Risk of Virus infection?

  • Thread starter Thread starter bob
  • Start date Start date
B

bob

What is the likelihood that a virus could be transferred over RDP? I do not
think this would be too great as I have yet to see any news about viruses
spreading this way, but my ignorant supervisor(who knows nothing about
networking) thinks that me connection to my XP machine at home would put my
work domain at risk. has anyone heard of any viruses being spread this way
(with disk/printer sharing off)?
 
I think, myself, with disk/printer sharing off, the risk is nil. In fact,
I'd even allow printer sharing, I think. But then, I'm not your admin.

I would bet that there are worse risks already open to that work
network--does he successfully block all IRC/chat/messenger/kazaa apps
already?
 
My company uses rather heavily for many applications, so I doubt if one RDP
connection to a personal computer would matter. Knowing that I am not the
only employee that does this, and that the OC48 that I am connection over is
meant specificly for employee use, I don't think the administrators care
(that's 1 of 80 OC48's running in and out of my building, so if you didn't
guess I work in a rather large data center). I was expecting the answer you
gave, but I wanted to make sure my supervisor had no ground to stand on with
his concerns.

As for IRC/chat I do not think these are blocked, nor are kazaa ports (it
has never been an issue). In some instances messenger ports are blocked,
but not usually.
 
It's tricky. I don't see the risk unless drive redirection is allowed.
However, there are third-party apps - AnalogX's TSDropCopy, for example,
that will allow for file movement, and it doesn't sound like your
environment is so locked down that such at thing can't be installed.

To me, it doesn't sound as though the incremental risk that RD without drive
redirection would add is significant--but it isn't my call.
 
-----Original Message-----
I think, myself, with disk/printer sharing off, the risk is nil. In fact,
I'd even allow printer sharing, I think. But then, I'm not your admin.

I would bet that there are worse risks already open to that work
network--does he successfully block all IRC/chat/messenger/kazaa apps
already?

Hi,

I think its pretty safe to use remote desktop because you
would be the only one that would have access to that
computer, and that computer would therefore block all
other incoming connections from the Internet. So the
chances of catching any viruses would be very small.

Thai
 
The main security implication with remote desktop is that you need to
have a secure password.. That is the passport to your system...

Also, make sure you upgrade to SP2 and that you use the firewall and
Auto-Update.

Jeffrey Randow (Windows Networking & Smart Display MVP)
(e-mail address removed)

Please post all responses to the newsgroups for the benefit
of all USENET users. Messages sent via email may or may not
be answered depending on time availability....

Remote Networking Technology Support Site -
http://www.remotenetworktechnology.com
Windows XP Expert Zone - http://www.microsoft.com/windowsxp/expertzone
 
It isn't unreasonable for the network admin to assume that the home machine
is infected. I don't see a way for that infection to travel through the
mouse/keystroke/screen paint transmission of RDP, though.

OTOH, if you install TSDropCopy, or haven't locked out drive redirection,
there's potential for moving an infected executable.
 
Yep... I have seen the damage that can happen with making a
connection from a "compromised" system with drive redirection
enabled... It wasn't pleasant...

Jeffrey Randow (Windows Networking & Smart Display MVP)
(e-mail address removed)

Please post all responses to the newsgroups for the benefit
of all USENET users. Messages sent via email may or may not
be answered depending on time availability....

Remote Networking Technology Support Site -
http://www.remotenetworktechnology.com
Windows XP Expert Zone - http://www.microsoft.com/windowsxp/expertzone
 
I was told by my supervisor that the policy does not allow this, but I was
welcome to email the head of the department myself and ask for further
information. It seems that my company has taken the better safe than sorry
approach, which I guess I can't blame then for. After all, how would it
look to our clients if the network gets infection VIA an unnecessary means
such as that. at any rate, I might look in to it further and see if I can
get permission (being that many employees have VPN access, I don't see why
not).

Thanks for all your replies,
Bob
 
I agree with you Jeffrey, I follow the same password requirement that my
company enforces (minimun 8 letters, 3 out of the 4 char types required).
As for SP2, I installed it on all my home computers as soon as it came out
(I beta tested it too so I knew what to expect).
 
My observations on virus vulnerability if RDP drive redirection is enabled is
this:

First, RDP runs on encyrption, much like HTTPS. It is the network
administrator of the domain who configures just what encyrption level will be
for each and every class of RDP clients [class meaning a novel client versus
a windows TCP client, for example.] So the encryption for RDP 5.0 and
higher, such as released with Windows XP, can be set as high as 128-bit and
no virus can traverse such a connection.

The risk of infection is simply in file transfer ability on open shares. In
the case of RDP, it is the VPN connection where there is a potential risk.

The largest concern is a worm that can replicate over open shares on a
network and / or take advantage of a security vulnerability. For a domain
network, the risk is greater for a worm as long as the worm is able to get
inside the domain first. Any remote computer accessing a network that is not
on the domain will not authenticate to any resource automatically. A remote
user must manually authenticate for each and ever server or machine being
accessed remotely unless a utlity is used to automatically authenticate such
as setting up a remote computer as a trusted resource to the domain. So the
risk for a remote computer to infect a domain is either: a domain user moves
an infected file onto the domain, or a domain user authenticates to a
resource that a worm then can access to. Generally speaking, a worm on a
domain can spread "unattended" but for a worm to spread from a remote
computer onto a domain has to be attended by the domain user to log on except
if that remote computer is "trusted" to that domain.

Since most corporate Anti-Virus packages load defense watch and real time
scanning as a Windows service, no one even has to be logged on for the
sniffing to be done. This then would add another line of defense behind
authenticating to a resource. If it is unknown whether or not your
anti-virus software runs truly as a Windows service, there are usually
several options you can try to test with. 1) If there is a scheduled scan
that occurs at a certain time, and that time passes when no one is logged on,
but the scan runs anyway, then the scheduled scan is running as a service,
and the real time scan likely runs along with. 2) Have the network admin
monitor the real time scan log on the anti-virus console software while some
one does a test logon via VPN unto a server resource. If the real time scan
log starts logging the files the VPN user is accessing, then the real time
scan is effectively defending against spreading a virus.

The risk of virus infection is somewhat more risky for the remote computer
that may not have its own firewall and has an open share. Generally remote
computers are not on their own "domain" and so may not have the
authentication requirement for anyone on the domain network to access your
open share on your remote computer (if they new how.) It is at that time
that an infected domain actually might be able to infect you.

If the remote computer is on a domain anyway; such as a laptop from work
that hot seats on the domain via a docking station., the risk is almost equal
as if phsically on the domain. When this happens, the vulnerability of the
laptop is just about on par as the vulnerability of the domain because the
domain probably manages the anti-virus / intrusion detection of that remote
laptop. The only increase of vulnerability of such a remote laptop is if,
while local on the domain is behind a firewall , or router, and the standard
ethernet connection is not firewalled for internal connectivety purposes. It
is prudent to then have your VPN connection with firewall turned on; but your
ethernet with firewall turned off. If the firewall is not turned on for VPN
then there is a risk for intrusion while at home; and if circustances are
correct, spread to the domain because the remote computer is viewed by the
domain as being either trusted to the domain, or simply as a domain computer
as if at work.
 
Back
Top