Date: Wed, 10 Apr 2002 15:13:07 -0400 (EDT) From: Matthew Emmerton <matt@gsicomp.on.ca> To: Lord Raiden <raiden23@netzero.net> Cc: freebsd-questions@FreeBSD.ORG Subject: Re: Good spoof page for Apache?? Message-ID: <Pine.BSF.4.21.0204101512030.5286-100000@xena.gsicomp.on.ca> In-Reply-To: <4.2.0.58.20020409233418.0095a220@pop.netzero.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Rather than going ot all the trouble of "spoofing", why not have Apache return a 403 error (authorization required) for people accessing outside of the office. You can do this based on IP (although I don't have any examples handy.) -- Matthew Emmerton || matt@gsicomp.on.ca GSI Computer Services || http://www.gsicomp.on.ca On Tue, 9 Apr 2002, Lord Raiden wrote: > Hi all. I'm looking at taking one of our servers that's supposed to be > for office use only and open it up to the outside. There's nothing secure > on it, but I don't want just anybody surfing to it and browsing around. So > what I was thinking of doing was in order to fool the average joe who might > get there by accident or intentionally, I want them to think they have > recieved a standard browser error and then leave. > > I've thought about modifying the browser error that IE gives, but I'm not > sure that will work. I want it to look like a legitimate client side error > when they hit the website, yet I want those who know the proper access URL > to still be able to access the site remotely. For example, "mydomain.com/" > would show the mock error, yet "mydomain.com/login.cgi" would still get > them to where they needed to go. I just need a way to spoof an error, not > generate a real one to help keep out nosy bypassers. Any ideas? > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0204101512030.5286-100000>