-
-
Notifications
You must be signed in to change notification settings - Fork 5.2k
Trusted proxy examples need safer defaults #7045
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Labels
Milestone
Comments
"Cache" is the wrong label @xabbuh :) |
Oops, thanks for the heads up @dzuelke :) |
See symfony/symfony#21830 and symfony/symfony#22238 I haven't digested the changes yet, but I'm updating this milestone to 3.3 because that's where the changes were made and I want to make sure we've got it right for that release :) |
fabpot
added a commit
to symfony/symfony
that referenced
this issue
May 25, 2017
…LB const (nicolas-grekas) This PR was merged into the 3.3 branch. Discussion ---------- [HttpFoundation] Add Request::HEADER_X_FORWARDED_AWS_ELB const | Q | A | ------------- | --- | Branch? | 3.3 | Bug fix? | yes (a missing part of a 3.3 feat.) | New feature? | no | BC breaks? | no | Deprecations? | no | Tests pass? | yes | Fixed tickets | - | License | MIT | Doc PR | - See symfony/symfony-docs#7045 Commits ------- 9ba12b0 [HttpFoundation] Add Request::HEADER_X_FORWARDED_AWS_ELB const
Can we close here? |
Closing as probably fixed by the mentioned pull requests. Thanks! |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
http://symfony.com/doc/current/request/load_balancer_reverse_proxy.html and http://symfony.com/doc/current/components/http_foundation/trusting_proxies.html talk about trusting proxies, and http://symfony.com/doc/current/request/load_balancer_reverse_proxy.html#but-what-if-the-ip-of-my-reverse-proxy-changes-constantly in particular mentions AWS as an example.
AWS ELBs do not set a
Forwarded
header, making it necessary to follow the instructions at http://symfony.com/doc/current/request/load_balancer_reverse_proxy.html#my-reverse-proxy-sends-x-forwarded-for-but-does-not-filter-the-forwarded-header, but they also do not set anX-Forwarded-Host
(only…-For
,…-Port
and…-Proto
), which means, that for a very popular use case (running on AWS, or products that build on it, e.g. Heroku), applications would be vulnerable to spoofing of those headers.My suggestion would be to
Forwarded
andX-Forwarded-Host
must be distrusted, or better yetThe text was updated successfully, but these errors were encountered: