#14597: request.is_secure() should support headers like: X-Forwarded-Protocol 
and X
-Forwarded-Ssl
------------------------------------+---------------------------------------
          Reporter:  gnotaras       |         Owner:  nobody
            Status:  closed         |     Milestone:        
         Component:  HTTP handling  |       Version:  1.2   
        Resolution:  wontfix        |      Keywords:        
             Stage:  Unreviewed     |     Has_patch:  0     
        Needs_docs:  0              |   Needs_tests:  0     
Needs_better_patch:  0              |  
------------------------------------+---------------------------------------
Comment (by lukeplant):

 Your latest proposal addresses some of the concerns about security, but as
 soon as you include it in Django, you will find hosts like !WebFaction
 (where the customer is not in charge of those HTTPS headers) saying things
 like "put these settings in your settings.py to make it work" - and the
 developers will never read all the big fat disclaimers about those
 settings. I'm not saying that !WebFaction are stupid or anything like
 that, it is just human nature to find the quickest solution to a problem.

 I still think that the solution is to put the burden of this logic and its
 security implications onto the developers — just like we solved
 `SetRemoteAddrFromForwardedFor` by removing it, not by making
 customizable.

-- 
Ticket URL: <http://code.djangoproject.com/ticket/14597#comment:6>
Django <http://code.djangoproject.com/>
The Web framework for perfectionists with deadlines.

-- 
You received this message because you are subscribed to the Google Groups 
"Django updates" group.
To post to this group, send email to django-upda...@googlegroups.com.
To unsubscribe from this group, send email to 
django-updates+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/django-updates?hl=en.

Reply via email to