From bf4b2173ef0aea76fe2eb4ee33e571203d6b4fc9 Mon Sep 17 00:00:00 2001 From: "James E. Housley" Date: Tue, 19 Jun 2001 01:59:10 +0000 Subject: New port of mod_extract_forwarded, an Apache module that can make proxied requests appear with client IP. PR: 27998 Submitted by: Anders Nordby --- www/mod_extract_forwarded/pkg-descr | 13 +++++++++++++ 1 file changed, 13 insertions(+) create mode 100644 www/mod_extract_forwarded/pkg-descr (limited to 'www/mod_extract_forwarded/pkg-descr') diff --git a/www/mod_extract_forwarded/pkg-descr b/www/mod_extract_forwarded/pkg-descr new file mode 100644 index 000000000000..a1f0912373d8 --- /dev/null +++ b/www/mod_extract_forwarded/pkg-descr @@ -0,0 +1,13 @@ +mod_extract_forwarded hooks itself into Apache's header parsing phase and looks +for the X-Forwarded-For header which some (most?) proxies add to the proxied +HTTP requests. It extracts the IP from the X-Forwarded-For and modifies the +connection data so to the rest of Apache the request looks like it came from +that IP rather than the proxy IP. + +mod_extract_forwarded can be dangerous for host based access control because +X-Forwarded-For is easily spoofed. Because of this you can configure which +proxies you trust or don't trust. + +WWW: http://web.systhug.com/mod_extract_forwarded/ + +- Anders Nordby -- cgit v1.2.3