The technology behind the World Wide Web, the Hypertext Transfer Protocol (HTTP), does not make any distinction of types of links — all links are functionally equal. Resources may be located on any server at any location. Linking to an image stored on another site increases the bandwidth use of that site even though the site is not being viewed as intended. The complaint may be the loss of ad revenue or changing the perceived meaning through an unapproved context.
Here is easy and simple way to stop hotlinking :
Open lighttpd.conf file:
$ vi lighttpd.conf
#### stop image hijacking (anti-hotlinking) $HTTP["referer"] =~ ".*BADDOMIN\.com.*" { url.access-deny = ( "" ) # url.access-deny = ( "jpg", "png", "js", "jpeg", "gif" ) }
You can also enforce password protection:
$HTTP["referer"] =~ ".*BADDOMIN\.com.*" { auth.require = ( "/" => ( "method" => "digest", "realm" => "Authorized users only", "require" => "valid-user" ) ) }
Restart lighttpd:
# service lighttpd restart
🐧 Get the latest tutorials on Linux, Open Source & DevOps via:
- RSS feed or Weekly email newsletter
- Share on Twitter • Facebook • 2 comments... add one ↓
Category | List of Unix and Linux commands |
---|---|
File Management | cat |
Firewall | Alpine Awall • CentOS 8 • OpenSUSE • RHEL 8 • Ubuntu 16.04 • Ubuntu 18.04 • Ubuntu 20.04 |
Network Utilities | dig • host • ip • nmap |
OpenVPN | CentOS 7 • CentOS 8 • Debian 10 • Debian 8/9 • Ubuntu 18.04 • Ubuntu 20.04 |
Package Manager | apk • apt |
Processes Management | bg • chroot • cron • disown • fg • jobs • killall • kill • pidof • pstree • pwdx • time |
Searching | grep • whereis • which |
User Information | groups • id • lastcomm • last • lid/libuser-lid • logname • members • users • whoami • who • w |
WireGuard VPN | Alpine • CentOS 8 • Debian 10 • Firewall • Ubuntu 20.04 |
I dont’t understand this line :
url.access-deny = ( “” )
and why the line
# url.access-deny = ( “jpg”, “png”, “js”, “jpeg”, “gif” )
is commented ? does it meen that every file called out of the domain are bloqued ?
Wouldn’t be wiser to block all referrers by default and instead use a white list of those allowed?
$HTTP[“referer”] =~ “*” {
url.access-deny = ( “” )
}
$HTTP[“referer”] =~ “.*GOODDOMIN.com.*” {
url.access-allow = ( “” )
}