
Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tlug] detect fake HTTP referrer
> Suppose I have a public domain image on my page that I dig up from
> some archive of such. Someone else likes the image and decides to
> use it on their page as well. That's legal.
My point is that he doesn't know that it's legal.
I see. So you're saying that his linking to my URL could also be a way of
avoiding the hassle of having to even figure out whether the image is
legal. That's a good point. So there are three possible motivations: (a)
laziness/inexperience, (b) copyright avoidance, or (c) letting someone
else pay the bandwith for the bulk of their site.
> .... That's my bandwidth and, even though I get a certain amount
> included in my montlhly allottment, it's not a *free*
> resource. That's theft.
AFAIK it's not. I can understand that you dislike it, but that
doesn't make it theft.
IANAL but it seems to me that intentionally using my paid-for ISP account
to serve images for their site without my permission should fall in the
same bracket as someone using another's WiFi access point without their
knowledge. The latter is of very questionable legality and there have been
arrests and fines (I Googled "WiFi theft" to verify that).
> > On every page that contains images, set a cookie with a short expiry
> > (say 1 hour), and insist on the cookie before you give away an image.
>
> But the cookie is just a string which can be spoofed. Unless you set a
> unique cookie per visitor, miscreants can still concoct an HTTP request
> that mimics the fixed-value cookie to access the file.
Unique is fine with me. (But I thought "short expiry" already implied
that; I don't see how to have short-expiry cookies that are
fixed-value.)
According to the original cookie spec, all that comes back to the server
on subsequent requests is:
Cookie: NAME1=OPAQUE_STRING1; NAME2=OPAQUE_STRING2 ...
Unless I'm reading this wrong, the expiry date doesn't get sent back when
the next request is made. So if the *value* of the cookie is simply set to
something like "my-little-secret" and the only thing that changes with
each request is the expiry date, the illicit client can easily ignore the
expiry date and send the fixed string back with his request. He'd have to
do pretty much the same thing to spoof the Referer header anyway.
---
Joseph L (Joe) Larabell Never fight with a dragon
http://larabell.org for thou art crunchy
and goest well with cheese.
Home |
Main Index |
Thread Index