-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Friday 04 October 2002 12:26 pm, i.t wrote: >it would be helpful, if you could provide some more actual details Hi sir,
I'm developing in redhat 7.3 httpd 1.3.23-14; it's a very complex infrastructure with mod_pubcookie, mod_proxy and mod_rewrite it's noteasy to describe it; it's easier for me show you the piece of code that in http allowed me to change parameter in post stuff, but not in https int change_out_post(request_rec *r, char *username) { char argsbuffer[HUGE_STRING_LEN]; int retval; /* checkout http_protocols.c for reading the body info */ if ((retval = ap_setup_client_block(r, REQUEST_CHUNKED_ERROR))) return retval; if (ap_should_client_block(r)) { char *p=r->connection->client->inptr; int len_read; ap_hard_timeout("copy script args", r); ; if ((p=strstr(r->connection->client->inptr, "username")) != NULL) { memcpy( p+strlen("username="), foo, 10); p=r->connection->client->inptr; } libpbc_debug("change_out_post[%d]: inptr: %s\n", __LINE__, p); ap_kill_timeout(r); } return(1); } i try to explain it: Premise. suppose that u want authenticate a user and after authentication u want to add the username to hidden parameter beacause application on backend (we are in rev-proxy architecture) needs it as post parameters. The misfact. before autheticating using mod_pubcookie i add some hidden parameter initialized to null e.g. 'username= ' u can see sufficient blanks after username=, to accomodate for username value it's a low tricky, don't blame to me! after authetication i try to valorize username...how?!? with strstr i search the parameter name in post area pointed (if we are in http!!!) by r->connection->client->inptr i add 9 bytes to this pointer (strlen("username=")) i write the username in place of blanks done! this horrible trick worked until i pass to https... Conclusion. i fear that it's not portable (sure it doesn't work in apache 2.0!) and after apache rewriting for chunked exploit all my stuff is outdated, even i've not tested it; i write this piece of code the days before 21 June!!! My prayer. now, i know well that this piece of sw cannot be a solution and i seraching for some help to do something more robust and reliable. thnx in advance! - -- Maurizio Marini -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE9nYLY4Q/49nIJTlwRAvyGAJ477retyJiKljXEpbDK6/R1C0js7gCfY9o1 cBcLKP/t/J0NITERpWOnl6I= =2GFV -----END PGP SIGNATURE-----