FWIW, decided to implement (for now) fronting with Apache httpd and
doing about the simplest thing possible: munging the look and feel.

>   RewriteEngine On
>   RewriteOptions Inherit
>   RewriteCond %{HTTP_REFERER} !^$
>   RewriteCond %{HTTP_REFERER} !^https://servername\.ucdavis\.edu/cas/ [NC]
>   RewriteRule \.(gif|jpg|css)$ - [F]
> 
>   ProxyPass /cas/ ajp://localhost:8009/cas/

Tom.


On 06/17/2013 10:44 AM, Tom Poage wrote:
> Hello,
> 
> Looking for opinions/experience protecting the CAS server webapp against, 
> among other things, 'hotlinking'.
> 
> E.g. requests routed via remote (compromised) site masquerading with 'stolen' 
> CAS server content as part of a phishing expedition.
> 
> One method is to evaluate HTTP 'Referer' for static content requests and, if 
> populated and not your site's URL, consider it being used without your 
> authorization. On detection, dynamically change something about your page, 
> e.g. CSS or an image(s), to alert the subject something is amiss. Yes, it's 
> only a small additional layer of protection, principally against 
> unsophisticated attackers, but we've seen this in the wild 
> and--unfortunately--sometimes it works.
> 
> I see two technical implementations offhand: (1) tukey.org UrlrRewriteFilter, 
> and (2) fronting the webapp with Apache httpd and using mod_rewrite.
> 
> Other ideas?
> 
> Thanks.
> Tom.
> 


-- 
You are currently subscribed to [email protected] as: 
[email protected]
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to