> As a workaround, you should avoid using x-forwarded-for header from
> untrusted sources.  Usually, it is the case - you can trust your frontend
> servers ;)
> 
> That means - real impact of this issue is very minor and mostly due to
> misconfiguration.

Excuse me ?

This is definitely _not_ a misconfiguration issue.

mod_rpaf is supposed to use the *last* X-Forwarded-For header.
There's a bug which adds some garbage to the remote_ip field, when a
specific request is sent, and a *correct* X-Forwarded-For header added by the
reverse proxy. (so the request has two X-Forwarded-For headers when it arrives
on the web front end, one is malicious, one is correct from a trusted source).

A workaround could be stripping the previous X-Forwarded-For headers on the
reverse proxy, but it shouldn't be necessary.

Real impact of this issue can be remote DOS of a LAMP cluster.
What makes you feel that this issue is "very minor" ?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to