Hi all,
Is the remote access over port 8176 secure?
Or can "hackers" just read the username and password from the traffic?
Thanks!
Regards
Is the remote access over port 8176 secure?
Or can "hackers" just read the username and password from the traffic?
RogueProeliator wrote:Is the remote access over port 8176 secure?
Or can "hackers" just read the username and password from the traffic?
The default authentication is a "digest" authentication which means that your username and password is NOT sent over the wire in a readable state, even if someone were watching the traffic. However, remote access directly to your server (not using the Reflector service) is also NOT secure in that all traffic can be monitored and potentially changed by a hacker even without your credentials. In other words, if a hacker were watching at a coffee shop he might be able to monkey with your system while you are there, but wouldn't have username/password to login later after you left. I guess it depends, then, on if you consider that secure "enough." Access using the Reflector is over a secure channel making it much harder (never say impossible!) for a hacker to view and/or change the communication.
Adam
matt (support) wrote:If you want a secure direct connection without a reflector, then the approach to take is to enable Web sharing on your Mac (Apache), tweak it to support HTTPS (create a self-signed cert), then create a reverse proxy in Apache to serve up Indigo's Web server (port 8176). A bit involved, but it is possible. Searching on the forum for "reverse proxy" and "apache" would be a good place to start. You'll also have to setup your router for port forwarding (to apache for HTTPS) and a dynamic IP address service, like DynDNS., presuming you don't have a static IP address.
Users browsing this forum: No registered users and 4 guests