CN109543121A - A kind of exterior chain url resource transfer method and device - Google Patents

A kind of exterior chain url resource transfer method and device Download PDF

Info

Publication number
CN109543121A
CN109543121A CN201811333764.7A CN201811333764A CN109543121A CN 109543121 A CN109543121 A CN 109543121A CN 201811333764 A CN201811333764 A CN 201811333764A CN 109543121 A CN109543121 A CN 109543121A
Authority
CN
China
Prior art keywords
exterior chain
chain url
resource transfer
url
exterior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811333764.7A
Other languages
Chinese (zh)
Other versions
CN109543121B (en
Inventor
郭文强
赖燕滨
江灵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wanwu Yunlian Technology Co Ltd
Original Assignee
Shenzhen Wanwu Yunlian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wanwu Yunlian Technology Co Ltd filed Critical Shenzhen Wanwu Yunlian Technology Co Ltd
Priority to CN201811333764.7A priority Critical patent/CN109543121B/en
Publication of CN109543121A publication Critical patent/CN109543121A/en
Application granted granted Critical
Publication of CN109543121B publication Critical patent/CN109543121B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses a kind of exterior chain url resource transfer method, include: the deployment exterior chain url resource transfer proxy server on double stack proxy servers, calls proxy server to obtain HTTP request of the exterior chain url resource transfer service to IPV6 client for request call exterior chain url resource by exterior chain url and carry out revised exterior chain url call request;Proxy server is called to determine the address exterior chain url from the exterior chain url call request by exterior chain url;Proxy server is called to send the HTTP call request to the address the exterior chain url by exterior chain url, so that the exterior chain url resource transfer service calls the exterior chain url resource from double stack proxy servers, the exterior chain url resource for the IPV4 for including in Website page to call proxy server that IPV6 client call can be made to be accessed by exterior chain url, improves the flexibility of exterior chain url resource transfer service system extension.

Description

A kind of exterior chain url resource transfer method and device
Technical field
The present invention relates to Internet technical field more particularly to a kind of exterior chain url resource transfer method and devices.
Background technique
Most of current internet is the IPV4 using 32 bit address.The IP address space deficiency of IPV4 agreement constrains mutually The development of networking.Internet address distributor gear (IANA) is 2 months in 2011 by last 2 of its IPV4 address space section "/8 " group of addresses dispenses.It is " idle in this event flag landing pit registration body (RIR) IP available V4 address space The termination in pond ", China Internet development will be by no available restriction in the address Pv4.It is not only taken at present in China or even world IPV6 Inexorable trend is had become for IPV4.
However, current most of mature applications mainly use IPV4 network, upgrade to IPV6 agreement experience from IPV4 agreement The relatively deficient and larger workload of needs: application provider need to largely modify the code of existing system, relevant to IP address Logical code is all revised as compatible IPV4/IPV6 agreement, and the hardware nets environment upgradings such as server place computer room is needed to support IPV6.Entire work has fast implemented high risk and high investment.With the urgent promotion that country upgrades the IPV6 network rebuilding, A kind of method that IPV4 application quickly can be moved into IPV6 network is needed, so that also accessible IPV4 is abundant by IPV6 user Internet resources, the website IPV4 can first using some transition schemes, compatible IPV6 user and IPV4 user be accessed simultaneously, industry master There is three types of technology route: double-stack technology, tunneling technique, translation technology.Wherein, 1 double-stack technology: double-stack technology requires to be related to Web site traffic interaction types of applications system, the network equipment, Operation Support System hardware and software device simultaneously run IPV4 and Two sets of protocol stacks of IPV6, can handle IPV4 and IPV6 data packet simultaneously.Using double stack routes to IPV6 evolution, website and answer Re-written code is generally required with system, comprising: network communication socket, API, URL, storage organization etc.;2 tunneling techniques: pass through Tunneling technique upgrades website and application system, it is desirable that website and user install the tunnel IPV6 software respectively, user application with IPV4 agreement (private address) and website application communication, and IPV4 message is encapsulated into the tunnel IPV6, network transmission is penetrated, it is typical Technology has Veno, Dslite, GRE etc.;3 translation technologies: translation technology is to dispose IP agreement between IPV6 user and the website IPV4 Conversion equipment establishes the mapping relations of address and port between IPV6/IPV4, to realize that it is mutual that transparent IPV6 and IPV4 exchange visits It is logical.Typical technology has NAT64, IVI, seven layers of reversed proxy server.
Although these three technologies have their own advantages, all have the shortcomings that one it is shared, i.e., can not solve the problems, such as " skylight ".Institute Meaning " skylight " problem refers to, if the website A content page of a support IPV6 agreement, refers to one and do not support IPV6 agreement Website B picture or other resources when, when IPV6 client access website A content when, use the website dns resolution A The address IPV6, and the response page based on IPV6 agreement and A Website server interaction acquirement A, when IPV6 client analyzes the website A When page load needs to go to take the picture or other resources of the website B, the address IPV6 of the same first dns resolution B of meeting, due to B net It stands and does not complete IPV6 transformation, the address IPV6 can not be resolved at this time or access B web failure using IPV6 address protocol. IPV6 client obtains the website B picture or resource failure, and the clients such as browser is caused to occur when showing A Website page The window of blank, referred to as " skylight ".In above-mentioned " skylight " examples of problems, for the originating website A, the net that includes in A It stands the picture of B or other resources url is known as exterior chain url.That is exterior chain url refers to the url of the domain name chain of non-content provider site. As it can be seen that " skylight " problem has seriously affected true customer experience.
For " skylight " problem, following disadvantage is individually present in three of the above technology: 1, double-stack technology is to website and application It unites more demanding, server and upgrading network equipment may be involved, investment is larger and the transformation period is longer, is that one kind is drilled for a long time Into technology, be relatively more suitable for framework and the relatively simple website IPV6 upgrading of business in a short time, large-scale website is often mutual It mutually quotes, one-side upgrading is inevitably present " skylight " problem;2, using tunneling technique, website only needs to increase newly One IPV6 tunnel server, but the corresponding tunnel the IPV6 software of user installation is needed simultaneously, universality and convenience have office Limit, and can not solve the problems, such as " skylight ", so being suitable for the application environment of C/S model or the field of the mountable terminal of user Scape, but unsuitable large scale deployment;3, the NAT64 in translation technology and IVI belongs to network layer translation technology, only at IP layers and transmits Layer converts IPV4/IPV6 message, can not identify application layer content, so can not solve the problems, such as " skylight ".
Based on above-mentioned technology there are the problem of, need a kind of method for solving the problems, such as " skylight " that can be safer at present.
Summary of the invention
There is technical issues that not support IPV6 to access due to exterior chain resource in view of the prior art and " skylight " occur, The embodiment of the invention provides a kind of exterior chain url resource transfer method and devices.
In a first aspect, the embodiment of the present invention provides a kind of exterior chain url resource transfer method, it is applied to double stack agency services Device is deployed with exterior chain url resource transfer proxy server on double stack proxy servers, which comprises
Start the exterior chain url resource transfer service disposed on double stack proxy servers;
It calls proxy server to obtain the exterior chain url resource transfer service by the exterior chain url to be used for IPV6 client The HTTP request of request call exterior chain url resource carries out revised exterior chain url call request;
Proxy server is called to determine the address exterior chain url from the exterior chain url call request by the exterior chain url;
Proxy server is called to send the HTTP call request to the address the exterior chain url by the exterior chain url, so that institute It states exterior chain url resource transfer service and calls the exterior chain url resource from double stack proxy servers.
With reference to first aspect, in the first possible implementation of the first aspect, the starting is in double stack generations Before the exterior chain url resource transfer service disposed on reason server, further includes:
Detection receives the response page content that source station server is sent;
Analyze the response page content whether include exterior chain resource connection string.
The possible implementation of with reference to first aspect the first, in second of possible implementation of first aspect In, if analyzing the connection string that the response page content includes exterior chain resource, start in double stack proxy servers The exterior chain url resource transfer service of upper deployment, it is described to start the exterior chain url resource tune disposed on double stack proxy servers With service, comprising:
The response page content is rewritten with preset connection string rewriting rule, obtains the revised page Response contents, the exterior chain url domain name for enabling the revised page response content to include are resolved to double stack agency clothes Business device;
The revised page response content is transmitted to IPV6 client by the exterior chain url resource transfer proxy server It end can be from when so that the IPV6 client being initiated to include the exterior chain url call request of the revised page response content Dns server gets double stack proxy server addresses, then sends the exterior chain url tune to double stack proxy servers With request, and the exterior chain url resource transfer proxy server is made to obtain the exterior chain url from the exterior chain url call request The relevant information of resource transfer service.
The possible implementation of second with reference to first aspect, in the third possible implementation of first aspect In, the relevant information, including exterior chain domain-name information and encryption information, signature hash operations result.
The third possible implementation with reference to first aspect, in the 4th kind of possible implementation of first aspect In, it is described that the response page content is rewritten with preset connection string rewriting rule, obtain the revised page Response contents, comprising:
By the exterior chain url resource transfer proxy server according to default hash rule, by the word comprising exterior chain domain-name information Symbol string and privately owned character string building hash input character string, and default hashing algorithm fortune is carried out to hash input character string It calculates, obtains signature hash operations as a result, outer to include in the response page content in conjunction with the signature hash operations result The connection string of chain url resource is rewritten.
The 4th kind of possible implementation with reference to first aspect, in the 5th kind of possible implementation of first aspect In, it is described to call proxy server to determine the address exterior chain url from the exterior chain url call request by the exterior chain url, comprising:
The encryption information of the exterior chain url resource transfer service, root are obtained by the exterior chain url resource transfer proxy server It is decrypted according to the predetermined encryption rule, restores the address exterior chain url;With or
The exterior chain for including in the exterior chain url call request is obtained by the exterior chain url resource transfer proxy server Domain-name information and signature hash operations result;
The hash is obtained according to the exterior chain domain-name information by the exterior chain url resource transfer proxy server and inputs character String;
By the exterior chain url resource transfer proxy server, character string is inputted according to the hash and the default hash is calculated Method operation obtains verification hash operations result;
By the exterior chain url call request resource transfer proxy server, by the verification hash operations result and the label Name hash operations result is compared;
If consistent, receive the exterior chain url call request, and is parsed outside from the exterior chain url call request The address chain url;Otherwise, refuse the exterior chain url call request.
Second aspect, the embodiment of the present invention provide a kind of exterior chain url resource transfer device, are applied to double stack agency services Device, the system deployment is on double stack proxy servers, including start unit and exterior chain url resource transfer proxy server, in which:
The start unit, for starting the exterior chain url resource transfer service disposed on double stack proxy servers;
The exterior chain url resource transfer proxy server, specifically includes:
Request unit, for calling proxy server to obtain the exterior chain url resource transfer service by the exterior chain url HTTP request to IPV6 client for request call exterior chain url resource carries out revised exterior chain url call request;
Address determination unit, for calling proxy server to determine from the exterior chain url call request by the exterior chain url The address exterior chain url;
Request transmitting unit, for calling proxy server to described in the transmission of the address the exterior chain url by the exterior chain url HTTP call request, so that the exterior chain url resource transfer service calls the exterior chain url from double stack proxy servers Resource.
In conjunction with second aspect, in the first possible implementation of the second aspect, further includes:
Monitoring unit, for detecting the response page content for receiving source station server and sending;
Analytical unit, for analyze the response page content whether include exterior chain resource connection string.
In conjunction with the first possible implementation of second aspect, in second of possible implementation of second aspect In, the start unit, comprising:
Subelement is rewritten, for being rewritten with preset connection string rewriting rule to the response page content, Revised page response content is obtained, the exterior chain url domain name for enabling the revised page response content to include parses To double stack proxy servers;
Subelement is forwarded, being used for will be in the revised page response by the exterior chain url resource transfer proxy server Appearance is transmitted to IPV6 client, so that the IPV6 client initiates the exterior chain comprising the revised page response content When url call request, double stack proxy server addresses can be got from dns server, then to double stack agency services Device sends the exterior chain url call request, and the exterior chain url resource transfer proxy server is asked from exterior chain url calling Seek the middle relevant information for obtaining the exterior chain url resource transfer service.
In conjunction with second of possible implementation of second aspect, in the third possible implementation of second aspect In, the rewriting subelement is specifically used for: by the exterior chain url resource transfer proxy server according to default hash rule, by wrapping The character string of the domain-name information containing exterior chain and privately owned character string building hash input character string, and to the hash input character string into The default hashing algorithm operation of row obtains signature hash operations as a result, in conjunction with the signature hash operations result to the response page The connection string for the exterior chain url resource for including in the content of face is rewritten, and revised page response content is obtained, so that institute Double stack proxy servers can be resolved to and include the label by stating the exterior chain url domain name that revised page response content includes Name hash operations result;
The forwarding subelement, is specifically used for: by the exterior chain url resource transfer proxy server by the revised page Face response contents are transmitted to IPV6 client, so that the IPV6 client is initiated to include the revised page response content Exterior chain url call request when, double stack proxy server addresses can be got from dns server, then to double stack generations It manages server and sends the exterior chain url call request, and make the exterior chain url resource transfer proxy server from the exterior chain url The exterior chain domain-name information and encryption information, signature hash operations knot of the exterior chain url resource transfer service are obtained in call request Fruit;
The address determination unit, is specifically used for:
The encryption information of the exterior chain url resource transfer service, root are obtained by the exterior chain url resource transfer proxy server It is decrypted according to the predetermined encryption rule, restores the address exterior chain url;With or
The exterior chain for including in the exterior chain url call request is obtained by the exterior chain url resource transfer proxy server Domain-name information and signature hash operations result;
The hash is obtained according to the exterior chain domain-name information by the exterior chain url resource transfer proxy server and inputs character String;
By the exterior chain url resource transfer proxy server, character string is inputted according to the hash and the default hash is calculated Method operation obtains verification hash operations result;
By the exterior chain url call request resource transfer proxy server, by the verification hash operations result and the label Name hash operations result is compared;
If consistent, receive the exterior chain url call request, and is parsed outside from the exterior chain url call request The address chain url;Otherwise, refuse the exterior chain url call request.
The third aspect, the embodiment of the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, It is characterized in that, realizing first aspect into the 6th kind of possible implementation of first aspect when the program is executed by processor Described in any item steps.
Fourth aspect, the embodiment of the present invention provide a kind of computer equipment, including memory, processor and are stored in storage On device and the computer program that can run on a processor, the processor realize first aspect to first when executing described program Step described in any one of the 6th kind of possible implementation of aspect.
One or more technical solution provided in an embodiment of the present invention, at least realizes following technical effect or excellent Point:
Due to disposing exterior chain url resource transfer generation on the double stack proxy servers for providing exterior chain url resource transfer service Device is managed, therefore, calls proxy server to obtain the exterior chain url resource transfer service by the exterior chain url and IPV6 client is used Revised exterior chain url call request is carried out in the HTTP request of request call exterior chain url resource;Pass through the exterior chain url tune The address exterior chain url is determined from the exterior chain url call request with proxy server;Call proxy server to institute by the exterior chain url It states the address exterior chain url and sends the HTTP call request, so that the exterior chain url resource transfer service takes from double stack agencies The exterior chain url resource is called on business device, to call proxy server that IPV6 client call can be made to be accessed by exterior chain url Website page in include IPV4 exterior chain url resource, not only solve due to IPV6 and IPV4 agreement it is incompatible caused by " skylight " problem, and improve the flexibility of exterior chain url resource transfer service system extension.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of exterior chain url resource transfer method provided in an embodiment of the present invention;
Fig. 2 is the Program modual graph of exterior chain url resource transfer device provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of computer readable storage medium provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of computer equipment provided in an embodiment of the present invention.
Specific embodiment
In view of the technical problem that the prior art is larger there are the complexity of exterior chain url resource transfer service, the present invention is implemented Example provides a kind of exterior chain url resource transfer method and device, and general thought is as follows:
Exterior chain url is disposed on double stack proxy servers and calls proxy server, calls proxy server to obtain by the exterior chain url HTTP request of the exterior chain url resource transfer service to IPV6 client for request call exterior chain url resource is rewritten Exterior chain url call request afterwards;Proxy server is called to determine exterior chain from the exterior chain url call request by the exterior chain url The address url;Proxy server is called to send the HTTP call request to the address the exterior chain url by the exterior chain url, so that institute It states exterior chain url resource transfer service and calls the exterior chain url resource from double stack proxy servers, to pass through exterior chain The exterior chain url resource for the IPV4 for including in the Website page that url calls proxy server that IPV6 client call can be made to be accessed.
Through the above technical solutions, call proxy server due to only disposing exterior chain url on double stack proxy servers, i.e., it is reachable Support the website A content page of IPV6 agreement to one, the picture for the website B that IPV6 agreement is not supported in reference one or other The purpose of resource not only solves the problems, such as since IPV6 and IPV4 agreement are incompatible caused " skylight ", and improves exterior chain The flexibility of url resource transfer service system extension.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The embodiment of the present invention is applied to exterior chain url resource transfer service system, including IPV6 client, dns server, double Stack proxy server, source station server, the website exterior chain url are deployed with exterior chain url resource transfer agency on double stack proxy servers Device.Wherein, IPV6 client be using the client of IPV6 address machine, include browser or APP software etc., can be to website Initiate the HTTP request based on IPV6 agreement in content service end.Double stack proxy servers be possess simultaneously the address IPV6 and IPV4 and The machine of protocol handling capability is deployed among client and source station server-side and plays the part of proxy role, installs seven layer proxy services Software can be communicated with the both ends of agency using the IP agreement that opposite end is supported.Source station server is web site contents server, Content service response is provided, supported IP address agreement and double stack agency service end communications can be used.
Exterior chain url resource transfer system is applied to IPV6 client and accesses the originating website A, includes the website exterior chain url in A The scene of resource (including picture or other resources), it is the website www.aa.com, request that IPV6 client, which accesses the originating website A, The http://www.aa.com/ page contains client loading page in response contents and needs the exterior chain url for continuing request to be http://bbb.bb.com/1.jpg.Wherein, exterior chain website bbb.bb.com only supports IPV4 agreement.
Specifically, request response interactive process are as follows:
1, IPV6 client access the http://www.aa.com/ page, the dns resolution address www.aa.com IPV6 to pair On stack proxy server, IPV6 client sends request http to double stack proxy servers by IPV6 agreement: // www.aa.com/。
2, after double stack proxy servers receive request, then the server for requesting go back to the place www.aa.com source station is forwarded.
3, the source station www.aa.com server is rung after receiving pair request of stack agency services to the return of double stack proxy servers Answer the content http://www.aa.com/ page.
4, after double stack proxy servers receive the response of the source station www.aa.com server, whether analysis response page content Connection string comprising exterior chain resource, such as http://bbb.bb.com/1.jpg, then the response for modifying source station server is Wherein yy.xx is the domain name that can parse the address IPV6 to http://bbb.bb.zz.yy.xx/1.jpg, can be general domain name Aa.com or other domain names.Zz can be the code name character string of com or com, facilitate the true url processing of sequential reduction.
5, after double stack proxy servers rewrite exterior chain resource, revised page response content is sent to IPV6 client End.
6, IPV6 client receives the http://www.aa.com/ page response that double stack agencies send, and analyzes displayed page Also need load exterior chain resource http://bbb.bb.zz.yy.xx/1.jpg.
7, IPV6 client is to the address IPV6 of dns server request analysis bbb.bb.zz.yy.xx, due to general domain name .yy.xx IPV6 address resolution is supported, and parsing address is double stack proxy servers place, IPV6 client is acted on behalf of to double stacks and taken Device be engaged in based on the transmission http://bbb.bb.zz.yy.xx/1.jpg request of IPV6 agreement.
8, double stack proxy servers receive http://bbb.bb.zz.yy.xx/1.jpg request, identify zz.yy.xx character The exterior chain url of string, removes yy.xx information, and reduction zz is com, preparation request exterior chain resource http://bbb.bb.com/ 1.jpg。
9, it when double stack proxy server preparation request http://bbb.bb.com/1.jpg, is first parsed to dns server The source station address IPV4 of bbb.bb.com, the response by IPV4 agreement to the source station bbb.bb.com request exterior chain resource, and After obtaining response, IPV6 client is given by IPV6 protocol forward exterior chain resource response.
10, IPV6 client obtains normal load exterior chain resource after exterior chain resource response (including picture or other moneys Source), without " skylight " problem.
Based on the same inventive concept, the embodiment of the present invention provides a kind of exterior chain url resource transfer method, is applied to double stack generations Server is managed, exterior chain url resource transfer proxy server is deployed on double stack proxy servers, refering to what is shown in Fig. 1, the present invention is implemented A kind of exterior chain url resource transfer method that example provides, includes the following steps:
Firstly, executing step S101: the exterior chain url resource transfer service that starting is disposed on double stack proxy servers.
Specifically, starting on double stack proxy servers to realize that exterior chain url resource transfer proxy server can be identified Exterior chain url resource transfer services corresponding response contents, if the connection string comprising exterior chain resource, if provided comprising exterior chain The connection string in source then starts the exterior chain url resource transfer service disposed on double stack proxy servers.
Specifically, specifically comprise the following steps S1011~S1013 in step S101:
Execute step S1011: detection receives the response page content that source station server is sent.
Specifically, the response page content sent to the source station server that double stack proxy servers receive is monitored.
It should be noted that IPV6 client accesses the http://www.aa.com/ page, dns resolution www.aa.com On the address IPV6 to double stack proxy servers, IPV6 client sends HTTP request to double stack proxy servers by IPV6 agreement http://www.aa.com/;After double stack proxy servers receive request, then request http://www.aa.com/ is forwarded to return The server of source station where www.aa.com;It is backward that the source station www.aa.com server receives http://www.aa.com/ request Double stack proxy server returning response contents.Therefore in the response page that double stack proxy servers can send source station server Appearance is detected.
In embodiment, it after step S1011, needs to analyze response page by exterior chain url resource transfer proxy server Content whether include unfinished IPV6 transformation exterior chain resource, specific implementation process is step S1012: analyzing the response page Content whether include exterior chain resource connection string.
It should be noted that after double stack proxy servers receive the response of the source station www.aa.com server, analysis response Whether content of pages includes that the connection string of exterior chain resource then modifies source station service such as http://bbb.bb.com/1.jpg The response of device is that wherein yy.xx is the domain name that can parse the address IPV6 to http://bbb.bb.zz.yy.xx/1.jpg, can be with For general domain name aa.com or other domain names.Zz can be the code name character string of com or com, facilitate the true url of sequential reduction Processing.
In embodiment, after step S1012, if response page content includes not complete the exterior chain money of IPV6 transformation Source then starts exterior chain url resource transfer service, otherwise the problem incompatible there is no network protocol, also just without starting exterior chain Url resource transfer service, specific implementation process are step S1013: if analyzing the response page content includes exterior chain resource Connection string then starts the exterior chain url resource transfer service disposed on double stack proxy servers.
Specifically, after double stack proxy servers receive the response of the source station www.aa.com server, analysis response contents are The no connection string comprising exterior chain resource, such as connection string comprising exterior chain resource, such as http://bbb.bb.com/ 1.jpg then starts the exterior chain url resource transfer service disposed on double stack proxy servers.
In step S1013, start the exterior chain url resource transfer service disposed on double stack proxy servers, specifically Include the following steps S10131~S10132:
Step S10131: rewriting the response page content with preset connection string rewriting rule, obtains Revised page response content, the exterior chain url domain name for enabling the revised page response content to include are resolved to institute State double stack proxy servers.
In specific implementation process, there are following several optional embodiments:
A1, by the exterior chain url resource transfer proxy server according to default rewriting rule, by including exterior chain domain-name information Character string constructs special string, changes to the connection string for the exterior chain url resource for including in the response page content It writes.
Specifically, being rewritten for the web site contents comprising exterior chain resource to exterior chain resource: with the website www.aa.com For, the http://www.aa.com/ page is requested, client loading page is contained in response contents and needs to continue request Exterior chain resource: http://bbb.bb.com/1.jpg.If the general domain name of aa.com completes IPV6 transformation, and bbb.bb.com is not IPV6 transformation is completed, the skylight problem of http://www.aa.com/ page presentation will be caused, traditional solution skylight is asked thus The scheme of topic is that exterior chain resource http://bbb.bb.com/1.jpg in the page is rewritten as http: // Bbb.bb.com.yy.xx/1.jpg, wherein yy.xx is the code name referred to, yy.xx be one with can parsing IPV6 The domain name of location can be the aa.com or other domain names for having completed IPV6 transformation.Some modes may change .com into Other characters, after rewriting exterior chain be http://bbb.bb.zz.yy.xx/1.jpg, for be isolated original exterior chain domain-name information and New domain name yy.xx, convenient double stacks act on behalf of the real URL of sequential reduction exterior chain, and http://bbb.bb.com/1.jpg is simultaneously requested.
A2, by the exterior chain url resource transfer proxy server according to predetermined encryption rule, by including exterior chain domain-name information Character string and privately owned code key building encrypted input word symbol string, and string is accorded with to the encrypted input word and carries out cryptographic calculation, added Close operation result rewrites the connection string for the exterior chain url resource for including in the response page content.
Specifically, for example, exterior chain resource http://bbb.bb.com/1.jpg in the page is rewritten as http: // The character string forms of AAAAAAAA.yy.xx/1.jpg, wherein yy.xx is that can parse double stack proxy server addresses Domain name can be general domain name aa.com or other domain names.And AAAAAAAA is then the generation of a string of encrypted special strings Refer to, the encrypted characters string create-rule are as follows: defeated by character string (the being assumed to be bbb.bb.com) building one comprising outer chain information Enter character string, for the private cipher key that input character string and only double stack proxy servers are held, according to certain Encryption Algorithm into Row cryptographic calculation, cryptographic calculation result are AAAAAAAA (not necessarily 8 characters).The private cipher key is only acted on behalf of by double stacks and is taken Business has supported, and does not announce externally.Encrypted input word symbol string can also contain other than it may include exterior chain domain-name information comprising other The character string of justice.Exterior chain resource url includes format sample belonging to domain name is unlimited after rewriting, or A-A-A-A-A- The formats such as A.yy.xx, but generally containing can be according to the information of certain rule reduction actual encryption result string AAAAAAAA With the domain name yy.xx information etc. that can be resolved to double stack proxy server addresses.
Cryptographic calculation result is cracked in order to prevent, and the character string comprising outer chain information can also be used to carry out hash fortune It calculates, as described below:
A3, by the exterior chain url resource transfer proxy server according to predetermined encryption rule, by including exterior chain domain-name information Character string and privately owned code key building encrypted input word symbol string, and string is accorded with to the encrypted input word and carries out cryptographic calculation, added Close operation result rewrites the connection string for the exterior chain url resource for including in the response page content;And pass through The exterior chain url resource transfer proxy server is according to default hash rule, by the character string comprising exterior chain domain-name information and privately owned word Symbol string building hash input character string, and default hashing algorithm operation is carried out to hash input character string, it obtains signature and dissipates Column operations is as a result, in conjunction with the company of the hash operations result to the exterior chain url resource for including in the response page content of signing Character string is connect to be rewritten.
Specifically, for example, exterior chain resource http://bbb.bb.com/1.jpg in the page is rewritten as http: // The string format of AAAAAAAABBBB.yy.xx/1.jpg, wherein yy.xx is the domain name that can parse the address IPV6, Ke Yiwei General domain name aa.com or other domain names.And in the generation that AAAAAAAABBBB is then a string of encrypted special strings, refers to, should add Close text string generation rule are as follows: an input character is constructed by the character string (being assumed to be bbb.bb.com) comprising outer chain information String is encrypted for the private cipher key that input character string and only pair stack proxy server are held according to certain Encryption Algorithm Operation, cryptographic calculation result are AAAAAAAA (not necessarily 8 characters), and cryptographic calculation result is cracked in order to prevent, may be used also To use the character string comprising exterior chain domain-name information, splice the privately owned key character string that a double stack proxy servers are just held, structure Input character string is built, a kind of hashing algorithm (such as MD5 value) is then selected to carry out hash operations, hashed result is extracted into fixed position Character string BBBB splicing is after AAAAAAAA is gone here and there in encryption.The character string comprising exterior chain domain-name information is that any carrying can be released Justice is the character string of bbb.bb.com domain name, can be bbb.bb.com.yy.xx or bbb--bb--com.yy.xx, bbb-- Bb--zz.yy.xx, bbb.bb.com, bbb--bb--com, bbb.bb.zz etc. but be not limited to above-mentioned character string);It is described BBBB hash character string not necessarily only refers to four characters, or the character of other digits in addition in the program, hashes character It goes here and there nonessential scheme, encipherment scheme can also be used only, Hash scheme can be used as encipherment scheme supplement.The privately owned key word Symbol string and private cipher key have been supported by double stack agency services, are not announced externally.Encryption or hash input character string are in addition to can Comprising the character string of other meanings can also be included outside privately owned key, exterior chain domain-name information.Exterior chain resource url includes after rewriting Format sample belonging to domain name is unlimited, or the formats such as A-A-A-A-A-A-B-B-B.yy.xx, but generally containing can be with According to the information of certain rule reduction actual encryption result string AAAAAAAA or hashed result string BBBB and double stacks can be resolved to Domain name yy.xx information of proxy server address etc..
In embodiment, it after step S10131, executes step S10132: passing through the exterior chain url resource transfer generation It manages device and the revised page response content is transmitted to IPV6 client, so that the IPV6 client is initiated comprising described When the exterior chain url call request of revised page response content, double stack proxy servers can be got from dns server Address, then the exterior chain url call request is sent to double stack proxy servers, and make the exterior chain url resource transfer Proxy server obtains the relevant information of the exterior chain url resource transfer service from the exterior chain url call request.
In specific implementation, there are following several optional implementations:
B1, the revised page response content is transmitted to by IPV6 by the exterior chain url resource transfer proxy server Client, when so that the IPV6 client being initiated to include the exterior chain url call request of the revised page response content, Double stack proxy server addresses can be got from dns server, then send the exterior chain to double stack proxy servers Url call request, and it is described outer that the exterior chain url resource transfer proxy server is obtained from the exterior chain url call request The exterior chain domain-name information of chain url resource transfer service.
For example, as shown in above-described embodiment A1, by the connection string http://bbb.bb.com/ of exterior chain resource 1.jpg, being revised as http://bbb.bb.zz.yy.xx/1.jpg, wherein yy.xx is the ground that can parse double stack proxy servers Location information, bbb.bb are exterior chain url domain-name information.Zz can be the code name character string of com or com, facilitate sequential reduction true Real url processing.
B2, the revised page response content is transmitted to by IPV6 by the exterior chain url resource transfer proxy server Client, when so that the IPV6 client being initiated to include the exterior chain url call request of the revised page response content, Double stack proxy server addresses can be got from dns server, then send the exterior chain to double stack proxy servers Url call request, and it is described outer that the exterior chain url resource transfer proxy server is obtained from the exterior chain url call request The exterior chain domain-name information and encryption information of chain url resource transfer service.
For example, as shown in above-described embodiment A2, exterior chain resource http://bbb.bb.com/1.jpg in the page is changed The character string forms of http://AAAAAAAA.yy.xx/1.jpg are written as, wherein yy.xx is that can parse double stack proxy servers The domain name of address can be general domain name aa.com or other domain names.And AAAAAAAA is then (false comprising exterior chain domain-name information It is set as bbb.bb.com) encrypted special string, exterior chain url domain-name information can be parsed.
B3, the revised page response content is transmitted to by IPV6 by the exterior chain url resource transfer proxy server Client, when so that the IPV6 client being initiated to include the exterior chain url call request of the revised page response content, Double stack proxy server addresses can be got from dns server, then send the exterior chain to double stack proxy servers Url call request, and it is described outer that the exterior chain url resource transfer proxy server is obtained from the exterior chain url call request The exterior chain domain-name information and encryption information of chain url resource transfer service, and signature hash operations result.
For example, as shown in above-described embodiment A3, by the connection string http://bbb.bb.com/ of exterior chain resource 1.jpg replaces with the character string shaped like format http://AAAAAAAABBBB.yy.xx/1.jpg, and wherein yy.xx is that can parse The address information of double stack proxy servers out can be general domain name aa.com or other domain names.And AAAAAAAABBBB is then A string of encrypted special strings, AAAAAAAA are the encrypted characters string that can parse exterior chain url domain-name information.BBBB is packet The character string of the hash operations result containing signature.
After step slol, it then executes step S102: calling proxy server to obtain the exterior chain by the exterior chain url HTTP request of the url resource transfer service to IPV6 client for request call exterior chain url resource carries out revised exterior chain Url call request.
For example, after double stack proxy servers rewrite exterior chain resource, revised page response content is sent to IPV6 client;IPV6 client receives the http://www.aa.com/ page response that double stack agencies send, and analysis shows page Face also needs load exterior chain resource http://bbb.bb.zz.yy.xx/1.jpg;IPV6 client is to dns server request analysis The address IPV6 of bbb.bb.zz.yy.xx, since general domain name .yy.xx supports IPV6 address resolution, and parsing address is double stack generations Where managing server, IPV6 client is based on IPV6 agreement to double stack proxy servers and sends http: // Bbb.bb.zz.yy.xx/1.jpg request.
After step s 102, it then executes step S103: calling proxy server from the exterior chain by the exterior chain url The address exterior chain url is determined in url call request.
It should be noted that for rewriting rule different in step S10131, the specific executive mode of step S103 also has Institute is different.In above-mentioned A1 implementation, step S103 is specifically included: according to step from the exterior chain url call request Preset rewriting rule, which carries out corresponding reduction, in 1013 can parse the address exterior chain url.
Specifically, double stack proxy servers receive http://bbb.bb.zz.yy.xx/1.jpg request, identification The exterior chain url of zz.yy.xx character string removes yy.xx information, and reduction zz is com, preparation request exterior chain resource http: // bbb.bb.com/1.jpg.Wherein zz effect is only to distinguish whether one of exterior chain resource identifies, and is then wanted if it is exterior chain resource It removes yy.xx suffix and restores true url, otherwise do not have to removal yy.xx suffix reduction.It the use of zz code name can be original in yy.xx When beginning website domain name aa.com, effectively distinguishing http://bbb.bb.zz.aa.com/1.jpg is that an exterior chain resource needs are gone Except aa.com, rather than the resource of the website aa.com itself, if otherwise there is the non-exterior chain resource http of an aa.com itself: // Ccc.cc.c.aa.com/ is also taken as exterior chain resource to remove aa.com, and forwarding will malfunction when requesting access to.
It should be noted that other websites http://ddd.dd.com/ for not supporting IPV6 agreement, (website can Can be a malicious site) if having malicious user that website www.aa.com is transformed from IPV6 analyzes above-mentioned rewriting rule, mould Intend improved exterior chain http://bbb.bb.zz.yy.xx/url format, directly inputs http in IPV6 client: // Ddd.dd.zz.yy.xx/ accesses.At this time IPV6 client to dns server parsing yy.xx the address IPV6 to for Www.aa.com carries out double stack proxy servers of IPV6 transformation, and double stack agency services are by the resource identification shaped like .zz.yy.xx For exterior chain, then restores http://ddd.dd.com/ and then initiate request to source station where ddd.dd.com, accordingly even when Ddd.dd.com does not complete IPV6 transformation, and malicious user can be used as springboard machine by above-mentioned double stack agencies in IPV6 client Successful access is carried out to the website ddd.dd.com.Above-mentioned original double stack generations that IPV6 skylight problem is transformed for website www.aa.com The springboard of any malicious access under IPV6 environment can be taken as because of the rewrite mechanism loophole of " skylight " problem by managing server Machine not only wastes machine processing resource, but also is related to auxiliary sensitive message reference, it is clear that not to be happy to see.
Based on above-mentioned problem, in above-mentioned A2 implementation, a kind of solution " skylight " that can be safer is proposed Problem method: a kind of rewriting rule system based on encryption, therefore in above-mentioned A2 implementation, step S103 is specifically included: The encryption information that the exterior chain url resource transfer service is obtained by the exterior chain url resource transfer proxy server, according to described pre- If encryption rule is decrypted, the address exterior chain url is restored.
Specifically, if step S1013 process does not include hashing algorithm operational character string BBBB, double stack proxy servers Receive http://AAAAAAAA.yy.xx/1.jpg request, then directly according to decrypted result after, use fixed encryption to restore rule It then restores http://bbb.bb.com/1.jpg to continue to request exterior chain resource, the exterior chain resource response forwarding that finally will acquire Give IPV6 client.
Cryptographic calculation result is cracked in order to prevent, in above-mentioned A3 implementation, proposes a kind of solution that can be safer Certainly " skylight " problem method: a kind of rewriting rule system based on encryption and signature, therefore it is directed to above-mentioned A3 implementation, step S103 specifically comprises the following steps S1031~S1036:
Firstly, executing step S1031, obtaining the exterior chain url resource tune by the exterior chain url resource transfer proxy server It with the encryption information of service, is decrypted according to the predetermined encryption rule, restores the address exterior chain url;
Step S1032, it is obtained in the exterior chain url call request by the exterior chain url resource transfer proxy server and includes The exterior chain domain-name information and signature hash operations result;
Step S1033, by the exterior chain url resource transfer proxy server according to the exterior chain domain-name information and described default Hash rule obtains the hash and inputs character string;
Step S1034, by the exterior chain url resource transfer proxy server, character string and described is inputted according to the hash Default hashing algorithm operation obtains verification hash operations result;
Step S1035, by the exterior chain url call request resource transfer proxy server, by the verification hash operations knot Fruit is compared with the signature hash operations result;
If step S1036, consistent, receive the exterior chain url call request, and solve from the exterior chain url call request The address exterior chain url is precipitated;Otherwise, refuse the exterior chain url call request.
Specifically, double stack proxy servers receive if step S1013 process has comprising hashing algorithm operational character string BBBB Http:// AAAAAAAABBBB.yy.xx/1.jpg request after then restoring decrypted result, is dissipated according to step S10131 is preset Regular (only double stack proxy servers are held) is arranged, first obtains and splices hash input character string in step S10131, use step The hashing algorithm of rapid S10131 calculates hashed result, and extraction step S10131 corresponds to the hashed result of digit, by the result It is compared with BBBB character string, allows the request if consistent, and restoring exterior chain url is http://bbb.bb.com/ 1.jpg continues to request exterior chain resource, and the exterior chain resource response that finally will acquire is transmitted to IPV6 client, if inconsistent, explanation This is the malicious access that simulation " skylight " rewriting rule generates, and directly breaks off relations this and requests access to.It is advantageous that: malice is visited Even if asking that user can simulate the url request of http://ZZZZZZZZZ.yy.xx/1.jpg format, but due to no privately owned close Key value, double stack proxy servers can not be decrypted or decrypted result is not a domain name, and malicious access will will fail.If existing simultaneously In the case where increasing hash operations, hashed value also can not be forged arbitrarily, by can not obtain double stack servers held it is privately owned The digit for being originally inputted result after character string and hash and extracting of key, specific hashing algorithm and hash operations, malicious user Can not puppet produce accurate hashed result signature value, access verification is unsuccessfully rejected.Double stack proxy servers are solved with this to be worked as Make the springboard machine problem of malicious user.
After step s 103, it then executes step S104: calling proxy server to the exterior chain by the exterior chain url The address url sends the HTTP call request, so that the exterior chain url resource transfer service is from double stack proxy servers Call the exterior chain url resource.
Specifically, when double stack proxy server preparation request http://bbb.bb.com/1.jpg, first to dns server The source station address IPV4 for parsing bbb.bb.com requests the response of exterior chain resource by IPV4 agreement to the source station bbb.bb.com, And after obtaining response, IPV6 client is given by IPV6 protocol forward exterior chain resource response.
IPV6 client obtains normal load exterior chain picture after exterior chain resource response, without " skylight " problem.
In the specific implementation process, exterior chain url resource transfer method provided in an embodiment of the present invention can be applied to IPV6 Include the situation of exterior chain IPV4 site resource in client accession page, is below www.aa.com with IPV6 transformation website, outside Chain resource url be http://bbb.bb.com/1.jpg, using the embodiment of the present invention provide exterior chain url resource transfer method into Row exterior chain resource transfer is illustrated, and specific implementation step is as follows:
1, IPV6 client access the http://www.aa.com/ page, the dns resolution address www.aa.com IPV6 to pair On stack proxy server, IPV6 client sends HTTP request http to double stack proxy servers by IPV6 agreement: // www.aa.com/
2, after double stack proxy servers receive request, then request http://www.aa.com/ is forwarded to go back to www.aa.com institute Server in source station.
3, the source station www.aa.com server returns after receiving http://www.aa.com/ request to double stack proxy servers Return response contents
4, after double stack proxy servers receive the response of the source station www.aa.com server, analysis response contents whether include The connection string of exterior chain resource then modifies the response contents of source station server such as http://bbb.bb.com/1.jpg, will Http:// bbb.bb.com/1.jpg replaces with the character string shaped like format http://AAAAAAAABBBB.yy.xx/1.jpg, Wherein yy.xx is the domain name that can parse the address IPV6, can be general domain name aa.com or other domain names, AAAAAAAABBBB It is then a string of encrypted special strings.
5, revised http://www.aa.com/ page response is passed through IPV6 protocol forward by double stack proxy servers Give IPV6 client.
6, IPV6 client receives the revised http://www.aa.com/ page response that double stack agencies send, IPV6 Client load response page when, discovery also need request http://AAAAAAAABBBB.yy.xx/1.jpg (as previously mentioned, this Locate merely illustrative without limiting to this url format)
7, IPV6 client is to the address IPV6 of dns server request analysis domain name AAAAAAAABBBB.yy.xx, due to General domain name .yy.xx supports IPV6 address resolution, and parsing address is double stack proxy server addresses, IPV6 client to Double stack proxy servers are based on IPV6 agreement and send http://AAAAAAAABBBB.yy.xx/1.jpg (as previously mentioned, herein only It is example without limiting to this url format).
8, double stack proxy servers receive http://AAAAAAAABBBB.yy.xx/1.jpg request, extract AAAAAAAA Character string is simultaneously decrypted according to the private cipher key held, and the result bbb.bb.com after restoring decryption, detailed process is as follows:
If a, step 4 process does not include hashing algorithm operational character string BBBB, directly according to decrypted result after, use Fixed also meta-rule restores http://bbb.bb.com/1.jpg and continues to request exterior chain resource, the exterior chain that finally will acquire Resource response is transmitted to IPV6 client;
If b, step 4 process has comprising hashing algorithm operational character string BBBB, after restoring decrypted result, according to step 4 hash is regular (only double stack proxy servers are held), first obtains and splices hash input character string in step 4, use step Rapid 4 hashing algorithm calculates hashed result, and the hashed result of the corresponding digit of extraction step 4, by the result and BBBB character String is compared, and allows the request if consistent, and restoring exterior chain url is http://bbb.bb.com/1.jpg, continues to request Exterior chain resource, the exterior chain resource response that finally will acquire is transmitted to IPV6 client, if inconsistent, illustrates that this is a simulation The malicious access that " skylight " rewriting rule generates, directly refuses this and requests access to.
Based on the same inventive concept, the embodiment of the present invention provides a kind of exterior chain url resource transfer device, refering to what is shown in Fig. 2, Applied to double stack proxy servers, the system deployment is on double stack proxy servers, including start unit 201 and exterior chain url Resource transfer proxy server 202, in which:
The start unit 201, for starting the exterior chain url resource transfer disposed on double stack proxy servers clothes Business;
The exterior chain url resource transfer proxy server 202, specifically includes:
Request unit 2021, for calling proxy server to obtain the exterior chain url resource transfer by the exterior chain url It services the HTTP request to IPV6 client for request call exterior chain url resource and carries out revised exterior chain url call request,
Address determination unit 2022, for calling proxy server from the exterior chain url call request by the exterior chain url Determine the address exterior chain url;
Request transmitting unit 2023, for calling proxy server to send institute to the address the exterior chain url by the exterior chain url HTTP call request is stated, so that the exterior chain url resource transfer service calls the exterior chain from double stack proxy servers Url resource.
In one embodiment, further includes:
Monitoring unit, for detecting the response page content for receiving source station server and sending;
Analytical unit, for analyze the response page content whether include exterior chain resource connection string.
In one embodiment, the start unit 201, comprising:
Subelement is rewritten, for being rewritten with preset connection string rewriting rule to the response page content, Revised page response content is obtained, the exterior chain url domain name for enabling the revised page response content to include parses To double stack proxy servers;
Subelement is forwarded, being used for will be in the revised page response by the exterior chain url resource transfer proxy server Appearance is transmitted to IPV6 client, so that the IPV6 client initiates the exterior chain comprising the revised page response content When url call request, double stack proxy server addresses can be got from dns server, then to double stack agency services Device sends the exterior chain url call request, and the exterior chain url resource transfer proxy server is asked from exterior chain url calling Seek the middle relevant information for obtaining the exterior chain url resource transfer service.
In one embodiment, the rewriting subelement, is specifically used for: passing through the exterior chain url resource transfer proxy server It according to predetermined encryption rule, is gone here and there by the character string comprising exterior chain domain-name information and privately owned code key building encrypted input word symbol, and right The encrypted input word symbol string carries out cryptographic calculation, obtains cryptographic calculation as a result, outer to include in the response page content The connection string of chain url resource is rewritten;With or by the exterior chain url resource transfer proxy server according to default hash Rule inputs character string by the character string comprising exterior chain domain-name information and privately owned character string building hash, and defeated to the hash Enter character string and carry out default hashing algorithm operation, obtains signature hash operations as a result, in conjunction with the signature hash operations result pair The connection string for the exterior chain url resource for including in the response page content is rewritten, and revised page response is obtained Content, the exterior chain url domain name for enabling the revised page response content to include are resolved to double stack proxy servers It and include the signature hash operations result;
The forwarding subelement, is specifically used for: by the exterior chain url resource transfer proxy server by the revised page Face response contents are transmitted to IPV6 client, so that the IPV6 client is initiated to include the revised page response content Exterior chain url call request when, double stack proxy server addresses can be got from dns server, then to double stack generations It manages server and sends the exterior chain url call request, and make the exterior chain url resource transfer proxy server from the exterior chain url The exterior chain domain-name information and encryption information, signature hash operations knot of the exterior chain url resource transfer service are obtained in call request Fruit;
The address determination unit, is specifically used for:
The encryption information of the exterior chain url resource transfer service, root are obtained by the exterior chain url resource transfer proxy server It is decrypted according to the predetermined encryption rule, restores the address exterior chain url;With or
The exterior chain for including in the exterior chain url call request is obtained by the exterior chain url resource transfer proxy server Domain-name information and signature hash operations result;
The hash is obtained according to the exterior chain domain-name information by the exterior chain url resource transfer proxy server and inputs character String;
By the exterior chain url resource transfer proxy server, character string is inputted according to the hash and the default hash is calculated Method operation obtains verification hash operations result;
By the exterior chain url call request resource transfer proxy server, by the verification hash operations result and the label Name hash operations result is compared;
If consistent, receive the exterior chain url call request, and is parsed outside from the exterior chain url call request The address chain url;Otherwise, refuse the exterior chain url call request.
Based on the same inventive concept, the embodiment of the present invention provides a kind of computer readable storage medium 301, with reference to Fig. 3 institute Show, be stored thereon with computer program 302, which realizes aforementioned exterior chain url resource transfer method when being executed by processor Step as described in the examples.
Based on the same inventive concept, the embodiment of the present invention provides a kind of computer equipment 1900, refering to what is shown in Fig. 4, the meter Bigger difference can be generated because configuration or performance are different by calculating machine equipment 1900, may include one or more centres Manage device (central processing units, CPU) 1922 (for example, one or more processors) and memory 1932, one or more storage application programs 1942 or data 1944 storage medium 1930 (such as one or one with Upper mass memory unit).Wherein, memory 1932 and storage medium 1930 can be of short duration storage or persistent storage.It is stored in The program of storage medium 1930 may include one or more modules (diagram does not mark), and each module may include to meter Calculate the series of instructions operation in machine equipment.Further, central processing unit 1922 can be set to and storage medium 1930 Communication executes the series of instructions operation in storage medium 1930 in computer equipment 1900.Described in the processor executes Step described in any embodiment in aforementioned exterior chain url resource transfer service call embodiment is realized when program.
Computer equipment 1900 can also include one or more power supplys 1926, one or more wired or nothings Wired network interface 1950, one or more input/output interfaces 1958, one or more keyboards 1956, and/or, one A or more than one operating system 1941, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Since the electronic equipment that the present embodiment is introduced is exterior chain url resource transfer method institute in implementation the embodiment of the present application The electronic equipment of use, so based on exterior chain url resource transfer method described in the embodiment of the present application, the affiliated skill in this field Art personnel can understand the specific embodiment and its various change form of the electronic equipment of the present embodiment, thus herein for How the electronic equipment realizes that the method in the embodiment of the present application is no longer discussed in detail.As long as those skilled in the art implement Electronic equipment used by exterior chain url resource transfer method in the embodiment of the present application, belongs to the range to be protected of the application.
The one or more technical solutions provided in the embodiment of the present invention, have at least the following technical effects or advantages:
Due to disposing exterior chain url resource transfer generation on the double stack proxy servers for providing exterior chain url resource transfer service Device is managed, therefore, calls proxy server to obtain the exterior chain url resource transfer service by the exterior chain url and IPV6 client is used Revised exterior chain url call request is carried out in the HTTP request of request call exterior chain url resource;Pass through the exterior chain url tune The address exterior chain url is determined from the exterior chain url call request with proxy server;Call proxy server to institute by the exterior chain url It states the address exterior chain url and sends the HTTP call request, so that the exterior chain url resource transfer service takes from double stack agencies The exterior chain url resource is called on business device, to call proxy server that IPV6 client call can be made to be accessed by exterior chain url Website page in include IPV4 exterior chain url resource, not only solve due to IPV6 and IPV4 agreement it is incompatible caused by " skylight " problem, and improve the flexibility of exterior chain url resource transfer service system extension.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) realize the push according to an embodiment of the present invention for realizing extension application The some or all functions of some or all components in the device of notice.The present invention is also implemented as executing this In described method some or all device or device programs (for example, computer program and computer program Product).It is such to realize that program of the invention can store on a computer-readable medium, it either can have one or more The form of a signal.Such signal can be downloaded from an internet website to obtain, be perhaps provided on the carrier signal or with Any other form provides.

Claims (10)

1. a kind of exterior chain url resource transfer method is applied to double stack proxy servers, which is characterized in that acted on behalf of in double stacks Exterior chain url resource transfer proxy server is deployed on server, which comprises
Start the exterior chain url resource transfer service disposed on double stack proxy servers;
Proxy server is called to obtain the exterior chain url resource transfer service to IPV6 client for requesting by the exterior chain url The HTTP request of exterior chain url resource is called to carry out revised exterior chain url call request;
Proxy server is called to determine the address exterior chain url from the exterior chain url call request by the exterior chain url;
Proxy server is called to send the HTTP request to the address the exterior chain url by the exterior chain url, so that the exterior chain The service of url resource transfer calls the exterior chain url resource from double stack proxy servers.
2. exterior chain url resource transfer method as described in claim 1, which is characterized in that the starting is acted on behalf of in double stacks Before the exterior chain url resource transfer service disposed on server, further includes:
Detection receives the response page content that source station server is sent;
Analyze the response page content whether include exterior chain resource connection string.
3. exterior chain url resource transfer method as claimed in claim 2, which is characterized in that if analyzing the response page content Connection string comprising exterior chain resource, then the exterior chain url resource transfer clothes that starting is disposed on double stack proxy servers Business, it is described to start the exterior chain url resource transfer service disposed on double stack proxy servers, comprising:
The response page content is rewritten with preset connection string rewriting rule, obtains revised page response Content, the exterior chain url domain name for enabling the revised page response content to include are resolved to double stack proxy servers;
The revised page response content is transmitted to IPV6 client by the exterior chain url resource transfer proxy server, It, can be from DNS when so that the IPV6 client being initiated to include the exterior chain url call request of the revised page response content Server gets double stack proxy server addresses, then sends the exterior chain url to double stack proxy servers and call Request, and the exterior chain url resource transfer proxy server is made to obtain the exterior chain url money from the exterior chain url call request Call the relevant information of service in source.
4. exterior chain url resource transfer method as claimed in claim 3, which is characterized in that the relevant information, including exterior chain domain Name information and encryption information, signature hash operations result.
5. exterior chain url resource transfer method as claimed in claim 4, which is characterized in that described with preset connection string Rewriting rule rewrites the response page content, obtains revised page response content, comprising:
By the exterior chain url resource transfer proxy server according to predetermined encryption rule, by the character string comprising exterior chain domain-name information It is gone here and there with privately owned code key building encrypted input word symbol, and string is accorded with to the encrypted input word and carries out cryptographic calculation, obtain cryptographic calculation As a result, being rewritten to the connection string for the exterior chain url resource for including in the response page content;With or
By the exterior chain url resource transfer proxy server according to default hash rule, by the character string comprising exterior chain domain-name information Hash input character string is constructed with privately owned character string, and default hashing algorithm operation is carried out to hash input character string, is obtained Hash operations must be signed as a result, in conjunction with the signature hash operations result to the exterior chain url for including in the response page content The connection string of resource is rewritten.
6. exterior chain url resource transfer method as claimed in claim 5, which is characterized in that described to be called by the exterior chain url Proxy server determines the address exterior chain url from the exterior chain url call request, comprising:
The encryption information that the exterior chain url resource transfer service is obtained by the exterior chain url resource transfer proxy server, according to institute It states predetermined encryption rule to be decrypted, restores the address exterior chain url;With or
The exterior chain domain name for including in the exterior chain url call request is obtained by the exterior chain url resource transfer proxy server Information and signature hash operations result;
The hash is obtained according to the exterior chain domain-name information by the exterior chain url resource transfer proxy server and inputs character string;
By the exterior chain url resource transfer proxy server, character string is inputted according to the hash and the default hashing algorithm is transported It calculates and obtains verification hash operations result;
By the exterior chain url call request resource transfer proxy server, the verification hash operations result and the signature are dissipated Column operations result is compared;
If consistent, receive the exterior chain url call request, and parse exterior chain url from the exterior chain url call request Address;Otherwise, refuse the exterior chain url call request.
7. a kind of exterior chain url resource transfer device is applied to double stack proxy servers, which is characterized in that the system deployment exists On double stack proxy servers, including start unit and exterior chain url resource transfer proxy server, in which:
The start unit, for starting the exterior chain url resource transfer service disposed on double stack proxy servers;
The exterior chain url resource transfer proxy server, specifically includes:
Request unit, for calling proxy server to obtain the exterior chain url resource transfer service pair by the exterior chain url HTTP request of the IPV6 client for request call exterior chain url resource carries out revised exterior chain url call request;
Address determination unit, for calling proxy server to determine exterior chain from the exterior chain url call request by the exterior chain url The address url;
Request transmitting unit, for calling proxy server to send the HTTP tune to the address the exterior chain url by the exterior chain url With request, so that the exterior chain url resource transfer service calls the exterior chain url resource from double stack proxy servers.
8. exterior chain url resource transfer device as claimed in claim 7, which is characterized in that further include:
Monitoring unit, for detecting the response page content for receiving source station server and sending;
Analytical unit, for analyze the response page content whether include exterior chain resource connection string.
9. exterior chain url resource transfer device as claimed in claim 8, which is characterized in that the start unit, comprising:
Subelement is rewritten, for being rewritten with preset connection string rewriting rule to the response page content, is obtained Revised page response content, the exterior chain url domain name for enabling the revised page response content to include are resolved to institute State double stack proxy servers;
Subelement is forwarded, for turning the revised page response content by the exterior chain url resource transfer proxy server IPV6 client is issued, so that the IPV6 client initiates the exterior chain url tune comprising the revised page response content When with request, double stack proxy server addresses can be got from dns server, then send to double stack proxy servers The exterior chain url call request, and the exterior chain url resource transfer proxy server is obtained from the exterior chain url call request Take the relevant information of the exterior chain url resource transfer service.
10. exterior chain url resource transfer device as claimed in claim 9, which is characterized in that the rewriting subelement, it is specific to use In: by the exterior chain url resource transfer proxy server according to default hash rule, by the character string comprising exterior chain domain-name information and Privately owned character string building hash input character string, and default hashing algorithm operation is carried out to hash input character string, it obtains Signature hash operations are as a result, provide the exterior chain url for including in the response page content in conjunction with the signature hash operations result The connection string in source is rewritten, and revised page response content is obtained, so that the revised page response content The exterior chain url domain name for including can be resolved to double stack proxy servers and include the signature hash operations result;
The forwarding subelement, is specifically used for: being rung the revised page by the exterior chain url resource transfer proxy server Content is answered to be transmitted to IPV6 client, so that the IPV6 client is initiated to include the outer of the revised page response content When chain url call request, double stack proxy server addresses can be got from dns server, then take to double stack agencies Business device sends the exterior chain url call request, and the exterior chain url resource transfer proxy server is called from the exterior chain url The exterior chain domain-name information and encryption information, signature hash operations result of the exterior chain url resource transfer service are obtained in request;
The address determination unit, is specifically used for:
The encryption information that the exterior chain url resource transfer service is obtained by the exterior chain url resource transfer proxy server, according to institute It states predetermined encryption rule to be decrypted, restores the address exterior chain url;With or
The exterior chain domain name for including in the exterior chain url call request is obtained by the exterior chain url resource transfer proxy server Information and signature hash operations result;
The hash is obtained according to the exterior chain domain-name information by the exterior chain url resource transfer proxy server and inputs character string;
By the exterior chain url resource transfer proxy server, character string is inputted according to the hash and the default hashing algorithm is transported It calculates and obtains verification hash operations result;
By the exterior chain url call request resource transfer proxy server, the verification hash operations result and the signature are dissipated Column operations result is compared;
If consistent, receive the exterior chain url call request, and parse exterior chain url from the exterior chain url call request Address;Otherwise, refuse the exterior chain url call request.
CN201811333764.7A 2018-11-09 2018-11-09 Method and device for calling outer link url (real time communication) resources Active CN109543121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811333764.7A CN109543121B (en) 2018-11-09 2018-11-09 Method and device for calling outer link url (real time communication) resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811333764.7A CN109543121B (en) 2018-11-09 2018-11-09 Method and device for calling outer link url (real time communication) resources

Publications (2)

Publication Number Publication Date
CN109543121A true CN109543121A (en) 2019-03-29
CN109543121B CN109543121B (en) 2023-11-03

Family

ID=65846647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811333764.7A Active CN109543121B (en) 2018-11-09 2018-11-09 Method and device for calling outer link url (real time communication) resources

Country Status (1)

Country Link
CN (1) CN109543121B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110971721A (en) * 2019-12-13 2020-04-07 睿哲科技股份有限公司 External link processing method, device, server and storage medium
CN111064827A (en) * 2020-03-18 2020-04-24 同盾控股有限公司 Agent detection method, device, equipment and medium based on domain name generic resolution
CN111107056A (en) * 2019-11-22 2020-05-05 睿哲科技股份有限公司 Method and device for calling out-link URL (Uniform resource locator) resource and protocol conversion server
CN111416885A (en) * 2020-03-20 2020-07-14 福建万物易联网络科技有限公司 Outer chain rewriting distributed system with fixed-length domain name
CN111416862A (en) * 2020-03-20 2020-07-14 福建万物易联网络科技有限公司 CDN platform access method and system based on IPV6IPV4
CN111865886A (en) * 2019-04-30 2020-10-30 深信服科技股份有限公司 IP address information configuration method, system, device and storage medium
CN111866198A (en) * 2019-04-30 2020-10-30 深信服科技股份有限公司 Link access method, system, device and computer readable storage medium
CN112148354A (en) * 2020-09-27 2020-12-29 网易(杭州)网络有限公司 Game starting method and device
CN112600950A (en) * 2020-12-09 2021-04-02 福建万物易联网络科技有限公司 Outer chain rewriting method and system of short crossbar format
CN112650955A (en) * 2020-12-30 2021-04-13 中国农业银行股份有限公司 Method and device for processing Uniform Resource Locator (URL)
CN112771835A (en) * 2020-12-25 2021-05-07 山石网科通信技术股份有限公司 Processing method and device for outer chain rewriting
EP4040760A1 (en) * 2021-02-04 2022-08-10 Webshare Software Company Automatic ipv6/ipv4 fallback approach in proxy networks

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010102625A (en) * 2008-10-27 2010-05-06 Fujitsu Ltd Method and device for rewriting uniform resource locator
CN102694754A (en) * 2012-06-07 2012-09-26 广州睿哲网络科技有限公司 Application gateway technology and system for realizing content interchange of Internet protocol version 4/Internet protocol version 6 (IPv4/IPv6) websites
CN104572843A (en) * 2014-12-12 2015-04-29 百度在线网络技术(北京)有限公司 Page loading method and device
CN109561078A (en) * 2018-11-09 2019-04-02 深圳万物云联科技有限公司 A kind of exterior chain url resource transfer method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010102625A (en) * 2008-10-27 2010-05-06 Fujitsu Ltd Method and device for rewriting uniform resource locator
CN102694754A (en) * 2012-06-07 2012-09-26 广州睿哲网络科技有限公司 Application gateway technology and system for realizing content interchange of Internet protocol version 4/Internet protocol version 6 (IPv4/IPv6) websites
CN104572843A (en) * 2014-12-12 2015-04-29 百度在线网络技术(北京)有限公司 Page loading method and device
CN109561078A (en) * 2018-11-09 2019-04-02 深圳万物云联科技有限公司 A kind of exterior chain url resource transfer method and device

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865886A (en) * 2019-04-30 2020-10-30 深信服科技股份有限公司 IP address information configuration method, system, device and storage medium
CN111866198A (en) * 2019-04-30 2020-10-30 深信服科技股份有限公司 Link access method, system, device and computer readable storage medium
CN111107056A (en) * 2019-11-22 2020-05-05 睿哲科技股份有限公司 Method and device for calling out-link URL (Uniform resource locator) resource and protocol conversion server
CN110971721A (en) * 2019-12-13 2020-04-07 睿哲科技股份有限公司 External link processing method, device, server and storage medium
CN111064827A (en) * 2020-03-18 2020-04-24 同盾控股有限公司 Agent detection method, device, equipment and medium based on domain name generic resolution
CN111064827B (en) * 2020-03-18 2020-07-07 同盾控股有限公司 Agent detection method, device, equipment and medium based on domain name generic resolution
CN111416885B (en) * 2020-03-20 2021-04-06 福建万物易联网络科技有限公司 Outer chain rewriting distributed system with fixed-length domain name
CN111416885A (en) * 2020-03-20 2020-07-14 福建万物易联网络科技有限公司 Outer chain rewriting distributed system with fixed-length domain name
CN111416862A (en) * 2020-03-20 2020-07-14 福建万物易联网络科技有限公司 CDN platform access method and system based on IPV6IPV4
CN112148354A (en) * 2020-09-27 2020-12-29 网易(杭州)网络有限公司 Game starting method and device
CN112148354B (en) * 2020-09-27 2023-07-25 网易(杭州)网络有限公司 Game starting method and device
CN112600950A (en) * 2020-12-09 2021-04-02 福建万物易联网络科技有限公司 Outer chain rewriting method and system of short crossbar format
CN112771835A (en) * 2020-12-25 2021-05-07 山石网科通信技术股份有限公司 Processing method and device for outer chain rewriting
CN112650955A (en) * 2020-12-30 2021-04-13 中国农业银行股份有限公司 Method and device for processing Uniform Resource Locator (URL)
CN112650955B (en) * 2020-12-30 2024-04-12 中国农业银行股份有限公司 Uniform resource locator URL processing method and device
EP4040760A1 (en) * 2021-02-04 2022-08-10 Webshare Software Company Automatic ipv6/ipv4 fallback approach in proxy networks
WO2022169805A1 (en) * 2021-02-04 2022-08-11 Webshare Software Company Automatic ipv6/ipv4 fallback approach in proxy networks
US11522826B2 (en) 2021-02-04 2022-12-06 Webshare Software Company Automatic IPV6/IPV4 fallback approach in proxy networks
US11736435B2 (en) 2021-02-04 2023-08-22 Webshare Software Company Automatic IPV6/IPV4 fallback approach in proxy networks

Also Published As

Publication number Publication date
CN109543121B (en) 2023-11-03

Similar Documents

Publication Publication Date Title
CN109543121A (en) A kind of exterior chain url resource transfer method and device
CN109561078A (en) A kind of exterior chain url resource transfer method and device
JP6750054B2 (en) A system for building and modeling web pages
CN114637933B (en) System and method for allocating communication resources via an information technology infrastructure
US10984456B2 (en) Systems and methods to bypass online advertisement blockers
CN102647482B (en) Method and system for accessing website
US7904345B2 (en) Providing website hosting overage protection by transference to an overflow server
JP2022536787A (en) Edge database management for network data plane
US8805990B2 (en) Load balancing for single-address tenants
CN103685583B (en) A kind of method and system of domain name mapping
US20160065684A1 (en) Method and apparatus for automatically optimizing the loading of images in a cloud-based proxy service
CN106790503A (en) It is a kind of to realize the IPv4 websites without skylight using the device upgraded to IPv6 based on HTTP reverse proxys
US8543713B2 (en) Computing environment arranged to support predetermined URL patterns
US10574724B2 (en) Automatic discovery of management nodes and generation of CLI using HA module
US20080243536A1 (en) Providing website hosting overage protection by storage on an independent data server
CN101184105A (en) Client appartus for updating data
CN107092825A (en) Technology for the isolation based on dynamic domain
JP5347429B2 (en) Uniform resource locator rewriting method and apparatus
CN106582013B (en) Game service system, method and device for updating data to online game
CN112241298A (en) Page display method and device, storage medium and electronic device
CN112394907A (en) Container-based delivery system construction method, application delivery method and delivery system
US20140283080A1 (en) Identifying stored vulnerabilities in a web service
CN103793459B (en) Webpage opening method and device
CN114124766B (en) Test method and device based on simulation data
CN115421693A (en) Method and device for realizing micro front-end architecture, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant