|
|||
I recommend you don't forward VNC traffic at all. VNC traffic is not secure by default and all info including passwords is sent in clear text.
Instead I recommend setting up either OpenVPN or SSH w/ port forwarding enabled. SSH is by far the easier of the two to implement. The idea is to tunnel your VNC Viewer through your SSH tunnel. Thus protecting it. I won't bother posting links as Google will show you many examples. This (SSH) would allow: 1. A secure connection from anywhere via SSH 2. Though SSH there are many features to control how users are able to connect Some examples being: Code:
LoginGraceTime MaxAuthTries MaxStartups Port XXXX <-- this will help avoid scripted scans 3. Less rules in your PF.conf Read here for more on SSH: http://www.openbsd.org/cgi-bin/man.c...ry=sshd_config Cheers! |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
ssh brute force attacks | sniper007 | FreeBSD Security | 21 | 12th June 2011 01:28 AM |
pf.conf and some questions about brute attacks | Daffy | OpenBSD Security | 10 | 27th March 2011 08:38 AM |
Air Force may suffer collateral damage from PS3 firmware update | J65nko | News | 1 | 13th May 2010 12:00 PM |
attacks DDoS | Sam | OpenBSD Security | 6 | 18th December 2009 12:07 AM |
pf.conf brute force rule | ijk | FreeBSD Security | 6 | 11th August 2008 04:54 PM |