to restrict access to the desktop in some way (e.g. assign a password) (C)

7. Ability to give, to another user, enough details for that user to connect to your desktop. (I) 8. A list of currently open connections, including details of the other endpoint of the connection and whether or not the connection is interactive. (I) 9. Ability to close a connection. (I) 10. Ability to toggle a connection between interactive and non-interactive. (I)

=> Client

1. Ability to view a desktop remotely. (C) 2. Ability to interact with a desktop remotely. (C)

3. Ability (for a user with sufficient priviledges) to connect to a given user's desktop on a given host. (C) 4. Ability to browse the network for hosts which you can then connect to. (I) 5. Ability (for a system administrator) to connect to a given user's desktop without the user being aware of the connection. (I)

6. Ability to view the remote desktop in fullscreen mode. (NTH)

7. Ability to connect to a desktop given a remote assitance request. (I) 8. Ability to connect to a desktop given some details from the host user. (I)

5. Notes/Design Constraints/Caveats
===================================

* I don't think the "Request Assistance" task is a very important one. In most cases where a user has support personnel available I think picking up the phone will be a much more common way of requesting assistance rather than clicking a button and twidling your thumbs waiting for someone to respond.

6. Review of Existing Technologies
==================================

6.1. Existing Products - VNC/RFB
================================

RFB[1] (Remote FrameBuffer) is the protocol used by VNC. The emphasis in the design of the protocol was to make very few requirements of the client. The client has no need to maintain explicit state and clients are able to disconnect and re-connect to the server while preserving the state of the user interface.

The dislay part of the protocol is based around a single simple graphics primitive "put a rectangle of pixel data at a given position". Each rectangle may be encoded in any one of a number of encodings allowing for compression or usage of parts of the client's existing copy of the framebuffer. Updates are requested by the client rather than pushed out by the server allowing the protcol to adapt to slower networks and/or clients - i.e. with a slow network or client the rate of updates are greatly reduced and the client ignores the transient state of the framebuffer.

The protocol is quite extensible. Extra encodings can be advertised by the server and used if the client supports the encoding. Use of encodings are not only limited to how frame buffer updates are encoded on the wire, but also extra psuedo-encodings may be added which can do anything from inform the client of a change in cursor shape, a change in the size of the screen or even things like extra in-band communication between the server and client.

There seems to be many different implementations of VNC available. Available RFB server implementations include:

* libvncserver[2]: a "library" for implementing VNC servers. It basically just seems to be a hacked up version of an existing VNC server in an archive with some header files. Not a very nice API, but quite a few projects are using it successfully.

* xf4vnc[3]: a controlled fork of XFree86 which allows you to run an Xserver which doubles as a VNC server or export your local framebuffer through a loadable module.

* realVNC[4]: seems to be a continuation of the original VNC project which has an Xserver which doubles as a VNC server. Thus, there is no method by which you can remote the local framebuffer.

* x0rfbserver: an X11 client which acts as an RFB server and exports the local display by polling the display for updates using X and pushing the updates out to clients using RFB.

* krfb[5]: a pretty nice looking VNC server for KDE which is based on the same concept (and indeed uses some of the code of) x0rfbserver. It also uses libvncserver.

I won't list the VNC client's available, there seem to be many, but suffice to say there are X11, Windows and OS X clients available along with, interestingly, several implementations of a Java client which can be run embedded in the browser as an applet.

Tim Waugh has written a nice article[6] on VNC and the many projects around the technology.

In summary, the RFB protocol has a number of advantages:

1) Simple and open protocol. 2) Rate-limited by the client, pretty low bandwidth/latency requirements. 3) Extensible. 4) Several open source implementations available. 5) Many existing clients available for different platforms.

6.2. Existing Protocols - Remote Desktop/RDP
============================================

"Remote Desktop"[7,8,9] is Microsoft's technology in this area. The RDP protocol itself is essentially an extension of the
ITU-T T.128 (aka T.SHARE) application sharing protocol[10].

The protocol is a good deal more complex than the RFB protocol and the protocol supports a very much larger set of functionality than the RFB protocol e.g.

* Printer re-direction - you can print something on the host machine to a printer local to the remote desktop client.

* Sound re-direction - sounds from the host can be heard at the client.

* Multi-point sharing - the remote desktop session does not neccessarily consist of only windows/applications on a single host. Multiple hosts can share applications to the session.

None of these features are needed here given the functional requirements above.

Also, the protocol has been further extended by Microsoft to such an extent that it hardly be considered an "open" protocol.

Another problem with Window's Remote Desktop compared to VNC is the limited client availability. On Linux, the rdesktop[11] project provides a Remote Desktop client (tsclient[12] is a GNOME-like frontend for it) but on Windows, the only client I know of is the Window's
Remote Desktop client.

6.3. Existing Protocols - Sun Ray
=================================

There's not a lot of information out there on SLIM, the protocol behind Sun Ray. About the only details available are from a paper[13] investigating the performace of the protocol.

SLIM, like RDP, is designed to immediately push all frame buffer updates to the client. Therefore, on low bandwidth connections the updates would just pile up. One would assume this is the reason
Sun Ray requires a dedicated network.

Also, Sun Ray has no client implementation available apart from the Sun Ray Enterprise Appliance itself.

7. System Design
================

7.1. Overview
=============

The host side is to be implemented as a VNC server using the libvncserver library. The VNC server will act as an X client and poll the local X display for the contents of the framebuffer and notify the
VNC clients if there have been any changes. Input events coming from the clients will be injected into the X display using the XTEST[14,15] extension. The VNC client we will most likely be a modified version of an existing Java client. The advantage of having a Java client is that it may be used to connect to the host from any platform.

7.2. Monitoring The Local Display
=================================

To implement a VNC server you need to know the contents of the local framebuffer in order to pass this information onto the VNC clients. Currently, as an X client, there is only one way to do this and that is by doing a GetImage on the root window which basically copies the entire framebuffer from the X server to the X client. The main problem with this approach is that without knowing what parts of the framebuffer has actually changed since the last time you updated, you are wasting an enormous amount of resources copying the entire framebuffer each time.

There are a number of possiblities to lessen the inefficiency here. The first is to limit the amount of polling you do per update of the framebuffer. For example, every update you could just check a certain number of scanlines against your local copy of the frame buffer and if parts of the scanline differ, then do a GetImage on a number of tiles which capture those changes to the scanline. This is the approach taken by krfb and x0rfbserver.

Another possibility is an X extension to notify the X client of changes to the framebuffer, thereby negating the need for continually polling the X server. When the client receives the notification it can do a GetImage to update its copy of the framebuffer with the latest changes. Keith Packard is currently working on an extension to do exactly this called XDAMAGE[16].

Initially we will use the x0rfbserver approach of polling the screen, but will later implement support for the XDAMAGE extension when it becomes available.

7.3. Input Event Handling
=========================

The VNC server will need to handle two types of input events coming from VNC clients - keyboard and pointer events. These events will be injected into the Xserver using the XTEST extension.

To inject a keyboard event into the X server you invoke
XTestFakeKeyEvent with the appropriate keycode. The X server then maps this keycode, according to the current modifier state, to a keysym. We need to make sure that they keycode we pass to the X server maps to the same keysym as the keysym we received from the VNC client. We can reverse map a keysym to a keycode, but we also need to make sure the modifier state is such that the keycode will map back to that keycode. Both krfb and x11vnc use the same code for ensuring this and we can just copy that.

You can inject into the X server button presses/releases using
XTestFakeButtonEvent() and pointer movement using
XTestFakeMotionEvent(). The PointerEvent you receive from the client contains information on the state of each button and the current pointer location. The only slightly difficult part here is translating the button state information to button presses/releases, but it merely involves keeping track of the previous button state.

7.4. Cursor Handling
====================

The basic problem here is how to allow the VNC client to see the cursor. There are several possible approaches:

1. Draw the cursor directly to the VNC server's copy of the framebuffer and send framebuffer updates as the cursor is moved around. The client will see the cursor being moved in all cases.

2. Provide the cursor image to the client using the RichCursor or XCursor psuedo encoding and let the client draw the cursor locally. The client only sees cursor movement when that client is the one moving the cursor.

3. Again provide the cursor image to the client, but also send the client updates on the pointer position using the PointerPos pseudo-encoding which the client can use to update the position of its locally drawn cursor. Again, the client will see the cursor movement no matter who is moving it.

Approach (2) isn't very useful - the client needs to be able to see cursor movement on the host. For that reason, we will not advertise the cursor image to the client unless it supports *both* cursor position and cursor shape updates. If the client only supports one or the other, we ignore the support for that encoding and always draw the cursor to the framebuffer.

One problem here is that, in the screen polling case, because we will be comparing the local copy of the framebuffer (which may, with approach (1) above, have the cursor drawn in it) to the actual framebuffer (which will not contain the cursor image) we will need to undraw the cursor before doing any comparison. Instead of complicating the screen polling code with this detail we will draw the cursor image to the framebuffer just before sending a frame buffer update to the client and then immediately undraw it.

Of course, with either approach (1) or (2) we need some mechanism by which we can determine the current cursor position and shape. The only way to determine the current cursor position is by regularily polling using XQueryPointer(). Determining the current cursor shape is not possible but such support is to be added to the
XFIXES extension. [FIXME: more details on this].

7.5. libvncserver Work
======================

libvncserver contains lots of code from different VNC server implementations. The intent is to bring all that code together under one API which makes it easy to write VNC servers. However, rather than being a library, it seems more like a full VNC server implementation around which you can wrap a main function.

There are a number of problems with the library which can be fixed in a fairly straightforward manner, by extending the API slightly and cleaning bits up.

Other concerns around the library containing way more implementation that we would like/need, many private functions exposed in the API, structures that will likely need to be expanded being exposed in the API and a general feeling that the library cannot hope to maintain ABI compatibility are much harder to address. We have the option of just statically linking to the library, and so, the project will not be held up by these problems, but we should continue to consider coming up with a plan to fix these problems.

Initially, the project will contain a copy of libvncserver with the following changes:

+ API to allow glib mainloop integration. + Support for version 3.7 of the RFB protocol - this adds security type negotiation. + A hook so that we can allow the user to decide whether or not an authenticated client should be allowed to connect. + Re-worked cursor handling so that the cursor remains drawn to the server's copy of the framebuffer only for the duration of rfbSendFrameBufferUpdate(). + API to set the current cursor postion. + Only send cursor shape updates when the client also has support for cursor position updates and vice versa. + Removed default implementations of hooks and make that the default action when the hook isn't implemented. + TRUE == 1 instead of -1 to match glib. + Warnings fixes. + LIBVNCSERVER prefix removed from the #ifdefs so that we can use a normal config.h. libvncserver really shouldn't have platform dependant defines in its header anyway. + Threading support disabled but not removed. + Lots of code which we don't need removed: - UDP support - Vestiges of CORBA support - Back channel support - setTranslateFunction(), getCursorPtr and displayHook hooks - HTTP server implementation - Support for drawing GUIs to the framebuffer on the server side. - Command line argument processing.

7.6. Service Discovery
======================

In order to implement the ability to browse the network for available remote desktop servers there must be some way to enumerate the available servers. One possible mechanism for doing this is DNS
Based Service Discovery[17], a draft of which is currently on the IETF standards track.

DNS-SD is a convention for naming and structuring DNS resource records such that a client can query the DNS for a list of named instances of a particular service. The client can then resolve one of these named instances to an address and port number via a SRV[18] record. In the remote desktop case, a client could query the DNS for
PTR records of _rfb._tcp.<domain> and would be returned a list of named instances of RFB servers, using TCP, on the domain. For example:

PTR:_rfb._tcp.ireland.sun.com -> SRV:Mark's Desktop._rfb._tcp.ireland.sun.com SRV:Gman's Desktop._rfb._tcp.ireland.sun.com

(Note the way the Service Instance Name is a user-friendly name containing arbitrary UTF-8 encoded text. It is not a host name.)

The client would then display the list of available remote desktop servers - i.e. "Mark's Desktop" and "Gman's Desktop" - and allow the user to choose one. If the user chooses "Mark's Desktop" the client can then resolve that SRV record associated with the remote desktop instance.

SRV:Mark's Desktop._rfb._tcp.ireland.sun.com -> markmc-box.ireland.sun.com:5900

The client can then resolve the "markmc-box.ireland.sun.com" hostname and using the resulting ip address connect to the remote desktop server on port 5900.

While DNS-SD seems like a perfect mechanism by which remote desktop instances may be queried for, there remains the problem of how the DNS is populated with the details of these services to begin with.

A related draft proposal on the IETF standards track is
Multicast DNS[19]. The idea behind Multicast DNS is to allow a group of hosts on a local link, in the absence of a convetionally managed
DNS server, to co-operatively manage a collection of DNS records and allow clients on that same local link query those records.

The scheme works by each client connecting to the mDNS multicast IPv4 address and sending/receiving DNS-like queries/answers to port 5353. Between them, the clients manage the top-level ".local." domain and negotiate any conflicts that arise. So, for example, the host referenced by "markmc-box.ireland.sun.com" in the above example could also be resolved using the host name "markmc-box.local" by other
Multicast DNS clients on the same link.

In order to be queriable by Multicast DNS, our remote desktop server could act as a Multicast DNS Responder and Querier and register the remote desktop service there. Here's how the example above would look like if we were using mDNS:

Client queries the local link for remote desktop servers ...

PTR:_rfb._tcp.local

... and receives a reply first from markmc-box ...

-> SRV:Mark's Desktop._rfb._tcp.local

... and then a reply from gman-box: -> SRV:Gman's Desktop._rfb._tcp.local

Once the user has selected "Mark's Desktop" from the displayed list, the client resolves that service and receives a reply once again from markmc-box:

SRV:Mark's Desktop._rfb._tcp.ireland.sun.com -> markmc-box.local:5900

The client then resolves "markmc-box.local" to an ip address
(still using Multicast DNS) and connects to that address on port 5900.

Luckily, implementing this won't require writing an mDNS implementation from scratch. There is an existing implementation in
GNOME CVS which integrates nicely with glib's main loop and there are plans to centralise this in a desktop service advertisement and discovery daemon.

Another possible mechanism for making remote desktop service information available via DNS is to use Dynamic DNS Updates[20] to add
DNS-SD records to a conventional DNS server. However, the majority of
DNS server deployments restrict (for obvious security reasons) the ability to update DNS records completely or to only a few known hosts. Because using this mechanism would require installation sites to change their DNS administration policies, this is obviously not an attractive option.

7.7. Security Considerations
============================

7.7.1. VNC Authentication
=========================

VNC uses a simple DES based challenge-response authentication scheme. In order to authenticate the client, the server sends a random
16 byte challenge and the client then encrypts the challenge with DES using the user supplied password as a key. If the response matches the expected result, the client is authenticated. Otherwise, the server closes the connection. There are a number of possible vulnerabilities with this mechanism.

Firstly, the password, being limited to 8 characters, could be brute force guessed by an attacker who continually tries to authenticate using different passwords[21]. The standard way of making such attacks unfeasible is to enforce a delay between failed authentication attempts - i.e. if there has been a failed authentication attempt, delay sending the challenge to the next client who connects for a number of seconds.

Another possible vulnerability is the predictability of the random challenge sent by the server. If the server, under any circumstances, sends a challenge which has previously been used in a successful authentication attempt there is the possibility that an attacker may use the previously observered valid response again. An example[22] of such is if the server re-seeds the random number generator used to produce the challenge with the current time on each connection attempt. In this case, if an attacker connects to the VNC server within the same one second window as a valid client, then the attacker will receive the same challenge as the valid client and use the response from that client to authenticate. To avoid such a vulnerability the server should produce highly unpredictable challenges using the cryptographically strong random number generator providied with the GNU TLS library.

Challenge-response authentication schemes are inherently susceptible to man-in-the-middle attacks. The basic idea is that attacker uses a client to generate a valid response for a given challenge. One way[23] of carrying out such an attack is if the attack can intercept and modify the packets flowing between the client and the server. The attacker can then replace the challenge from the server with a challenge the attacker has received in a pending authentication attempt. The client then returns a valid response for that challenge with which the attacker can use to complete its authentication. Given that this tool is aimed mainly at system administrators administering a network of many desktop machines, and given that an administrator would likely set the same password for the remote desktop server on each of these machines, a more worrying man-in-the-middle attack is:

("C" is the administrator using a VNC client, "S" is the VNC server under attack and "M" is the attacker.)

1. M starts a modified VNC server which advertises itself on the local link using mDNS and DNS-SD (see the "Service Discovery" above) 2. C connects to M's modified VNC server by selecting it from the list of available VNC servers 3. M then connects to S and receives a challenge 4. M sends this challenge to C 5. C sends back a valid response to M 6. M sends a failed authentication message to C. 7. M uses this response to authenticate against S and is granted access.

There is no way to protect VNC's challenge response authentication mechanism from such an attack.

DES[24], by today's standards, is quite a weak encryption mechanism. Given that in this case that both plaintext and ciphertext
(the challenge and response) are both available a brute force attack to find the key (the password in the VNC case) is possible. Brute force cracking of DES is a much discussed[25]. A large amount of computing power would be required for such an attack and given that this tool would only deployed on private networks, it is perhaps not an immediate concern. However, in the years to come it is to be expected that such attacks would beome much more common and easy to perform. 7.7.2. Encryption
=================

RFB protocol messages are sent across the network unencrypted. This is an obvious security concern because an attacker may snoop the protocol packets and, using a modified VNC viewer, observe a VNC session in progress. Even more worrying, is that all key presses are sent in the open and may be snooped. Considering that system administrators are the primary target audience and that they are likely to enter the root password when running some system utility, the password could be snooped and used to gain root-level access to the machine.

In order to protect the VNC session from such attacks, the protocol should be extended to allow the stream to be encrypted. Luckily, the RFB protocol was designed to allow such extensions while maintaining compatibility.

The encryption of the RFB stream will be implemented with
TLS/SSL[26] using the gnutls[27] library and, for the Java client, the
Java Secure Socket Extension (JSSE)[28].

TLS is a protocol designed to provide privacy, data integrity, compression and, optionally, peer authentication using public key cryptography. The protocol mainly consists of two parts - the Record
Protocol and the Handshake Protocol. The Record Protocol is responsible for fragmenting, compressing, hashing and encrypting the data to be transmitted. The Handshake Protocol involves the peers agreeing on a protocol version, cipher suite and compression method, generating a shared secret and, optionally, exchanging certificates to allow the peers to authenticate one another (either or both peers may be authenticated).

New security types will be added (see below) which will cause the client and server to begin the TLS handshaking protocol immediately after one of those security types has been agreed upon. If
VNC authentication is required, that challenge-response exchange will happen immediately after the TLS handshake has completed.

The peer authentication which may take place as part of the
TLS handshake involves the peers exchanging certificates (currently only X.509[29] certificates are supported by the protocol but support for OpenPGP[30] certificates has been proposed[31]) and verifying their identity. In order to support server certificate authentication the VNC client will need have some sort of certificate store which contains the server certificates the client trusts - this is useful because it prevents a man-in-the middle attack. To support client certificate authentication, the VNC server will also require a certificate store listing the clients who are authorised to connect - this is useful because the password is no longer a weak point, but also that it would be generally more convenient for a system administrator to distribute his certicate to each of the desktop systems he administers and never have to type in a password.

If certificate based peer authentication is not used the client and server agree on a secret using anonymous Diffie-Hellman key exchange. TLS supports compression of the communication stream. Some investigation should be carried out to see if using this compression mechanism is with uncompressed RFB tiles results in better bandwidth usage than no TLS compression and compressed RFB tiles.

7.7.3. New RFB Security Types
=============================

The negotiated security-type in the RFB protocol is an 8 bit unsigned integer. Currently there are only two possible values:
"None"(1) to indicate no authentication is needed and "VNC authentication"(2) to indicate that the client is to be authenticated using the challenge-response scheme detailed above. 0 indicates and error condition.

We will add a further four security types:

+ Anonymous TLS (3) + TLS With VNC Authentication (4) + TLS With Server Certificate and VNC Authentication (5) + TLS With Server and Client Certificate Authentication (6)

In order to ensure interoperability with other implementations, these security types must be registered with RealVNC who maintain the RFB protocol specification.

7.7.4. Security Related Preferences
===================================

A number of preferences will be provided which will have a direct impact of the security of the system. Their meaning and rationale for their existance is detailed below:

/desktop/gnome/remote_access/enabled (boolean, default=false)

If false, the Remote Desktop server will not be started at login time and if running will not allow any new remote connections, put all existing clients on hold and exit after a 30 second timeout.

The rationale for the preference is that unless Remote Desktop access is to actually be used, it is much more preferable to not have the server running for both resource consumption and security reasons.

The default for the preference is false under the assumption that Remote Desktop access will not be used by the majority of the user base.

/desktop/gnome/remote_access/prompt_enabled (boolean, default=true)

If true, once a client has connected and been authenticated the user is prompted on whether the client connection should be allowed to be completed.

The rationale here is that in the majority of scenarios, the user on the host machine should be in control of whether or not remote users are allowed to connect to their desktop. Even if the host user has enabled remote access, set a password and informed some other user of that password, the host user may still want to both be aware of another user connecting and also decide whether that particular time is suitable for the remote user to connect.

The default is true for two reasons. Firstly, it is assumed that most users will want to vet new connections and, secondly, because by default there is no authentication required to connect this prompt will provide some level of manual authentication.

/desktop/gnome/remote_access/view_only (boolean, default=false)

If true, remote users will only be allowed to view the remote desktop and all keyboard, pointer and clipboard events from the remote user will be ignored.

The view only preference is intended to support the simple collaboration scenario where a number of remote users will connect to a single host to observe something happening on the host machine. In this scenario the host will no want any of the remote users to use the pointer or keyboard on the host.

The default is false because this is not the primary scenario we are expecting to target.

/desktop/gnome/remote_access/require_encryption (bool, default=true)

If true, the host requires that all connecting client use TLS encryption. Any clients attempting to use the "None" and "VNC Authentication" security types will be refused. This will only have affect the cases where the VNC viewer being used by remote user does not have support for TLS encryption. If the viewer does have support, it will always be used.

The preferences is provided so that the host may make the policy decision on whether unencrypted connections should be allowed.

However, in most cases it is expected that the host will require that only encrypted connections be allowed so as to not allow any information on the host to be compromised. For this reason, the default value for the preference is true.

/desktop/gnome/remote_access/authentication_methods (list, default=[none])

The list of authentication which the server will advertise. Currently the supported values are "none" and "vnc", but when certificate based authentication is implemented "server-cert-with-vnc" and "server-cert-with-client-cert" will also be supported.

The preference is provided so as to allow the host user decide on how remote users should be authenticated. The host may decide that no authentication is required, that password or certificate based authentication should be used.

The default value is "none" because there is no point in having the default value be "vnc" because no password would be set.

/desktop/gnome/remote_access/vnc_password (base64 encoded string, default=<unset>)

The password used to authenticate the remote user when VNC authentication is being used. The password is stored in GConf base64 encoded to provide an extra level of secrecy. However, the secrecy of the password is guaranteed by the fact that the files which GConf stores preference values in are only readable by the user in question.

7.7.5. Summary of Security Considerations
=========================================

( How to put this ? There must be some standard methodology to lay out the specific types of attacks you are and are not protecting against with different configurations e.g. given the following configuration:

+ allowed = true + require_encryption = true + authentication_methods = [vnc] + vnc_password = strong-password

and based on the following assumptions about potential attackers:

+ Has the ability to snoop the intervening network stream. - Does not have the ability to modify the intervening network stream. - Does not have the ability to brute force crack the DES key given the challenge and response. - Does not have the ability to spoof an IP address. + Does not have access to the host machine as either root or the user who is running the server. + Does not have any prior knowledge of what the password may be. + Does not have access to the user's X display. + Does not have access to the user's GConf daemon.

then no attacker should be able to:

+ Snoop the host's screen contents from the VNC session. + Snoop keyboard/pointer/clipboard events from the client. + Obtain access to the VNC session. + Obtain shell access to the host machine as root or the user who is running the server.

But you are also making assumptions about the behaviour of the user on both sides - e.g. that the remote user has the correct IP address and port number for the host she wishes to connect to, and not the IP address and port number of an attacker. )

What problems remain ?

+ No peer authentication - possibility of man-in-the-middle attacks.

8. Host User Interface
======================

8.1. Preferences Dialog
=======================

Menu Entry: Name = Remote Desktop Comment = Set your remote desktop access preferences Categories = GNOME;Application;Settings;

+-+-------------------------------------------------------+-+-+ |#| Remote Desktop Preferences |_|X| +-+-------------------------------------------------------+-+-+ | | | ! Some of these preferences are locked down | | | | Sharing | | ------- | | [ ] Allow other users to view my desktop on their computer | | [ ] Also allow other users to control my desktop | | | | Security | | -------- | | When a user tries to view or control my desktop: | | [ ] Ask me for confirmation | | [ ] Ensure they are using encryption | | [ ] Require them to enter this password: | | Password: ________ | | | +-------------------------------------------------------------+ | <Help> <Close> | +-------------------------------------------------------------+

Notes: o The "locked down" warning is only displayed if one of the GConf keys associated with the preferences isn't writable. Each such non-writable key also causes the appropriate control to be made insensitive. o When "Enable remote desktop access" is inactive, the rest of the controls are insensitive. o When "Require password for remote access" is inactive, the "Password" entry is insensitive.

8.2. Connection Query Dialog
============================

This dialog appears when the "Prompt me before allowing access" preference is set and a remote user connects to the server and is authenticated.

+-+----------------------------------------------------------+-+-+ |#| Question |_|X| +-+----------------------------------------------------------+-+-+ | | | ??? An attempt is being made to access your deskop remotely | | ??? from '<hostname>' | | ??? | | Allow this connection to be completed? | | | +----------------------------------------------------------------+ | <Refuse> <Allow> | +----------------------------------------------------------------+

8.3. Notification Area Icon
===========================

Icon which will appear in the notification area when there are any remote users connected. Clicking on the icon will show the connections details dialog.

8.4. Connection Details Dialog
==============================

Dialog will show the list of remote desktop users, the host they are connected from and how long they have been connected. You will be able to disconnect a given user using the dialog.

9. Client User Interface
========================

+ Initially a patched version of RealVNC's Java vncviewer. + Later possibly a integrated into a lockhart type GUI.

10. See Also
============

[1] - The RFB Protocol Specification http://www.uk.research.att.com/vnc/rfbproto.pdf

[2] - libvncserver: http://libvncserver.sourceforge.net/

[3] - xf4vnc: http://xf4vnc.sourceforge.net/

[4] - realVNC: http://www.realvnc.com/

[5] - krfb: http://www.tjansen.de/krfb/

[6] - VNC: Where it came from, where it's going: http://cyberelk.net/tim/articles/VNC/

[7] - Using Remote Desktop: https://www.microsoft.com/windowsxp/pro/using/howto/gomobile/remotedesktop/default.asp

[8] - Using Remote Assitance: https://www.microsoft.com/windowsxp/pro/using/howto/gethelp/remoteassist/default.asp

[9] - FAQ on Remote Desktop: https://www.microsoft.com/windowsxp/remotedesktop/faq.asp

[10] - ITU-T T.128 Application Sharing Protocol: http://www.rdesktop.org/docs/t128.zip

[11] - rdesktop: A Remote Desktop Protocol Client: http://www.rdesktop.org/

[12] - tsclient: A Frontend for rdesktop: http://www.gnomepro.com/tsclient/

[13] - The Interactive Performace of SLIM: A Stateless, Thin-Client Architecture: http://research.sun.com/research/features/tenyears/volcd/papers/nrthcutt.htm

[14] - XTEST Extension Protocol: http://www.x.org/pub/R6.6/xc/doc/hardcopy/Xext/xtest.PS.gz

[15] - XTEST Extension Library: http://www.x.org/pub/R6.6/xc/doc/hardcopy/Xext/xtestlib.PS.gz

[16] - XDAMAGE Extension Wiki http://xlibs.freedesktop.org/Software/DamageExt

[17] - DNS-Based Service Discovery: http://files.dns-sd.org/draft-cheshire-dnsext-dns-sd.txt

[18] - A DNS RR for specifying the location of services (DNS SRV): http://www.ietf.org/rfc/rfc2782.txt

[19] - Performing DNS Queries via IP Multicast: http://files.multicastdns.org/draft-cheshire-dnsext-multicastdns.txt

[20] - Dynamic Updates in the Domain Name System (DNS UPDATE): http://www.ietf.org/rfc/rfc2136.txt

[21] - Example of a brute force VNC passwords cracking tool: http://www.securiteam.com/tools/Brute_forcing_VNC_passwords.html

[22] - Example of VNC challenge predictability vulnerability: http://www.securityfocus.com/archive/1/284064/2003-09-02/2003-09-08/2

[23] - Details of how a man-in-the-middle attack on VNC might be performed: http://www1.corest.com/common/showdoc.php?idx=117&idxseccion=10

[24] - A nice overview of DES encryption: http://www.tropsoft.com/strongenc/des.htm

[25] - Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design http://cryptome.org/cracking-des.htm

[26] - Transport Layer Security (TLS) - IETF standardisation of SSL http://www.ietf.org/html.charters/tls-charter.html

[27] - The GNU Transport Layer Security Library (gnutls) http://www.gnu.org/software/gnutls/

[28] - Java Secure Sockets Extension http://java.sun.com/products/jsse/index-14.html

[29] - Public-Key Infrastructure (X.509) (pkix) http://www.ietf.org/html.charters/pkix-charter.html

[30] - OpenPGP Message Format (rfc2440) http://www.ietf.org/rfc/rfc2440.txt

[31] - Using OpenPGP keys for TLS authentication http://www.ietf.org/internet-drafts/draft-ietf-tls-openpgp-keys-03.txt

Remote Desktop How-To
Linux/Unix
Windows
Mac OS X

Notice: The information in this document is intended for use with the Hammer system. Please direct feedback to rcc@rcc.its.psu.edu regarding any information which appears to be missing, inaccurate, or unclear.
Overview

Remote Desktop Connection is an application included with Windows that connects to a Remote Desktop Protocol (RDP) server. Each Hammer system has such a server running, thus allowing a connection to be made. Remote Desktop connections present users with a familiar desktop GUI and do not require manual configuration of an SSH client.
Linux/Unix

Most Linux distributions have the rdesktop Remote Desktop client included in their standard repositories, but it may not be installed by default. The command to install also varies from distribution to distribution.

For distribtions that use yum, such as Red Hat Enterprise Linux and Fedora, the command to install rdesktop is the following: su -
<type the root password> yum install rdesktop

For distributions that use apt-get, such as Debian and Ubuntu, the command to install rdesktop is the following: sudo apt-get install rdesktop
<type your own password>

If you have trouble installing rdesktop, please contact rcc@rcc.its.psu.edu.

To connect Hammer using rdesktop, type: rdesktop -A hammer.rcc.psu.edu

You will be presented with the Log On to Linux dialog box described in step 3 of the Windows instructions; please continue from that point.
Windows
Launch the Remote Desktop Connection application by clicking on the Start Menu, then All Programs, then Accessories, and finally Remote Desktop Connection.
Type hammer.rcc.psu.edu into the Computer box and click Connect. If a dialog box appears that says "The identity of the remote computer cannot be verified. Do you want to connect anyway?", click Yes.
Type your username and password into the Log On to Linux dialog box and click OK.
The GNOME desktop will then appear. To launch a Terminal, click Applications, then Accessories, then Termimal.
From the terminal, you can enter the same commands that you would from an SSH session (module, vim, etc.).
Mac OS X

The Remote Desktop client for Mac is available for download from Microsoft. Once installed, the Remote Desktop Connection application will appear in the Applications folder. The actual usage of the client is the same for Windows and Mac. Launch the Remote Desktop Connection application and then follow the Windows instructions from step 2.

Note:
If you receive a black screen when you try to connect, click on the RDC option in the menu bar, choose preferences, and click on the Login tab. Make sure that the User name, Password, and Domain field are empty.
If you receive an "error - problem connecting message" after you type your username and password into the Log on to Linux dialog, click on the RDC option in the menu bar, choose preferences, and click on the Display tab. Make sure that the Colors combo box has the Millions option chosen.

Similar Documents

Premium Essay

Final

...NET230-Final Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. ___C_ 1. When ____ is used with only a filename and without parameters, the status of the object is displayed, indicating whether the object is encrypted and whether new files added to a folder will be encrypted. a.|CONVERT|c.|EFS| b.|CIPHER|d.|AES| ___C_ 2. Windows 2000 EFS uses ____. a.|DESX|c.|3DES| b.|AES|d.|4DFS| ___D_ 3. ____ must be used to grant or restrict access to objects in the shared folder. a.|Shared folders|c.|LFN| b.|Objects|d.|NTFS permissions| ____A 4. The ____ is a server-side software that sends a print job to the proper server in the format required by that server. a.|print client|c.|language monitor| b.|network interface driver|d.|print provider| ___D_ 5. A(n) ____ works with the printer driver to despool spool files during playback, making any needed changes to the spool file according to its data type. a.|print processor|c.|printer router| b.|mismatched document|d.|RAW spool file| ___D_ 6. ____ provides printer control at the print-job level and enables users to change printer defaults levels, such as number of copies, color, and printer languages. a.|Network interface printer|c.|Direct Driver Interface| b.|Printer Job Language|d.|Print resolution| ___B_ 7. Which of the following terms describes the contents of a completely or partially interpreted data file that contains text and control...

Words: 849 - Pages: 4

Free Essay

Resume Style

...Summary: Provided onsite and remote support for over 20 years on both tier 1 and 2 levels. TECHNICAL SKILLS Hardware: Pentium desktops, laptops, notebooks. Hewlett Packard printers connecting with both printer servers and TCP/IP .All modems and compatible, desktop scanners, Multimedia (CD and R/W ROMS) HP plotters, port replicators, and most other peripherals. Worked with Cisco routers and Hubs. Experience with Macintosh. Software: Bomgar remote access software, Microsoft Office XP 2003, 2007 2010. (Includes: Word, Excel, PowerPoint and Outlook), Active Directory, TC/PIP Citrix Metaframe. Norton, Mcafee, Trend Micro anti-virus. Malwarebytes. Trend Micro’s Data Armor and file Armor. GHOST. Experience with Macintosh versions of aforementioned software. Operating Systems: MS-DOS (all versions), Windows 95, 98, 2000, ME, NT, XP Vista, 7, and 8.Desktop (Including Networks) Novell 3.x and 4.x, Windows NT, 2003 and 2008. Also experience with most versions of MAC. PROFESSIONAL EXPERIENCE IT Contractor March 2015 – Present Robert Half onsite at Landmark Apartment Trust IT Consultant * Upgrading iPads with new operating systems and Remote Management app. by contacting each of the 90 properties owned by phone and walking user through the process Teksystems onsite at Bayfront Health Service Desk/Desktop Support * Answer calls to the helpline and providing support through remote access or onsite support * Work...

Words: 488 - Pages: 2

Free Essay

Sales and Marketing Executive

...CURRICULUMVITAE PERSONALDETAILS FIRST NAME : BRUCE SURNAME : CHIMUKA ADDRESS : SMARTNET NETWORKS LIMITED LUBAMBE ROAD, NORTHMEAD, BOX 37933, LUSAKA, ZAMBIA DATE OF BIRTH : 25/10/1983 PLACE OF BIRT : MONZE NATIONALITY : ZAMBIAN NRC No : 131232/77/1 SEX : MALE MARITAL STATUS : MARRIED RELIGION : CHRISTIAN HOBBIES : LISTENING TO GOSPEL MUSIC LANGUAGES : ENGLISH, NYANJA&TONGA CONTACT No : +260950254807, +260968793352, EMAIL : bcchimusb562@gmail.com EDUCATIONALBACKGROUND 2012: Bachelor of Business Administration in CMIS; Rusangu University. 2005:Grade10-12; Namwala High School. 2002:Grade9; Itezhi-Tezhi Basic School. 2001:Grade1-8; Mujika Basic School, Monze. PROFESSIONAL QUALIFICATIONS * Candidate-Master’s Degree of Science in Information Technology * Candidate- Cisco Certified Network Associate * Certified Fiber Optic Technician * SMB Account Manager * BBA-Computer and Management Information Systems WORKEXPERIENCE * Am currently working with Smartnet Network Limited as Technical Sales...

Words: 858 - Pages: 4

Premium Essay

Common Lab Tasks

...lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You will need to download...

Words: 2388 - Pages: 10

Free Essay

Microsoft Remote Desktop Gateway (Rdg)

...3Mokihana Sabang NT2580 Unit 3 10/11/12 Wallace Dear Richman Investments, I am happy to hear that you are looking to expand your company and are currently looking for a remote access policy. One, I think giving your employees the ability to use their company computers from home and when traveling for the business is a great opportunity, I also believe it can be a high risk with nothing in place of security. I purpose that all computers in which has been provided by the company use RDG. Microsoft Remote Desktop Gateway (RDG) * Allows you to log in to your ETSU computer from off-campus * Requires no software installation * Presents a lower security risk * Does not expire (subject to periodic review) With that said there will be rules set for all employees’ in which RDG is to use. 1) All employees will sign a RDG agreement. 2) All employees who will be given a company computer will need to get permission from Vice president. 3) When connect to the company internet/server you must make sure no one else will be on your network. 4) Computers must be up to date with anti-virus and any recommended software. 5) 30 minutes of inactivity, computer will automatically disconnect from the network. 6) Only the Headquarters VP, Presidents, and IT will be able to access any other sites on the network. *(not vice versa) I want to thank you for giving me the opportunity to help you with getting this setup for your company. Feel free...

Words: 263 - Pages: 2

Premium Essay

I Got You

...and click Login in the Login box 2. To connect to he VPN for the first time, click Start AnyConnect - If you get the warning as seen above about the Java plu-in, please click Trust to move forward. You may notice the two windows below. Please, click on run in the warning window to continue. 3. When you get to this the window above, click on “Mac OS X 10.6+ (Intel)” to download the installer of the VPN client. - The installer will be downloaded to your default download location 4. Navigate to your default download location and locate the downloaded “anyconnect…-k9.dmg” file. Then, start the installation process of the client. - Once you locate the “.dmg” file, lunch it and a temporary drive will be created on your desktop. Access the “AnyConnect VPN 3.xxxx” drive and lunch the “vpn.pkg” file that it contains. - Once the “vnp.pkg” file is lunched you will be guided through the installation process as indicated in the window above. 5. Once the installation process has completed, locate the “Cisco” folder in the “Applications” folder and lunch the “Cisco AnyConnect Secure Mobility Client” . - Once lunched, you’ll be prompted to enter the address, “vpn.csvcl.net”, in the box below. - Once you type the address, click “Connect” and enter your username and password in the box below 6- Type your assigned username and password and click OK to login to the VPN. Note: Once you have successfully connected to the VPN, proceed to PART II which...

Words: 807 - Pages: 4

Premium Essay

Common Lab Tasks

...lab itself, those common steps have been collected in this file. You may refer to this document at any time during your lab session. Though you may not be required to perform each of these steps in every lab, the Common Lab Steps are listed in the order that you are most likely to encounter them. As you review this list, you should pay attention to the logic and flow of the lab. This will help you to perform the lab procedures more quickly and more accurately. Note: The other virtual machines used in this environment may require as long as 10 minutes to complete their initialization processes (wake-up sequences) and load all required software. If you receive a connection error message, wait at least one minute before clicking on the Remote Desktop Connection icon to retry the connection. Virtual Lab Environment You will use the virtual lab environment to complete the learning activities in this lab manual. Note: The virtual lab environment, also called the Virtual Security Cloud Lab (VSCL) requires Java, Adobe Flash, and a compatible Web browser. The list of compatible browsers and required version numbers for Java and Flash is available on the VSCL Web site (http://campus.toolwire.com/b4ubegin/start.asp). The Technical Support Help Desk will not be able to assist you in the use of unsupported Web browsers. If you use an unsupported browser, you may not be able to complete the labs as directed in the lab procedures. You will need to download...

Words: 2387 - Pages: 10

Premium Essay

Scan

...Scan Report October 12, 2015 Summary This document reports on the results of an automatic security scan. The scan started at Mon Oct 12 18:07:01 2015 UTC and ended at Mon Oct 12 18:33:02 2015 UTC. The report first summarises the results found. Then, for each host, the report describes every issue found. Please consider the advice given in each description, in order to rectify the issue. Contents 1 Result Overview 2 2 Results per Host 2.1 172.30.0.7 . . . . . . . . . . . . . . . . 2.1.1 High ms-wbt-server (3389/tcp) 2.1.2 Low ms-wbt-server (3389/tcp) 2.1.3 Log ms-wbt-server (3389/tcp) . 2.1.4 Log general/CPE-T . . . . . . 2.1.5 Log general/HOST-T . . . . . 2.1.6 Log general/tcp . . . . . . . . . 2.1.7 Log ssh (22/tcp) . . . . . . . . 2.2 172.30.0.11 . . . . . . . . . . . . . . . 2.2.1 High ms-wbt-server (3389/tcp) 2.2.2 Medium general/tcp . . . . . . 2.2.3 Medium http (80/tcp) . . . . . 2.2.4 Low ms-wbt-server (3389/tcp) 2.2.5 Low http (80/tcp) . . . . . . . 2.2.6 Log ms-wbt-server (3389/tcp) . 2.2.7 Log general/tcp . . . . . . . . . 2.2.8 Log http (80/tcp) . . . . . . . 2.2.9 Log general/CPE-T . . . . . . 2.2.10 Log general/HOST-T . . . . . 2.2.11 Log general/icmp . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 12664 - Pages: 51

Free Essay

Configureing Dual Monitors

...Begin Solution Dual Monitors Setup: 1.       On the desktop of your laptop and not your remote computer. 2.       Right click the desktop and navigate to screen resolution. 3.       Under multiple displays ensure that extend desktop is selected and click apply. 4.       Both monitors should now be on but the screen orientation may be off. 5.       When looking at your monitors from left to right take notice of the numbers that flash on the screen  when clicking the Identify button on the top right of the screen. 6.       For example if you press the Identify button and on the left screen is a 2 and the right monitor is a 1 make sure the monitors in the program look the same. If they are not drag the monitor that is wrong on the other side of the monitor. 7.       Click on the left monitor after making the last change and select the option make this my main display. 8.       Once everything looks right please click the OK button at the bottom of the screen. 9.       If you move your mouse from left screen to right screen the mouse should move to either side with ease. Configuring Remote Desktop with Dual Monitors: 1.       Open remote desktop on the laptop and not your PC at work. 2.       On the bottom left of the remote desktop connection screen click on Show Options. 3.       Click on the Display tab on top of the window. 4.       Make sure the option  Use all my monitors for the remote session is checked. 5.       Above that option is a slider ranging from...

Words: 327 - Pages: 2

Free Essay

Paper

...complying with PCI-DSS standards. 6. What are the 11 titles of mandates and requirements for SOX compliance? * Public Company Accounting Oversight Board (PCAOB) * Auditor Independence * Corporate Responsibility * Enhanced Financial Disclosures * Analyst Conflicts of Interest * Commission Resources and Authority * Studies and Reports * Corporate and Criminal Fraud Accountability * White Collar Crime Penalty Enhancement * Corporate Tax Returns * Corporate Fraud Accountability 7. What purpose may COBIT serve to help comply with regulations such as Sarbanes-Oxley? The purpose for COBIT was to provide comply for IT Infrastructure library. 8. What is RDP? What port number does it use? RDP is Remote Desktop and it uses port...

Words: 266 - Pages: 2

Premium Essay

Lab 2 Nessus Ports Report Notes

...List of hosts | 172.30.0.1 | High Severity problem(s) found | | 172.30.0.2 | High Severity problem(s) found | | 172.30.0.200 | High Severity problem(s) found | | 172.30.0.4 | High Severity problem(s) found | | 172.30.0.8 | High Severity problem(s) found | | 172.30.0.9 | High Severity problem(s) found | | [^] Back | 172.30.0.1 | Scan Time Start time : | Sun May 25 13:18:40 2014 | End time : | Sun May 25 13:22:00 2014 | | | Number of vulnerabilities Open ports : | 9 | High : | 2 | Medium : | 0 | Low : | 19 | | | | Remote host information Operating System : | Linux Kernel 2.6 on Debian 6.0 (squeeze) | NetBIOS name : | | DNS name : | | | | | [^] Back to 172.30.0.1 | Port general (0/icmp) | [-/+] | Nessus Scan Information | Synopsis: Information about the Nessus scan. Description: This script displays, for each tested host, information about the scan itself: - The version of the plugin set - The type of plugin feed (HomeFeed or ProfessionalFeed) - The version of the Nessus Engine - The port scanner(s) used - The port range scanned - The date of the scan - The duration of the scan - The number of hosts scanned in parallel - The number of checks done in parallel Risk factor: None Solution: n/a Plugin output: Information about this scan : Nessus version : 4.2.2 (Build 9129) (Nessus 4.4.1 is available - consider upgrading) Plugin feed version : 201107120935 Type of plugin...

Words: 29098 - Pages: 117

Premium Essay

Global Pharmaceutical Industry

...E-mail, terminal services) …While Enforcing Strict Security  Allow access only to necessary applications and resources for certain users  Mitigate risks from unmanaged endpoints  Customize experience and access for diverse user groups (partners, suppliers, employees)  Enable provisional workers (contractors, outsourcing)  Enforce consistent security policy  Support myriad of devices (smartphones, laptops, kiosks) …And the Solution Must Achieve Positive ROI  Minimize initial CAPEX costs  Lower ongoing administrative and support OPEX costs 3 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net THE SOLUTION: JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Mobile User – Cafe  Secure SSL access to remote users from any device or location  Easy access from Web-browsers – no client software to manage  Dynamic, granular access control to manage users and resources SA6500 VoIP Teleworker Business Partner or Customer  Single comprehensive solution to access various application types from various devices available Wireless User Airport Kiosk User 4 www.radiusconsultingghana.com Copyright © 2010 Juniper Networks, Inc. www.juniper.net JUNIPER NETWORKS SSL VPN MARKET LEADERSHIP...

Words: 3503 - Pages: 15

Free Essay

None

...EMCO Remote Desktop GoToMyPC® Current uses: A main use of remote desktop software is remote administration. It can also be used for "headless computers": instead of each computer having its own monitor, keyboard, and mouse, or using a KVM switch, a monitor, keyboard and mouse can be attached to one computer with remote control software, and headless computers controlled by it. The duplicate desktop mode is useful for user support and education. Remote control software combined with telephone communication can be nearly as helpful for novice computer-users as if the support staff were actually there. Since the advent of cloud computing remote desktop software can be housed on USB hardware devices, allowing users to connect the device to any PC connected to their network or the Internet and recreate their desktop via a connection to the cloud. This model avoids one problem with remote desktop software, which requires the local computer to be switched on at the time when the user wishes to access it remotely. (It is possible with a router with C2S VPN support, and Wake on LAN equipment, to establish a virtual private network (VPN) connection with the router over the Internet if not connected to the LAN, switch on a computer connected to the router, then connect to it.) The common name for USB devices with the capacity to remotely recreate a user's desktop is "secure portable office".[1] Malicious use Remote control software is also used maliciously. From 2008, typically...

Words: 653 - Pages: 3

Free Essay

Nessus Lab

...Authentication (NLA) 3. Medium: SMB Signing Required 9. Yes, there are solutions for the three listed vulnerabilities: 1. Low: Terminal Services Encryption Level is not FIPS-140 Compliant * Description: The encryption setting used by the remote Terminal Services service is not FIPS-140 compliant. * Solution: Change RDP encryption level to : 4. FIPS Compliant 2. Medium: Terminal Services Doesn’t Use Network Level Authentication (NLA) * Description: The remote Terminal Services is not configured to use Network Level Authentication (NLA). NLA uses the Credential Security Support Provider (CredSSP) protocol to perform strong server authentication either through TLS/SSL or Kerberos mechanisms, which protect against man-in-the-middle attacks. In addition to improving authentication, NLA also helps protect the remote computer from malicious users and software by completing user authentication before a full RDP connection is established. * Solution: Enable Network Level Authentication (NLA) on the remote RDP server. This is generally done on the 'Remote' tab of the 'System' settings on Windows. 3. Medium: SMB Signing Required * Description: Signing is not required on the remote SMB server. This can allow man-in-the-middle attacks against the SMB server. * Solution: Enforce message signing in the host's configuration. On Windows, this is found in the policy setting 'Microsoft network server: Digitally sign communications (always)'...

Words: 613 - Pages: 3

Free Essay

Distance Learning Computer-Based Hands-on Workshop: Experiences on Virtual and Physical Lab Environments

...distance learning with ability to support hands-on computer lesson is needed. In this paper, a platform for region-wide distance learning computer-based hands-on workshop is presented through the actual developments. The proposed platform supports 1) teaching/learning activities in a hands-on computer workshop 2) efficient large-scale remote computer laboratory. Computer virtualization and StarBED large-scale computing testbed were utilized to create a distance learning computer laboratory, virtual and physical. This paper discusses various aspects of deploying virtual and physical lab environments for region-wide learners in a synchronous-style distance learning workshop. Keywords Hands-on computer workshop, remote laboratory, distance learning, educational technology 1 Introduction With digital and telecommunication technologies, distance education has been developed to extend boundary of knowledge sharing to be more location and time independent. It has been widely deployed in academic or training programs to mobilize knowledge within or across organizations, countries and regions. With its characteristic to share knowledge to more learners at remote locations, it has become a costeffective solution for human resource development. In the digital age which daily operations of humans are computer-assisted, practical skills to use computers to accomplish specialized tasks in different fields are...

Words: 4133 - Pages: 17