NextGen$ a ?crit :

>Matthew Toseland a ?crit :
>  
>
>>On Wed, Nov 09, 2005 at 06:46:29PM +0100, NextGen$ wrote
>>    
>>
>>>Bob a ?crit :
>>>      
>>>
>>>>[snip.]
>>>>Also the Emu seednodes link should be coral-cached as per Ian's wishes, I 
>>>>forgot
>>>>about that.
>>>>        
>>>>
>>>Maybe I should do it on the server side ? Using some "permanent
>>>redirect" trick...
>>>
>>>      
>>>
>>Probably a good idea. But do we know how to tell whether it is being
>>fetched by a coral-cache server?
>> 
>>
>>    
>>
>Matching the user-agent ?
>
>Here is the revelant part of Apache's config file :
>
>RewriteEngine on
>RewriteCond %{HTTP_USER_AGENT} !^CoralWebPrx
>RewriteCond %{QUERY_STRING} !^coral-no-serve
>RewriteRule ^/(.*)$ http://downloads.freenetproject.org.nyud.net:8090/$1
>[R,L]
>
><IfModule mod_expires.c>
>        <LocationMatch "/seednodes/">
>                ExpiresActive on
>                ExpiresDefault "access plus 2 hour"
>        </LocationMatch>
></IfModule>
>
>It should work ... please report if it doesn't.
>
>  
>
>>>Should I let people downloading them without using CoralCache ?
>>>
>>>NextGen$.
>>>      
>>>
    As all the traffic outgoing from downloads.freenetproject.org goes
through CC, shouldn't we publish hashes of files. Does it worth it or am
I the only one concerned by this potential weakness ?

    Publishing hashes might not be enough ... Endeed, what will prevent
an offender from altering them too ? Maybe we should even use GPG...

NextGen$.
(nb. previously we weren't using nor SSL nor hashes ... so the website
might already have been targetted by a MiM attack... Even on SF's
website ;) )

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: OpenPGP digital signature
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20051110/9b32874e/attachment.pgp>

Reply via email to