[Paul Alfille]

> So I'd guess that people access an public owhttpd should be pretty
> safe, as long as the 1-wire devices aren't controlling something
> delicate.

Apart from the queueing issue, my main "worry" (if it turns out to be
a problem, I'll just remove access) has been that a lot of uncached
requests would interfer with the regular use.  All accesses, however,
have to go through an apache server acting as a reverse proxy, so I
use the rewrite module to block all requests for uncached data and
have apache remove the links to uncached data as well.  Then I should
be able to control the number of actual requests on the bus caused by
owhttpd using the timeout options.  Does an option in owhttpd/owserver
to disallow uncached requests sound like a good idea?

How secure is the --readonly option in owhttpd?  Is it merely removing
the forms, is it still possible to POST data or to contruct clever
URLs?

My 1-wire devices are controlling some delicate stuff.  One switch can
close the main water valve to our house, one can disable a leakage
detection system, another can trigger the fire alarm, so to be sure to
block write access is important.  I run owhttp with the options
--readonly -s server1:xxxx -s server2:xxxx ... -s serverN:xxxx.

-- 
Steinar

------------------------------------------------------------------------------
Enter the BlackBerry Developer Challenge  
This is your chance to win up to $100,000 in prizes! For a limited time, 
vendors submitting new applications to BlackBerry App World(TM) will have 
the opportunity to enter the BlackBerry Developer Challenge. See full prize 
details at: http://p.sf.net/sfu/blackberry
_______________________________________________
Owfs-developers mailing list
Owfs-developers@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/owfs-developers

Reply via email to