ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    The Myth of RDP Insecurity

    IT Discussion
    rdp vpn security
    18
    103
    12.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      flaxking
      last edited by

      One thing to think about is that this might change who has access to create accounts that can access the system externally. i.e. now every local admin has that power, when with a VPN that power might be a bit more naturally contained. Also, depending on the VPN setup, IT will create VPN user passwords themselves and thus have direct control of their complexity. Although users tend to prefer a SSO VPN method.

      However, there is often a disconnect in the VPN strategy. The LAN is trusted, but then unmanaged, untrusted systems are allowed full access to the LAN via the VPN. It doesn't make sense.

      The bottom line is that any method used need to be thoroughly thought out and planned. Personally, I think would like to have at least 2 step authentication.

      scottalanmillerS 3 Replies Last reply Reply Quote 0
      • scottalanmillerS
        scottalanmiller @flaxking
        last edited by

        @flaxking said in The Myth of RDP Insecurity:

        One thing to think about is that this might change who has access to create accounts that can access the system externally. i.e. now every local admin has that power, when with a VPN that power might be a bit more naturally contained.

        Not really. Local admins can't open the outside firewall ports. And who is creating local admins? Any anyone that can create an RDP session because of their admin rights, can also create a VPN through those same rights.

        F 1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @flaxking
          last edited by

          @flaxking said in The Myth of RDP Insecurity:

          Also, depending on the VPN setup, IT will create VPN user passwords themselves and thus have direct control of their complexity.

          But that power exists with RDP, as well. Remember RDP has a VPN built in, so anything you can do with a VPN, RDP natively can do.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @flaxking
            last edited by

            @flaxking said in The Myth of RDP Insecurity:

            However, there is often a disconnect in the VPN strategy. The LAN is trusted, but then unmanaged, untrusted systems are allowed full access to the LAN via the VPN. It doesn't make sense.

            Yes, there is a huge risk that the "add on" VPN actually become a security problem, rather than a security solution. If carefully managed, it can be "additional" security. But as commonly used, it is a massive risk.

            1 Reply Last reply Reply Quote 1
            • F
              flaxking @scottalanmiller
              last edited by

              @scottalanmiller said in The Myth of RDP Insecurity:

              @flaxking said in The Myth of RDP Insecurity:

              One thing to think about is that this might change who has access to create accounts that can access the system externally. i.e. now every local admin has that power, when with a VPN that power might be a bit more naturally contained.

              Not really. Local admins can't open the outside firewall ports. And who is creating local admins? Any anyone that can create an RDP session because of their admin rights, can also create a VPN through those same rights.

              In a basic RDP setup, the ports are already open and mapped. The concern wouldn't be someone maliciously creating a way into the system, but someone accidentally doing it.

              For example, if tier 1 support has local admin privileges on workstation, maybe they shouldn't be trusted with the power to accidentally create user accounts with external access permissions.

              I would love to see a practical how-to on securely setting up external access with minimal resources.

              scottalanmillerS 2 Replies Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @flaxking
                last edited by

                @flaxking said in The Myth of RDP Insecurity:

                @scottalanmiller said in The Myth of RDP Insecurity:

                @flaxking said in The Myth of RDP Insecurity:

                One thing to think about is that this might change who has access to create accounts that can access the system externally. i.e. now every local admin has that power, when with a VPN that power might be a bit more naturally contained.

                Not really. Local admins can't open the outside firewall ports. And who is creating local admins? Any anyone that can create an RDP session because of their admin rights, can also create a VPN through those same rights.

                In a basic RDP setup, the ports are already open and mapped. The concern wouldn't be someone maliciously creating a way into the system, but someone accidentally doing it.

                This may be true for the Windows desktop, but it is only true when administration rights have been given, and RDP is enabled. It requires two steps, the first of which is the actual problem (giving someone who is not a proper, trained admin the task of overseeing security on a system) and the second is very intentional.

                But that's as far as it goes. The system would still not be accessible for actors outside of the LAN because it would not open ports on the network firewall.

                1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @flaxking
                  last edited by

                  @flaxking said in The Myth of RDP Insecurity:

                  I would love to see a practical how-to on securely setting up external access with minimal resources.

                  If you only need to expose a single RDP "server" to the outside, the necessary settings for a normal environment are trivial. Setup up RDP as normal, use proper password and account security, add singular port mapping from network firewall to RDP "server". That's it.

                  For more security, of course IP locking and such is not hard, but might not be warranted.

                  F 1 Reply Last reply Reply Quote 0
                  • D
                    dave_c @syko24
                    last edited by

                    I also use Cyberarms Intrusion Detection.It works well

                    1 Reply Last reply Reply Quote 1
                    • F
                      flaxking @scottalanmiller
                      last edited by

                      @scottalanmiller said in The Myth of RDP Insecurity:

                      @flaxking said in The Myth of RDP Insecurity:

                      I would love to see a practical how-to on securely setting up external access with minimal resources.

                      If you only need to expose a single RDP "server" to the outside, the necessary settings for a normal environment are trivial. Setup up RDP as normal, use proper password and account security, add singular port mapping from network firewall to RDP "server". That's it.

                      For more security, of course IP locking and such is not hard, but might not be warranted.

                      I believe more security is required in order to mitigate the risks caused by things that are difficult to control.

                      For example, user created passwords. I'd guess that 80% of user passwords that user's aren't reusing from somewhere else contain the business name. Requiring long passwords might be a way to help mitigate this, but practically speaking, a lot of IT pros would get major push back from management if this was implemented. I'm not saying management would be right to push back since they're not providing the budget for a more secure solution, but that's the reality of many SMB. In their eyes, availability tanks.

                      In that situation I would not be comfortable with putting forth direct RDP as an option.

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @flaxking
                        last edited by

                        @flaxking said in The Myth of RDP Insecurity:

                        Requiring long passwords might be a way to help mitigate this, but practically speaking, a lot of IT pros would get major push back from management if this was implemented.

                        Right, but it is very important to understand then that the problem here is management determining that security is not to be implemented, not a problem with RDP.

                        If this policy is the case, then a VPN will not resolve it.

                        F 1 Reply Last reply Reply Quote 1
                        • F
                          flaxking @scottalanmiller
                          last edited by

                          @scottalanmiller said in The Myth of RDP Insecurity:

                          @flaxking said in The Myth of RDP Insecurity:

                          Requiring long passwords might be a way to help mitigate this, but practically speaking, a lot of IT pros would get major push back from management if this was implemented.

                          Right, but it is very important to understand then that the problem here is management determining that security is not to be implemented, not a problem with RDP.

                          If this policy is the case, then a VPN will not resolve it.

                          Right, agreed. Your main point in this thread is that RDP isn't the vulnerability. But practically speaking, you have to mitigate the risks surrounding it, and that's what I think a how-to would be good for, though it might need several different scenarios.

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @flaxking
                            last edited by

                            @flaxking said in The Myth of RDP Insecurity:

                            @scottalanmiller said in The Myth of RDP Insecurity:

                            @flaxking said in The Myth of RDP Insecurity:

                            Requiring long passwords might be a way to help mitigate this, but practically speaking, a lot of IT pros would get major push back from management if this was implemented.

                            Right, but it is very important to understand then that the problem here is management determining that security is not to be implemented, not a problem with RDP.

                            If this policy is the case, then a VPN will not resolve it.

                            Right, agreed. Your main point in this thread is that RDP isn't the vulnerability. But practically speaking, you have to mitigate the risks surrounding it, and that's what I think a how-to would be good for, though it might need several different scenarios.

                            You do, but I think the point is that you can't mitigate them with a VPN, which is the normal assumption. RDP isn't really vulnerable, it's not RDP risks that need to be mitigated. And RPD contains an extremely secure VPN, so a VPN can't be the solution. There can be risks, but they are from other tech or organizational risks and mitigations are to those risks, not to RDP risks. Those risks remains, such as weak passwords, whether RDP is used or not.

                            F 1 Reply Last reply Reply Quote 1
                            • C
                              Carnival Boy @scottalanmiller
                              last edited by

                              @scottalanmiller said in The Myth of RDP Insecurity:

                              I know the 🌶 site there is this persistent myth that RDP is insecure and that the solution to its insecurity is to wrap it in a VPN. This seems very silly...
                              Azure itself exposes RDP directly because it is considered extremely secure.

                              The Azure portal says "RDP port 3389 is exposed to the Internet. This is only recommended for testing. For production environments, we recommend using a VPN or private connection."

                              I'm struggling to reconcile this statement with your post, unless I'm missing something?

                              0_1521104891064_df13fc2d-b2c3-4827-8467-c64b772aae62-image.png

                              triple9T scottalanmillerS 2 Replies Last reply Reply Quote 1
                              • triple9T
                                triple9 @Carnival Boy
                                last edited by

                                Personally, I prefer to close RDP if possible and put it into VPN. Keep it open only if client insists, and even then try to limit to certain IPs only. Even though there is no documented case that RDP itself was to blame (other than recently discovered exploit, but for 2003 and XP, which are dead anyway), I just don’t like the idea of having it exposed. As @scottalanmiller said "the product is just believed to be insecure" and I feel that way.
                                Good read at https://blog.rapid7.com/2017/08/09/remote-desktop-protocol-exposure/

                                1 Reply Last reply Reply Quote 2
                                • scottalanmillerS
                                  scottalanmiller @Carnival Boy
                                  last edited by

                                  @carnival-boy said in The Myth of RDP Insecurity:

                                  @scottalanmiller said in The Myth of RDP Insecurity:

                                  I know the 🌶 site there is this persistent myth that RDP is insecure and that the solution to its insecurity is to wrap it in a VPN. This seems very silly...
                                  Azure itself exposes RDP directly because it is considered extremely secure.

                                  The Azure portal says "RDP port 3389 is exposed to the Internet. This is only recommended for testing. For production environments, we recommend using a VPN or private connection."

                                  I'm struggling to reconcile this statement with your post, unless I'm missing something?

                                  Azure always exposes RDP. They recommend you buy things from them, which is really just a vendor trying to upsell. MS' own documentation says that RDP is very secure. And since RPD has a VPN, it's a trick statement - they recommend a VPN, which RDP has so... voila. It's a handy way to promote selling their additional VPN service without actually stating that RDP is a risk or that RDP doesn't have VPN, they let people just assume.

                                  Of course, I recommend not having any remote access open, and using state management which is way more secure than either.

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    flaxking @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in The Myth of RDP Insecurity:

                                    @flaxking said in The Myth of RDP Insecurity:

                                    @scottalanmiller said in The Myth of RDP Insecurity:

                                    @flaxking said in The Myth of RDP Insecurity:

                                    Requiring long passwords might be a way to help mitigate this, but practically speaking, a lot of IT pros would get major push back from management if this was implemented.

                                    Right, but it is very important to understand then that the problem here is management determining that security is not to be implemented, not a problem with RDP.

                                    If this policy is the case, then a VPN will not resolve it.

                                    Right, agreed. Your main point in this thread is that RDP isn't the vulnerability. But practically speaking, you have to mitigate the risks surrounding it, and that's what I think a how-to would be good for, though it might need several different scenarios.

                                    You do, but I think the point is that you can't mitigate them with a VPN, which is the normal assumption. RDP isn't really vulnerable, it's not RDP risks that need to be mitigated. And RPD contains an extremely secure VPN, so a VPN can't be the solution. There can be risks, but they are from other tech or organizational risks and mitigations are to those risks, not to RDP risks. Those risks remains, such as weak passwords, whether RDP is used or not.

                                    I'm not a big VPN fan, but they often can provide additional security that plain RDP does not. Client certificate authentication for example.
                                    However, I agree that just wrapping RDP with a just password-secured VPN isn't providing additional value.

                                    1 Reply Last reply Reply Quote 0
                                    • S
                                      Spiral
                                      last edited by

                                      Interesting topic.

                                      I have wondered about this myself many times.

                                      Would the VPN have mitigated these security exposures listed here:

                                      https://blog.rapid7.com/2017/08/09/remote-desktop-protocol-exposure/

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @Spiral
                                        last edited by

                                        @spiral said in The Myth of RDP Insecurity:

                                        Interesting topic.

                                        I have wondered about this myself many times.

                                        Would the VPN have mitigated these security exposures listed here:

                                        https://blog.rapid7.com/2017/08/09/remote-desktop-protocol-exposure/

                                        Probably, but so would proper maintenance. Essentially all real world RDP attacks are against unmaintained systems.

                                        1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller
                                          last edited by

                                          What's interesting with articles like this is they say things like "surely people aren't just exposing RDP, are there?" But let's ask that about VPNs. People aren't really exposing VPNs to the Internet, are they?

                                          Of course they are. Why is it okay with VPNs?

                                          1 Reply Last reply Reply Quote 1
                                          • S
                                            Spiral
                                            last edited by

                                            Exactly.

                                            That is why I was always curious about the argument.

                                            Are "they" trying to make the argument that generally VPNs are developed using better security coding practices than Microsoft's development of RDP?

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 3 / 6
                                            • First post
                                              Last post