|
2008-04-09
, 14:42
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#32
|
Because I did use my.XP.box.IP:1 not my.XP.box.IP:0. And I thought the :1 was required because it is specified when I describe port 5901.
Since it seems like it's working, I would guess I'm doing it right. But if anyone sees an error I'm making, please tell me.
|
2008-04-09
, 16:27
|
|
Posts: 48 |
Thanked: 40 times |
Joined on Apr 2008
@ Spain
|
#33
|
Okay, I think I'm up and running with the whole enchilada now. I think Benson's recommendations regarding the settings on tightVNC
[...] indeed my router does block port 5900? Is there a more definitive way to determine if my router is or is not blocking port 5900?
|
2008-04-09
, 22:29
|
|
Posts: 100 |
Thanked: 13 times |
Joined on Mar 2008
|
#34
|
|
2008-04-10
, 08:35
|
|
Posts: 90 |
Thanked: 5 times |
Joined on Dec 2007
|
#35
|
|
2008-04-10
, 10:29
|
|
Posts: 100 |
Thanked: 13 times |
Joined on Mar 2008
|
#36
|
|
2008-04-10
, 15:01
|
|
Posts: 100 |
Thanked: 13 times |
Joined on Mar 2008
|
#37
|
|
2008-04-10
, 16:17
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#38
|
What is the opinion of the gurus regarding the potential threat of brute force attacks to an SSH server? It certainly seems possible for a automated assault to access my machine's port 22 by forcing an SSH tunnel through a brute force/dictionary style attack? How significant of a threat is this and is the installation of something similar to DenyHosts something that should be included in our setup as it has thus far been described?
The wiki that I reference at the beginning of this post deals with establishing the ssh tunnel to an sshd server running on a Linux machine, and then establishing the VNC session through that tunnel. More or less identical to what we've been describing, except that we've been connecting to a machine with an XP OS. Likewise, DenyHosts is a Linux app. Is it possible to implement it in Cygwin? Or, is there something similar (or for that matter, something completely different) that will help to protect the system's port 22 against this type of attack?
|
2008-04-13
, 23:22
|
|
Posts: 100 |
Thanked: 13 times |
Joined on Mar 2008
|
#39
|
|
2008-04-14
, 16:23
|
|
Posts: 4,930 |
Thanked: 2,272 times |
Joined on Oct 2007
|
#40
|
#PasswordAuthentication yes
PasswordAuthentication no
Then I left home and jumped onto a public wifi spot at a local cafe, replicating the above mentioned process. Except this time, I connected to my router's WAN IP address. The port forwarding I had set up for the router worked and it sent the tunnel to the XP box's port 22.
Then I was able to VNC from my nokia to 127.0.0.1:1 and pull up the XP box's screen. It's worth mentioning that the VNC display was much slower when using the public wifi than when implementing the same process on my home wlan.
Now, in order to determine if my XP machine was at risk of random VNC clients accessing it through the WAN, I killed the ssh tunnel I had established which immediately killed the VNC session as well. Then I tried to establish a VNC session again (without first establishing an ssh tunnel).
Just to make sure, I first tried to VNC to 127.0.0.1:1 and obviously that didn't do anything (which is what I expected). Then I tried to VNC to the XP box's IP, and that didn't do anything (which I also expected, as the XP box's IP is isolated within my home wlan). Finally, I tried to VNC to my router's WAN IP address. This was the only one that I was truly concerned about, because it had the potential to forward the communication to my XP box's port 5900.
Luckily, that also didn't work. So can I assume that what jldiaz is describing:
Also, I'm a little confused about what Benson said in post 29
Since it seems like it's working, I would guess I'm doing it right. But if anyone sees an error I'm making, please tell me.
Now as far as this is concerned: