Practical Technology

for practical people.

November 10, 2009
by sjvn01
0 comments

Using Secure Remote Connection to Access Office Resources Connected PCs

Computers and Internet access are universally available, but your corporate network resources are probably only available on your office PC and on your laptop. If you wanted to securely use your office resources from another computer — say, your husband’s laptop or your local library’s PC — you were out of luck. Until now.

By using the combination of Windows 7 and Windows Server 2008 R2 services, your IT department can set up what Microsoft calls Secure Remote Connection. With this feature, a user on any Windows 7 system can gain access to the corporate intranet’s resources. In short, with the right back-end setup you can run office-only programs and get to server-based files from any Windows 7 PC. If desired, you could even set up a complete thin-client desktop solution, where the entire business desktop is hosted on the servers and staff run the desktop on any Windows 7 PC with a high-speed Internet connection.

What makes this different from, say, Microsoft’s Windows Server 2008 Terminal Services Gateway or Citrix XenApp? Secure Remote Connection tries to provide a more integrated package on the server side that also doesn’t require any additional software on the Windows 7 desktop.

Microsoft hasn’t yet provided a recipe on how to do this, but we do know what the ingredients are for this virtual desktop dish. On the server side, it starts with Server 2008 R2?s Remote Workspace and Remote Desktop Gateway.

Remote Workspace is the new name for Terminal Services in Windows Server 2008 R2. This package has more than just a new brand-name. It incorporates both the presentation virtualization and the VDI (Virtual Desktop Infrastructure).

This in turn is managed by the Remote Desktop Connection Broker. Under this new virtualization-based approach there are two kinds of thin-client Windows 7 desktops for remote users: persistent (that is, permanent) VMs and pooled VMs.

In the case of a persistent VM, there is a one-to-one mapping of the thin-client Windows 7 desktop to users. Just as with an ordinary desktop, each user is assigned his own unique desktop. Except, in this case, it’s a virtualized desktop. The user can customize the desktop to his taste, and he can use it on any Windows 7 PC with an Internet connection.

With a pooled VM, a single image is replicated as needed. You can still maintain a unique user state by using profiles and folder redirection, but any changes made during a session disappear when the user logs off.

To use any of this functionality, though, you need more than just the technology. You need to license Microsoft Windows Virtual Enterprise Centralized Desktop (VECD). VECD licensing, which is device-based, is mandatory for any Windows VDI deployment that uses virtual copies of Windows. To manage all this, Windows Server 2008 R2 uses a unified front-end to manage these new Hyper-V based virtual machine remote desktops.

To make sure these remote virtualized desktops (persistent or pooled) get to the right resources, Server 2008 R2 uses the updated Terminal Services Gateway, Remote Desktop Gateway. The major changes from an enterprise point of view is that Remote Desktop Gateway is more efficient in handling and managing idle sessions. This, in turn, saves system resources on the server side, and, in the long run, that saves cash.

Connecting all this with the Windows 7 desktop is an updated version of Remote Desktop Protocol (RDP ). Microsoft claims that this new version of RDP is faster than ever before. In addition, it supports the Aero Glass interface, improved multimedia performance, and it supports redirecting DirectX. So, in theory, you could run games over RDP on a virtual Windows 7 desktop. That’s not a good idea at work, but it does underline RDP’s improved speed improvements.

Helping this performance boost along on the Windows 7 side is DirectAccess. Microsoft calls DirectAccess a virtual private network (VPN) replacement, but that’s not quite right. DirectAccess incorporates a built-in Windows 7 VPN that uses Internet Protocol security (IPSec), an old, but still robust, Microsoft VPN protocol.

What makes DirectAccess more than just a VPN is that it uses Internet Protocol version 6 (IPv6) to make the end-to-end connection between a Windows 7 client and a Windows Server 2008 R2 host. There’s nothing new about IPv6; it’s the next generation of TCP/IP networking, which has never found broad acceptance in North America or Europe. Microsoft is using it now to perform the rare feat of improving both security and speed.

It improves security because it combines the relatively uncommon IPv6 with IPSec. You can also use DirectAccess to authenticate the user and use it to configure what intranet resources specific users can access with it. Last, but far from least, you can also integrate DirectAccess with Network Access Protection (NAP). By doing this, you can make sure that users won’t be allowed in if they’re trying to login from a Windows 7 system without up-to-date patches or an anti-virus program installed.

The performance boost comes from separating corporate traffic from Internet traffic. With DirectAccess, only corporate network traffic actually starts from or goes to the business servers. With a traditional VPN, all traffic, even if it’s just to do a Google search, is routed through the corporate network. By reducing this traffic, DirectAccess reduces traffic both at the corporate gateway and within the LAN, thus preserving resources; it also increases the client PC’s effective network speed by avoiding the overhead of sending ordinary Internet requests though the business network.

You’re not using IPv6? Not a problem. DirectConnect has support for IP-HTTPS. This is a new tunneling protocol that’s only supported by Windows 7 and Windows Server 2008 R2; it enables the office PC and server to tunnel IPv6 packets inside an IPv4-based HTTPS session. This provides both the necessary IPv6 support, while also helping your company’s PCs to make connections through a Web proxy server or a firewall that might block an ordinary VPN connection.

Here’s the broad outline of how it works. First, you set up your Windows Server 2008 R2 hosts so that they can handle DirectConnect, Remote Workspace and Remote Desktop Gateway. If you elect to use virtual machines for off-site Windows 7 users, you also need to jump through the VECD hoops. That done, you’ll be ready to let any of your Windows 7 users – with the proper authentication – start using your corporate resources.

Once set up properly, this powerful combination of Windows 7 and Server 2008 R2 should enable your workers to do their work from almost any location. While this is likely to require upgrading your servers, by improving both remote security and network speed, it should result in a bottom line IT win when all is said and done.

A version of this story first appeared in IT Expert Voice.

November 10, 2009
by sjvn01
2 Comments

Where is the Linux desktop going?

While I like the Linux desktop a lot, I don’t pretend that it’s that popular. That’s why I found it fascinating that, despite everything Microsoft has been able to throw at it, desktop Linux still managed to claim 32% of the netbook market.

And Microsoft has thrown everything but the kitchen sink at desktop Linux. For example, the Redmond giant has strong-armed vendors into not selling Linux-powered netbooks; lied about Linux sales; and all but gave XP Home away to keep vendors from including Linux instead . Despite all that, it seems, according to ABI Research, that desktop Linux has actually grown in the last year.

ABI reports that almost a third of the netbooks that will have shipped in 2009 came with Linux. Last year at this same time, ASUS, then the world’s biggest netbook vendor, said that only three out of ten of its netbooks were shipped with Linux. In fact, looking ahead, Jeff Orr, an ABI analyst, predicted that Linux will overtake Windows on netbooks by 2013.

Why? Because it’s cheaper. The rise of ARM-powered netbooks with Linux that will bring laptops to the $100 price range is expected to help Linux take over the bottom-end of computing.

More >

November 10, 2009
by sjvn01
0 comments

Microsoft violates GPL

Microsoft has long ripped off free software. The canonical case is that Microsoft’s first version of the fundamental TCP/IP network stack, which underlies the Internet and almost all business networking, was swiped from the BSD-licensed Unixes. Years later, it seems Microsoft still can’t resist stealing from open-source software.

Rafael Rivera, a Microsoft fan, reports in his “Within Windows” blog that Windows 7 USB/DVD Download Tool, a program to help netbook XP Home users to upgrade to Windows 7, contains “source-code source code was obviously lifted from the CodePlex-hosted (yikes) GPLv2-licensed ImageMaster project.”

CodePlex is Microsoft’s open-source project hosting site. It’s also the name of Microsoft’s new ‘open-source,’ non-profit group, the CodePlex Foundation. The Foundation’s job is to bring open-source and proprietary software companies together to work on open-source projects. Well, now we know why: so that Microsoft can walk off with any goodies that they produce.

More >

November 9, 2009
by sjvn01
1 Comment

Child Porn: Malware’s ultimate evil

If you lose files, you can probably restore them. If your credit gets stolen, you can eventually restore it. But, if malware starts storing child pornography on your PC, you’re done. In a world where anything goes-as Paris Hilton’s ‘career’ and SC governor Mark Sanford continuing in office after his ‘hike’ on the Appalachian trail shows–there are still some things you cannot do and survive in society. Near the top of that list is child pornography. Now, thanks to some particularly nasty Windows malware, your computer might be being used to store it and you may never know it until it’s too late.

A recent AP report revealed that pedophiles are using “virus-infected PCs to remotely store and view their stash without fear they’ll get caught.” It’s not just sick people though. “Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites. Whatever the motivation, you get child porn on your computer – and might not realize it until police knock at your door.”

The AP “found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.”

More >

November 6, 2009
by sjvn01
3 Comments

An important Linux fix

Most of the time you can go for months, years, without patching your Linux distribution and not be in any real danger. A recently uncovered security hole in the Linux kernel does deserve your attention.

Specifically, Earl Chew, a Linux developer, and, at about the same time, Brad Spengler, creator of the Linux security program Grsecurity, discovered that there was a possible null pointer error that could, in theory, enable non-root users grab administrator privileges. You don’t want that to happen.

This particular bug, known in developer circles as CVE-2009-3547, hits all modern versions of the Linux 2.6 kernel It’s been fixed in the upcoming 2.6.32 RC (release candidate), but unless you’re running on Linux’s bleeding edge, you’re not running that version of the kernel.

So chances are you might have this problem. I say might because for this security hole to be open the value to the mmap_min_addr pointer has to be zero. If it’s not, you’re safe.

More >

November 6, 2009
by sjvn01
2 Comments

Could Microsoft switch to Linux?

You’d expect, as my friend Preston Gralla did, that when someone says “proprietary software is eventually going to be doomed,” and that Microsoft’s future might best be served in releasing its own version of Linux that he’s a Linux fan. Wrong, this prophet of Windows doom and gloom was Keith Curtis, a former Microsoft Research staffer. Could he be right? I think the answer is yes and no.

Yes, proprietary software is on the decline. Forget about the free software ideology that holds that free access to code is morally right. Businesses have figured out that not only does open source tend to produce better code, it’s cheaper to produce it. Economic reality has made even Microsoft to, ever so reluctantly, embrace some open-source projects.

Sure you have to share the fruits of your efforts in open-source development, but you end up creating better code faster. As many developers have discovered it’s a lot easier to build on top of other programmer’s good work rather than waste time with proprietary software development constant reinvention of the wheel.

And, yes, Microsoft could release a Linux of its own with a Windows Aero-like interface on top of it. Why not? It’s not that hard to make a Linux desktop distribution.

More >