Hold on a second.
That's still not going to be a good spoof because you also would check
REMOTE_CLIENT as usual, and expect to always see your front-end's IP
there, so Randal's example isn't completely accurate, since you'll see
the real client's IP there and thus know not to trust the
X-Forwarded-For header.  What you really want to check is what the
front-end does if there's already an X-Forwarded-For header.  If it
overwrites it, you should be fine.

  Issac

Randal L. Schwartz wrote:
>>>>>> "Boysenberry" == Boysenberry Payne <[EMAIL PROTECTED]> writes:
> 
> Boysenberry>  I'm using a two server system.  Front end Apache 1.33/php4
> Boysenberry> uses mod_proxy
> Boysenberry> and mod_rewrite to proxy to the back end Apache2/MP2 system.
> 
> Boysenberry>  I was wondering if $ENV{HTTP_X_FORWARDED_HOST} is a reliable way
> Boysenberry> to determine the domain of the request; or is it easily spoofed?
> 
>     telnet your.server.example.com 80
>     GET /some/url HTTP/1.0
>     X-forwarded-for: some-other-host
>     CR
>     CR
> 
> Yeah, that's tough to spoof. :)
> 

Reply via email to