Page 1 of 1

IIS virtual directory on another machine

Posted: Tue Mar 01, 2005 5:13 pm
by Burrito
I am setting up a virtual directory for a different physical computer from my web server. all of the web pages will be housed on this separate server but accessed through my web server (I have to do this because we dont' want to have to buy another secure certificate for the other server).

I created a vd using the UNC path of the server and it worked great, but I can not serve any pages from my web server. I tried some php pages first, and they bombed but I figured that was because of database issues (which I'll have to address soon), but that wasn't it. I then craeted just a dummy test.htm page and it bombed as well.

I get error 500 (internal server error) so it's not your usual mumbo jumbo...any ideas here?

thx,

Burr

Posted: Tue Mar 01, 2005 5:23 pm
by feyd
I don't remember if it works or not, but what about mapping the UNC path to a drive on the machine, then mapping the virual directory to that drive?

Posted: Tue Mar 01, 2005 5:25 pm
by Burrito
mapping drives is a user specific thing:

ie if I log in as Burrito and map a drive (Y:) to \\mybox\myshare that will only exist for me.

I can't log in to the machine as the IUSR.

Posted: Tue Mar 01, 2005 5:27 pm
by feyd
I remember being able to set global ones.. or you may be able to add the data inside the registry for IUSR..

Posted: Tue Mar 01, 2005 7:42 pm
by timvw
<offtopic>

although you are not supposed to login/execute code as iusr:

but it as simple as getting a handle for the desktop window and iterating over the windows untill you find one owned by iusr (or whatever account you want) and changing the callback function.

</offtopic>

Posted: Tue Mar 01, 2005 8:39 pm
by Burrito
timvw wrote:


but it as simple as getting a handle for the desktop window and iterating over the windows untill you find one owned by iusr (or whatever account you want) and changing the callback function.
huh?

Posted: Tue Mar 01, 2005 9:13 pm
by timvw
you can find a more detailed explanation here:
http://security.tombom.co.uk/shatter.html