Your comments confuse me, and they are in the vein of other comments
here that don't make sense to me.
I don't think any "connection,
firewall/vpn or not", is completley safe from penetration.
Let's start here: You are correct, no exposed connection is 100% safe
from penetration - that's whey we use MULTIPLE forms of authentication
and rules to LIMIT exposure.
Maybe there
are some websites etc that are completely and utterly invulnerable to
attack but I doubt it, as new exploits are always coming to light. Yet
the risk/benefit ratio must be acceptable, else half of the internet
would go away.
In many cases, if you have a proper security method, some/many exploits
are meaningless - as an example, we had Fortune 500 companies with
public sites running on IIS 4 and 5 for years, unpatched, without a
single compromise, due to the methods we implemented. During that same
time, there were uncountable sites compromised because the site
admins/network admins didn't understand protection/security methods and
exposure.
I don't understand why, as far as I can tell, you and others think TS on
the internet would only be acceptible if it was invulnerable to
penetration?
It's not just TS, it's ANY server that runs on a Windows Platform (and
many Linux platforms, and HPUX)....
When it comes to exposed Microsoft boxes, in 20+ years of working with
computers/networks, I've never had a compromised system under my
management. I know the limitations of Windows, and I learned long ago,
and this is important, ONLY EXPOSE WHAT MUST BE EXPOSED.
In this case, your Terminal Server, you have proven methods that don't
mean you expose TS to the public - it's just plain lazy to do it.
What makes it different from any web server?
It's a different service, something that is based on a new (new, meaning
in the last few years) method that Microsoft has implemented - and it's
not proven as far as I'm concerned. Ask yourself what happens if someone
with Admin access permits user X to have RD access to the server? What
if the web site is cracked and they add users with RD permission?
Website exploits are common, but they are easy to protect against as
most firewalls and IDS tools already look for them - I don't see any RD
Proxy services being implemented in Firewalls....
That's why I
brought up etrade and online banks etc. There must be something behind
what you're saying but I can't figure it out. It sounds like you only
recommend using TS on internal LANS, unless it presents only anonymous
and uninteresting data?
ETrade does not expose their servers like you want - they don't allow
users to TS into them.
Windows TS should only be exposed on the LAN or through a VPN of some
type. That's what I'm saying.
You also said "Why would you host a TS box at another location and not
provide any services?" I don't understand that either. I think you are
referring to my statement than the ts box I'm talking about would not be
connected to an internal lan, it's be at an external web host's site.
That doesn't mean it does not provide any services? Right???
If you have a box, and allow TS connections, what other connections do
you allow to it from the public?
Are you using this box as a cheap Application Server and hosting apps
for customers?