Yes Jonathan, that's exactly what I am doing with Ruby on Rails -
serving it through the apache but the request goes to a ruby script
before the application decides if it can be served or not. The
remaingin question is how to restrict the player to a specific domain
or subdomains.

On Nov 6, 2007 9:29 PM, Jonathan Valliere <[EMAIL PROTECTED]> wrote:
> Instead of serving your player directly via http. You can use python
> as the URL to return the SWF binary in the response if access is
> granted.
>
> Sent from my mobile device
>
> On Nov 6, 2007, at 5:39 PM, "Marcelo de Moraes Serpa" <[EMAIL PROTECTED]
>
>  > wrote:
>
> > Ruby on Rails, but I also use Django, Plone and Zope. So, basically
> > Ruby and Python.
> >
> > On Nov 6, 2007 8:01 PM, Samuel Agesilas <[EMAIL PROTECTED]> wrote:
> >> Marcelo,
> >>
> >> Ahh... ok. Cool! If I may ask another question that I neglected to
> >> post and that is what kind of back end technology are you using?
> >> Java,
> >> PHP, ASP.NET?
> >>
> >> Cheers,
> >> Sam
> >>
> >>
> >> On Nov 6, 2007, at 3:54 PM, Marcelo de Moraes Serpa wrote:
> >>
> >>> Hello Samuel,
> >>>
> >>>> If I may chime in this discussion.. what are you trying to protect?
> >>>> The
> >>>> actual swf or access to services exposed in the swf?
> >>>
> >>> Yes, it wans't clear. Actually I'm not really trying to protect the
> >>> SWF but instead restrict the ways it can be served. Mine is an
> >>> application somewhat like youtube but more restricted, so, I
> >>> wouldn't
> >>> want anyone to get the URL and play the videos anywhere (outside of
> >>> the allowed domain).
> >>>
> >>> On Nov 6, 2007 4:41 PM, Samuel Agesilas <[EMAIL PROTECTED]> wrote:
> >>>> Marcelo,
> >>>>
> >>>> If I may chime in this discussion.. what are you trying to protect?
> >>>> The
> >>>> actual swf or access to services exposed in the swf?
> >>>>
> >>>> cheers,
> >>>> Sam
> >>>>
> >>>>
> >>>>
> >>>> On Nov 4, 2007, at 6:42 PM, Jonathan Valliere wrote:
> >>>>
> >>>> Marcelo,
> >>>>
> >>>> As far as referrer checking, your going to need to search google or
> >>>> get in
> >>>> touch with a Red5 developer ( put it on the Red5 mailing list ).
> >>>>
> >>>> Encryption:  You can load in SWF binary via ByteArray and
> >>>> encryption can be
> >>>> done with ByteArray data ( that can be loaded via .. Loader ?? ).
> >>>> Essentially you encrypt your SWF binary ( and store it encrypted on
> >>>> the
> >>>> server ) and load it in over HTTPs and decrypt it based on a
> >>>> public/
> >>>> private
> >>>> key based on a secondary encryption mechanism located inside the
> >>>> first one
> >>>> and load into a SWFLoader at runtime.  Run the entire application
> >>>> over HTTPs
> >>>> with cache off and it should be pretty dam secure.
> >>>>
> >>>> http://en.wikipedia.org/wiki/Public-key_cryptography
> >>>>
> >>>> http://en.wikipedia.org/wiki/Encryption
> >>>>
> >>>> http://en.wikipedia.org/wiki/Topics_in_cryptography
> >>>>
> >>>> I bet there are a lot of good books on Cryptography.
> >>>>
> >>>> -Jon
> >>>>
> >>>>
> >>>> On Nov 4, 2007, at 7:24 PM, Marcelo de Moraes Serpa wrote:
> >>>> Hello Jonathan,
> >>>>
> >>>>> You could protect swfs over RTMP via Red5 to make sure of a
> >>>>> correct
> >>>> referrer.
> >>>>
> >>>>
> >>>>> You could also load in an encrypted SWF that contains a secondary
> >>>> encrypted Binary file that self-decrypts ( and runs ) and is
> >>>> responsible for
> >>>> referrer / self-authentication over HTTPS / RTMP.
> >>>>
> >>>>
> >>>> Any examples or maybe pointers to articles that elaborate on these
> >>>> techniques?
> >>>>
> >>>> Thanks,
> >>>>
> >>>> Marcelo.
> >>>>
> >>>>
> >>>>
> >>>> On 11/4/07, Jonathan Valliere <[EMAIL PROTECTED]> wrote:
> >>>>>
> >>>>> yeah but you can't protect against everything.  you can encrypt
> >>>>> your swfs,
> >>>> decrypt them clientside but that could also ultimately be faked
> >>>> given enough
> >>>> time and data capture.
> >>>>>
> >>>>>
> >>>>> You could protect swfs over RTMP via Red5 to make sure of a
> >>>>> correct
> >>>> referrer.  You could also load in an encrypted SWF that contains a
> >>>> secondary
> >>>> encrypted Binary file that self-decrypts ( and runs ) and is
> >>>> responsible for
> >>>> referrer / self-authentication over HTTPS / RTMP.
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>>
> >>>>> On Nov 4, 2007, at 12:23 PM, Marcelo de Moraes Serpa wrote:
> >>>>>
> >>>>>
> >>>>>> Red the URL from the browser and see if the domain is valid.  I
> >>>>>> forget
> >>>> how to get it normally but in Flex you get it this way
> >>>>>>
> >>>>>
> >>>>> Yes, but one could possibly decompile the SWF and remove this code
> >>>>> (since
> >>>> it is client side).
> >>>>>
> >>>>>
> >>>>> On 11/4/07, Jonathan Valliere <[EMAIL PROTECTED] > wrote:
> >>>>>>
> >>>>>> Red the URL from the browser and see if the domain is valid.  I
> >>>>>> forget
> >>>> how to get it normally but in Flex you get it this way
> >>>>>>
> >>>>>>
> >>>>>> Application( Application.application ).url
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> On Nov 3, 2007, at 11:40 AM, Jean-Philippe DELAVALLADE wrote:
> >>>>>>
> >>>>>> It's perhaps a solution
> >>>>>> but i prefer using a referer like in Flash Media Server
> >>>>>> I don't find it in RED5
> >>>>>>
> >>>>>>
> >>>>>>
> >>>>>> Le 3 nov. 07 à 16:23, Marcelo de Moraes Serpa a écrit :
> >>>>>>
> >>>>>> Hmm.. yep, haven't though about the domain restrictions of the
> >>>>>> player,
> >>>> it might work!
> >>>>>>
> >>>>>> @Paul: Afaik, it works like this: When the player downloads a SWF
> >>>>>> from a
> >>>> domain, it looks for a crossdomain.xml file that in turns contains
> >>>> rules on
> >>>> which other domains are allowed to play your SWF files you are
> >>>> serving
> >>>> through your domain. Please someone correct-me if I'm wrong.
> >>>>>>
> >>>>>> Cheers,
> >>>>>>
> >>>>>> Marcelo.
> >>>>>>
> >>>>>>
> >>>>>> On 11/3/07, Jean-Philippe DELAVALLADE < [EMAIL PROTECTED]>
> >>>>>> wrote:
> >>>>>>>
> >>>>>>> Thanks Paul :)
> >>>>>>> Add a cross-domain policy, which prevents unauthorized domains
> >>>>>>> from
> >>>> accessing your assets.
> >>>>>>> but how ??
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>> Le 3 nov. 07 à 14:42, paul|LOWRES a écrit :
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>> maybe a cross-domain policy is, what you are looing for?
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>> http://livedocs.adobe.com/flash/9.0/UsingFlash/help.html?content=WSd60f23110762d6b883b18f10cb1fe1af6-7b35.html
> >>>>>>>
> >>>>>>>
> >>>>>>> cheers,
> >>>>>>> paul
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>> Am 03.11.2007 um 14:01 schrieb Marcelo de Moraes Serpa:
> >>>>>>>
> >>>>>>> Hello Jean,
> >>>>>>>
> >>>>>>> I'm also searching for a way to restrict my flash application
> >>>>>>> in a
> >>>> domain. Actually I thought in serving the SWF through a script
> >>>> instead of
> >>>> letting the webserver serve it so that I could do this referrer
> >>>> check
> >>>> server-side (Using Ruby/Rails or PHP for example). Code to check
> >>>> the
> >>>> referrer in the SWF could work but someone could decompile your SWF
> >>>> and
> >>>> remove this check.
> >>>>>>>
> >>>>>>> If someone got some ideas regarding that, please share!
> >>>>>>>
> >>>>>>> Marcelo.
> >>>>>>>
> >>>>>>>
> >>>>>>> On 10/26/07, Jean-Philippe DELAVALLADE < [EMAIL PROTECTED]>
> >>>>>>> wrote:
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Hello,
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> I would like to protect my application, do a referrer in fact
> >>>>>>>> I've tried this code but the server never run with that :
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> public boolean appConnect(IConnection conn, Object[] params) {
> >>>>>>>>   String pageUrl =
> >>>>>>>> (String)conn.getConnectParams().get( "pageUrl"
> >>>> );
> >>>>>>>>   log.debug( "L'URL de la pages est : " +pageUrl);
> >>>>>>>>   if(pageUrl != "http://mydomain";){
> >>>>>>>> return false;
> >>>>>>>>        }
> >>>>>>>> Can you show me the way, in order to my appli just run under my
> >>>> domain ?
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> Thanks guys
> >>>>>>>>
> >>>>>>>>
> >>>>>>>> JP
> >>>>>>>> _______________________________________________
> >>>>>>>> osflash mailing list
> >>>>>>>> [email protected]
> >>>>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>>>
> >>>>>>>>
> >>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> osflash mailing list
> >>>>>>> [email protected]
> >>>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> osflash mailing list
> >>>>>>> [email protected]
> >>>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>>
> >>>>>>>
> >>>>>>> _______________________________________________
> >>>>>>> osflash mailing list
> >>>>>>> [email protected]
> >>>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>>
> >>>>>>>
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> osflash mailing list
> >>>>>> [email protected]
> >>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> osflash mailing list
> >>>>>> [email protected]
> >>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>
> >>>>>> _______________________________________________
> >>>>>> osflash mailing list
> >>>>>> [email protected]
> >>>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>>
> >>>>>>
> >>>>>
> >>>>>
> >>>>> _______________________________________________
> >>>>> osflash mailing list
> >>>>> [email protected]
> >>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>
> >>>>> _______________________________________________
> >>>>> osflash mailing list
> >>>>> [email protected]
> >>>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>>
> >>>>>
> >>>>
> >>>> _______________________________________________
> >>>> osflash mailing list
> >>>> [email protected]
> >>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>> _______________________________________________
> >>>> osflash mailing list
> >>>> [email protected]
> >>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>
> >>>>
> >>>> _______________________________________________
> >>>> osflash mailing list
> >>>> [email protected]
> >>>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>>>
> >>>>
> >>>
> >>> _______________________________________________
> >>> osflash mailing list
> >>> [email protected]
> >>> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>
> >>
> >> _______________________________________________
> >> osflash mailing list
> >> [email protected]
> >> http://osflash.org/mailman/listinfo/osflash_osflash.org
> >>
> >
> > _______________________________________________
> > osflash mailing list
> > [email protected]
> > http://osflash.org/mailman/listinfo/osflash_osflash.org
>
> _______________________________________________
> osflash mailing list
> [email protected]
> http://osflash.org/mailman/listinfo/osflash_osflash.org
>

_______________________________________________
osflash mailing list
[email protected]
http://osflash.org/mailman/listinfo/osflash_osflash.org

Reply via email to