It totally understand about the wireshark issue which is why we were trying to move to sftp (I stood this solution quickly for testing).
Well, wyUpdate only supports downloading from ftp://, file:///, http://, and https://. We don't support downloading updates from sftp:// (a.k.a. SSH FTP) nor ftps:// (a.k.a. FTP with SSL slapped on).
wyBuild does support uploading updates to SFTP (a.k.a SSH FTP) sites, but that's another matter.
Based on your solution how does this prevent anyone (non-Customers) from simply downloading the wyu/wys files using any simple download method? Perhaps, I misunderstood the article, but it appears that this solution is only for preventing downloads using the wyUpdate application. Our concern goes beyond this to people checking out a site for vulnerabilities. We chose SFTP as our ideal solution to force someone to authenticate first before attempting to download anything.
In the limit or prevent updates article we talk about how you can limit access of your updates to only users with a valid product key. The actual verifying of the key is done server-side. And if you do everything on HTTPS then the product key is encrypted on the way to the server and the update is encrypted on the way back to the client.
This sounds like it solves all your problems:
- Encrypted details
- Encrypted updates
- Verification done on the server (not wyUpdate).
If someone was able to download the wyu/wys files (Without your wyUpdate client), how difficult would it be to unpack?
It depends on what's inside the update. Sometimes updates only contain patches (that is, the info to get from "old file" to "new file"). Sometimes updates contain full files. Sometimes updates contain a mix of both.
Using the article I linked to solves the problem of users without permission to your app getting updates.
Does that make sense?