1 |
On Sun, Jan 17, 2016 at 6:38 AM, lee <lee@××××××××.de> wrote: |
2 |
> Suppose you use a VPN connection. How do does the client (employee) |
3 |
> secure their own network and the machine they're using to work remotely |
4 |
> then? |
5 |
|
6 |
Poorly, most likely. Your data is probably not nearly as important to |
7 |
them as their data is, and most people don't take great care of their |
8 |
own data. |
9 |
|
10 |
As I mentioned in my other post, there might be some exceptions if |
11 |
you're dealing with highly-skilled IT security employees or something |
12 |
like that, but most people don't take nearly the level of care with |
13 |
their clients as you're probably going to want them to. |
14 |
|
15 |
|
16 |
> What's the Linux equivalent of RDP sessions? Some sort of VNC seems to |
17 |
> usually require a lot of bandwidth, and I wouldn't know how to run it as |
18 |
> a service so that someone could just start a client (like rdesktop) and |
19 |
> log in to the server as they can do with Windoze servers. --- I only |
20 |
> found x11rdp which appears to be incompatible with current X servers. |
21 |
|
22 |
There is stuff like xtogo and other NX-like technologies, but the |
23 |
trend seems to be towards client-side rendering which makes them |
24 |
perform about as well as VNC. I mostly gave up on it ages ago - it |
25 |
was fairly fragile to keep working as well. I do know one of the |
26 |
maintainers - perhaps it has gotten better in recent years. |
27 |
|
28 |
However, while an RDP-like solution protects you from some types of |
29 |
attacks, it still leaves you open to many client-side problems like |
30 |
keylogging. I don't know any major corporation that lets people RDP |
31 |
into their applications in general. |
32 |
|
33 |
It sounds like Grant is concerned enough about his application to |
34 |
restrict logins to a specific IP (presumably it uses SSL and sign-ons |
35 |
as well). If you care THAT much about where valid users can connect |
36 |
from, I don't see why you'd just let them VPN into your LAN running |
37 |
who-knows-what-rootkit on their workstations. |
38 |
|
39 |
If you're truly 100% web-based I'd just go the chromebook route. If |
40 |
not, I'd issue laptops that you control with full-disk encryption, and |
41 |
you can then set them up however you need to. |
42 |
|
43 |
-- |
44 |
Rich |