Remote Access Axiom
RemoteEverything Target More and more computers are online 24/7. Most of these computers are operated by home users, and there are vulnerabilities, such as security vulnerabilities that are not patched and have proper passwords. However, the biggest disadvantage is the user. The rapid penetration of email viruses indicates the lack of security awareness and the deceptiveness of most Internet users. Of course, e-mail viruses are e-mail attachments that are better classified as Trojans. It spread so quickly that users were surprisingly willing to violate the basic rules when dealing with unreliable content.
If users are responsible for infecting their computers with Trojans, how can you trust them to protect their systems against direct attacks? Even network administrators can forget to install one or two patches in the worst case scenario, which could allow an attacker to run arbitrary code on the affected system. Cyber attacks are not new, but there have been significant changes that have recently taken place. A handful of a once prohibited profession is limited to highly skilled, knowledgeable and well connected people,
Anyone can often do this because of the automatic exploitation kits that can abuse thousands of known vulnerabilities outside the box.
Remote Access and Security
It is easy to see that many computers connected to the Internet are very vulnerable, even without remote access products installed. Remote access products are considered a high degree of risk factor, but mostly for psychological reasons. The first negative reactions are generally related to security effects when users first see remote access solutions while working. This is very normal and actually desirable. The main problem is that users don't immediately see threats in other applications, such as the network. e-mail client, web server or operating system itself.
By default, all modern operating systems include some kind of remote access solution. For example, Windows is sent as a simple remote management interface with Microsoft Remote Desktop. OpenBSD, which is a Unix variant generally accepted as the most secure operating system available, includes SSH; it is a simple and secure application that allows command line access to a remote computer over a network connection.
![]() | LogMeIn Host Software for Windows Free Driver | |
Authentication to the Gateway from the Host
The gateway must prove its identity to the host before it can be trusted with the access code. When connecting to the gateway, the host computer checks the certificate moved during the TLS negotiation to ensure that LogMeIn is connected to one of the gateway servers. This process is very similar to how the gateway validates the client. Host Authentication in the Gateway Gateway authenticates the host when it receives an incoming connection using a unique long descriptor string.
This string is a shared secret between two entities and is given by the gateway when the host is installed. This unique identifier is transmitted from TLS secure channels only after you verify the host gateway identity. Figure 3 shows how hosts and gateways verify each other before the host is accessed by the customer.
Data Encryption
The TLS standard defines a wide choice of password groups based on AES or 3DES based encryption for compatibility reasons. When using AES 128 or 256-bit keys, 3DES uses 168-bit keys. The customer and host approve the strongest possible password. The client sends a list of passwords that the host wants to use, and the host selects the preferred one. The TLS standard does not specify how the host should select the last password. In LogMeIn, the host selects only the strongest shared password pack the customer has to offer.
This method allows clients and hosts to deny the use of certain data protection algorithms without having to update either component if an algorithm is considered to be corrupted or unsafe.
Discussion: