Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] detect fake HTTP referrer
- Date: Thu, 17 Jan 2008 01:39:18 -0500 (EST)
- From: Joe Larabell <fred62@example.com>
- Subject: Re: [tlug] detect fake HTTP referrer
- References: <78d7dd350801160011x2db75b54ofdbffb76d41c5044@mail.gmail.com> <20080116112944.ab6ae181.attila@kinali.ch> <78d7dd350801160622taa0faf3sa072283d59964936@mail.gmail.com> <20080116112603.G63335@isris.pair.com> <87sl0x32p3.fsf@uwakimon.sk.tsukuba.ac.jp>
... Better to tell them up front that they need to enable cookies for your site.
In my case (and I'm sure I'm not alone), I have the browser pop the "accept cookies?" question and decide on a per-site basis. For a site that does not require logins, I generally say no to the popup. If I later find that the cookie is necessary just to d/load a file from the site (which is somewhat non-standard for a website), I then have to go into the options and undo my original decision. That's enough of a pain that unless I really need the file, I generally just leave. Requiring cookies for such a lame reason (file d/load) is likely to cost you customers.
The point of NVH's story is that for legit referrers, the visitor just downloads the file. It's like an OEM agreement, I suspect: he lets "people he likes" rebrand his content (ie, by linking directly to it from their pages).
I thought the point was that he didn't want anyone else offering the file for d/load but himself (I think the follow-up also clarified that).
Actually, in the U.S. the correct term "obeying copyright law without checking the license". If somebody puts up content on a public site with no access controls, then anybody may download it. This *does not* mean that "anybody" may keep anything more than the "ephemeral" copies that are required to view it. Let alone redistribute.
What I was referring to has nothing to do with copyright. Suppose I have a public domain image on my page that I dig up from some archive of such. Someone else likes the image and decides to use it on their page as well. That's legal. But instead of copying the file to *his* server, he just puts *my* URL into the <img> tag. Now, when someone visits his page, his server takes the hit for the HTML but *my* server supplies the image. That's my bandwidth and, even though I get a certain amount included in my montlhly allottment, it's not a *free* resource. That's theft. Not of the image -- of the bandwidth.
On every page that contains images, set a cookie with a short expiry (say 1 hour), and insist on the cookie before you give away an image.
But the cookie is just a string which can be spoofed. Unless you set a unique cookie per visitor, miscreants can still concoct an HTTP request that mimics the fixed-value cookie to access the file. If this miscreant is already spoofing the Referer string, it's no extra trouble to spoof a cookie.
--- Joseph L (Joe) Larabell Never fight with a dragon http://larabell.org for thou art crunchy and goest well with cheese.
- Follow-Ups:
- Re: [tlug] detect fake HTTP referrer
- From: Stephen J. Turnbull
- References:
- [tlug] detect fake HTTP referrer
- From: Nguyen Vu Hung
- Re: [tlug] detect fake HTTP referrer
- From: Attila Kinali
- Re: [tlug] detect fake HTTP referrer
- From: Nguyen Vu Hung
- Re: [tlug] detect fake HTTP referrer
- From: Joe Larabell
- Re: [tlug] detect fake HTTP referrer
- From: Stephen J. Turnbull
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] AsusTek EEEPC comes to Japan
- Next by Date: [tlug] More on ePaper based book readers
- Previous by thread: Re: [tlug] detect fake HTTP referrer
- Next by thread: Re: [tlug] detect fake HTTP referrer
- Index(es):
Home Page Mailing List Linux and Japan TLUG Members Links