
232 Flash Media Server Security
Configure the adaptor to listen on a secure port. If you need a secure connection,
configure the adaptor for the application to listen on a secure port by setting the
secure
attribute to
true in the HostPort tag in the Adaptor.xml file. Be aware that you can assign
only one virtual host to an adaptor that listens on a secure port, and you must specify the IP
address of that virtual host in Adaptor.xml.
Configure adaptors globally or individually. The SSL section in the Server.xml file
contains required information for using SSL and configures all adaptors to use the same
settings. However, you might want to use a different certificate for each virtual host. For
example, if you are an Internet service provider, you might want different websites that you
host to send different digital certificate information to clients. In this case, you would
configure your adaptors individually to override the settings in the Server.xml file.
To use different certificates for each adaptor, copy the
SSL section in the Server.xml file to the
Adaptor.xml file and enter the new values. You don’t need to copy the
SSLRandomSeek tag, as
this tag is a server-level setting that cannot be overridden in Adaptor.xml.
Using other secure development practices
You might not want to use SSL in all your applications because of the additional processing
time required to encrypt data over a secure connection. You can use other effective strategies
to help protect all your media applications, regardless of what protocol is used for
connections.
Confirm the location of the client SWF When you deploy a Flash Media Server
application, use a server-side script to verify that connecting SWF files are coming from the
location you expect (and not from an unknown computer). You can do this by checking the
client.referrer property of the client object before the server accepts the connection.
For more information about writing server-side scripts, see Developing Media Applications.
Use server-side script precautions In server-side scripts do not use procedures that can be
called by a malicious application, which could then fill a hard disk, consume the processor, or
do other damage. Procedures attached to client objects are particularly vulnerable. Procedures
to be aware of include writing to the hard disk without checking the quantity of data being
written, procedures that can be infinitely looped, and so on.
TIP
If a secure connection is not required, you can use assign more than one virtual host to a
single adaptor; that is, you can have multiple virtual hosts on a single IP address.
Commenti su questo manuale