Replies: 3 comments
-
typically you'd only use |
Beta Was this translation helpful? Give feedback.
-
If I set |
Beta Was this translation helpful? Give feedback.
-
if you want to get rid of the log messages but you don't want to remove the headers from the incoming request, then it is better to just use/configure them, it won't hurt, assuming they contain correct information about the external URL |
Beta Was this translation helpful? Give feedback.
-
Hi,
Since upgrading Debian recently I have a new mod_auth_openidc which has started to complain about unexpected X-Forwarded-* headers, as I haven't configured mod_auth_openidc to use them. I have the Cloudflare proxy in front of my sites which is injecting these headers.
Some other applications can be configured to only use those headers if the connection comes from whitelisted IP address. This prevents direct access (avoiding the proxy) injecting faked proxy information. For example Apache HTTPD mod_remoteip can be configured to use the client IP address from X-Forwarded-For (or CF-Connecting-IP) if it comes from an IP on the whitelist.
I don't see any option in mod_auth_openidc to check the source IP before using these headers. Is this a security risk?
Secondly, what does mod_auth_openidc use these headers for anyway? I already use mod_remoteip to get the true remote IP. Everything works ok. But then my external proto/host/port is always the same as the internal ones anyway.
Beta Was this translation helpful? Give feedback.
All reactions