On Sat, Aug 3, 2013 at 5:59 PM, Richard Hipp <d...@sqlite.org> wrote:
>
>
> On Sat, Aug 3, 2013 at 4:59 PM, Maxim Khitrov <m...@mxcrypt.com> wrote:
>>
>> On Sat, Aug 3, 2013 at 4:52 PM, reverse <reve...@snowflakejoins.com>
>> wrote:
>> > Hi,
>> >
>> > I also had some problems behind proxy. Solved those by having one more
>> > Apache instance just for Fossil deployment.
>> >
>> > Please consider taking value of HTTP_FORWARDED_REQUEST_URI (if present)
>> > instead of PATH_INFO, and of X-Forwarded-For instead of REMOTE_ADDRESS.
>>
>> I sent in a patch to use X-Real-IP (same as X-Forwarded-For, I
>> think?). Not sure why it wasn't accepted,
>
>
> Your patch would allow clients to forge their IP address by injecting an
> X-Forwarded-For header in the HTTP request.  Fossil has no way of knowing if
> the X-Forwarded-For comes from a trusted proxy or a malicious client.

What about adding a config option to allow this header only when
fossil is running behind a reverse proxy? Alternatively, you could
accept X-Forwarded-For by default when the remote address is the local
host. That should take care of the most common setup.
_______________________________________________
fossil-users mailing list
fossil-users@lists.fossil-scm.org
http://lists.fossil-scm.org:8080/cgi-bin/mailman/listinfo/fossil-users

Reply via email to