ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Who is at Fault?

    IT Discussion
    6
    17
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • thwrT
      thwr
      last edited by

      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

      Net RunnerN 1 Reply Last reply Reply Quote 2
      • Net RunnerN
        Net Runner @thwr
        last edited by

        @thwr said in Who is at Fault?:

        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

        scottalanmillerS 1 Reply Last reply Reply Quote 2
        • scottalanmillerS
          scottalanmiller @Net Runner
          last edited by

          @net-runner said in Who is at Fault?:

          @thwr said in Who is at Fault?:

          Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

          This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

          Same thing happens to exposed VPNs 🙂

          thwrT 1 Reply Last reply Reply Quote 1
          • thwrT
            thwr @scottalanmiller
            last edited by thwr

            @scottalanmiller said in Who is at Fault?:

            @net-runner said in Who is at Fault?:

            @thwr said in Who is at Fault?:

            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

            This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

            Same thing happens to exposed VPNs 🙂

            I won't compare a certificate based VPN with RDP 😉

            JaredBuschJ 1 Reply Last reply Reply Quote 0
            • JaredBuschJ
              JaredBusch @thwr
              last edited by

              @thwr said in Who is at Fault?:

              @scottalanmiller said in Who is at Fault?:

              @net-runner said in Who is at Fault?:

              @thwr said in Who is at Fault?:

              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

              Same thing happens to exposed VPNs 🙂

              @scottalanmiller said in Who is at Fault?:

              @net-runner said in Who is at Fault?:

              @thwr said in Who is at Fault?:

              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

              Same thing happens to exposed VPNs 🙂

              I won't compare a certificate based VPN with RDP 😉

              Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

              thwrT 1 Reply Last reply Reply Quote 0
              • thwrT
                thwr @JaredBusch
                last edited by

                @jaredbusch said in Who is at Fault?:

                @thwr said in Who is at Fault?:

                @scottalanmiller said in Who is at Fault?:

                @net-runner said in Who is at Fault?:

                @thwr said in Who is at Fault?:

                Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                Same thing happens to exposed VPNs 🙂

                @scottalanmiller said in Who is at Fault?:

                @net-runner said in Who is at Fault?:

                @thwr said in Who is at Fault?:

                Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                Same thing happens to exposed VPNs 🙂

                I won't compare a certificate based VPN with RDP 😉

                Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                That's the point. It's a whole different story

                DashrenderD 1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender @thwr
                  last edited by

                  @thwr said in Who is at Fault?:

                  @jaredbusch said in Who is at Fault?:

                  @thwr said in Who is at Fault?:

                  @scottalanmiller said in Who is at Fault?:

                  @net-runner said in Who is at Fault?:

                  @thwr said in Who is at Fault?:

                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                  This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                  Same thing happens to exposed VPNs 🙂

                  @scottalanmiller said in Who is at Fault?:

                  @net-runner said in Who is at Fault?:

                  @thwr said in Who is at Fault?:

                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                  This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                  Same thing happens to exposed VPNs 🙂

                  I won't compare a certificate based VPN with RDP 😉

                  Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                  That's the point. It's a whole different story

                  Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                  I'm not sure you can do RDP auth based on certificate?

                  thwrT 1 Reply Last reply Reply Quote 0
                  • thwrT
                    thwr @Dashrender
                    last edited by

                    @dashrender said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    @jaredbusch said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    @scottalanmiller said in Who is at Fault?:

                    @net-runner said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                    Same thing happens to exposed VPNs 🙂

                    @scottalanmiller said in Who is at Fault?:

                    @net-runner said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                    Same thing happens to exposed VPNs 🙂

                    I won't compare a certificate based VPN with RDP 😉

                    Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                    That's the point. It's a whole different story

                    Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                    I'm not sure you can do RDP auth based on certificate?

                    I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                    DashrenderD 1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @thwr
                      last edited by

                      @thwr said in Who is at Fault?:

                      @dashrender said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      @jaredbusch said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      @scottalanmiller said in Who is at Fault?:

                      @net-runner said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                      This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                      Same thing happens to exposed VPNs 🙂

                      @scottalanmiller said in Who is at Fault?:

                      @net-runner said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                      This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                      Same thing happens to exposed VPNs 🙂

                      I won't compare a certificate based VPN with RDP 😉

                      Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                      That's the point. It's a whole different story

                      Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                      I'm not sure you can do RDP auth based on certificate?

                      I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                      MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                      thwrT 1 Reply Last reply Reply Quote 0
                      • thwrT
                        thwr @Dashrender
                        last edited by

                        @dashrender said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        @dashrender said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        @jaredbusch said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        @scottalanmiller said in Who is at Fault?:

                        @net-runner said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                        Same thing happens to exposed VPNs 🙂

                        @scottalanmiller said in Who is at Fault?:

                        @net-runner said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                        Same thing happens to exposed VPNs 🙂

                        I won't compare a certificate based VPN with RDP 😉

                        Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                        That's the point. It's a whole different story

                        Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                        I'm not sure you can do RDP auth based on certificate?

                        I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                        MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                        I'm talking about this specific scenario here, not RDP in general.

                        1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender
                          last edited by

                          This scenerio is the fault of:

                          • IT for giving the user local admin,
                          • the local user for allowing a remote person to create a local account
                          • the local user for not checking the password requirements for that account
                          • the remote support for using a shit password
                          • the remote support for allowing use to have access to RDP (assuming it wasn't needed)
                          1 Reply Last reply Reply Quote 0
                          • 1 / 1
                          • First post
                            Last post