Home Backend Development C#.Net Tutorial Asp.Net Core uses middleware to prevent image hotlinking

Asp.Net Core uses middleware to prevent image hotlinking

Dec 26, 2016 am 10:26 AM

1. Principle

To achieve anti-hotlinking, we must first understand the implementation principle of hotlinking. When it comes to the implementation principle of anti-hotlinking, we have to start with the HTTP protocol. In the HTTP protocol, there are A header field is called referer, which uses URL format to indicate where to link to the current web page or file. In other words, through the referer, the website can detect the source webpage visited by the target webpage, and if it is a resource file, it can track the webpage address that displays it. With the referer tracking the source, it is easier to handle. At this time, it can be processed through technical means. Once it is detected that the source is not this site, it will be blocked or returned to the specified page. If you want to protect your website from hotlinking, you need to treat different situations differently.

If the website server uses apache, then using the Url Rewrite function that comes with apache can easily prevent various hot links. The principle is to check the refer. If the refer information comes from other websites, Redirect to a specified image or web page.

If the server uses IIS, you need to use a third-party plug-in to implement the anti-hotlink function. A commonly used product now is called ISAPI_Rewrite, which can implement the anti-hotlink function similar to apache. In addition, forums can also use the "login verification" method to prevent hot links.

2. Implement anti-hotlinking

Now let us implement anti-hotlinking technology in ASP.NET Core to protect our applications and site files. This requires using the middleware technology in ASP.NET Core to monitor and process all incoming requests and check whether these requests come from our application.

Let us create this anti-hotlink middleware program:

public class HotlinkingPreventionMiddleware
{
  private readonly string _wwwrootFolder;
  private readonly RequestDelegate _next;
 
  public HotlinkingPreventionMiddleware(RequestDelegate next, IHostingEnvironment env)
  {
    _wwwrootFolder = envWebRootPath;
    _next = next;
  }
 
  public async Task Invoke(HttpContext context)
  {
    var applicationUrl = $"{contextRequestScheme}://{contextRequestHostValue}";
    var headersDictionary = contextRequestHeaders;
    var urlReferrer = headersDictionary[HeaderNamesReferer]ToString();
 
    if(!stringIsNullOrEmpty(urlReferrer) && !urlReferrerStartsWith(applicationUrl))
    {
      var unauthorizedImagePath = PathCombine(_wwwrootFolder,"Images/Unauthorizedpng");
         
      await contextResponseSendFileAsync(unauthorizedImagePath);
    }
       
    await _next(context);
  }
}
Copy after login

In this middleware we can see ASP.NET Core The Request object in does not encapsulate the Referrer. If you want to obtain the Referrer, you must access it through HTTP headers.

Generally, there is an IApplicationBuilder extension:

public static class BuilderExtensions
{
  public static IApplicationBuilder UseHotlinkingPreventionMiddleware(this IApplicationBuilder app)
  {
    return appUseMiddleware();
  }
}
Copy after login

Finally, to use it, you only need to call the above extension function in the Configure function.

app.UseHotlinkingPreventionMiddleware();
Copy after login

3. Can it really be defended?

How to break through anti-leeching? As for the way to check the refer, you can first enter another page of the destination address in the page middleware and then go to the destination page. In this way, the refer of the page is the destination site's own. In this way, a breakthrough is achieved. There are many tools that can be used in this regard, especially mature web project test packages, such as HtmlUnit. It is possible to set refer directly in the request.

If the stolen website uses the https protocol and the image link is http, the request initiated from https to http will not include a referer due to security regulations, thereby bypassing anti-hotlinking.

Finally, I can only say that this method can only defend to a certain extent, and it is impossible to eliminate all attacks. It is still recommended to use mature server application solutions, such as Nginx.

The above is the entire content of this article. I hope it will be helpful to everyone's learning. I also hope that everyone will support the PHP Chinese website.

For more related articles on Asp.Net Core’s use of middleware to prevent image hotlinking, please pay attention to the PHP Chinese website!


Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
2 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
Hello Kitty Island Adventure: How To Get Giant Seeds
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
Two Point Museum: All Exhibits And Where To Find Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

.NET Deep Dive: Mastering Asynchronous Programming, LINQ, and EF Core .NET Deep Dive: Mastering Asynchronous Programming, LINQ, and EF Core Mar 31, 2025 pm 04:07 PM

The core concepts of .NET asynchronous programming, LINQ and EFCore are: 1. Asynchronous programming improves application responsiveness through async and await; 2. LINQ simplifies data query through unified syntax; 3. EFCore simplifies database operations through ORM.

How to use char array in C language How to use char array in C language Apr 03, 2025 pm 03:24 PM

The char array stores character sequences in C language and is declared as char array_name[size]. The access element is passed through the subscript operator, and the element ends with the null terminator '\0', which represents the end point of the string. The C language provides a variety of string manipulation functions, such as strlen(), strcpy(), strcat() and strcmp().

How to use various symbols in C language How to use various symbols in C language Apr 03, 2025 pm 04:48 PM

The usage methods of symbols in C language cover arithmetic, assignment, conditions, logic, bit operators, etc. Arithmetic operators are used for basic mathematical operations, assignment operators are used for assignment and addition, subtraction, multiplication and division assignment, condition operators are used for different operations according to conditions, logical operators are used for logical operations, bit operators are used for bit-level operations, and special constants are used to represent null pointers, end-of-file markers, and non-numeric values.

What is the role of char in C strings What is the role of char in C strings Apr 03, 2025 pm 03:15 PM

In C, the char type is used in strings: 1. Store a single character; 2. Use an array to represent a string and end with a null terminator; 3. Operate through a string operation function; 4. Read or output a string from the keyboard.

Avoid errors caused by default in C switch statements Avoid errors caused by default in C switch statements Apr 03, 2025 pm 03:45 PM

A strategy to avoid errors caused by default in C switch statements: use enums instead of constants, limiting the value of the case statement to a valid member of the enum. Use fallthrough in the last case statement to let the program continue to execute the following code. For switch statements without fallthrough, always add a default statement for error handling or provide default behavior.

How to handle special characters in C language How to handle special characters in C language Apr 03, 2025 pm 03:18 PM

In C language, special characters are processed through escape sequences, such as: \n represents line breaks. \t means tab character. Use escape sequences or character constants to represent special characters, such as char c = '\n'. Note that the backslash needs to be escaped twice. Different platforms and compilers may have different escape sequences, please consult the documentation.

What is the function of C language sum? What is the function of C language sum? Apr 03, 2025 pm 02:21 PM

There is no built-in sum function in C language, so it needs to be written by yourself. Sum can be achieved by traversing the array and accumulating elements: Loop version: Sum is calculated using for loop and array length. Pointer version: Use pointers to point to array elements, and efficient summing is achieved through self-increment pointers. Dynamically allocate array version: Dynamically allocate arrays and manage memory yourself, ensuring that allocated memory is freed to prevent memory leaks.

How to convert char in C language How to convert char in C language Apr 03, 2025 pm 03:21 PM

In C language, char type conversion can be directly converted to another type by: casting: using casting characters. Automatic type conversion: When one type of data can accommodate another type of value, the compiler automatically converts it.

See all articles