CIS525 - Lecture#22 - November 20, 2000
Dr. Maxim will not be lecturing on Wednesday, November 22nd!
Chapters 14 and 15 in Hall assigned as independent reading.
uh-oh, runnin' low on new Dilberts
http Transfer: chap 16
------------------------
1) client opens a socket to http server, (by default port 80)
2) issues command by sending request line - some optional headers and blank line
3) might have server side data following blank line
4) the http server sends response
5) may be some response headers
6) blank line
7) document
8) closes connection
Request methods for http 1.0, Page 877
--------------------------------------
1)GET
i.e.
GET/HTTP/1.0
GET/~jay/app.pdf HTTP/1.0
2)POST
i.e.
POST/CGI-BIN/SEARCH HTTP/1.0
3)HEAD
i.e.
HEAD/reports/notes.html HTTP 1.0
HTTP 1.1:
----------
4) PUT - client request storage of page on server
5) DELETE - client request deletion of page
6) OPTIONS - available communication options URI
7) TRACE - request return attached document with no changes
See the following pages:
--------------------------
Page 880-888 for optional headers
Page 888 for list of http response lines
Page 898 for MIME header options
LabledTextForm.class, (placed in same directory)
See page 900 for more examples
Cookies:
--------
Netscape's specification
http://home.newscape.com/assist/security/faqs/cookies.html
set-cookie: cookie-Name = cookieValue
set-cookie: hit-per-page = 10
OR
set-cookie:hits-per-page = 10;
expires = friday, 01-Jan-199,
00:00:00:.00 gmt;
path=/;
domain = search.service
Page 900-905 ShowCookies.class, chocolate-chip.csh
Privacy and Security:
----------------------
- cookies cannot contain executable code
- can be forced off client by exceeding the limit, (i.e. 21st cookie)
- cookies 'invisible' to user, (you can turn of cookie accept)
Public-key encryption:
----------------------
HTTPS - (secure HTTP), uses secure sockets layer
=> traditional (symmetric) encrytion, (common secret key)
=> two keys, secret key, (known to sender)
public key, (known to everyone)
M = P(Si,(m)) = Si(Pi(m))
to send message only readable by Alice
C = Pa(m) using key only decipherable by Alice
Alice decodes:
M = Sa(C)
digital signature, (to ensure Bob sent the message)
C = Sb(m)
=>by sending C and M to Alice
Alice verifies:
M = Pb(C)
to ensure private two way communication, Bob should:
Ci = Cb(M)
C2 = Pa(C1) = Pa(Sb(m))
=>Alice can:
M = Pb(Sa(C2)) = Pb(sa(pa(Sb(m))))
CHAPTER 17: CGI and Java
---------------------------
1) html form and cgi program
2) Java, (and a cgi program)
http://search.yahoo.com/bin/search?p=cgi+program
See Page 948