remote desktop security, any reason for vpn?

  • Thread starter Thread starter Bukowski
  • Start date Start date
B

Bukowski

In searching the archives of this group for security tips using remote
desktop, I've seen posts suggesting running rdc through a vpn for added
security. Is this generally agreed upon, and if so what exactly are the
security reasons for doing so? One thread mentioned only opening one port,
but remote desktop uses just one port. It already uses 128 bit encryption,
right? Is there really any benefit to doing tunneling it thru a vpn?
 
Sooner Al said:

There is one security point in that thread I understand. If you need the
ability to use RDP for multiple pcs at once, you only have to open one port.
I never need to myself, so this isn't an issue. The only other security
related point is about a type of attack that is possible with RDP alone, but
not with RDP over a VPN tunnell, but no details are given. Can someone
expand on what this alledged vulnerability is?
 
FWIW, since that discussion I've had an informal discussion (around the time
of that thread) with a Microsoft staff person.

As I recall it, the gist was that this was a known issue with the RDP
protocol, and that while they continually look for ways to improve security
issues, there wouldn't be any announcement in relation to the SecurityFocus
issue.

I'm still not knowledgable enough to know how much effort such an attack
would be to set up--so I don't have a sense of how valuable what you have to
steal would need to be to make it worth doing.

And, to add to the complexity, VPN's are not created equal--a PPTP VPN has
similar encryption to RDP, but is better protected against MITM attacks.
IPSEC/L2TP VPN's provide a better level of security than PPTP.

So, yes, a VPN does add to the security of the connection.
 
Back
Top