Server control panel

advertisement
Advanced Kontrol System – ASK!
Server control panel
Server control panel
Security policy (password protection)
You may use a password to protect the server against unauthorized access. By clicking the
"Change Password" button, a window shows up where you may enter the new password. You
also need to enter your current password for verification purposes. It’s recommended to read
„Server Security FAQ” for understanding password verification process.
Access control
Using the Access Control Window, you may specify the only IPs that will be able to
connect to this server. Checking or unchecking the boxes will enable or disable the features
available after the connection is made. Beware, any IP not in the list will have no features
available after the connection is made. You cannot use wildcards in IPs.
Advanced Kontrol System – ASK!
Server control panel
Server log
Server log settings
The log is a list where information about what has happened during a session is stored (e.g.
file deletions, screen captures etc).
You may enable data storing in the log and message showing in the notification area. You
may also select one of the three time periods for data storing in the log (7 days, 30 days or
permanent). The log may be emptied or saved as a text file on the computer by pressing the
Empty / Save as... buttons. To view the log, press the Show button.
Server log
You may show the actions made during the connections, any warnings or errors by
checking / unchecking the boxes in Shown items group. You may also filter the log by searching
for a particular source from the Source column or a particular piece of text from the Action
column.
Advanced Kontrol System – ASK!
Server control panel
Server security FAQ
How does the password authentication work?
The server generates a 100-character string which it will send to the client. The client
calculates the password hash which it will concatenate to the string received from the server,
determining the new string's hash. It will send this new hash to the server for verifying. This way,
attackers cannot find out the password or its hash. Due to the randomness of the servergenerated string and the non-reversible hash calculation, attackers won't be able to use the
initial string to discover the password or its hash.
Are the sent data coded?
Yes. The sent data are encoded during connections by default.
How are the data coded?
For each incoming connection, the server generates a new random key for Rijndael
(Advanced Encryption Standard). Using RSA (2048 bit keys), it creates a new secure connection
with the client, sending it the key for Rijndael. The Rijndael cryptosystem will be used for further
data coding. The AES key will be 256 bytes long.
How does the access control work?
Should the client notice you can't use a certain feature, the feature's button is inactive. The
server shall refuse all incoming connections for the options you don't have access to.
If I have found a vulnerability, how can I get in touch with the programmer?
You can e-mail us at andreisfrent@yahoo.com. Please mention the vulnerability you have
discovered.
Download