-
-
Notifications
You must be signed in to change notification settings - Fork 1
Description
Problem
3 files in the repo deploy VNC servers with -SecurityTypes None --I-KNOW-THIS-IS-INSECURE, giving anyone on the network full remote desktop access without a password:
-
autobot-infrastructure/shared/scripts/infrastructure/browser-vnc.service(line 10)
Systemd unit template — this was deployed to .25 and masked in chore: mask stale autobot-vnc service on node .25 #1904, but the template still exists. -
autobot-infrastructure/shared/scripts/setup_browser_vnc.sh(lines 43-45)
Automated setup script that SSHs to .25 and creates the insecure VNC. -
autobot-infrastructure/shared/scripts/utilities/start-isolated-vnc.sh(lines 21-23)
Utility script. Also has stale IP192.168.168.17(wrong subnet — should be172.16.168.x).
Risk
Anyone on the 172.16.168.0/24 network can connect to port 5901 and get full desktop access — no password prompt. On .25 this is now masked (#1904), but re-running setup_browser_vnc.sh would re-create the insecure service.
Proposed Fix
- Replace
-SecurityTypes Nonewith-SecurityTypes VncAuthin all 3 files - Remove
--I-KNOW-THIS-IS-INSECUREflag - Ensure
~/.vnc/passwdis set during setup - Fix stale
192.168.168.17IP instart-isolated-vnc.sh - Consider whether
browser-vnc.servicetemplate should be deleted (since chore: mask stale autobot-vnc service on node .25 #1904 masked the service)
Discovered During
Investigating #1904 (mask stale VNC on .25)
Impact
Priority: high — unauthenticated remote desktop access on internal network