Solved

asp.net Using Tilde "~" in path gives ip adress and port instead of domain name.

Posted on 2008-10-06
3
242 Views
Last Modified: 2012-05-05
I'm deploying a application and i got a problem with the url resolution on the server side.

When I'm login, the browser detect my authentication cookie as a third-party Cookie.

My investigations leed me to think it's the redirection links appear to resolve to a IP adress and a port number instead of my subdomain.
(i got http://xxx.xxx.xxx.xxx:xxx/login.aspx instead of http://sub.myDomain.com/login.aspx) I got the corect adress in the adress bar.

I think our in-house sysadmin put my app on is iis server as a "web app" that lisent on a specific port, then he redirect it somewere to sub.myDomain.com. But how those thing works is not my duty.

What could I do or ask to my in-house sysadmin?
 


0
Comment
Question by:David Robitaille
  • 2
3 Comments
 
LVL 23

Expert Comment

by:adilkhan
Comment Utility
Try to set the Domain Propety when you setup/create a cookie

response.cookies("TEST").domain = "yourdomain.com"

this way system will ignore sub domain.
0
 
LVL 18

Author Comment

by:David Robitaille
Comment Utility
doesn`t help.
<authentication mode="Forms">
<forms name=".AuthCookie" timeout="30" slidingExpiration="true" domain="myDomain.com" />
</authentication>
i dont create cookies for the main domain or anything.it just the automatic thisn that asp.net does to create the login...
 if i goes in the page - Web page privacy policy in IE, i got the  http://sub.myDomain.com and some other entry like http://xxx.xxx.xxx.xxx:xxx/login.aspx
0
 
LVL 18

Accepted Solution

by:
David Robitaille earned 0 total points
Comment Utility
i got a talk with my sys admin he removed the  sub.myDomain.com from the adress thing. so now when you go to   http://sub.myDomain.com, you are redirected to  http://xxx.xxx.xxx.xxx:xxx/ and evrything works... (it not perfect but it works...)
 
 
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

User art_snob (http://www.experts-exchange.com/M_6114203.html) encountered strange behavior of Android Web browser on his Mobile Web site. It took a while to find the true cause. It happens so, that the Android Web browser (at least up to OS ver. 2.…
One of the most often confused topics in the area DNS is the idea of GLUE records. Specifically, what they are, when they are needed, when they are provided, and how they are created. First, WHAT IS GLUE? To understand GLUE, you must first under…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now