Security

Hamachi is a VPN (Virtual Private Network) solution anyone has access to. It is available for the latest versions of Windows, but also for Linux. The recently released version for MAC is still beta, but it can be properly used without any problems at all. Setting up a VPN is usually very complicated, as you have to work on the router, firewall and software. But with Hamachi, anyone can set up a local private network over the Internet. In order to bypass the common difficulties in setting up a perfect VPN, Hamachi relies on the peer-to-peer technology. Therefore, it relies on a server that authenticates the users through some keys. The manufacturer also claims that once the server establishes a link between the Hamachi clients, the secured connection is available to them only, without any traffic going through these servers. However, the servers emit some signals on a regular basis to verify whether the clients are still connected or not.

Logging in

When logging in, the users’ identities are verified. This operation is required whenever you plan to start or use a connection. It ensures that there are no security breaches and that no one else has access to the respective connection, aside from the users. The process is done through a RSA key pair. Basically, the user who logs in gives the node a private key, while the server verifies it as soon as it is received. If everything is correct, the client is authenticated and can share the connection with others. In order to login, the user requires more than just this key:
•    A network name and password picked by the client who established the connection
•    The virtual IP associated with the respective computer

Encrypting information

There are a wide variety of encryption methods out there and Hamchi uses its own. The process implies scrambling and mixing the information in unique ways, only to send it in a secure way from one server to another. The information is exchanged along with a key; therefore, both parts know exactly how to identify the messages. The encryption is performed through a 2048 bit protocol and ensures a high Hamachi security for the users.

Aside from the actual encryption, all the packages sent are counted and have some limitations. Their frequency is just as important, so the replay, spam or flood attacks are successfully avoided.

Securing a connection

Aside from all these security measures, the Hamachi users have their own methods to secure their connections. The one responsible for creating the virtual network also has the possibility to set up some requirements and restrictions.

In order to avoid the unwanted guests, most administrators set up passwords. The passwords are given out to their friends or mates, so no one else can join the respective groups. The network can also be locked if the administrators are no longer expecting anyone else to be part of the group. They may choose to manually approve every join too. Whenever a particular user aims to join the network, the administrator has to accept or reject the request.

Finally, all the problems occurring with other users can be solved in a simple and effective way – banning and evicting them from the rooms.