Remote Desktop Security Statement

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Remote Desktop Security

Statement
We are aware that the security of remote desktop is of utmost importance to you and your clients
when using ISL Online remote computer software, therefore it is our top priority to assure you the
highest level of remote desktop security. This security statement presents a detailed technical
background of the ISL Online technology and reveals how secure is ISL Online's remote desktop.
The provided information should help you understand several security layers implemented in the ISL
Online products.
ISL Online' s remote desktop security in short: industry-standard (SSL) security technologies are
used to protect data transfer; RSA 1024 Bit Public / Private Key Exchange is used to negotiate
symmetrical AES 256 Bit end-to-end encoding; end-user applications are digitally signed by means
of a VeriSign certificate.

ISL Light Security Policy


This section describes the procedure for establishing an ISL Light session and the implemented
security layers.

Firewall Connection Ports


No firewall adjustments are needed to start a remote desktop support session, as ISL Light
automatically initiates an outgoing connection. ISL Light tries to connect using ports 7615, 80 and
443, therefore it works with your existing firewall and does not require any additional configuration.

SSL Secured Communication


The Secure Sockets Layer (SSL) cryptographic protocol provides security and data integrity of the
communication. For each ISL Light connection an additional SSL layer is established over the HTTP
protocol. Widely tested and used OpenSSL library is used for the SSL implementation.

RSA 1024 Bit Public / Private Key Exchange


To establish a remote desktop support connection with a client, the helpdesk operator needs to start
the ISL Light Desk application, which carries an RSA 1024 Bit Public Key of the ISL Conference Proxy
server. The initial connection is established when the Public Key of the ISL Light Desk application
and the Private Key of the ISL Conference Proxy server are verified and exchanged successfully. The
industry standard X.509 certificates are used to guarantee authenticity of transmission. This PKI
(Public Key Infrastructure) prevents the "Man-in-the-middle-attacks". Upon a successful RSA 1024
Bit Public / Private Key Exchange, the Diffie- Hellman cryptographic algorithm is used to exchange
symmetrical AES 256 Bit keys. After the exchange all subsequent communication between the ISL
Light Desk application and the ISL Conference Proxy server is encrypted using symmetrical AES 256
Bit keys.

User Authentication
The helpdesk operator needs to be a registered ISL Online user with a valid username and
password. To obtain a unique session code, the operator needs to be identified by providing the
username and password to the ISL Conference Proxy server. The AES 256 Bit encrypted username
and password are sent to the ISL Conference Proxy for verification. The username and password are
checked against the ISL Conference Proxy user database. Alternatively, when using the Server
License, different types of authentication schemes can be integrated within the ISL Conference
Proxy, like the RADIUS or LDAP authentication.

Session Code
Upon successful authentication, a unique session code is generated by the ISL Conference Proxy
server and returned to the ISL Light Desk application through the AES 256 Bit encrypted channel.
The helpdesk operator needs to pass the session code (for example over the phone) to the client,
who enters the session code in the ISL Light Client application and starts a connection with the ISL
Conference Proxy server. The ISL Light Client application carries an RSA 1024 Bit Public Key of the
ISL Conference Proxy server. The initial connection is established when the Public Key of the ISL
Light Client application and the Private Key of the ISL Conference Proxy server are verified and
exchanged successfully. The industry standard X.509 certificates are used to guarantee authenticity
of transmission. This PKI (Public Key Infrastructure) prevents the "Man-in-the- middle-attacks".

RSA 1024 Bit Public / Private Key Exchange with the Diffie-Hellman cryptographic algorithm is used
to exchange symmetrical AES 256 Bit keys. After the exchange all subsequent communication
between the ISL Light Client application and the ISL Conference Proxy server is encrypted using
symmetrical AES 256 Bit keys.

The unique session code is sent through the AES 256 Bit encrypted channel from the ISL Light Client
to the ISL Conference Proxy. Based on the unique session code, the ISL Conference Proxy matches
together the ISL Light Desk and the ISL Light Client applications. The session code is invalidated
immediately after the connection is established between the ISL Light Client and the ISL Light Desk.

AES 256 Bit End-to-end Encryption


Once the ISL Light Desk and the ISL Light Client applications are matched on the ISL Conference
Proxy server by means of an identical unique session code, the new SSL handshake is started.

The ISL Light Client application carries an RSA 1024 Bit Public Key of the ISL Light Desk application.
An initial connection is established when the Public Key of the ISL Light Client application and the
Private Key of the ISL Light Desk application are verified and exchanged successfully. The industry
standard X.509 certificates are used to guarantee authenticity of transmission. This PKI (Public Key
Infrastructure) prevents the "Man-in-the-middle-attacks".

RSA 1024 Bit Public / Private Key Exchange with the Diffie-Hellman cryptographic algorithm is used
to exchange symmetrical AES 256 Bit keys. After the exchange, all subsequent communication
between the ISL Light Client application and the ISL Light Desk application is encrypted using
symmetrical AES 256 Bit keys.

AES 256 Bit encrypted data transfer end-to-end SSL tunnel is established between the ISL Light
Desk and the ISL Light Client applications. All the information exchanged between the helpdesk
operator and the client is encrypted from end-to-end, meaning that even the ISL Conference Proxy
cannot decrypt the content of the session but only transfers the packets from one side to another.

Session Data Storage


The data transferred between the ISL Light Desk and ISL Light Client during a session (desktop
sharing images, files, audio/video communication, etc.) is NOT stored on the ISL Conference Proxy
server. Only the basic session parameters (IP addresses of the ISL Light Desk/Client, session length,
bytes transferred, end of session dialogs etc.) are stored on the ISL Conference Proxy server. The
ISL Light sessions can also be recorded. However, the ISL Light Desk and the ISL Light Client users
are always notified when a session recording starts and stops. Session recording files are stored
locally, on the ISL Light Desk or the ISL Light Client computer.

Code Signing
ISL Light Desk and ISL Light Client applications are digitally signed by means of a VeriSign Code
Signing certificate, which reliably identifies XLAB as the software publisher and guarantees that the
code has not been altered or corrupted since it was signed with a time-stamped digital signature.

Data Centres
The ISL Online Network's dedicated servers are hosted by professional data centres all over the
globe. We only choose highly reliable and industry-proven data centres with modern facilities and
equipment, such as redundant or backup power supplies, redundant data communication
connections, environmental controls (e.g. air conditioning, fire suppression) and security devices.
We solely control the servers running ISL Conference Proxy application and have strict
administrative password storage policy. Due to the AES 256 Bit end-to-end encryption security
policy, even the administrators of the network cannot see the content of the sessions.

For most security delicate organisations such as banks, national agencies, corporate environments,
we offer the Server License model, where the ISL Conference Proxy application is installed on the
server within such an organisation. In this case, all ISL Light connections are established through
the ISL Conference Proxy installed on the server running in the organisation, completely
independent of the ISL Online Network. As the Server License installation is a stand-alone system,
the organisation is solely responsible for the server's administration.

Function Transparency
ISL Light is designed for providing remote support to clients over the Internet but only upon the
client's explicit request. The client starts and can also terminate the session anytime. During a
session, the client is asked for permission to start desktop sharing, enable the remote keyboard and
mouse control, send and receive files, turn on or off audio and video communication etc. Even when
the operator has full remote desktop control over the client's PC, the client can easily take control by
simply moving the mouse.

The functionality of the software is totally transparent as the application is never running in the
background. The client is always aware of the running session and can follow the actions performed
by the helpdesk operator all the time. Once the session is terminated, the helpdesk operator cannot
access the client's computer again with the same session code.

Programme Executables Integrity


The Quality Assurance policy is implemented in the cycle of the ISL Online product development. All
programme applications need to go through the following stages:

 Development
 Release Candidate
 Testing
 Official Release
 Distribution
 User Download
We guarantee that the software applications we develop reach the final destination intact. Several
mechanisms are implemented to assure that:

 A branch is created in the development source tree for each release. This assures
that smaller improvements on a minor release are always implemented on the level of a specific
source branch, which is thoroughly tested.
 The release candidate application executables are signed using the proprietary
algorithm by a secure key, which is accessible to the ISL Online release team only.
 In the testing department a team of experts is responsible for quality control of each
software branch.
 When the release candidate is approved by the testing department, the official
release of the application executables are signed using the proprietary algorithm by a secure key,
which is accessible to the ISL Online release team only.
 When the official release is deployed, the proprietary signature is verified by the ISL
Conference Proxy.
 The software applications downloaded by the user are additionally signed by means
of a VeriSign Code Signing certificate, which reliably identifies XLAB as the software publisher and
guarantees that the code has not been altered or corrupted since it was signed with a time-stamped
digital signature.
This process assures integrity of the ISL Online application executables from the development stage
to the user download.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy