
Is there some way I can edit the deployment file to include this? I'm unfamiliar with how it's packaged.
Well, sure, it's all out in the open for you to modify at will. As indicated in the original post in this thread, supercoe is already hosting the "one leg" stunnel mod, I think as a self-contained ChunkVNC SSL package.ahinson wrote:Now if we can get stunnel bundled in the ChunkVNC instantsupport.exe, that would be awesome.
Is there some way I can edit the deployment file to include this? I'm unfamiliar with how it's packaged.
I thought so too but I didn't see a link for it on his site - I checked before asking.B wrote:Well, sure, it's all out in the open for you to modify at will. As indicated in the original post in this thread, supercoe is already hosting the "one leg" stunnel mod, I think as a self-contained ChunkVNC SSL package.ahinson wrote:Now if we can get stunnel bundled in the ChunkVNC instantsupport.exe, that would be awesome.
Is there some way I can edit the deployment file to include this? I'm unfamiliar with how it's packaged.
Most or all of the coding and packaging (other than the actual UltraVNC components) is done using the AutoIT language.
http://chunkvnc.googlecode.com/
http://walkernerds.com/chunkvnc/
It's in my first post in this thread.ahinson wrote:I thought so too but I didn't see a link for it on his site - I checked before asking.
Code: Select all
[Repeater]
Address=127.0.0.1:5901 change this to your address -> example.repeater.com:5901
[ChunkViewer]
ListMax=10
List=
Quality=3
Code: Select all
[ChunkVNC]
accept = 127.0.0.1:5901
connect=192.2.2.1:443 change this to your address -> example.repeater.com:443
Code: Select all
[Repeater]
Address=127.0.0.1:5500
[ChunkVNC]
Installed=0
Path=
ID=
Code: Select all
[ChunkVNC]
accept = 5500
connect = my.fqdn.com:443
Code: Select all
[ChunkVNC]
accept = 443
connect = 127.0.0.1:5500
Code: Select all
server: 5500
viewer: 5901
Code: Select all
[Repeater]
Address=my.fqdn.com:5901
[ChunkViewer]
ListMax=10
List=407926|407926
Quality=3
I tried this and it doesn't work. stunnel disconnects before it (the viewer) can connect. Maybe this is a limitation of stunnel?B wrote:Good. Please let us know if you manage to add the second stunnel for that second leg.
I suppose, at worst case, one could use stunnel on one leg and ssh for the other... but that would be crazy.
Again, I <b>think</b> the only exposure in the current SSL-enhanced package is the handshake and login on the viewer side, and that's if the RC4 keys are compromised.
I believe that multiple stunnel are supported, but you need to use different ports for each tunnel (or different ips), as each tunnel is tied to a port.B wrote:It includes mention of multiple Stunnel support.
I've also use this trick for years and works ok. Not so much companies use protocol filters, so this is the easyest solution.Yod4z wrote:Yes this tip work only for proxy/firewall that block only port.
We do this on my society from 5 year without any problems with lot of our customers