summaryrefslogtreecommitdiffstats
path: root/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl
diff options
context:
space:
mode:
Diffstat (limited to 'x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl')
-rwxr-xr-xx11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl68
1 files changed, 64 insertions, 4 deletions
diff --git a/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl b/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl
index d9aebc4..0e7f3bb 100755
--- a/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl
+++ b/x11vnc/misc/enhanced_tightvnc_viewer/bin/util/ssvnc.tcl
@@ -496,6 +496,62 @@ set msg {
jiggle_text .oh.f.t
}
+proc help_fetch_cert {} {
+ toplev .fh
+
+ scroll_text_dismiss .fh.f 85 37
+
+ center_win .fh
+ wm resizable .fh 1 0
+
+ wm title .fh "Fetch Certificates Help"
+
+ set msg {
+ The above SSL Certificate has been retrieved from the VNC Server via the
+ "Fetch Cert" action.
+
+ It has merely been downloaded via the SSL Protocol: IT HAS NOT BEEN VERIFIED
+ IN ANY WAY.
+
+ So, in principle, it could be a fake certificate being inserted by a bad
+ person attempting to perform a Man-In-The-Middle attack on your SSL connection.
+
+ If, however, by some external means you can verify the authenticity of
+ this SSL Certificate you can use it for your VNC SSL connection to the
+ VNC server you wish to connect to. It will provide an authenticated and
+ encrypted connection.
+
+ You can verify the SSL Certificate by comparing the MD5 or SHA1 hash
+ value via a method/channel you know is safe (i.e. not also under control
+ of a Man-In-The-Middle attacker). You could also check the text between
+ the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- tags, etc.
+
+ Once you are sure it is correct, you can press the Save button to save the
+ certificate to a file on the local machine for use when you connect via
+ VNC tunneled through SSL. If you save it, then that file will be set as
+ the Certificate to verify the VNC server against. You can see this in
+ the dialog started via the "Certs..." button on the main panel.
+
+ NOTE: If you want to make PERMANENT the association of the saved SSL
+ certificate file with the VNC server host, you MUST save the setting as
+ a profile for loading later. To Save a Profile, click on Options -> Save
+ Profile ..., and choose a name for the profile and then click on Save.
+
+ To reload the profile at a later time, click on the "Load" button on
+ the main panel and then select the name and click "Open". If you want
+ to be sure the certificate is still associated with the loaded in host,
+ click on "Certs..." button and make sure the "ServerCert" points to the
+ desired SSL filename.
+
+ See the Certs... Help for more information. A sophisticated method
+ can be set up using a Certificate Authority key to verify never before
+ seen certificates (i.e. like your web browser does).
+}
+
+ .fh.f.t insert end $msg
+ jiggle_text .fh.f.t
+}
+
proc win_nokill_msg {} {
global help_font is_windows system_button_face
toplev .w
@@ -2006,7 +2062,7 @@ proc fetch_cert {} {
.f4.getcert configure -state normal
mesg "Fetched $hpnew Cert"
- set n 50
+ set n 47
set ok 1
if {$cert_text == ""} {
set cert_text "An Error occurred in fetching SSL Certificate from $hp"
@@ -2059,7 +2115,8 @@ proc fetch_cert {} {
if {$ok} {
button .fetch.save -text Save -command "destroy .fetch; save_cert $hpnew"
- pack .fetch.save -side bottom -fill x
+ button .fetch.help -text Help -command "help_fetch_cert"
+ pack .fetch.help .fetch.save -side bottom -fill x
}
center_win .fetch
@@ -4040,12 +4097,15 @@ proc save_cert {hp} {
global scroll_text_focus
set scroll_text_focus 0
global uname
- scroll_text .scrt.f 90 14
+ scroll_text .scrt.f 90 17
set scroll_text_focus 1
set msg {
This dialog lets you import a SSL Certificate retrieved from a VNC server.
+ Be sure to have verified its authenticity via an external means (checking
+ the MD5 hash value, etc)
+
Set the "Save to File" name to the file where the imported certificate
will be saved.
@@ -4054,7 +4114,7 @@ proc save_cert {hp} {
After you have imported the Certificate it will be automatically selected
as the "ServerCert" for this host: %HOST
- To make the ServerCert setting to the imported cert file permanent,
+ To make the ServerCert setting to the imported cert file PERMANENT,
select Options -> Save Profile to save it in a profile.
}