Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Trusted proxy examples need safer defaults #7045

Closed
Milestone
@dzuelke

Description

@dzuelke

http://symfony.com/doc/current/request/load_balancer_reverse_proxy.html andhttp://symfony.com/doc/current/components/http_foundation/trusting_proxies.html talk about trusting proxies, andhttp://symfony.com/doc/current/request/load_balancer_reverse_proxy.html#but-what-if-the-ip-of-my-reverse-proxy-changes-constantly in particular mentions AWS as an example.

AWS ELBs do not set aForwarded header, making it necessary to follow the instructions athttp://symfony.com/doc/current/request/load_balancer_reverse_proxy.html#my-reverse-proxy-sends-x-forwarded-for-but-does-not-filter-the-forwarded-header, but they also do not set anX-Forwarded-Host (only…-For,…-Port and…-Proto), which means, that for a very popular use case (running on AWS, or products that build on it, e.g. Heroku), applications would be vulnerable to spoofing of those headers.

My suggestion would be to

  1. explicitly mention for the AWS case that bothForwarded andX-Forwarded-Host must be distrusted, or better yet
  2. explicitly list known safe combinations for popular IaaS/PaaS systems and then
  3. instruct users to carefully double-check what headers their platform in question supports, and distrust any that it does not.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions


      [8]ページ先頭

      ©2009-2025 Movatter.jp