ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    The Myth of RDP Insecurity

    IT Discussion
    rdp vpn security
    18
    103
    12.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      Carnival Boy
      last edited by

      Scott, in a previous thread you wrote "the general thinking in many cases is that you put a VPN aggregator at the edge and expose nothing else, only that. I'm not saying that's some magic answer, but it is the "LAN Security Model" that is why VPNs were really created."

      Does that thinking apply here at all, or am I missing the point? Exposing an RDP port of a Windows Server directly to the internet - so there's no authentication at the perimeter? Why is that a good idea here? I accept that RDP is essentially the same as a VPN, but isn't the difference in where the authentication takes place rather than the model itself?

      coliverC scottalanmillerS 3 Replies Last reply Reply Quote 0
      • coliverC
        coliver @Carnival Boy
        last edited by

        @carnival-boy said in The Myth of RDP Insecurity:

        Scott, in a previous thread you wrote "the general thinking in many cases is that you put a VPN aggregator at the edge and expose nothing else, only that. I'm not saying that's some magic answer, but it is the "LAN Security Model" that is why VPNs were really created."

        Does that thinking apply here at all, or am I missing the point? Exposing an RDP port of a Windows Server directly to the internet - so there's no authentication at the perimeter? Why is that a good idea here? I accept that RDP is essentially the same as a VPN, but isn't the difference in where the authentication takes place rather than the model itself?

        Mostly because that's the LAN security model. He's advocating, here at least, for a LAN-less model in which you harden the endpoint and have zero trust to anything on the network.

        scottalanmillerS 1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @Carnival Boy
          last edited by

          @carnival-boy said in The Myth of RDP Insecurity:

          Scott, in a previous thread you wrote "the general thinking in many cases is that you put a VPN aggregator at the edge and expose nothing else, only that. I'm not saying that's some magic answer, but it is the "LAN Security Model" that is why VPNs were really created."

          Does that thinking apply here at all, or am I missing the point? Exposing an RDP port of a Windows Server directly to the internet - so there's no authentication at the perimeter?

          RDP does have authentication. It's SaaS. Secured like anything else that you would secure.

          A VPN is the same as RPD (literally, they are identical technology for security both in encryption and authentication because RDP literally uses a VPN) so wither you are exposing RDP's own VPN directly to the Internet or some random third party VPN directly to the Internet, you are doing the same thing.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Carnival Boy
            last edited by

            @carnival-boy said in The Myth of RDP Insecurity:

            I accept that RDP is essentially the same as a VPN, but isn't the difference in where the authentication takes place rather than the model itself?

            No, not authentication in a different place. Under some circumstances the difference would be that you authenticate twice, which if we use two totally disconnected schemes, and two totally different technologies, is certainly going to increase security as long as your users don't rebel.

            But using a VPN to do that requires a deep understanding of the RDP model and a specific approach designed to approach the security with that disconnection in mind. Then, at least, you can remove the "overlap" problem.

            But you don't do this with any other technology, even ones not secured to the degree that RDP is. So this seems like something that doesn't make sense under any normal conditions and, if it did, there are way more effective ways to secure RDP even further (limiting login attempts, temporary IP locking, etc.)

            The encryption portion of the second VPN is essentially worthless, that's not the concern. It's just "doubling up" the authentication piece, which can be improved, much more easily in other ways.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @coliver
              last edited by

              @coliver said in The Myth of RDP Insecurity:

              @carnival-boy said in The Myth of RDP Insecurity:

              Scott, in a previous thread you wrote "the general thinking in many cases is that you put a VPN aggregator at the edge and expose nothing else, only that. I'm not saying that's some magic answer, but it is the "LAN Security Model" that is why VPNs were really created."

              Does that thinking apply here at all, or am I missing the point? Exposing an RDP port of a Windows Server directly to the internet - so there's no authentication at the perimeter? Why is that a good idea here? I accept that RDP is essentially the same as a VPN, but isn't the difference in where the authentication takes place rather than the model itself?

              Mostly because that's the LAN security model. He's advocating, here at least, for a LAN-less model in which you harden the endpoint and have zero trust to anything on the network.

              Correct. Just secure RDP properly, and then the secondary VPN is really pointless.

              1 Reply Last reply Reply Quote 0
              • C
                Carnival Boy
                last edited by

                OK. I was only thinking in terms of the LAN and VPN authentication on the firewall, rather than just opening ports up on the firewall to let all traffic on those RDP ports through to the LAN.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Carnival Boy
                  last edited by

                  @carnival-boy said in The Myth of RDP Insecurity:

                  OK. I was only thinking in terms of the LAN and VPN authentication on the firewall, rather than just opening ports up on the firewall to let all traffic on those RDP ports through to the LAN.

                  That's what the RDP system is doing already, just with the port open to it. A VPN needs a port open for it, or the equivalent (not all are TCP.) Any technology like this has to have the ports open in order for the initial authentication. Whether it is the RDP port, the VPN port, something has to be open for you to connect.

                  1 Reply Last reply Reply Quote 0
                  • dbeatoD
                    dbeato
                    last edited by

                    Well I am convinced now 😛 VPN is not equal 😕
                    https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug/

                    scottalanmillerS 1 Reply Last reply Reply Quote 2
                    • scottalanmillerS
                      scottalanmiller @dbeato
                      last edited by

                      @dbeato said in The Myth of RDP Insecurity:

                      Well I am convinced now 😛 VPN is not equal 😕
                      https://www.bleepingcomputer.com/news/security/many-vpn-providers-leak-customers-ip-address-via-webrtc-bug/

                      LOL, those are "VPN Providers" which is that weird "Consumer VPN" scam thing that everyone sells these days.

                      1 Reply Last reply Reply Quote 1
                      • S
                        Spiral
                        last edited by

                        Personally, I always thought the OpenVPN certificate was good second factor to the RDP username and password access. Thinking this would reduce AD account lockouts in relation to AD accounts which also had RDP access.

                        Isn't there some value in using two separate authentication systems in a multi-factor arrangement?

                        scottalanmillerS JaredBuschJ 2 Replies Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @Spiral
                          last edited by

                          @spiral said in The Myth of RDP Insecurity:

                          Personally, I always thought the OpenVPN certificate was good second factor to the RDP username and password access. Thinking this would reduce AD account lockouts in relation to AD accounts which also had RDP access.

                          Isn't there some value in using two separate authentication systems in a multi-factor arrangement?

                          Some value, certainly. But it there is specific value to that it seems that we must apply that universally and not tied to RDP in any way.

                          1 Reply Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @Spiral
                            last edited by

                            @spiral said in The Myth of RDP Insecurity:

                            Personally, I always thought the OpenVPN certificate was good second factor to the RDP username and password access. Thinking this would reduce AD account lockouts in relation to AD accounts which also had RDP access.

                            Isn't there some value in using two separate authentication systems in a multi-factor arrangement?

                            There is. But those are issues around the username and password being used for RDP. It has nothing to do with the security of the RDP session itself.

                            1 Reply Last reply Reply Quote 2
                            • PSX_DefectorP
                              PSX_Defector
                              last edited by

                              Here is the one thing that will shut the dumbasses up about RDP being "insecure".

                              Multi factor authentication.

                              Microsoft even supplies wonderful application for it.

                              https://azure.microsoft.com/en-us/services/multi-factor-authentication/

                              Eliminates all the shit password problems, even if its 'password', has a mobile app to just hit a button to approve login, and is pretty easy to set up to boot.

                              1 Reply Last reply Reply Quote 2
                              • JaredBuschJ
                                JaredBusch
                                last edited by

                                This was mentioned in another thread once, but I feel it needs to be here also.

                                https://github.com/glasnt/wail2ban

                                scottalanmillerS wrx7mW 2 Replies Last reply Reply Quote 2
                                • scottalanmillerS
                                  scottalanmiller @JaredBusch
                                  last edited by

                                  @JaredBusch said in The Myth of RDP Insecurity:

                                  This was mentioned in another thread once, but I feel it needs to be here also.

                                  https://github.com/glasnt/wail2ban

                                  Anyone got a guide to working with that with RDS?

                                  dbeatoD JaredBuschJ 2 Replies Last reply Reply Quote 0
                                  • dbeatoD
                                    dbeato @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in The Myth of RDP Insecurity:

                                    @JaredBusch said in The Myth of RDP Insecurity:

                                    This was mentioned in another thread once, but I feel it needs to be here also.

                                    https://github.com/glasnt/wail2ban

                                    Anyone got a guide to working with that with RDS?

                                    No that I know of, I can work on it maybe tomorrow or Friday.

                                    scottalanmillerS 1 Reply Last reply Reply Quote 2
                                    • scottalanmillerS
                                      scottalanmiller @dbeato
                                      last edited by

                                      @dbeato said in The Myth of RDP Insecurity:

                                      @scottalanmiller said in The Myth of RDP Insecurity:

                                      @JaredBusch said in The Myth of RDP Insecurity:

                                      This was mentioned in another thread once, but I feel it needs to be here also.

                                      https://github.com/glasnt/wail2ban

                                      Anyone got a guide to working with that with RDS?

                                      No that I know of, I can work on it maybe tomorrow or Friday.

                                      That would be awesome.

                                      1 Reply Last reply Reply Quote 0
                                      • JaredBuschJ
                                        JaredBusch @scottalanmiller
                                        last edited by

                                        @scottalanmiller said in The Myth of RDP Insecurity:

                                        @JaredBusch said in The Myth of RDP Insecurity:

                                        This was mentioned in another thread once, but I feel it needs to be here also.

                                        https://github.com/glasnt/wail2ban

                                        Anyone got a guide to working with that with RDS?

                                        No, I was just trying to link solutions for someone and remembered it from another thread.

                                        scottalanmillerS 1 Reply Last reply Reply Quote 1
                                        • scottalanmillerS
                                          scottalanmiller @JaredBusch
                                          last edited by

                                          @JaredBusch said in The Myth of RDP Insecurity:

                                          @scottalanmiller said in The Myth of RDP Insecurity:

                                          @JaredBusch said in The Myth of RDP Insecurity:

                                          This was mentioned in another thread once, but I feel it needs to be here also.

                                          https://github.com/glasnt/wail2ban

                                          Anyone got a guide to working with that with RDS?

                                          No, I was just trying to link solutions for someone and remembered it from another thread.

                                          Cool, well it is a start. Good passwords, good RDP patching, wail2ban... should make RDP a lot more secure with relatively little effort, in theory.

                                          1 Reply Last reply Reply Quote 0
                                          • NashBrydgesN
                                            NashBrydges
                                            last edited by

                                            Any concerns about the fact that there will be no further maintenance of wail2ban?

                                            Hasn't seen any updates in over a year and doesn't look like there will be any to come. Am I misunderstanding what this means?

                                            DustinB3403D JaredBuschJ 2 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 6
                                            • 4 / 6
                                            • First post
                                              Last post