Update: UltraVNC 1.4.3.6 and UltraVNC SC 1.4.3.6: https://forum.uvnc.com/viewtopic.php?t=37885
Important: Please update to latest version before to create a reply, a topic or an issue: https://forum.uvnc.com/viewtopic.php?t=37864
Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://x.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc
Important: Please update to latest version before to create a reply, a topic or an issue: https://forum.uvnc.com/viewtopic.php?t=37864
Join us on social networks and share our announcements:
- Website: https://uvnc.com/
- GitHub: https://github.com/ultravnc
- Mastodon: https://mastodon.social/@ultravnc
- Facebook: https://www.facebook.com/ultravnc1
- X/Twitter: https://x.com/ultravnc1
- Reddit community: https://www.reddit.com/r/ultravnc
- OpenHub: https://openhub.net/p/ultravnc
Dynamic encryption key.
Dynamic encryption key.
With normal UltraVNC, when you normally 'trust' the remote computer, there's no issue with physical access to the key. However, if you put this key in a self-extracting archive, and send it out to many people, some of which you may not know personally (Or perhaps put it on a website for all to DL), isn't there the possibility someone unscrupulous could extract the key, and then eavesdrop on a session?
- Rudi De Vos
- Admin & Developer
- Posts: 6863
- Joined: 2004-04-23 10:21
- Contact:
Well, yes and no. The server has a public/private key pair. LOTS of exchanges between the client and server are needed to use the public/private key pair to establish a session key. The server still needs to have a certificate and a public/private key.
Public key encryption is also EXPENSIVE cpu-wise.
Since the DSM architecture is kinda a black-box in the middle of VNC, with no control or visibility over the communication flow, it can't go through the complete key negotiation process.
If eaves dropping is the only concern, then the new MSRC4 Beta plugin might be an option. It adds salt to the key for each session. Makes each session key "unique".
Rudi, if you want to implement SSL-type key negotiation after version 1.0, let me know, I'm all for it. Adding a second DSM architecture to do the key negotiation might be one idea...
Sean
Public key encryption is also EXPENSIVE cpu-wise.
Since the DSM architecture is kinda a black-box in the middle of VNC, with no control or visibility over the communication flow, it can't go through the complete key negotiation process.
If eaves dropping is the only concern, then the new MSRC4 Beta plugin might be an option. It adds salt to the key for each session. Makes each session key "unique".
Rudi, if you want to implement SSL-type key negotiation after version 1.0, let me know, I'm all for it. Adding a second DSM architecture to do the key negotiation might be one idea...
Sean
Try finding the solution on http://www.encryptionkey.info/
Try finding the solution on http://www.encryptionkey.info/