Bug 59094

Summary: [new port] www/mod_extract_forwarded2: mod_extract_forwarded for apache2
Product: Ports & Packages Reporter: Clement Laforet <sheepkiller>
Component: Individual Port(s)Assignee: Clement Laforet <clement>
Status: Closed FIXED    
Severity: Affects Only Me CC: sheepkiller
Priority: Normal    
Version: Latest   
Hardware: Any   
OS: Any   
Attachments:
Description Flags
mod_extract_forwarded2.shar none

Description Clement Laforet 2003-11-09 21:10:04 UTC
	Since I need mod_extract_forwarded for apache2 and I can't find any patch, here's mine.

	Description:
	mod_extract_forwarded2 hooks itself into Apache's header parsing phase and looks
	for the X-Forwarded-For header which some (most?) proxies add to the proxied
	HTTP requests. It extracts the IP from the X-Forwarded-For and modifies the
	connection data so to the rest of Apache the request looks like it came from
	that IP rather than the proxy IP.
	
	mod_extract_forwarded can be dangerous for host based access control because
	X-Forwarded-For is easily spoofed. Because of this you can configure which
	proxies you trust or don't trust.

How-To-Repeat: 	N/A.
Comment 1 Mathieu Arnold freebsd_committer freebsd_triage 2003-11-25 10:24:43 UTC
Class Changed
From-To: maintainer-update->change-request

Accurate class
Comment 2 Clement Laforet freebsd_committer freebsd_triage 2003-12-17 14:43:50 UTC
Responsible Changed
From-To: freebsd-ports-bugs->clement

It's my PR.
Comment 3 Clement Laforet freebsd_committer freebsd_triage 2004-01-05 13:05:17 UTC
State Changed
From-To: open->closed

New port added.