Actions
Bug #26847
openBrute-force protection being triggered using haproxy
Status:
New
Priority:
Normal
Assignee:
-
Category:
Authentication
Target version:
-
Description
When using a haproxy in front of Foreman, the IP that is being checked in failed logins is the one for haproxy. So 30 authentications in 5 minutes coming from the same haproxy blocks all the logins coming from that haproxy.
Should it use request.remote_ip instead of request.ip to make it work with X-Forwarded-For headers?
Updated by Lukas Zapletal over 5 years ago
- Category set to Authentication
- Triaged changed from No to Yes
Hello, we can't make use of X-Forwarded-For header because then an attacker can spoof any data in it. However I was big advocate of increased limit, what we have by default is too small - for bruteforcing one need tens of thousands tries to consider something to be bruteforcing I believe. Feel free to increase this number if you think the same.
Actions