ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    FQDN not Resolving

    IT Discussion
    dns
    6
    79
    15.1k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller
      last edited by

      I'm not the expert here, but a common practice is to keep it inside of the network and require people to connect via a VPN before connecting to RDP. The VPN, for security, would be best handled by being exclusive to a DMZ where the RDS server sat isolated from other traffic.

      1 Reply Last reply Reply Quote 0
      • brianlittlejohnB
        brianlittlejohn
        last edited by

        I thought common practice now was to use rds gateway so you only open port 443 and everything is passed through it.

        scottalanmillerS 1 Reply Last reply Reply Quote 3
        • scottalanmillerS
          scottalanmiller @brianlittlejohn
          last edited by

          @brianlittlejohn said:

          I thought common practice now was to use rds gateway so you only open port 443 and everything is passed through it.

          Which is a form of VPN 🙂 SSL VPN for a single port and application. But yes, that's the best way. Not sure if it is the most common in the SMB yet.

          1 Reply Last reply Reply Quote 1
          • DashrenderD
            Dashrender @JaredBusch
            last edited by

            @JaredBusch said:

            @JaredBusch said:

            @christophergault said:

            @scottalanmiller I got it working!!!! I fell so accomplished. Jk

            Great!, now I can through a password cracker at it..

            Note: I really will not, but this is part of RDS I hate. I need to find a fail2ban equivalent for Windows.

            While not the same, one should have account lockouts set after some amount of bad attempts.

            1 Reply Last reply Reply Quote 1
            • scottalanmillerS
              scottalanmiller
              last edited by

              That would make DoS attacks super easy on your users, though.

              DashrenderD 1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @scottalanmiller
                last edited by

                @scottalanmiller said:

                That would make DoS attacks super easy on your users, though.

                can something like nginx (SP) sit in front for a fail2ban type server?

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said:

                  @scottalanmiller said:

                  That would make DoS attacks super easy on your users, though.

                  can something like nginx (SP) sit in front for a fail2ban type server?

                  Not sure what you mean. NGinx would still use fail2ban to automate the firewall.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    Here is a Windows product that works like fail2ban..

                    http://rdpguard.com/

                    1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said:

                      @Dashrender said:

                      @scottalanmiller said:

                      That would make DoS attacks super easy on your users, though.

                      can something like nginx (SP) sit in front for a fail2ban type server?

                      Not sure what you mean. NGinx would still use fail2ban to automate the firewall.

                      Can you think of a solution to provide fail2ban like service infront of RDS?

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @Dashrender said:

                        @scottalanmiller said:

                        @Dashrender said:

                        @scottalanmiller said:

                        That would make DoS attacks super easy on your users, though.

                        can something like nginx (SP) sit in front for a fail2ban type server?

                        Not sure what you mean. NGinx would still use fail2ban to automate the firewall.

                        Can you think of a solution to provide fail2ban like service infront of RDS?

                        IPBan does exactly that, and is open source.

                        https://github.com/jjxtra/Windows-IP-Ban-Service

                        1 Reply Last reply Reply Quote 1
                        • stacksofplatesS
                          stacksofplates
                          last edited by

                          You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                          JaredBuschJ DashrenderD 2 Replies Last reply Reply Quote 0
                          • JaredBuschJ
                            JaredBusch @stacksofplates
                            last edited by JaredBusch

                            @johnhooks said:

                            You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                            That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                            stacksofplatesS 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @stacksofplates
                              last edited by

                              @johnhooks said:

                              You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                              Which problem are you solving with this? attaching the RDS box?
                              What would you start the SSH tunnel with? and the VM would have to forward your traffic through itself to the RDS server, just like an RDS Gateway.

                              I suppose you're mentioning using an SSH box because then you could use Fail2Ban?

                              stacksofplatesS 1 Reply Last reply Reply Quote 0
                              • stacksofplatesS
                                stacksofplates @Dashrender
                                last edited by

                                @Dashrender said:

                                @johnhooks said:

                                You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                Which problem are you solving with this? attaching the RDS box?
                                What would you start the SSH tunnel with? and the VM would have to forward your traffic through itself to the RDS server, just like an RDS Gateway.

                                I suppose you're mentioning using an SSH box because then you could use Fail2Ban?

                                You could use whatever you want to initiate the connection. That was one reason I mentioned it (fail2ban) but it has some other uses too. I have a jump box that has 2FA and pubkey only, so I just initiate the connection, type in the code, and just open the RDP session.

                                1 Reply Last reply Reply Quote 0
                                • stacksofplatesS
                                  stacksofplates @JaredBusch
                                  last edited by

                                  @JaredBusch said:

                                  @johnhooks said:

                                  You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                  That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                                  How is that any different than using RD Gateway or a VPN?

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @stacksofplates
                                    last edited by

                                    @johnhooks said:

                                    @JaredBusch said:

                                    @johnhooks said:

                                    You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                    That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                                    How is that any different than using RD Gateway or a VPN?

                                    I guess I've never heard of using SSH as a VPN for other things.

                                    stacksofplatesS 1 Reply Last reply Reply Quote 0
                                    • stacksofplatesS
                                      stacksofplates @Dashrender
                                      last edited by

                                      @Dashrender said:

                                      @johnhooks said:

                                      @JaredBusch said:

                                      @johnhooks said:

                                      You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                      That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                                      How is that any different than using RD Gateway or a VPN?

                                      I guess I've never heard of using SSH as a VPN for other things.

                                      Ya you can do ssh -L 8080:<rdphost>:3389 user@host and it will tunnel 3389 on the remote host to 8080 on your localhost. Plus it's fully encrypted this way.

                                      One good random use for it is if you're behind a proxy and you need to get to a site, you can do the same thing. ssh -L 8080:sitename:80 user@host and then visit localhost:8080 and you'll be at the site.

                                      C DashrenderD 2 Replies Last reply Reply Quote 1
                                      • C
                                        christophergault @stacksofplates
                                        last edited by

                                        @johnhooks I already set it up where I don't use SSH.

                                        1 Reply Last reply Reply Quote 0
                                        • DashrenderD
                                          Dashrender @stacksofplates
                                          last edited by

                                          @johnhooks said:

                                          @Dashrender said:

                                          @johnhooks said:

                                          @JaredBusch said:

                                          @johnhooks said:

                                          You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                          That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                                          How is that any different than using RD Gateway or a VPN?

                                          I guess I've never heard of using SSH as a VPN for other things.

                                          Ya you can do ssh -L 8080:<rdphost>:3389 user@host and it will tunnel 3389 on the remote host to 8080 on your localhost. Plus it's fully encrypted this way.

                                          One good random use for it is if you're behind a proxy and you need to get to a site, you can do the same thing. ssh -L 8080:sitename:80 user@host and then visit localhost:8080 and you'll be at the site.

                                          Does that work on Windows?

                                          I fully understand how this works on Linux (though I don't see the need to use RDS on a Linux GUI - if you have Linux on your desktop - aren't you more likely to be using PowerShell or other shell access solutions for your Windows boxes?

                                          So I'm trying to understand the use case.

                                          stacksofplatesS scottalanmillerS 2 Replies Last reply Reply Quote 0
                                          • stacksofplatesS
                                            stacksofplates @Dashrender
                                            last edited by

                                            @Dashrender said:

                                            @johnhooks said:

                                            @Dashrender said:

                                            @johnhooks said:

                                            @JaredBusch said:

                                            @johnhooks said:

                                            You could also put an SSH tunnel in front. SSH into a VM and tunnel 3389. I do the same thing for my container VDI, just port 22 instead of 3389.

                                            That is not useful for an RDS deployment. RDS deployments are meant to be either public to the LAN or public to the WAN. that is really the point of using RDS.

                                            How is that any different than using RD Gateway or a VPN?

                                            I guess I've never heard of using SSH as a VPN for other things.

                                            Ya you can do ssh -L 8080:<rdphost>:3389 user@host and it will tunnel 3389 on the remote host to 8080 on your localhost. Plus it's fully encrypted this way.

                                            One good random use for it is if you're behind a proxy and you need to get to a site, you can do the same thing. ssh -L 8080:sitename:80 user@host and then visit localhost:8080 and you'll be at the site.

                                            Does that work on Windows?

                                            I fully understand how this works on Linux (though I don't see the need to use RDS on a Linux GUI - if you have Linux on your desktop - aren't you more likely to be using PowerShell or other shell access solutions for your Windows boxes?

                                            So I'm trying to understand the use case.

                                            Yes, with PuTTY. But even if you are on a Linux desktop or laptop, wouldn't you want RDP access from that? Maybe I'm misunderstanding you. This is just so you can access RDP remotely inside your network.

                                            DashrenderD 2 Replies Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 2 / 4
                                            • First post
                                              Last post