Your message dated Sat, 25 Jan 2014 15:47:06 +0000
with message-id <[email protected]>
and subject line Bug#726529: fixed in libapache2-mod-rpaf 0.6-7+wheezy1
has caused the Debian Bug report #726529,
regarding libapache2-mod-rpaf: failure to work with authz allow/deny
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
726529: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726529
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libapache2-mod-rpaf
Version: 0.6-7
Severity: important

Dear Maintainer,

  this is a follow up of bug #697644. I could reproduce the problem today on
two up-to-date Wheezys, and here are the instructions to encounter the bug.

  Setup a single default Apache vhost, which we thus may reach with any name.
Eg:

  <VirtualHost *:80>
    ServerName rpaf-bug

    DocumentRoot /var/www
    CustomLog /var/log/apache2/access.log combined

    <Location />
      Order deny,allow
      Deny from all
      Allow from 1.2.3.4
    </Location>
  </VirtualHost>

  ... where 1.2.3.4 is an IP address of your host. Then on this same host,
try :

  $ curl http://localhost/
  (denied with Apache default 403 page)
  $ curl http://1.2.3.4/
  (granted, serves /var/www/default/index.html happily)

  So everything's fine till there. Then install libapache2-mod-rpaf and keep
its default config (which trusts 127.0.0.1), and try :

  $ curl -H 'X-Forwarded-For: 1.2.3.4' http://localhost/
  (denied with Apache default 403 page)
  $ tail /var/log/apache2/access.log
  ...
  1.2.3.4 - - [09/Jan/2014:22:15:53 +0100] "GET / HTTP/1.1" 403 461 "-" 
"curl/7.26.0"

  ... where obviously mod_rpaf works fine (seeing the log) but auth is 
wrongfully denied.
CGIs also get 1.2.3.4 in REMOTE_ADDR. I made several tests, and it's clear that 
Apache
authz against the real client IP (127.0.0.1 above), and not the one in 
X-Forwarded-For.

  This problem bit me this afternoon with a serious security exposure while
migrating a site to a new server with the help of a reverse proxy. I think this
is a serious issue.

-- System Information:
Debian Release: 7.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages libapache2-mod-rpaf depends on:
ii  apache2-mpm-worker [apache2-mpm]  2.2.22-13
ii  libc6                             2.13-38

libapache2-mod-rpaf recommends no packages.

libapache2-mod-rpaf suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: libapache2-mod-rpaf
Source-Version: 0.6-7+wheezy1

We believe that the bug you reported is fixed in the latest version of
libapache2-mod-rpaf, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Sergey B Kirpichev <[email protected]> (supplier of updated 
libapache2-mod-rpaf package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Mon, 20 Jan 2014 17:56:07 +0400
Source: libapache2-mod-rpaf
Binary: libapache2-mod-rpaf
Architecture: source amd64
Version: 0.6-7+wheezy1
Distribution: stable
Urgency: low
Maintainer: Sergey B Kirpichev <[email protected]>
Changed-By: Sergey B Kirpichev <[email protected]>
Description: 
 libapache2-mod-rpaf - module for Apache2 which takes the last IP from the 
'X-Forwarded-
Closes: 726529
Changes: 
 libapache2-mod-rpaf (0.6-7+wheezy1) stable; urgency=low
 .
   * Restore 030_ipv6.patch, removed by QA upload in 0.6-1 (Closes: #726529)
Checksums-Sha1: 
 3d63eeaf56cba02fce43208b69835396273ca01b 2018 
libapache2-mod-rpaf_0.6-7+wheezy1.dsc
 ff8ff3bc4188172d5d29ebc246af2b379cb3672f 5654 
libapache2-mod-rpaf_0.6-7+wheezy1.debian.tar.gz
 67810d6cd0c9e985e8c308c1b6bc71df09ed86e2 10272 
libapache2-mod-rpaf_0.6-7+wheezy1_amd64.deb
Checksums-Sha256: 
 319cec49bc84e5cef8cfc17b45ba6ac8dca17c347cd0e93dd459e869c13818aa 2018 
libapache2-mod-rpaf_0.6-7+wheezy1.dsc
 0a69a28f77ec17dfa2ca95d99c48d08696feea1d57bb35dc588b93cd17fd44cb 5654 
libapache2-mod-rpaf_0.6-7+wheezy1.debian.tar.gz
 fff354bb91957e87b8c7d70cff8bccdad4a13d433bd5af144c238c3fc85778c2 10272 
libapache2-mod-rpaf_0.6-7+wheezy1_amd64.deb
Files: 
 528379b30c2855b0849434b9a94a7d01 2018 httpd extra 
libapache2-mod-rpaf_0.6-7+wheezy1.dsc
 e9218284c9c04b69414d56f1c3953777 5654 httpd extra 
libapache2-mod-rpaf_0.6-7+wheezy1.debian.tar.gz
 33340011ab689144c21fd549e6a59e07 10272 httpd extra 
libapache2-mod-rpaf_0.6-7+wheezy1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=KECw
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to