Installation guide
Content vulnerabilities
Onlinedigitalcontentcanbecompromisedanumberofways:
• Raiding the browser cache—ough the lenames are not easily read, it is relatively simple to
retrieve video les from the browser cache. is vulnerability is only present with progressive
video delivery; streams are never cached.
• Video URI access—VideoURIscanbeeasilydiscoveredusingfree“snier”utilities.
• SWF le re-serving—Your SWF le can be copied and re-served from another domain. SWF
les can also be decompiled, oen revealing your Flash Media Server address, application, and
stream names.
• Replay technologies—Alsoreferredtoas“streamripping,”thisisthemostinsidiousofsecurity
issues because it is more dicult to prevent. Stream ripping utilities intercept the data stream and
record it to a le that can then be played.
Flash Media Server security architecture
Streaming has a higher level of security than progressive delivery, because media les are never
cached to disk. Flash Media Server further enhances protection against other risks with additional
security features:
• Userauthenticationusingserver-sideActionScript
• Authorizationadaptor
• Accessadaptor
• SWFleverication
• Domainaccesscontrol
• Customsolutionsoeredbycontentdeliverynetworks
• StreamencryptionusingRTMPEorRTMPS
First, we’ll look at the overall Flash Media Server security architecture as shown in the following
gure and then examine each of the protection measures in depth. Regardless of the sensitivity
or ownership of your content, you’ll want to implement some level of security when deploying to
theweb.It’sbesttobeginbysecuringyourserver,andthensecuringyourcontent.
Flash Media Server security architecture
Flash Media Server
Web server
Client
Validated
SWF
RTMP
HTTP
Database Authentication
Stream Encryption
Domain Restriction
SWF Hashing
User Authentication
Dynamic Access Control
Unique key/token handshake
53