Honglin Ye wrote:
Murray Altheim wrote:


Honglin Ye wrote:
[...]


xml-security is a too-big topic. I am thinking how to prevent un-wanted
query. As it stands now, Any one who knows the hostName and portNumber
can query/update documents inside, by using either a commandline tool or
a slightly modified java-api. (assume that he is inside the firewall, or
he is outside firewall but the port used is open)


But you can do that in your application, not in Xindice. There's
no need to pollute Xindice's code base with every single need there
is out there. There's about ten ways to handle this before you ever
need to modify things at the database layer.

Murray

I did not demand to pollute xindice. While you mentioned ten ways to accomplish that, I only need one. The easier the better. Can anyone let me how to hide the xindice from quering using commandline tool?

These are just off the top of my head as I type them:

  1. write a small proxy to sit between the actual Xindice port and
     the proxy (public) port. This could probably be accomplished
     with less than a thousand lines of code (I wrote a tiny HTTP
     server in about 500-600).
  2. create an IP access control list to filter access via incoming
     IP addresses
  3. use a user-based system:
      a. via username-password
      b. via domain-based filtering
  4. extend one or two of Xindice's classes to enable data flow based on
     any number of factors.
  5. use a cookie-based system (i.e., if the user query doesn't have
     the right cookie, deny service
  6. encrypt all data stored in Xindice (prior to going into Xindice)
     and give the keys only to trusted clients
  7. extend the client to require a preliminary handshaking, where
     the server challenges the client to produce a hash.
  8. make the port available only within your LAN/WAN
  9. use existing proxies to keep out intruders
 10. require access only via a downloaded client that uses any number
     of secure methods to gain access to the server (hashes, passwords,
     etc.)
 11. alter the query itself to include a hash prefix. The formula
     to the hash is only known to you and trusted clients.

I dunno. This is five minutes' effort. I'm sure I could think of
more. I'm sure others could too.

Murray

......................................................................
Murray Altheim                    http://kmi.open.ac.uk/people/murray/
Knowledge Media Institute
The Open University, Milton Keynes, Bucks, MK7 6AA, UK               .

 "I'm a war president. I make decisions here in the Oval Office
  in foreign policy matters with war on my mind." -- George W. Bush
  http://news.bbc.co.uk/1/hi/world/americas/3470139.stm

 "This is the new Mein Kampf. Only Hitler did not have nuclear
  weapons. It's the scariest document I've ever read in my life."
        -- Dr. Helen Caldicott, referring to the Project for the
  New American Century report entitled "Rebuilding America's
  Defenses: Strategy, Forces and Resources For a New Century"
  http://home.earthlink.net/~platter/neo-conservatism/pnac.html

    "This report proceeds from the belief that America should seek
     to preserve and extend its position of global leadership by
     maintaining the preeminence of U.S. military forces." [op. cit.]

    "[...] and advanced forms of biological warfare that can target
     specific genotypes may transform biological warfare from the
     realm of terror to a politically useful tool." [op. cit.]

 "This is a blueprint for US world domination."
  http://www.guardian.co.uk/comment/story/0,3604,1036571,00.html




Reply via email to