I have phpBB forum, and whenever soneone's trying to include image hosted on imageshack.us in the their post they get an "406 Not Acceptable" error. This does not happen with other image hosts. People are wondering, and so am I. On phpBB support forum I've read that this is a "server-side problem - your host has decided to block POST packets containing whatever is special about the imageshack links".<br /><br />Is this true?<br />If it is, what other image hosts are being blocked (so I can let users know which sites not to use)? And what's the reason for this blocking, if not a secret?<br /><br />Thanks!<!--content-->
yeah, same story on TCH Forums, but not on others I visit... so, why is TCH blocking it, its only images... :-/<br /><!--content-->
Please open a ticket with the <a href="https://ssl.totalchoicehosting.com/supportdesk" target="_blank">help desk</a> so a tech can check it out for you.<!--content-->
done + fixed. thank you!<br /><br /><i>*me still wonders why is foto hosting site is being blocked :-/ *</i><!--content-->
The site in question was not blocked by TCH. The suspectable lengthy URLs will be caught by mod_security filter on the server when executing. As you have disabled mod_security for your account through help desk ticket, the issue has resolved itself. <br /><!--content-->
<!--quoteo(post=221714:date=Mar 9 2008, 01:24 AM:name=TCH-Alex)--><div class='quotetop'>QUOTE (TCH-Alex @ Mar 9 2008, 01:24 AM) <a href="http://www.totalchoicehosting.com/forums/index.php?act=findpost&pid=221714"><img src='http://www.totalchoicehosting.com/forums/style_images/1/post_snapback.gif' alt='*' border='0' /></a></div><div class='quotemain'><!--quotec-->The site in question was not blocked by TCH. The suspectable lengthy URLs will be caught by mod_security filter on the server when executing. As you have disabled mod_security for your account through help desk ticket, the issue has resolved itself.<!--QuoteEnd--></div><!--QuoteEEnd--><br /><br />on this very forum, try to reply to this post with only single line:<br /><a href="http://www.image2shack.us/" target="_blank">http://www.image2shack.us/</a><br />only remove "2" in the middle, don't even need to use IMG tag. and you'll get the same error.<br /><br />add the "2" in the middle - no problem.<br /><br />i do appreciate you help in resolving it on my account, thank you. i'm just wondering that's up with this...<!--content-->
Maybe because it's not a valid web site?<br /><br /><!--quoteo--><div class='quotetop'>QUOTE<!--content-->
i didn't say go visit it <img src="http://www.totalchoicehosting.com/forums/style_emoticons/default/smile.gif" style="vertical-align:middle" emoid="" border="0" alt="smile.gif" /><br /><br />it just proves my confusion: you CAN include any web address in your post, weather domain exists or not ?see its up there and its clickable... but not imageshack.us (note, that if forum engine doesn't attempt to render it as a URI, like here when did not include www prefix, its ok, its just text). but as soon as you include it -- you'll get error 406 Not Acceptable!<!--content-->
Like alex said. Something about imageshack url is causing our mod_security rules to trip.<br /><br />I will have Ryan take a peak at this and he will respond directly to this thread.<br /><br />Bill<br /><br /><!--content-->
thanks!!<!--content-->
Same problem here. Any photo from Imageshack gets a 406 unacceptable error. I have the same IPB software as this forum. From what I've been told the mod_security rules may be overly strict or something? Is there a fix in the works other than disabling it in the .htaccess file (which may not be very secure)?<!--content-->
Please add these lines on .htaccess<br /><IfModule mod_security.c><br />SecFilterEngine Off<br />SecFilterScanPOST Off<br /></IfModule><!--content-->
Alex if you read my post above I know that. My question is does doing that make a php based forum more vulnerable to security issues?<!--content-->
mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.<br /><br />Obviously, disabling mod_security will turn off this security measures.<br /><br />But, you can turn off mod_security for a specific file in your account. For example if the file image-upload.php is calling the external image url, you can turn off mod_security for the upload script only like<br /><br /><br /><IfModule mod_security.c><br /><Files image-upload.php ><br />SecFilterEngine Off<br />SecFilterScanPOST Off<br /></Files><br /></IfModule><br /><br /><!--content-->
yeah, same story on TCH Forums, but not on others I visit... so, why is TCH blocking it, its only images... :-/<br /><!--content-->
Please open a ticket with the <a href="https://ssl.totalchoicehosting.com/supportdesk" target="_blank">help desk</a> so a tech can check it out for you.<!--content-->
done + fixed. thank you!<br /><br /><i>*me still wonders why is foto hosting site is being blocked :-/ *</i><!--content-->
The site in question was not blocked by TCH. The suspectable lengthy URLs will be caught by mod_security filter on the server when executing. As you have disabled mod_security for your account through help desk ticket, the issue has resolved itself. <br /><!--content-->
<!--quoteo(post=221714:date=Mar 9 2008, 01:24 AM:name=TCH-Alex)--><div class='quotetop'>QUOTE (TCH-Alex @ Mar 9 2008, 01:24 AM) <a href="http://www.totalchoicehosting.com/forums/index.php?act=findpost&pid=221714"><img src='http://www.totalchoicehosting.com/forums/style_images/1/post_snapback.gif' alt='*' border='0' /></a></div><div class='quotemain'><!--quotec-->The site in question was not blocked by TCH. The suspectable lengthy URLs will be caught by mod_security filter on the server when executing. As you have disabled mod_security for your account through help desk ticket, the issue has resolved itself.<!--QuoteEnd--></div><!--QuoteEEnd--><br /><br />on this very forum, try to reply to this post with only single line:<br /><a href="http://www.image2shack.us/" target="_blank">http://www.image2shack.us/</a><br />only remove "2" in the middle, don't even need to use IMG tag. and you'll get the same error.<br /><br />add the "2" in the middle - no problem.<br /><br />i do appreciate you help in resolving it on my account, thank you. i'm just wondering that's up with this...<!--content-->
Maybe because it's not a valid web site?<br /><br /><!--quoteo--><div class='quotetop'>QUOTE<!--content-->
i didn't say go visit it <img src="http://www.totalchoicehosting.com/forums/style_emoticons/default/smile.gif" style="vertical-align:middle" emoid="" border="0" alt="smile.gif" /><br /><br />it just proves my confusion: you CAN include any web address in your post, weather domain exists or not ?see its up there and its clickable... but not imageshack.us (note, that if forum engine doesn't attempt to render it as a URI, like here when did not include www prefix, its ok, its just text). but as soon as you include it -- you'll get error 406 Not Acceptable!<!--content-->
Like alex said. Something about imageshack url is causing our mod_security rules to trip.<br /><br />I will have Ryan take a peak at this and he will respond directly to this thread.<br /><br />Bill<br /><br /><!--content-->
thanks!!<!--content-->
Same problem here. Any photo from Imageshack gets a 406 unacceptable error. I have the same IPB software as this forum. From what I've been told the mod_security rules may be overly strict or something? Is there a fix in the works other than disabling it in the .htaccess file (which may not be very secure)?<!--content-->
Please add these lines on .htaccess<br /><IfModule mod_security.c><br />SecFilterEngine Off<br />SecFilterScanPOST Off<br /></IfModule><!--content-->
Alex if you read my post above I know that. My question is does doing that make a php based forum more vulnerable to security issues?<!--content-->
mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc.<br /><br />Obviously, disabling mod_security will turn off this security measures.<br /><br />But, you can turn off mod_security for a specific file in your account. For example if the file image-upload.php is calling the external image url, you can turn off mod_security for the upload script only like<br /><br /><br /><IfModule mod_security.c><br /><Files image-upload.php ><br />SecFilterEngine Off<br />SecFilterScanPOST Off<br /></Files><br /></IfModule><br /><br /><!--content-->