Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

https remoting

Posted on 2004-08-05
10
Medium Priority
?
358 Views
Last Modified: 2012-05-05
Hi,

I have a remoting application which uses a binary formatter over tcp, this isn't hosted within IIS, but within my own application server.

I am releasing the application to a client who want to connect over the web.

I'm a little concerned about security, i.e. can someone hack the application by using the open port ?? or is there some kind of handshaking between legitimate clients trying to connect.

Ideally, I'd like to encrypt the data being sent. We have an SSL certificate, is there any way this can be used to encrypt the data.

I've done some web-searches, but can only find info on using SSL when hosted within IIS, which isn't an option.

Thanks
Smg.
0
Comment
Question by:smegghead
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
10 Comments
 
LVL 37

Accepted Solution

by:
gregoryyoung earned 2000 total points
ID: 11730461
0
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11730470
smegghead: please email me per other question ... I forget to put my pants on in the morning sometimes when I go to work :)
0
 
LVL 10

Author Comment

by:smegghead
ID: 11730486
I did email you, tried three different addresses (tried to work them out from your profile).. got two bounce backs, so assumed the 3rd worked.

Mine is on my profile also, so you might be better emailing me !! :-)

Chrs
Smg.
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11730501
gregoryyoung@ee
0
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11730515
0
 
LVL 4

Expert Comment

by:Eran_R
ID: 11730728
The .NET remoting framework provides a lot of extensibility options.

Almost all extensions to the .NET remoting involve implementating IMessageSink.
.NET remoted calls go through the following chain:

[Client side]
call -> TransparentProxy -> RealProxy -> EnvoySinkChain -> ClientContextSinkChain -> ClientChannelSinkChain

<transport>

[Server side]
ServerChannelSinkChain -> ServerContextSinkChain -> ServerObjectSinkChain -> StackBuilderSink -> method call

You can choose to implement some sort of encryption on one of these sink chains, for example, client and server channel sinks (symmetric).

I must say that implementing such stuff requires a good understanding of .NET remoting infrastructure.
The following books are pretty good, and contain some examples of customized sinks:

"Microsoft .NET Remoting" - Microsoft Press - ISBN:0735617783
"Advanced .NET Remoting (C# Edition)" - Apress - ISBN:1590590252 (Contains encryption example)

Since you need some special action performed on both server side and client side, proxies are not the solution. You need to use message sinks to acheive what you want.

The website www.idesign.net also contains some resources and sample code for .NET remoting specialization (go to the Downloads section)

Hope this helps
0
 
LVL 4

Expert Comment

by:Eran_R
ID: 11750146
I stumbled upon an article on MSDN that answers your needs exactly!

here's the link:
Part I - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dndotnet/html/remsspi.asp
Part II - http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dndotnet/html/remsec.asp (What you need)

Part II contains an example of using custom channel sinks to add security to .NET remoting
0
 
LVL 37

Expert Comment

by:gregoryyoung
ID: 11750212
Eran_R please read my last post...

0

Featured Post

How to Use the Help Bell

Need to boost the visibility of your question for solutions? Use the Experts Exchange Help Bell to confirm priority levels and contact subject-matter experts for question attention.  Check out this how-to article for more information.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

IP addresses can be stored in a database in any of several ways.  These ways may vary based on the volume of the data.  I was dealing with quite a large amount of data for user authentication purpose, and needed a way to minimize the storage.   …
The object model of .Net can be overwhelming at times – so overwhelming that quite trivial tasks often take hours of research. In this case, the task at hand was to populate the datagrid from SQL Server database in Visual Studio 2008 Windows applica…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question