VNC uses a random challenge-response system to provide the basic authentication that allows you to connect to a VNC server. This is reasonably secure; the password is not sent over the network. Once you are connected, however, traffic between the viewer and the server is unencrypted, and could be snooped by someone with access to the intervening network. We therefore recommend that if security is important to you, you 'tunnel' the VNC protocol through some more secure channel such as SSH.
Originally posted by: sward666
Text
VNC uses a random challenge-response system to provide the basic authentication that allows you to connect to a VNC server. This is reasonably secure; the password is not sent over the network. Once you are connected, however, traffic between the viewer and the server is unencrypted, and could be snooped by someone with access to the intervening network. We therefore recommend that if security is important to you, you 'tunnel' the VNC protocol through some more secure channel such as SSH.
Originally posted by: Shockwave
Originally posted by: sward666
Text
VNC uses a random challenge-response system to provide the basic authentication that allows you to connect to a VNC server. This is reasonably secure; the password is not sent over the network. Once you are connected, however, traffic between the viewer and the server is unencrypted, and could be snooped by someone with access to the intervening network. We therefore recommend that if security is important to you, you 'tunnel' the VNC protocol through some more secure channel such as SSH.
Its essentially like that for every network on the planet. If you have the equipment, and access to the transmission medium being used, you can analyze it.
So, I personally wouldnt hesitate to use VNC, although I also dont have anything so critical on my box that I would be in trouble if someone got in. Well, other then the RIAA of course...![]()
Originally posted by: Entity
Doesn't TightVNC solve the problem of unsecure connections?
Rob