. To enable bits to work, the server should be compatible with HTTP 1.1, or at least support the range header in the get method. This is because bits needs to be able to request part of the file. In addition, the downloaded content must be static content, such as marking a file, code file, bitmap, or sound. When the request is dynamic (for example, CGI, ISAPI, or content generated by ASP. NET), the GET request containing the range header is meaningless.
Currently, BITs has two versions: 1.0 and
Getting started
Authentication is often used in website creation. Asp.net has several built-in authentication methods, such as Windows, Froms, and Passport. These authentication methods are different. Generally, the authentication method of a website goes through the following steps:
1. Enter the user name and password, and click OK.
2. Check whether the user name and password are correct in the background. If the user name and password are correct, a
object is used to identify the current user. The identifier can only provide a small amount of security context information, such as the user name. The identity object can be used to authenticate users.Iidentity InterfaceLike the iprincipal interface, this interface must be implemented for all objects identified by the user. The iidentity interface defines the structure of the basic amount of the Identity object, which is defined as follows:
Authenti
from the pool. If all the httpapplication objects in the pool are busy, ASP. NET creates a new httpapplication object.
The entire lifecycle of requests processed by httpapplication is a relatively complex process. Events are triggered at different stages of the process. We can register corresponding events and inject the processing logic into a stage of httpapplication processing requests. Table 1-1 lists the names of events triggered by httpapplication when processing each request in sequence
. vscc.2003/ms. msdnqtr.2003apr. 1033/cpguide/html/cpconidentitypermissions.htm3. principalpermission (Role Based permission)
Authorization authorization determines whether a user has the right to operate, such as whether the logged-on user has the permission to access resources or databasesAuthentication authenticates the user's identity. mainly include: HTTP Basic Authentication, certificates, Kerberos, passport, NTLM,
Forms-based and digest
The two
First, you need to understand the following abbreviation:MicrosoftID:
Used for MSN, office live, and Microsoft Passport sites
You provide some services (such as MSN, Hotmail, and MCP) on the Microsoft website, such as live email, Hotmail, and MSN accounts... Wait!
You can also use your own mailbox registered to Microsoft ID, such as the yourlunch@126.com!
Register an address. For more information, see the following operations!
MCP access code:
The C
The Web. config file contains some basic sections. The detailed configurations of these sections are as follows:
1. Configure
(1) Windows: Internet Information Service (IIS) performs Authentication Based on application settings. Anonymous Access must be disabled in IIS.
(2) forms: the project creator must provide a custom form for users to enter creden, and then authenticate the identity in the application. The user's creden are stored in the cookie
basic HTTP verification. The user enters the user name and password in the form, and the password is transmitted in plain text on the network. If a node on the network intercepts the authentication request, after Anti-encoding, you can easily obtain the user's password. Therefore, when using basic HTTP verification methods and form-based verification methods, you must determine that the weaknesses of these two methods are acceptable to your application.
Client-certificate-based authentication)T
Analysis:
configuration information for. NET Web applications, such as the most common settings for how to authenticate an ASP. Web application, can appear in every directory in the application. When you create a new Web application through vb.net, by default, a default Web. config file is automatically created in the root directory, including the default configuration settings, and all subdirectories inherit its configuration settings. If you want t
for authentication. Some Applications Support authentication in multiple ways, such as ASP. net supports forms, passport, and Windows integration in three (and none) Ways to authenticate, and then involves authorization issues. The more layers of the application layer, the more complicated these security issues. However, as long as you are clear-headed and basic concepts are clear, there is no big problem
-authenticate header is included in the answer, and the browser displays the user name/Password dialog box, and then makes a request again after filling in the appropriate authorization header. IIS defines a number of different 401 errors, which indicate a more specific cause of the error. These specific error codes are displayed in the browser, but are not displayed in the IIS log:· 401.1-Login failed.· 401.2-The server configuration caused the login
passwordProtectionThe page. A www-authenticate header is included in the answer, and the browser displays the user name/Password dialog box, and then makes a request again after filling in the appropriate authorization header. IIS defines a number of different 401 errors, which indicate a more specific cause of the error. These specific error codes are displayed in the browser, but are not displayed in the IIS log:401.1-Login failed.401.2-The server
location header (HTTP 1.1 is new).307-temporary Redirect Many browsers incorrectly respond to a 302 response for redirection, even if the original request is post, even though it can actually be redirected only if the answer to the POST request is 303. For this reason, HTTP 1.1 has been added in 307 to allow for more cleanup of the region in several status codes: When a 303 response occurs, the browser can follow the redirected get and post requests, and if the 307,301,302 answer, the browser c
by the Proxy server specified in the Location header (New in HTTP 1.1 ).· 307-Temporary Redirect and 302 (Found) are the same. Many browsers mistakenly respond to the 302 response for redirection. Even if the original request is POST, it can only be redirected when the POST request actually responds to 303. For this reason, HTTP 1.1 adds 307 to clear the region code in several states: When a 303 response occurs, the browser can follow the redirected GET and POST requests; if a 307 response occu
list.
403.15
Client access permission exceeded.
403.16
The client certificate is not trusted or invalid.
403.17
The client certificate has expired or is not yet valid.
403.18
The requested URL cannot be executed in the current application pool. This error code is specific to IIS 6.0.
403.19
You cannot execute CGI for clients in this application pool. This error code is specific to IIS 6.0.
the World Wide Web, such as transaction payment.
Confirm that Nginx supports the OpenSSL Module
Run the following command:
nginx -Vnginx: nginx version: nginx/1.0.0nginx: built by gcc 4.4.3 (Ubuntu 4.4.3-4ubuntu5) nginx: TLS SNI support enablednginx: configure arguments: --user=www --group=www --prefix=/usr/local/webserver/nginx --with-http_stub_status_module --with-http_ssl_module
If no-with-http_ssl_module compilation parameter is found, it is not supported. Nginx does not su
Exceeded.
403.16
The client certificate is not trusted or invalid.
403.17
The client certificate has expired or is not yet valid.
403.18
The requested URL cannot be executed in the current application Pool. This error code is specific to IIS 6.0.
403.19
You cannot execute CGI for clients in this application Pool. This error code is specific to IIS 6.0.
403.20
Pass
server discovered that the File's extension is css. 5. In the cache directory, the proxy server creates a directory named home.php and caches the Imposter's "css" files (nonexistent css files).Exploit exploitsIf an attacker lures a logged-in user to access http://www.example.com/home.php/logo.png, the Web page (the page containing the User's personal Information) is cached on the cache server, so that the cached personal information is publicly accessible. If the HTTP principal information in
exceeded.
403.16
The client certificate is not trusted or invalid.
403.17
The client certificate has expired or is not yet valid.
403.18
The requested URL cannot be executed in the current application pool. This error code is specific to IIS 6.0.
403.19
You cannot execute CGI for clients in this application pool. This error code is specific to IIS 6.0.
403.20
Pass
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.