ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Who is at Fault?

    IT Discussion
    6
    17
    1.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      flaxking @JaredBusch
      last edited by

      @jaredbusch said in Who is at Fault?:

      As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

      It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

      JaredBuschJ 1 Reply Last reply Reply Quote 0
      • JaredBuschJ
        JaredBusch @flaxking
        last edited by

        @flaxking said in Who is at Fault?:

        @jaredbusch said in Who is at Fault?:

        As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

        It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

        But one or both actions could have been impossible had that not been setup in the first place.

        F 1 Reply Last reply Reply Quote 0
        • F
          flaxking @JaredBusch
          last edited by

          @jaredbusch said in Who is at Fault?:

          @flaxking said in Who is at Fault?:

          @jaredbusch said in Who is at Fault?:

          As well as whoever allowed an admin account to be a daily driver. That is totally relevant, even if you try to claim it isn't.

          It is relevant, however it complicates the scenario at lot more and is beyond the people currently in the scenario.

          But one or both actions could have been impossible had that not been setup in the first place.

          But it is a predefined constraint that the tech, user, and software support tech all have to work with.

          1 Reply Last reply Reply Quote 0
          • thwrT
            thwr
            last edited by

            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

            Net RunnerN 1 Reply Last reply Reply Quote 2
            • Net RunnerN
              Net Runner @thwr
              last edited by

              @thwr said in Who is at Fault?:

              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

              scottalanmillerS 1 Reply Last reply Reply Quote 2
              • scottalanmillerS
                scottalanmiller @Net Runner
                last edited by

                @net-runner said in Who is at Fault?:

                @thwr said in Who is at Fault?:

                Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                Same thing happens to exposed VPNs 🙂

                thwrT 1 Reply Last reply Reply Quote 1
                • thwrT
                  thwr @scottalanmiller
                  last edited by thwr

                  @scottalanmiller said in Who is at Fault?:

                  @net-runner said in Who is at Fault?:

                  @thwr said in Who is at Fault?:

                  Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                  This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                  Same thing happens to exposed VPNs 🙂

                  I won't compare a certificate based VPN with RDP 😉

                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @thwr
                    last edited by

                    @thwr said in Who is at Fault?:

                    @scottalanmiller said in Who is at Fault?:

                    @net-runner said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                    Same thing happens to exposed VPNs 🙂

                    @scottalanmiller said in Who is at Fault?:

                    @net-runner said in Who is at Fault?:

                    @thwr said in Who is at Fault?:

                    Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                    This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                    Same thing happens to exposed VPNs 🙂

                    I won't compare a certificate based VPN with RDP 😉

                    Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                    thwrT 1 Reply Last reply Reply Quote 0
                    • thwrT
                      thwr @JaredBusch
                      last edited by

                      @jaredbusch said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      @scottalanmiller said in Who is at Fault?:

                      @net-runner said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                      This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                      Same thing happens to exposed VPNs 🙂

                      @scottalanmiller said in Who is at Fault?:

                      @net-runner said in Who is at Fault?:

                      @thwr said in Who is at Fault?:

                      Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                      This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                      Same thing happens to exposed VPNs 🙂

                      I won't compare a certificate based VPN with RDP 😉

                      Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                      That's the point. It's a whole different story

                      DashrenderD 1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender @thwr
                        last edited by

                        @thwr said in Who is at Fault?:

                        @jaredbusch said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        @scottalanmiller said in Who is at Fault?:

                        @net-runner said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                        Same thing happens to exposed VPNs 🙂

                        @scottalanmiller said in Who is at Fault?:

                        @net-runner said in Who is at Fault?:

                        @thwr said in Who is at Fault?:

                        Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                        This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                        Same thing happens to exposed VPNs 🙂

                        I won't compare a certificate based VPN with RDP 😉

                        Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                        That's the point. It's a whole different story

                        Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                        I'm not sure you can do RDP auth based on certificate?

                        thwrT 1 Reply Last reply Reply Quote 0
                        • thwrT
                          thwr @Dashrender
                          last edited by

                          @dashrender said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          @jaredbusch said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          @scottalanmiller said in Who is at Fault?:

                          @net-runner said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                          This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                          Same thing happens to exposed VPNs 🙂

                          @scottalanmiller said in Who is at Fault?:

                          @net-runner said in Who is at Fault?:

                          @thwr said in Who is at Fault?:

                          Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                          This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                          Same thing happens to exposed VPNs 🙂

                          I won't compare a certificate based VPN with RDP 😉

                          Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                          That's the point. It's a whole different story

                          Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                          I'm not sure you can do RDP auth based on certificate?

                          I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                          DashrenderD 1 Reply Last reply Reply Quote 0
                          • DashrenderD
                            Dashrender @thwr
                            last edited by

                            @thwr said in Who is at Fault?:

                            @dashrender said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            @jaredbusch said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            @scottalanmiller said in Who is at Fault?:

                            @net-runner said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                            This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                            Same thing happens to exposed VPNs 🙂

                            @scottalanmiller said in Who is at Fault?:

                            @net-runner said in Who is at Fault?:

                            @thwr said in Who is at Fault?:

                            Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                            This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                            Same thing happens to exposed VPNs 🙂

                            I won't compare a certificate based VPN with RDP 😉

                            Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                            That's the point. It's a whole different story

                            Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                            I'm not sure you can do RDP auth based on certificate?

                            I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                            MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                            thwrT 1 Reply Last reply Reply Quote 0
                            • thwrT
                              thwr @Dashrender
                              last edited by

                              @dashrender said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              @dashrender said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              @jaredbusch said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              @scottalanmiller said in Who is at Fault?:

                              @net-runner said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                              Same thing happens to exposed VPNs 🙂

                              @scottalanmiller said in Who is at Fault?:

                              @net-runner said in Who is at Fault?:

                              @thwr said in Who is at Fault?:

                              Someone exposed RDP on the firewall? Are you serious? Put a VPN tunnel in front for remote access.

                              This! Forwarding sensitive stuff like RDP to WAN is just... you know. You can try doing this, however, to see how thousands of brute connections (mostly Chinese IPs) start to initiate within a couple of minutes. Looks pretty scary 🙂

                              Same thing happens to exposed VPNs 🙂

                              I won't compare a certificate based VPN with RDP 😉

                              Same thing still happens though. Just there is all but no risk of a successful access, because of the certificate base.

                              That's the point. It's a whole different story

                              Really, are you saying that RDP with a good password is less secure than a VPN with a good password?

                              I'm not sure you can do RDP auth based on certificate?

                              I wouldn't even start this kind of discussion. Do you really think that someone who puts RDP into the wild and got hacked (probably by brute force and weak passwords) really cares about client certificates? I doubt that.

                              MS publishes RDP directly on the internet - this is my point. So taking certs out of the conversation - are you saying MS is crazy?

                              I'm talking about this specific scenario here, not RDP in general.

                              1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender
                                last edited by

                                This scenerio is the fault of:

                                • IT for giving the user local admin,
                                • the local user for allowing a remote person to create a local account
                                • the local user for not checking the password requirements for that account
                                • the remote support for using a shit password
                                • the remote support for allowing use to have access to RDP (assuming it wasn't needed)
                                1 Reply Last reply Reply Quote 0
                                • 1 / 1
                                • First post
                                  Last post