views:

27

answers:

1

The WCF documentation says that the "Net Named Pipe" binding can be used for fast interprocess communication on a single machine. It cannot be used for communication across machines.

I would like to know if using the Net Named Pipe binding will protect my service from being attacked from outside the network. I've been told that the answer is no; that although Net Named Pipe binding is meant to be used for interprocess communication on the same machine, it can be hacked to allow access from other machines. Is that accurate?

WCF experts, please chime in. Does using the Net Named Pipe binding intrinsically protect my service from unauthorized access from other machines?

+1  A: 

Per the name Net Named Pipe this binding uses local named pipes as the transport mechanism. On Windows machines named pipes are treated like files... and as such are accessible remotely like browsing to a machine with \\machinename. Therefore since the transport mechanism is accessible to remote machines the binding is inherently not immune to unauthorized access, although there may be some security advantages to named pipes as opposed to TCP or HTTP.

Mogounus
@Mogounus: It's not accessible across the Internet, and remote access can be secured with an Access Control List. I hardly think that remote access is much of a concern, given the system is configured correctly.
John Saunders
His questions was "Does using the Net Named Pipe binding intrinsically protect my service from unauthorized access from other machines". The answer to that is NO. HTTP and TCP bindings are also secure if configured properly, but again that was not the question.
Mogounus
Sounds like a clear "no" to me.
Rice Flour Cookies