G
Guest
With RDP 6.0 installed, are the credentials still passed between a remote
host and a RAS server (or any other machine, for that matter) in clear text?
Or with this latest version of RDP, can a completely encrypted
connection/session be made across the I'net?
I have a PPTP VPN configured on a Win2003SP2 machine with MS-CHAPv2 and
Windows Authentication in the access policy. Using Ethereal or Netmon 3.0,
no human-readable information is available in the LCP, GRE or PPP packets
captured when making a connection and during the session, as expected.
Recently, I was unable to establish a VPN connection from a remote location
but needed to access the RAS box. Reluctantly, I remoted into my
firewall/router, set port forwarding on 3389 to the RAS box and made my
connection. I changed my password just before I closed the 3389 connection
and immediately closed the port/forwarding on the firewall/router. However,
before I took any of these actions, I started a capture using Netmon 3.0.
The capture indicated that everything was encrypted - I couldn't see
credentials being passed to the server.
If the RDP 6.0 protocol is now secure end-to-end by design, this would
obviate the need to first create a VPN connection, woudln't it?
If anyone can authoritatively let me know if RDP 6.0 is in fact now secure
end-to-end, I would appreciate the confirmation; and if in your opinion, this
can safely be used in lieu of a VPN.
Thanks.
host and a RAS server (or any other machine, for that matter) in clear text?
Or with this latest version of RDP, can a completely encrypted
connection/session be made across the I'net?
I have a PPTP VPN configured on a Win2003SP2 machine with MS-CHAPv2 and
Windows Authentication in the access policy. Using Ethereal or Netmon 3.0,
no human-readable information is available in the LCP, GRE or PPP packets
captured when making a connection and during the session, as expected.
Recently, I was unable to establish a VPN connection from a remote location
but needed to access the RAS box. Reluctantly, I remoted into my
firewall/router, set port forwarding on 3389 to the RAS box and made my
connection. I changed my password just before I closed the 3389 connection
and immediately closed the port/forwarding on the firewall/router. However,
before I took any of these actions, I started a capture using Netmon 3.0.
The capture indicated that everything was encrypted - I couldn't see
credentials being passed to the server.
If the RDP 6.0 protocol is now secure end-to-end by design, this would
obviate the need to first create a VPN connection, woudln't it?
If anyone can authoritatively let me know if RDP 6.0 is in fact now secure
end-to-end, I would appreciate the confirmation; and if in your opinion, this
can safely be used in lieu of a VPN.
Thanks.