Blue Iris hacked?

Q™

IPCT Contributor
Joined
Feb 16, 2015
Messages
4,990
Reaction score
3,991
Location
Megatroplis, USA
@Warsaws - I'm not sure I follow how a VPN will solve the problem. He has someone randomly connecting to his server. The VPN will only be effective if he first blocks all internet access to the box and then permits the VPN traffic to it...
We're speaking of the member's port 80 traffic, correct? If yes then kampstra is correct imo; unless the member specifically closes his port 80 WAN traffic, running a VPN won't stop BGs from hacking away at his HTTP port.

Hacker ==>axe01.gif
 

bp2008

Staff member
Joined
Mar 10, 2014
Messages
12,681
Reaction score
14,043
Location
USA
If he has Blue Iris, he has a powerful windows box, which is more than adequate to run a VPN server (like OpenVPN!) on. Heck, Windows even has a simple VPN server built in, though it is hard to configure last I checked. Anyway, it should go without saying that after getting a VPN working you would remove the port forwarding rules that expose cameras and/or Blue Iris.
 

Warsaws

Young grasshopper
Joined
Dec 13, 2015
Messages
74
Reaction score
2
Now I'm confused. That's back to what I've always done.
 

kampstra

n3wb
Joined
Jul 26, 2016
Messages
3
Reaction score
1
In networking there are always multiple ways to do something, some are quick and easy and some require some extra leg work. The approach I mentioned to add a static route is a simple way to quickly block someone that is hacking your box. It's not a long term fix. If they are on a dynamic IP then the next time they reboot their cable modem/router they likely get a new IP address and will be back in your server. The best approach is to block all internet traffic to the server and use a secure tunnel with some kind of VPN (SSL, TLS, IPSEC) to secure remote access. This does require some additional software/hardware that is capable of hosting the secure connection and any remote clients will also need to be capable of supporting tunneling which means more leg work. I don't disagree that this approach is more secure and sustainable, it's just more leg work to setup and configure all the devices.
 
Top