-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
forwarding Source IP as client IP #2
Comments
yah just ran into this now. basically white listing cannot work???? @Rdago did you find a solution? |
@Rdago i see your forked the repo and made some changes. But did you fix the forwardfor? I see something about UniqueID. |
@jessequinn I am also having the same issue, have you got any solution? how to get client-IP back on Modsecurity. |
I am also having the same issue, is there any solution for this? |
I also have the same problem. Any solution? |
same problem here. the trick i use to match requests in haproxy and modsec is the uniqid header. in /etc/haproxy/haproxy.cfg, add this in frontend section :
and modify this in default section :
Regards |
Thank you @CorentinS6 It solved the problem. |
When using spoa on Haproxy the modproxy logs keep showing that the connected client is the haproxy itself (which in my case is 127.0.0.1, as I run the agent on the server in a docker) and modproxy logs this IP.
Is there a way to include the original source IP which connected to the HAproxy beforehand and pass it to modsecurity - in a forwarded for header for example?
The problem is that some features like geoip or ip reputation do not work on this scenario. Moreover when using siem-solution for logging the modsecurity logs and threats the connecting IP is always localhost.
Im looking forward to receive some tipps or even a solution how to handle this.
Thanks in advance.
The text was updated successfully, but these errors were encountered: