diff options
author | Andre Arko <andre@arko.net> | 2013-01-02 15:21:13 -0800 |
---|---|---|
committer | Andre Arko <andre@arko.net> | 2013-01-02 15:26:27 -0800 |
commit | 75dcdbc84e53cd824c4f1c3e4cb82c40f27010c8 (patch) | |
tree | 255a7267c3679a0d8f4ec7ffdb01505858819448 /Rakefile | |
parent | 9f200fb296da721d50af53712d1e7998a5140e76 (diff) | |
download | rails-75dcdbc84e53cd824c4f1c3e4cb82c40f27010c8.tar.gz rails-75dcdbc84e53cd824c4f1c3e4cb82c40f27010c8.tar.bz2 rails-75dcdbc84e53cd824c4f1c3e4cb82c40f27010c8.zip |
Restore original remote_ip algorithm.
Proxy servers add X-Forwarded-For headers, resulting in a list of IPs. We
remove trusted IP values, and then take the last given value, assuming that
it is the most likely to be the correct, unfaked value. See [1] for a very
thorough discussion of why that is the best option we have at the moment.
[1]: http://blog.gingerlime.com/2012/rails-ip-spoofing-vulnerabilities-and-protection/
Fixes #7979
Diffstat (limited to 'Rakefile')
0 files changed, 0 insertions, 0 deletions