Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 269045
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T23:46:34+00:00 2026-05-11T23:46:34+00:00

I am interested to know how an URL-based api key restriction works, such as

  • 0

I am interested to know how an URL-based api key restriction works, such as the one used by Google to protect its Google Maps service.

From what I understand from this article “Restricting Access to Ajax Services,” there are two parts involved: first where the service creates a specific key for a given domain, using a one-way hash function; and second where the service validates the key based on the Referer header.

While the article is quite explanatory, I still have a problem trying to understand how safe is the validation method. I mean, if the key is checked only against the referer, isn’t this quite easy to forge? I am thinking that a simple “127.0.0.1 http://www.mydomain.com” in the hosts file will be enough to trick the validation, and think that the referer is http://www.mydomain.com .

I might have misunderstood some things and a few clarifications will be appreciated.

  • 1 1 Answer
  • 2 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T23:46:34+00:00Added an answer on May 11, 2026 at 11:46 pm

    The “Limitations” section of the article you cite specifically mentions the possibility of spoofing the referrer.

    Changing the host file might indeed be enough to forge your referrer, but only when you’re accessing the site from your own computer. That means you can abuse the license only when testing locally. That’s not very interesting abuse.

    In order to publish your app, you’d need to spoof the referrer on everyone’s browsers, unless you’re using the API from a locally run executable, in which case you’re probably in full control of all the headers.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

Does anyone know a good .NET dictionary API? I'm not interested in meanings, rather
I am interested to know if there is any open source payment gateway based
I am interested to know what strategies people have to keep their code AND
I'm interested to know if there's any sites out there that has implemented CardSpace
I'm interested to know what approach people are taking in developing automated unit tests
I am interested to know whether anyone has written an application that takes advantage
I know java and would normally put in getter/setter methods. I am interested in
Do you know what may cause memory leaks in JavaScript? I am interested in
Does anyone know any resources (books/websites/whatever) related to parsing. I'm not so much interested
I'm interested in grabbing the EPG data from DVB-T streams. Does anyone know of

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.