We just blacklist certain urls and certain referrers on gmodules.com. We
haven't really had any issue with that scheme, and we're a pretty big target
for exploits.

On Wed, Jul 16, 2008 at 2:45 PM, Chris Chabot <[EMAIL PROTECTED]> wrote:

> Some might feel the same ... adding a security token to all the proxy
> requests or checking referrers etc has been added as a possible solution to
> reduce the risk a bit but so far hasn't gotten a lot of traction.
>
>
> On Jul 16, 2008, at 11:39 PM, Emilio Daniel González wrote:
>
>  That is abuse! I thing...
>>
>> On Wed, Jul 16, 2008 at 6:34 PM, Chris Chabot <[EMAIL PROTECTED]> wrote:
>>
>>> Well what you -could- do is create a site, and host all the 'images'
>>> (lets
>>> pretend this does not involve scantly dressed people) on the pages on img
>>> src="http://shindig/proxy?url=http://myhost.com/some/image.gif"; /> ...
>>> and
>>> thus offloading most of the bandwidth used to the proxy instead of the
>>> originating site.
>>>
>>>
>>>
>>> On Jul 16, 2008, at 11:27 PM, Emilio Daniel González wrote:
>>>
>>>  So, if I were a bad guy, can I copy all Internet into the proxy?! =P
>>>>
>>>> On Wed, Jul 16, 2008 at 6:07 PM, Kevin Brown <[EMAIL PROTECTED]> wrote:
>>>>
>>>>>
>>>>> On Wed, Jul 16, 2008 at 2:03 PM, Emilio Daniel González
>>>>> <[EMAIL PROTECTED]>
>>>>> wrote:
>>>>>
>>>>>  btw, why all the files that pass through the proxy are named as
>>>>>> "p.txt"?
>>>>>> it's a convention or what?
>>>>>>
>>>>>
>>>>>
>>>>> the "p" is arbitrary (it stands for proxy). The .txt extension
>>>>> generally
>>>>> causes the file to be opened in a text editor rather than the web
>>>>> browser
>>>>> (either that or the user gets a download dialog). Most other extensions
>>>>> would be loaded in the browser (making the technique ineffective) or
>>>>> blocked
>>>>> by security software.
>>>>>
>>>>>
>>>>>
>>>>>> On Wed, Jul 16, 2008 at 5:58 PM, Chris Chabot <[EMAIL PROTECTED]>
>>>>>> wrote:
>>>>>>
>>>>>>  So how does it prevent the use of the proxy as a 'free Akamai' when
>>>>>>>
>>>>>>
>>>>>> people
>>>>>>
>>>>>>>
>>>>>>> can use it for their images/etc?
>>>>>>>
>>>>>>>
>>>>>>> On Jul 16, 2008, at 10:52 PM, Kevin Brown wrote:
>>>>>>>
>>>>>>> Yes, it works under that use case. Sending it as an attachment does
>>>>>>> not
>>>>>>>
>>>>>>>>
>>>>>>>> interfere with legitimate use of the proxy as it does not impact
>>>>>>>> img,
>>>>>>>> object, embed, script, or link elements or style sheet imports.
>>>>>>>>
>>>>>>>> On Wed, Jul 16, 2008 at 1:46 PM, Ropu <[EMAIL PROTECTED]> wrote:
>>>>>>>>
>>>>>>>> hi
>>>>>>>>
>>>>>>>>>
>>>>>>>>> i have a question.
>>>>>>>>>
>>>>>>>>> will sending proxy results as attachment work with this example?
>>>>>>>>> *
>>>>>>>>> Let the container cache your dynamic content*
>>>>>>>>> http://code.google.com/apis/opensocial/articles/latency/#dynamic
>>>>>>>>>
>>>>>>>>> The gadgets.io.getProxyUrl function will return the location of the
>>>>>>>>> cached
>>>>>>>>> version of the URL you provide, including images, JavaScript, and
>>>>>>>>> CSS.
>>>>>>>>>
>>>>>>>>
>>>>>> So
>>>>>>
>>>>>>>
>>>>>>>>> instead of using the URL of content hosted on your server, like
>>>>>>>>> this:
>>>>>>>>>
>>>>>>>>> function showImage() {
>>>>>>>>> imgUrl = 'http://www.example.com/i_heart_apis_sm.png';
>>>>>>>>> html = ['<img src="', imgUrl, '">'];
>>>>>>>>> document.getElementById('dom_handle').innerHTML = html.join('');
>>>>>>>>> };
>>>>>>>>>
>>>>>>>>> showImage();
>>>>>>>>>
>>>>>>>>> you can use the URL of the cached content, like this:
>>>>>>>>>
>>>>>>>>> function showImage() {
>>>>>>>>> imgUrl = 'http://www.example.com/i_heart_apis_sm.png';
>>>>>>>>> *cachedUrl = gadgets.io.getProxyUrl(imgUrl);*
>>>>>>>>> html = ['<img src="', *cachedUrl*, '">'];
>>>>>>>>> document.getElementById('dom_handle').innerHTML = html.join('');
>>>>>>>>> };
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> showImage();
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> if so, its preventing "free akamai"or phishing?
>>>>>>>>>
>>>>>>>>> said this, or the example is wrong (and we are limiting
>>>>>>>>> functionality)
>>>>>>>>>
>>>>>>>>
>>>>>> or
>>>>>>
>>>>>>>
>>>>>>>>> the solution is partial (or im completely mixed up :P)
>>>>>>>>>
>>>>>>>>> ropu
>>>>>>>>>
>>>>>>>>> On Fri, Jul 11, 2008 at 2:45 PM, Kevin Brown <[EMAIL PROTECTED]>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>> On Fri, Jul 11, 2008 at 2:20 AM, Karsten Beyer <[EMAIL PROTECTED]>
>>>>>>>>>
>>>>>>>>
>>>>>> wrote:
>>>>>>
>>>>>>>
>>>>>>>>>> Hi,
>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> what is the suggested strategy to prevent abuse of the open proxy
>>>>>>>>>>> at
>>>>>>>>>>> /gadgets/proxy? I found some old discussions from february about
>>>>>>>>>>>
>>>>>>>>>>
>>>>>> adding
>>>>>>
>>>>>>>
>>>>>>>>>>>  the
>>>>>>>>>>
>>>>>>>>>>  IP address of the user as HTTP header. Some testing however
>>>>>>>>>>> showed
>>>>>>>>>>>
>>>>>>>>>>
>>>>>> that
>>>>>>
>>>>>>>
>>>>>>>>>>>  this
>>>>>>>>>>
>>>>>>>>>>  is not yet implemented.
>>>>>>>>>>>
>>>>>>>>>>> Are there any plans to implement some kind of whitelist feature?
>>>>>>>>>>> More
>>>>>>>>>>> importantly: Are there any reasons against implementing such a
>>>>>>>>>>>
>>>>>>>>>>
>>>>>> feature?
>>>>>>
>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> You could always add a whitelist for outbound requests, but you'd
>>>>>>>>>> have
>>>>>>>>>> to
>>>>>>>>>> do
>>>>>>>>>> a custom http fetcher implementation.
>>>>>>>>>>
>>>>>>>>>> The java version is currently returning all proxied files as
>>>>>>>>>> attachments,
>>>>>>>>>> which has helped significantly with reducing the potential of
>>>>>>>>>> /gadgets/proxy
>>>>>>>>>> as a phishing vector or free Akamai.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Best Regards,
>>>>>>>>>>>
>>>>>>>>>>> Karsten Beyer
>>>>>>>>>>> [EMAIL PROTECTED]
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> --
>>>>>>>>> .-. --- .--. ..-
>>>>>>>>> R o p u
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>
>>>>>>
>>>
>>>
>

Reply via email to