230px Screenshot of the Hamachi Client, showing a joined network and other users who are participating | |
Developer(s) | LogMeIn Inc. |
---|---|
Stable release | 2.2.0.428[1] / May 11, 2016; 4 years ago |
Operating system | Microsoft Windows (XP or later), Mac OS X, Linux (beta) |
Type | P2P, VPN |
License | Proprietary (Free of charge for up to 5 devices) |
Website | https://www.vpn.net/ |
LogMeIn Hamachi is intended as a zero-configurationvirtual private network (VPN) application that is capable of establishing direct links between computers that are behind NAT firewalls without requiring reconfiguration (when the user's PC can be accessed directly without relays from the Internet/WAN side); in other words, it establishes a connection over the Internet that emulates the connection that would exist if the computers were connected over a local area network.
There’s a safest way to uninstall LogMeIn Hamachi for Mac on Mac without searching all over your Mac, and that’s by using CleanMyMac X. Launch CleanMyMac X and click on Uninstaller in the left menu. Select the, you can either uninstall it or, if it’s not acting as it should, you can perform an Application Reset. Sep 27, 2010 Networking Connectivity Hamachi for Mac OS X Hamachi for Mac OS X 0.9.9.9-20 for Mac by LogMeIn, Inc. File Details. Add to Watch List. File Details: File Size: 0.1 MB: License: Freeware: Operating System: Mac OS X: Date Added: June 21, 2006. Publisher: LogMeIn, Inc. Homepage: Hamachi: Other Versions Publisher's Description.
It is currently available as a production version for Microsoft Windows and OS X, as a beta version for Linux, and a system-VPN-based client compatible with iOS and Android.
For paid subscribers Hamachi runs in the background on idle computers. The feature was previously available to all users, but became restricted to paid subscribers only.
Operational summary
Hamachi is a proprietary centrally-managed VPN system, consisting of the server cluster managed by the vendor of the system and the client software, which is installed on end-user computers. Client software adds a virtual network interface to a computer, and it is used for intercepting outbound as well as injecting inbound VPN traffic. Outbound traffic sent by the operating system to this interface is delivered to the client software, which encrypts and authenticates it and then sends it to the destination VPN peer over a specially initiated UDP connection. Hamachi currently handles tunneling of IP traffic including broadcasts and multicast. The Windows version also recognizes and tunnels IPX traffic.
![Hamachi Hamachi](https://dl1.cbsistatic.com/i/2017/01/19/378e9184-9c72-49a6-89d7-20d4747915e4/8d9f7c339c05384f0652cf51d23e7573/imgingest-1417505390474593552.png)
Each client establishes and maintains a control connection to the server cluster. When the connection is established, the client goes through a login sequence, followed by the discovery process and state synchronization. The login step authenticates the client to the server and vice versa. Quilt pro software programs. The discovery is used to determine the topology of the client's Internet connection, specifically to detect the presence of NAT and firewall devices on its route to the Internet. The synchronization step brings a client's view of its private networks in sync with other members of these networks.
When a member of a network goes online or offline, the server instructs other network peers to either establish or tear down tunnels to the former. When establishing tunnels between the peers, Hamachi uses a server-assisted NAT traversal technique, similar to UDP hole punching. Detailed information on how it works has not been made public. This process does not work on certain combinations of NAT devices, requiring the user to explicitly set up a port forward. Additionally 1.0 series of client software are capable of relaying traffic through vendor-maintained 'relay servers'.
In the event of unexpectedly losing a connection to the server, the client retains all its tunnels and starts actively checking their status. When the server unexpectedly loses client's connection, it informs client's peers about the fact and expects them to also start liveliness checks. This enables Hamachi tunnels to withstand transient network problems on the route between the client and the server as well as short periods of complete server unavailability. Some Hamachi clients also get closed port on other clients, which cannot be repaired by port forwarding.
Hamachi is frequently used for gaming and remote administration. The vendor provides free basic service, and extra features for a fee.
In February 2007, an IP-level block was imposed by Hamachi servers on parts of Vietnamese Internet space due to 'the scale of the system abuse originating from blocked addresses'. The company is working on a less intrusive solution to the problem.[citation needed]
Addressing
Each Hamachi client is normally assigned an IP address when it logs into the system for the first time. To avoid conflicting with existing private networks on the client side the normal private IP address blocks 10.0.0.0/8, 172.16.0.0/12 and 192.168.0.0/16 are not used.
Before November 19, 2012 the 5.0.0.0/8 range was used. This range was previously unallocated but was allocated to RIPE NCC in late 2010 and space from this range is now being used by hosting providers on the public internet. Hamachi switched to the 25.0.0.0/8 block.[2]
The 25.0.0.0/8 block is allocated to the British Ministry of Defence. Organisations who need to communicate with the MOD may experience problems when more specific Internet routes attract traffic that was meant for internal hosts, or alternatively find themselves unable to reach the legitimate users of those addresses because those addresses are being used internally,[3] and such 'squatting' is against the established practice of the Internet.
The client now supports IPv6, and if this is selected then the address assigned is picked from a range registered to LogMeIn.[2]
The IP address assigned to the Hamachi client is henceforth associated with the client's public crypto key. As long as the client retains its key, it can log into the system and use this IP address. Hamachi creates a single broadcast domain between all clients. This makes it possible to use LAN protocols that rely on IP broadcasts for discovery and announcement services over Hamachi networks.
Security
The following considerations apply to Hamachi's use as a VPN application:
- Additional risk of disclosure of sensitive data which is stored or may be logged by the mediation server — minimal where data is not forwarded.
- The security risks due to vulnerable services on remote machines otherwise not accessible behind a firewall, common to all VPNs.
- Hamachi is stated to use strong, industry-standard algorithms to secure and authenticate the data and its security architecture is open. Despite this security cannot necessarily be guaranteed.[4]
- The existing client-server protocol documentation contains a number of errors,[5][6] some of which have been confirmed by the vendor, pending correction,[7] with others not yet confirmed.
- For the product to work, a 'mediation server', operated by the vendor, is required.
- This server stores the nickname, maintenance password, statically-allocated 25.0.0.0/8 IP address and the associated authentication token of the user. As such, it can potentially log actual IP addresses of the VPN users as well as various details of the session.
Compatibility
The current builds of Hamachi are available for the following operating systems:[8]
- Microsoft Windows (XP or later)
- OS X (10.6 or newer; Intel-based Macs only)
- Linux (beta)
- FreeBSD users can install and utilize Linux version, there's a port created in FreeBSD Ports.
- iOS (via iOS system VPN)
- Android (via Android system VPN)
Prior to versions 1.0.2.0 and 1.0.2.1 for the Windows release,[9] many Windows Vista users had experienced compatibility and connection issues while using Hamachi. As of March 30, 2007, the software now includes Vista tweaks, which answer these OS-related problems, among other specific solutions.[10]
See also
- Network address translation (NAT) Overview, related RFCs: RFC 4008, RFC 3022, RFC 1631 (obsolete)
- Simple Traversal of UDP over NATs (STUN), a NAT traversal protocol defined in RFC 3489 (obsoleted by RFC 5389)
- Session Traversal Utilities for NAT (Updated STUN, as defined in RFC 5389)
- UDP hole punching another NAT traversal technique
References
- ↑'Hamachi Release Notes'
- ↑ 2.02.1'Changes to Hamachi on November 19th', Official LogMeIn product blog
- ↑Vegoda, Leo. 'Used but Unallocated: Potentially Awkward /8 Assignments'. The Internet Protocol Journal — Volume 10, No. 3. Cisco.com. Retrieved 2011-03-25.<templatestyles src='Module:Citation/CS1/styles.css'></templatestyles>
- ↑'LogMeIn Hamachi2 Security Whitepaper'. Logmeinsupport.com. Retrieved 2011-04-12.<templatestyles src='Module:Citation/CS1/styles.css'></templatestyles>
- ↑Hamachi protocol documentation errors. Hamachi.cc forums.[dead link]
- ↑More Hamachi protocol documentation concerns. Hamachi.cc forums.[dead link]
- ↑Acknowledgement of documentation errors. Hamachi.cc forums.[dead link]
- ↑'FAQ: What are the system requirements for LogMeIn Hamachi?'. LogMeIn, Inc. Retrieved 13 June 2015.<templatestyles src='Module:Citation/CS1/styles.css'></templatestyles>
- ↑'Hamachi for Windows, change log'. Hamachi.cc. Retrieved 2011-04-12.<templatestyles src='Module:Citation/CS1/styles.css'></templatestyles>[not in citation given]
- ↑'Hamachi Community Forums - 1.0.2.1 is released'. Forums.hamachi.cc. Retrieved 2011-04-12.<templatestyles src='Module:Citation/CS1/styles.css'></templatestyles>[not in citation given]
External links
Retrieved from 'https://infogalactic.com/w/index.php?title=LogMeIn_Hamachi&oldid=721215834'
|
Regarding Use of Protocols, SHA-0 vs. SHA-1[edit]
It was implied on the Hamachi forums that there was a potential security risk in using Hamachi due to various parts of the program having used SHA-0 instead of SHA-1.
See here for the Hamachi development team's response clarifying how that is not the case, and there is no security risk in the specific uses of SHA-0 in Hamachi.
Paul-lmi (talk) 19:58, 9 January 2009 (UTC)
Version 2[edit]
Since Version 2 became available, 0.9.x is unavailable for download from the Hamachi site for Mac OS X and Linux. The article should be updated to reflect this change. 129.107.59.249 (talk) 14:30, 12 November 2009 (UTC)
Logmein Vpn Hamachi
They are, however, available from http://files.hamachi.cc/linux/68.84.192.76 (talk) 00:46, 23 November 2009 (UTC). — Preceding unsigned comment added by Jsquad9096 (talk • contribs) 23:03, 14 July 2013 (UTC)
Software[edit]
I am concerned that hamachi only discusses the software that is provided by LogMeIn. There is also a hamachi sushi (Yellowtale fish), and a hamachi which is the notch on a sword that is placed just before the sharpened edge. I could not find either of these in Wikipedia. —Preceding unsigned comment added by Lledger7 (talk • contribs) 01:01, 26 February 2010 (UTC)
Reference Links Broken[edit]
Reference links 5, 6, and 7 to the Hamachi forums appear to be broken. Not sure what should be done about that. IAmTheCandyman (talk) 19:00, 22 March 2011 (UTC)
Use for piracy[edit]
Some internet chatter describes Hamachi as a frequent tool for piracy. For example:
Some explanation, or at least discussion, of the relative importance of piracy in Hamachi use, would help me decide whether to comply with my daughter's request to install Hamachi on the family laptop which she uses.
C4dn (talk) 23:20, 1 January 2012 (UTC)
- If no reliable sources have discussed illegitimate uses of Hamachi, then we can't in the article either. One problem is that we don't give medical, legal, security, or parenting advice. Another problem is, this is not a forum for general discussion of article topics; it's just for improving the article. Me? I'd sit her down and explain the risks (privacy, security, legal), and I'd never trust that laptop ever again. For anything. --Lexein (talk) 04:02, 2 January 2012 (UTC)
Bs27975 (talk) 20:32, 2 May 2012 (UTC)
- C4dn is confusing the tool with the use of the tool. Just because he has installed the tool for his daughter does not absolve him of the responsibility of monitoring how his daughter uses that tool. If use is entirely legit, then he has acquired valuable functionality. If one aspect of the tool's use is not legit, then he need control that aspect of the tool's use. In other words .. don't throw the baby out with the bathwater.
- It would be entirely legitimate within the article to indicate any VPN poses security risks that must be individually evaluated for acceptability. Perhaps via a 'See also: Potential security risks of VPNs (link to vpn)' type of reference.
- Lexein, sadly, is promoting FUD with his comments. The presence of lack of a VPN doesn't change the manner in which you should look at or evaluate the trustworthiness of a machine. You shouldn't trust anything for anything in the first place. But people are going to, with due consideration and evaluation. The presence or lack of the VPN has nothing to do with it - merely the trust placed in the controller of the resource. In this case, the daughter in the laptop. No parent should trust such a machine in their home network, in the first place. Caveat emptor applies.
--Bs27975 (talk) 20:38, 2 May 2012 (UTC)
- Never mind. Largely covered by 'The security risks due to vulnerable services on remote machines otherwise not accessible behind a NAT, common to all VPNs.' However, the baby with the bathwater comment does still apply. Bs27975 (talk) 21:09, 2 May 2012 (UTC)
'server cluster managed by the vendor of the system' - confusing, clarification needed.[edit]
I came to this page to find out more about the beastie. Have not used it, but done some reading / poking about.
The use of the word 'vendor' here is (probably) misleading. The typical connotation of the word 'vendor' implies commerciality. So, in this case, 'vendor' would appear to me to mean logmein or Hamachi (Which is not a vendor, but a product?). Yet, as far as I can tell, any client can be a server. And such would not normally be considered a 'vendor', although that is exactly what they are in this context, and that use is actually correct. But it is .. misleading.
Perhaps the text could be clarified to note that Hamachi / server / vendor is tracking and connecting the credentials of client systems, which can be either or both providers, and users, of the shared data.
Certainly if my understanding above is incorrect, I'd appreciate it if the article corrected and clarified these aspects.
Or, perhaps, rework / reverse the orientation of the paragraph, more towards, Clients provide or use data provided by other clients, and Hamachi manages / directs / authenticates / authorizes inter-client connectivity.
![Mac Mac](https://images.sftcdn.net/images/t_app-cover-m,f_auto/p/2bea4bde-96d7-11e6-878e-00163ed833e7/2690128288/logmein-hamachi-screenshot.jpg)
The other problem with the confusion here is an implication that the data is held on the Hamachi systems. Which I don't believe to be true, except perhaps in special circumstances. e.g. Hamachi backup pointed to by a Hamachi vpn client? I think, with this paragraph's comment, the confusion is evident. When someone comes here to try an find out 'What is Hamachi?'.
It would be useful if the author could also indicate if controls limiting the scope of the access are present. Yes, the implication (could this be made explicit, please) is that one's OS' file sharing mechanisms apply, however, an indication that control can be limited to, say, specific directories, would be appreciated.
'Additionally 1.0 series of client software are capable of relaying traffic through vendor-maintained 'relay servers'.' - by implication, other versions, if there are any, are not. Perhaps prefixing with 'As of' is appropriate?
Hamachi Download For Mac
'Hamachi is frequently used for gaming and remote administration. The vendor provides free basic service and extra features for a fee.' is also confusing. These services are offered by Hamachi, or by logmein?
logmein is itself confusing, when trying to grok the whole. It appears to be a series of component parts. The coordination of those component parts, if there is such, is not readily apparent. Explaining the relationship between Hamachi and logmein would be useful, here. Even if only a brief blurb, and a reference to a wikip logmein entry.
Logmein Hamachi
'The IP address is henceforth associated with the client's public crypto key. As long as the client retains its key, it can log into the system and use this IP address.' - confusing. Expand please. 'public crypto key' is perhaps the cause of the confusion. The implication is that one gains a public 5/8 address, and public internet routing tables updated, auto-accessible via the NAT adapter created by the internal virtual Hamachi network adapter. This seems unlikely, so if true, please so enunciate. More likely, the 5/8 address is available for as long as the virtual, temporary, private VPN exists. Which is to say, This 5/8 redirection, and it is a complete 5/8 redirection (?) persist only for as long as the private network connection is established.
I now see that 'Hamachi client is running.' explains this, however, I believe my comments above still stand and apply. Perhaps this paragraph should merely be moved up higher in the article, so that it is encountered first.
'minimal where data is not forwarded.' - insufficient. By definition, making a connection transmits data. What is unclear, from the sentence, what data is forwarded. To be able to judge the risk. e.g. The implication is the data within the files being shared may be exposed. How to install metamod tf2. Perhaps this is not the intent.
'For the product to work, a 'mediation server', operated by the vendor, is required.' It would seem prudent to note OpenVPN as an alternative, wherein such a mediation server is not necessary. For that matter, a discussion of the relationship / alternative to OpenVPN would be useful here. Certainly that is one of the reasons I came to read the article in the first place: (a) What is Hamachi?; (b) How does it differ from OpenVPN. Granted, it becomes evident that part of (b) is ease or simplicity of functional establishment for the non-expert users, and that Hamchi performs the function of 'traffic cop' (for central / negotiation of connectivity) unavailable in a (typical?) OpenVPN setup. e.g. No need for bilateral static name resolution configuration behind NAT'ted networks.
To the author - thank you so much for writing this.
Bs27975 (talk) 21:16, 2 May 2012 (UTC)
IP Change[edit]
Recently, I heard that Hamachi changed to the 25.0.0.0/8 network as it is used by a government who using that network for private addresses anyway. My source for this news was Security Now Episode 379 (which doesn't have a text transcript at the time of this post). I'm not posting anything about it as I don't use the software myself, and don't have a reference to use. Miquel 'Fire' Burns (talk) 22:02, 24 November 2012 (UTC)
Remove the Swedish link[edit]
It refers to the fish not the software (Hamachi). 10/4-2013 15:05 GMT+2 — Preceding unsigned comment added by 85.230.124.50 (talk) 13:05, 10 April 2013 (UTC)
Jumpstart dumpper for windows 10. Dumpper is a free and portable software focused on the management of wireless networks in Windows. In addition, Dumpper Download it incorporates several methods to show and check some security flaws discovered both in the Wps protocol, and in obtaining the WPA. Jun 07, 2018 Thank You for watching, Please like and subscribe for more videos supporter us for more video my channel https://bit.ly/2ln7. We ran the Command Prompt using Windows 10. If you are using Windows 8.1, Windows 8, Windows 7, Windows Vista or Windows XP, you can use the same method to run the Command Prompt as administrator. Open the Start Menu and before clicking anywhere, type 'cmd' on your keyboard. This process will enable you to run a search through the Start Menu. Download Dumpper v.40.1 - jumpstart.rar at FILENINJA.NET. This file (Dumpper v.40.1 - jumpstart.rar) is hosted at free file sharing service 4shared. If you are the copyright owner for this file, please Report Abuse to 4shared. Jumpstart dumpper free download - dumpper, JumpStart, JumpStart World 2nd Grade, and many more programs.
I came to the fish too. Please remove the incorrect link. 12/4-2013 18:07 GMT+2, Bosse Eriksson — Preceding unsigned comment added by 213.66.16.158 (talk) 16:07, 12 April 2013 (UTC)
What is an advertisement doing on Wikipedia?[edit]
This is clearly an ad for a paid service. It reads exactly like an ad. This has no business on Wikipedia. Pages like this, written this way, are neither neutral POV nor particularly noteworthy.
Logmein Hamachi Alternative
169.231.35.176 (talk) 00:48, 3 August 2013 (UTC)
- I've rewrote the big advert/quote in the lede section. Thanks ツ Jenova20(email) 12:27, 27 January 2014 (UTC)
Hamachi
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Talk:LogMeIn_Hamachi&oldid=643208944'