Daniel Mejia
12/19/2024, 6:12 PMbdw429s
12/19/2024, 6:14 PMbdw429s
12/19/2024, 6:14 PMbdw429s
12/19/2024, 6:14 PMbdw429s
12/19/2024, 6:15 PMDaniel Mejia
12/19/2024, 6:15 PMbdw429s
12/19/2024, 6:15 PMbdw429s
12/19/2024, 6:15 PMbdw429s
12/19/2024, 6:15 PMDaniel Mejia
12/19/2024, 6:16 PMbdw429s
12/19/2024, 6:16 PMx-forwarded-for
header claiming they are coming from localhost and then you're settings to block the admin, etc will give them access to everything!bdw429s
12/19/2024, 6:16 PMbdw429s
12/19/2024, 6:16 PMbdw429s
12/19/2024, 6:16 PMbdw429s
12/19/2024, 6:17 PMbdw429s
12/19/2024, 6:17 PMbdw429s
12/19/2024, 6:17 PMDaniel Mejia
12/19/2024, 6:19 PMelpete
12/19/2024, 6:27 PMquetwo
12/19/2024, 6:42 PMx-forwarded-ip
to the request (that we have to pull out manually). When you use AWS's proxy, it is in x-remote-user
. Some firewalls/proxies won't pass the external IP along unless you configure it.bdw429s
12/19/2024, 6:43 PMbdw429s
12/19/2024, 6:43 PMDaniel Mejia
12/19/2024, 6:44 PMbdw429s
12/19/2024, 6:45 PMbdw429s
12/19/2024, 6:45 PMbdw429s
12/19/2024, 6:45 PMquetwo
12/19/2024, 6:45 PMbdw429s
12/19/2024, 6:45 PMgetHTTPRequestData().headers
Daniel Mejia
12/19/2024, 6:47 PMbdw429s
12/19/2024, 6:48 PMbdw429s
12/19/2024, 6:49 PMNote
Both HTTP and HTTPS protocols (with TLS inspection) are always filled by Azure Firewall with XFF (X-Forwarded-For) header equal to the original source IP address.
Daniel Mejia
12/19/2024, 7:06 PMbdw429s
12/19/2024, 7:06 PMbdw429s
12/19/2024, 7:06 PMbdw429s
12/19/2024, 7:06 PMDaniel Mejia
12/19/2024, 8:35 PM