Asp.Net Core uses middleware to prevent image hotlinking
1. Principle
To achieve anti-hotlinking, we must first understand the implementation principle of hotlinking. When it comes to the implementation principle of anti-hotlinking, we have to start with the HTTP protocol. In the HTTP protocol, there are A header field is called referer, which uses URL format to indicate where to link to the current web page or file. In other words, through the referer, the website can detect the source webpage visited by the target webpage, and if it is a resource file, it can track the webpage address that displays it. With the referer tracking the source, it is easier to handle. At this time, it can be processed through technical means. Once it is detected that the source is not this site, it will be blocked or returned to the specified page. If you want to protect your website from hotlinking, you need to treat different situations differently.
If the website server uses apache, then using the Url Rewrite function that comes with apache can easily prevent various hot links. The principle is to check the refer. If the refer information comes from other websites, Redirect to a specified image or web page.
If the server uses IIS, you need to use a third-party plug-in to implement the anti-hotlink function. A commonly used product now is called ISAPI_Rewrite, which can implement the anti-hotlink function similar to apache. In addition, forums can also use the "login verification" method to prevent hot links.
2. Implement anti-hotlinking
Now let us implement anti-hotlinking technology in ASP.NET Core to protect our applications and site files. This requires using the middleware technology in ASP.NET Core to monitor and process all incoming requests and check whether these requests come from our application.
Let us create this anti-hotlink middleware program:
public class HotlinkingPreventionMiddleware { private readonly string _wwwrootFolder; private readonly RequestDelegate _next; public HotlinkingPreventionMiddleware(RequestDelegate next, IHostingEnvironment env) { _wwwrootFolder = envWebRootPath; _next = next; } public async Task Invoke(HttpContext context) { var applicationUrl = $"{contextRequestScheme}://{contextRequestHostValue}"; var headersDictionary = contextRequestHeaders; var urlReferrer = headersDictionary[HeaderNamesReferer]ToString(); if(!stringIsNullOrEmpty(urlReferrer) && !urlReferrerStartsWith(applicationUrl)) { var unauthorizedImagePath = PathCombine(_wwwrootFolder,"Images/Unauthorizedpng"); await contextResponseSendFileAsync(unauthorizedImagePath); } await _next(context); } }
In this middleware we can see ASP.NET Core The Request object in does not encapsulate the Referrer. If you want to obtain the Referrer, you must access it through HTTP headers.
Generally, there is an IApplicationBuilder extension:
public static class BuilderExtensions { public static IApplicationBuilder UseHotlinkingPreventionMiddleware(this IApplicationBuilder app) { return appUseMiddleware(); } }
Finally, to use it, you only need to call the above extension function in the Configure function.
app.UseHotlinkingPreventionMiddleware();
3. Can it really be defended?
How to break through anti-leeching? As for the way to check the refer, you can first enter another page of the destination address in the page middleware and then go to the destination page. In this way, the refer of the page is the destination site's own. In this way, a breakthrough is achieved. There are many tools that can be used in this regard, especially mature web project test packages, such as HtmlUnit. It is possible to set refer directly in the request.
If the stolen website uses the https protocol and the image link is http, the request initiated from https to http will not include a referer due to security regulations, thereby bypassing anti-hotlinking.
Finally, I can only say that this method can only defend to a certain extent, and it is impossible to eliminate all attacks. It is still recommended to use mature server application solutions, such as Nginx.
The above is the entire content of this article. I hope it will be helpful to everyone's learning. I also hope that everyone will support the PHP Chinese website.
For more related articles on Asp.Net Core’s use of middleware to prevent image hotlinking, please pay attention to the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The core concepts of .NET asynchronous programming, LINQ and EFCore are: 1. Asynchronous programming improves application responsiveness through async and await; 2. LINQ simplifies data query through unified syntax; 3. EFCore simplifies database operations through ORM.

The char array stores character sequences in C language and is declared as char array_name[size]. The access element is passed through the subscript operator, and the element ends with the null terminator '\0', which represents the end point of the string. The C language provides a variety of string manipulation functions, such as strlen(), strcpy(), strcat() and strcmp().

The usage methods of symbols in C language cover arithmetic, assignment, conditions, logic, bit operators, etc. Arithmetic operators are used for basic mathematical operations, assignment operators are used for assignment and addition, subtraction, multiplication and division assignment, condition operators are used for different operations according to conditions, logical operators are used for logical operations, bit operators are used for bit-level operations, and special constants are used to represent null pointers, end-of-file markers, and non-numeric values.

In C, the char type is used in strings: 1. Store a single character; 2. Use an array to represent a string and end with a null terminator; 3. Operate through a string operation function; 4. Read or output a string from the keyboard.

A strategy to avoid errors caused by default in C switch statements: use enums instead of constants, limiting the value of the case statement to a valid member of the enum. Use fallthrough in the last case statement to let the program continue to execute the following code. For switch statements without fallthrough, always add a default statement for error handling or provide default behavior.

In C language, special characters are processed through escape sequences, such as: \n represents line breaks. \t means tab character. Use escape sequences or character constants to represent special characters, such as char c = '\n'. Note that the backslash needs to be escaped twice. Different platforms and compilers may have different escape sequences, please consult the documentation.

There is no built-in sum function in C language, so it needs to be written by yourself. Sum can be achieved by traversing the array and accumulating elements: Loop version: Sum is calculated using for loop and array length. Pointer version: Use pointers to point to array elements, and efficient summing is achieved through self-increment pointers. Dynamically allocate array version: Dynamically allocate arrays and manage memory yourself, ensuring that allocated memory is freed to prevent memory leaks.

In C language, char type conversion can be directly converted to another type by: casting: using casting characters. Automatic type conversion: When one type of data can accommodate another type of value, the compiler automatically converts it.
