From 96d64448203e15c4cb960039349fa81edae6b9b4 Mon Sep 17 00:00:00 2001 From: Amos Jeffries Date: Tue, 25 May 2010 23:12:20 +1200 Subject: [PATCH] Author: Wojciech Zatorski Author: Amos Jeffries Support TPROXYv4 spoofing of X-Forwarded-For client address. Assumes correct configuration use of the X-Forwarded-For header with a zone of trusted sources. SECURITY WARNING: This patch depends on security features not present in older Squid versions and is not to be ported or applied to earlier releases. --- doc/release-notes/release-3.2.sgml | 5 +++++ src/cf.data.pre | 16 ++++++++++++++-- src/cf_gen_defines | 1 + src/forward.cc | 10 ++++++++-- src/structs.h | 3 +++ 5 files changed, 31 insertions(+), 4 deletions(-) diff --git a/doc/release-notes/release-3.2.sgml b/doc/release-notes/release-3.2.sgml index 2d5e3906de..2712b9cde9 100644 --- a/doc/release-notes/release-3.2.sgml +++ b/doc/release-notes/release-3.2.sgml @@ -181,6 +181,11 @@ This section gives a thorough account of those changes in three categories: logfile_daemon

Ported from 2.7 + tproxy_uses_indirect_client +

Controls whether the indirect client address found in the X-Forwarded-For + header is used for spoofing instead of the directly connected client address. + Requires both --enable-follow-x-forwarded-for and --enable-linux-netfilter + Changes to existing tags