1 |
On Sunday, January 17, 2016 07:27:45 AM Rich Freeman wrote: |
2 |
> On Sun, Jan 17, 2016 at 6:38 AM, lee <lee@××××××××.de> wrote: |
3 |
> > Suppose you use a VPN connection. How do does the client (employee) |
4 |
> > secure their own network and the machine they're using to work remotely |
5 |
> > then? |
6 |
> |
7 |
> Poorly, most likely. Your data is probably not nearly as important to |
8 |
> them as their data is, and most people don't take great care of their |
9 |
> own data. |
10 |
> |
11 |
> As I mentioned in my other post, there might be some exceptions if |
12 |
> you're dealing with highly-skilled IT security employees or something |
13 |
> like that, but most people don't take nearly the level of care with |
14 |
> their clients as you're probably going to want them to. |
15 |
> |
16 |
> > What's the Linux equivalent of RDP sessions? Some sort of VNC seems to |
17 |
> > usually require a lot of bandwidth, and I wouldn't know how to run it as |
18 |
> > a service so that someone could just start a client (like rdesktop) and |
19 |
> > log in to the server as they can do with Windoze servers. --- I only |
20 |
> > found x11rdp which appears to be incompatible with current X servers. |
21 |
> |
22 |
> There is stuff like xtogo and other NX-like technologies, but the |
23 |
> trend seems to be towards client-side rendering which makes them |
24 |
> perform about as well as VNC. I mostly gave up on it ages ago - it |
25 |
> was fairly fragile to keep working as well. I do know one of the |
26 |
> maintainers - perhaps it has gotten better in recent years. |
27 |
> |
28 |
> However, while an RDP-like solution protects you from some types of |
29 |
> attacks, it still leaves you open to many client-side problems like |
30 |
> keylogging. I don't know any major corporation that lets people RDP |
31 |
> into their applications in general. |
32 |
|
33 |
Actually, there are several large corporations that use RDP-like technologies. |
34 |
Although those are called "VDI" and usually use XenDesktop on the server side |
35 |
and "icaclient" on the client. |
36 |
Runs through HTTPS and apart from keyloggers and screenloggers, there is not |
37 |
much that can be done. |
38 |
Using 2-factor authentication (RSA-type keys or similar) they're pretty |
39 |
secure. |
40 |
|
41 |
-- |
42 |
Joost |