Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    RDP issues

    General pfSense Questions
    11
    32
    7.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Why would users machines even be able to access something they don't have access to via RDP??

      Can't "hack" into something with the username/password if they don't have access to even get there..  If rdp is used for admin, then only admin machines should have access.  If admin walked away from his desk and did not lock his machine, or guess they know what the admins password is they could just unlock it.

      Pretty sure his rdp session WITH odd ball port is saved on his past connections, etc..

      So let me guess you think hiding your SSIDs is good security practice too?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • F
        firewalluser
        last edited by

        I think we need to agree to disagree then.

        Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

        Asch Conformity, mainly the blind leading the blind.

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Clearly I have no problems in disagreeing with your statements ;)

          Changing your standard ports for services to non standard is simple attempt at obscurity, and as we all know security through obscurity is not security..  This is security 101

          How does NIST state it – oh yeah "System security should not depend on the secrecy of the implementation or its components."

          If your doing it to say keep your logs a bit cleaner from the bots hitting your port on the outside ok..  But it is not a valid security measure.  And would seem completely pointless on the inside..  And could even lead to problems..  Hey can you get into that server in that remote DC, billy quit and we have the username and passwords but RDP is not coming up ;)

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            It could be argued that the single, correct AES256 key in use is simply obscure in a sea of 2^256 possibilities but I digress…

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              hehe –- that is a valid point Derelict, valid point ;)

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.7.2, 24.11

              1 Reply Last reply Reply Quote 0
              • F
                firewalluser
                last edited by

                @johnpoz:

                Clearly I have no problems in disagreeing with your statements ;)

                Changing your standard ports for services to non standard is simple attempt at obscurity, and as we all know security through obscurity is not security..  This is security 101

                How does NIST state it – oh yeah "System security should not depend on the secrecy of the implementation or its components."

                What gives you the impression it was an attempt at security through obscurity?

                Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                Asch Conformity, mainly the blind leading the blind.

                1 Reply Last reply Reply Quote 0
                • KOMK
                  KOM
                  last edited by

                  You are literally obscuring the standard port number for common services by moving it to a different location.  It will trick a lot of dumb scans that happen constantly on the Internet but it won't stop a scanner dedicated to finding remote access servers (RDP, SSH, VNC etc) no matter which port they're listening on.  It doesn't take a lot of time to parallel-scan huge swathes of port space per IP address when you have many computers at your command.

                  1 Reply Last reply Reply Quote 0
                  • N
                    NOYB
                    last edited by

                    @johnpoz:

                    So let me guess you think hiding your SSIDs is good security practice too?

                    … think hiding your SSIDs is good security practice?  Yes.

                    1 Reply Last reply Reply Quote 0
                    • F
                      firewalluser
                      last edited by

                      @KOM:

                      You are literally obscuring the standard port number for common services by moving it to a different location.  It will trick a lot of dumb scans that happen constantly on the Internet but it won't stop a scanner dedicated to finding remote access servers (RDP, SSH, VNC etc) no matter which port they're listening on.  It doesn't take a lot of time to parallel-scan huge swathes of port space per IP address when you have many computers at your command.

                      I think we are talking cross purposes here.

                      In my original post I do state
                      https://forum.pfsense.org/index.php?topic=97868.msg545715#msg545715
                      "although vpn is still preferred route.
                      "

                      In fact I've said the same thing in a rehashed way right here.
                      https://forum.pfsense.org/index.php?topic=94177.msg526779#msg526779
                      "If you want to hide the fact you have (multiple) port forwards setup for RDP on the internet, setup OpenVPN on another ip address range to get you inside the lan, then change your pfsense portwards from wan to openvpn. The less you expose wan side the better imo.
                      "

                      In this post from this thread https://forum.pfsense.org/index.php?topic=97868.msg546006#msg546006
                      "On the point of having the RDP on different ports within a lan setting, how do you prove it wasnt the admin logging in and rdp'ing onto a machine when the audits show it was the admin username and password used and no cctv exists in the office?"

                      its a different scenario now, just focusing on lan, dont care about wan which is what I think some of you havent let go of, but the premise is that having non default RDP ports lanside can be used to trip someone up who makes assumptions about the lan whilst only being in possession of the admin username & pwd from their workstation.

                      We know its a windows workstation and others exist as thats why we are using RDP, instead of say VNC, Teamview, Goto, etc etc. Trip doesnt stop people getting to their destination, but it can be useful for showing up anomalies where hidden knowledge is not known to the right people.

                      So can you answer the question?

                      If you need to clarify anything more about the lan setup, whats running and whats not, just ask.  ;)

                      Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                      Asch Conformity, mainly the blind leading the blind.

                      1 Reply Last reply Reply Quote 0
                      • F
                        firewalluser
                        last edited by

                        @NOYB:

                        @johnpoz:

                        So let me guess you think hiding your SSIDs is good security practice too?

                        … think hiding your SSIDs is good security practice?  Yes.

                        I dont like any 2.4GHz frequencies full stop, 900Mhz is better especially when considering an antenna 15metres up has a maximum coverage radius of upto 50Km making it ideal for mesh networks, and tends to be unlicenced in many countries around the world.

                        Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                        Asch Conformity, mainly the blind leading the blind.

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          What does 900Mhz has to do with not broadcasting ssid?  So you think its a good practice not to broadcast it?  rolleyes..

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                          1 Reply Last reply Reply Quote 0
                          • F
                            firewalluser
                            last edited by

                            @johnpoz:

                            What does 900Mhz has to do with not broadcasting ssid?  So you think its a good practice not to broadcast it?  rolleyes..

                            I dont use wifi full stop, sure not broadcasting the SSID can make it a little harder for others to spot who dont have things like air crack, but I just dont like that frequency so I dont use it. Besides theres also this.
                            https://decorrespondent.nl/1101/What-we-give-away-when-we-log-on-to-a-public-Wi-Fi-network/31040493-53737dba

                            Now 900Mhz is a different frequency all together with totally different properties and is one I do like for mesh networks, but like any over the air network, always encrypt and its also why SETI could ultimately fail when considering advanced intelligent lifeforms may use fibre, copper or laser line of sight communications amongst other communication carrier methods, to reduce the ability of eavesdroppers even though there is still radial beam divergence with some lasers which could potentially enable an eavesdropper.

                            Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                            Asch Conformity, mainly the blind leading the blind.

                            1 Reply Last reply Reply Quote 0
                            • R
                              rudelerius
                              last edited by

                              Now 900Mhz is a different frequency all together with totally different properties…, but like any over the air network, always encrypt and its also why SETI could ultimately fail when considering advanced intelligent lifeforms may use fibre, copper or laser line of sight communications amongst other communication carrier methods, to reduce the ability of eavesdroppers even though there is still radial beam divergence with some lasers which could potentially enable an eavesdropper

                              You win.  :D

                              1 Reply Last reply Reply Quote 0
                              • johnpozJ
                                johnpoz LAYER 8 Global Moderator
                                last edited by

                                "sure not broadcasting the SSID can make it a little harder for others to spot who dont have things like air crack,"

                                huh?  You know who it makes it harder on - the users of said network, like your buddy that is over and wants to connect to your wifi network that your giving him the creds to do.

                                Who else, yeah grandma across the street prob wont see it on her phone.  As to everyone else, not so much the broadcast of the SSID is only 1 out of 5 different thinks that broadcast the SSID.  Probe responses contain the ssid, associations requests, re-associations requests and probe requests all contain the SSID.  So you turning of beacon is not hiding anything from anyone..

                                You sure do not need aircrack to find the SSID of network that is not sending out beacons.  There are many point and click tools that any user barely able to use google could run that will give show them the SSID from these other methods of finding it.  Easy free one off the top of my head is https://www.acrylicwifi.com/en/wlan-software/wlan-scanner-acrylic-wifi-free/

                                So your tinfoil hat is on so tight you don't use a tablet or laptop in your own home??  WTF??

                                An intelligent man is sometimes forced to be drunk to spend time with his fools
                                If you get confused: Listen to the Music Play
                                Please don't Chat/PM me for help, unless mod related
                                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                                F 1 Reply Last reply Reply Quote 0
                                • F
                                  firewalluser
                                  last edited by

                                  @johnpoz:

                                  So your tinfoil hat is on so tight you don't use a tablet or laptop in your own home??  WTF??

                                  Got the song as well. https://www.youtube.com/watch?v=wFNO2sSW-mU  ;D

                                  Of course there are other reasons why I dont use wifi which you havent mentioned, but I'll let you find them out in due course if so inclined.  :)

                                  Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

                                  Asch Conformity, mainly the blind leading the blind.

                                  1 Reply Last reply Reply Quote 0
                                  • F
                                    FriedaDiaz @johnpoz
                                    last edited by

                                    thank you

                                    1 Reply Last reply Reply Quote 0
                                    • P
                                      paksilas Banned
                                      last edited by

                                      This post is deleted!
                                      1 Reply Last reply Reply Quote 0
                                      • First post
                                        Last post
                                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.