Linux front end for a MS Terminal Server?

Top Page
Attachments:
Message as email
+ (text/plain)
Delete this message
Reply to this message
Author: Scott H
Date:  
Subject: Linux front end for a MS Terminal Server?
Thank you very much for your reply! I'm not sure
I understand all of it, so let me try to take
issue with some of what you say, and please set
me straight where I'm off base. Below are my
comments...

> From: Craig White <>


> > Here's the situation: we used to have a W2K
> box
> > in our DMZ (I'll call it xterm) which
> accepted
> > TSAC web connections to it (TSAC is a
> web-based
> > terminal services client). Once the user
> > authenticated to the local box's SAM (SAM is
> the
> > user/password database for a standalone box -
> we
> > didn't want to have our AD domain stuff out
> > there), another terminal service client
> session
> > is started for them (not web-based) to a MS
> > terminal server inside, on our LAN. In this
> way
> > we could protect the internal MS boxen from
> > direct connections from the Internet. Of
> course,
> > eventually, xterm got hacked, and now we
> don't
> > want to rebuild it with backed up SAM db
> because
> > someone might have all this info, and we
> don't
> > REALLY want to create all new passwords and
> get
> > them to the users, and then have it all
> happen
> > again. So I suggest this, and please tell me
> if
> > it could work:
> >
> > External user connects to a hardened Linux
> box in
> > the DMZ, via SSH. They are authenticated to
> our
> > RADIUS server (can Linux authenticate to
> radius?
> > MS can't). A script is run to then connect
> the
> > user with rdesktop to the MS terminal server
> > inside.
> >
> > Does this sound possible? Has anyone done
> > anything like this?
> >
> -----
> This setup isn't any more logical than the
> first setup.
>
> If the intent is to have Terminal Service
> clients access from public
> internet - why not just forward the stuff
> through the firewall directly
> to the terminal server and FULLY IMPLEMENT ALL
> WINDOWS SECURITY SYSTEMS
> on the terminal server.


The idea is we'd like to create more layers than
that. And we don't feel real comfortable with
Windows servers serving up sessions directly to
the Internet, even it "ALL WINDOWS SECURITY
SYSTEMS" were "FULLY IMPLEMENTED". Capital
letters don't a secure OS make! :)

> Security through obscurity doesn't work.
> Security via Rube Goldberg
> technological axioms likewise isn't security.


We're not using obscurity, we're trying to
require any would-be cracker to hack through
multiple, disparate security layers before
getting to anything we care about. That's what we
think has saved us in this case, in fact. The
box I'm calling xterm was hacked, but nothing
internally was compromised. (The cracker may have
a copy of the SAM db from this box, but that
isn't our AD info)

> I would bet money that Windows can authenticate
> via Radius but that
> isn't the point.


Agreed. My security guy says it can't be done,
but that's not the issue here. You may be right.

> Not wanting to have AD information out there???
> That's exactly what you
> did when you created this so-called DMZ and
> allowed this computer in
> this so-called DMZ onto the internal LAN. A DMZ
> would not allow a
> computer to connect to the internal LAN for any
> reason.


Apparently there are different ideas on exactly
what constitutes a DMZ? In this case, we have
xterm behind a firewall which controls all
traffic to the box, either from the Internet, or
from the LAN, like this:

LAN--FIREWALL--INTERNET
       \     
       XTERM


> As for creating all new passwords for users -
> requiring users to
> frequently change their passwords is often
> called a security policy.


I don't understand your point here. For the
record, we do require password changes.

> Evidently, your company has some strange
> notions about security...let's
> hope that they don't have personal information,
> credit information about
> anyone.


strange notions? like what?

> My suggestion...hire somebody to create a
> security policy first...then
> have them plan the remote access.


Unfotunately, we don't have budget for that, so
we're doing the best we can, and this is one of
the avenues. I appreciate your feedback!

Thanks,

Scott



.

__________________________________
Do you Yahoo!?
SBC Yahoo! DSL - Now only $29.95 per month!
http://sbc.yahoo.com