There is a thread on this, though about 4 months old, so I started a new one rather than raise the dead.
I used to have a TightVNC-over-FreeSSHd tunnel running on my desktop. Then one day I noted many unauthorized login attempts over the course of about 20 minutes, shut down the servers, uninstalled everything, and haven't tried again.
I'm interested in getting this set up once more, but want some advice on the property security measure to take to avoid problems.
1.) Should I use TightVNC, or something else? I did like the option of using a web browser, but that didn't seem to work over FreeSSHd, so I couldn't use it anyway.
2.) Same for FreeSSHd -- should I continue using this server or is another one out there better?
3.) What firewall/security steps should I take to lock the server machine down? I was using an RSA key, which (supposedly) adds a decent level of security to things; should I keep going with RSA or is there something better?
I'm not very knowledgeable about these security issues, so help is appreciated. The machine is connected via physical line to a wireless router which has WPA/WPA2 encryption (unfortunately, one of the PC's in the house won't connect to WPA2, so I need to have both, despite WPA now being cracked). The router is running standard company firmware.
I had been using DynDNS to connect easily to the machine, is this okay?
Thanks in advance.
Posts
Can trade TF2 items or whatever else you're interested in. PM me.
Fun tidbit: I just checked my auth logs and found 3054 invalid user logins, 2851 of which were from the same IP. I think I should probably hammer out a script to ban excessive login attempts.
Edit: Above was assuming a Linux server (or BSD I suppose).
If you are using Windows you might as well just Remote Desktop / Terminal Services (port 3389) which is also encrypted. I also like to use Hamachi for VPN access on Linux and Windows. Easy to setup and work with rather than opening public ports.
SC2 NA: exoplasm.519 | PA SC2 Mumble Server | My Website | My Stream