/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License.
*/ package org.apache.catalina.valves;
/** * <p> * Tomcat port of <a href="https://httpd.apache.org/docs/trunk/mod/mod_remoteip.html">mod_remoteip</a>, this valve * replaces the apparent client remote IP address and hostname for the request with the IP address list presented by a * proxy or a load balancer via a request headers (e.g. "X-Forwarded-For"). * </p> * <p> * Another feature of this valve is to replace the apparent scheme (http/https) and server port with the scheme * presented by a proxy or a load balancer via a request header (e.g. "X-Forwarded-Proto"). * </p> * <p> * This valve proceeds as follows: * </p> * <p> * If the incoming <code>request.getRemoteAddr()</code> matches the valve's list of internal or trusted proxies: * </p> * <ul> * <li>Loop on the comma delimited list of IPs and hostnames passed by the preceding load balancer or proxy in the given * request's Http header named <code>$remoteIpHeader</code> (default value <code>x-forwarded-for</code>). Values are * processed in right-to-left order.</li> * <li>For each ip/host of the list: * <ul> * <li>if it matches the internal proxies list, the ip/host is swallowed</li> * <li>if it matches the trusted proxies list, the ip/host is added to the created proxies header</li> * <li>otherwise, the ip/host is declared to be the remote ip and looping is stopped.</li> * </ul> * </li> * <li>If the request http header named <code>$protocolHeader</code> (default value <code>X-Forwarded-Proto</code>) * consists only of forwards that match <code>protocolHeaderHttpsValue</code> configuration parameter (default * <code>https</code>) then <code>request.isSecure = true</code>, <code>request.scheme = https</code> and * <code>request.serverPort = 443</code>. Note that 443 can be overwritten with the <code>$httpsServerPort</code> * configuration parameter.</li> * <li>Mark the request with the attribute {@link Globals#REQUEST_FORWARDED_ATTRIBUTE} and value {@code Boolean.TRUE} to * indicate that this request has been forwarded by one or more proxies.</li> * </ul> * <table border="1"> * <caption>Configuration parameters</caption> * <tr> * <th>RemoteIpValve property</th> * <th>Description</th> * <th>Equivalent mod_remoteip directive</th> * <th>Format</th> * <th>Default Value</th> * </tr> * <tr> * <td>remoteIpHeader</td> * <td>Name of the Http Header read by this valve that holds the list of traversed IP addresses starting from the * requesting client</td> * <td>RemoteIPHeader</td> * <td>Compliant http header name</td> * <td>x-forwarded-for</td> * </tr> * <tr> * <td>internalProxies</td> * <td>Regular expression that matches the IP addresses of internal proxies. If they appear in the * <code>remoteIpHeader</code> value, they will be trusted and will not appear in the <code>proxiesHeader</code> * value</td> * <td>RemoteIPInternalProxy</td> * <td>Regular expression (in the syntax supported by {@link java.util.regex.Pattern java.util.regex})</td> * <td>10\.\d{1,3}\.\d{1,3}\.\d{1,3}|192\.168\.\d{1,3}\.\d{1,3}| * 169\.254\.\d{1,3}\.\d{1,3}|127\.\d{1,3}\.\d{1,3}\.\d{1,3}| * 100\.6[4-9]{1}\.\d{1,3}\.\d{1,3}|100\.[7-9]{1}\d{1}\.\d{1,3}\.\d{1,3}| * 100\.1[0-1]{1}\d{1}\.\d{1,3}\.\d{1,3}|100\.12[0-7]{1}\.\d{1,3}\.\d{1,3}| * 172\.1[6-9]{1}\.\d{1,3}\.\d{1,3}|172\.2[0-9]{1}\.\d{1,3}\.\d{1,3}| 172\.3[0-1]{1}\.\d{1,3}\.\d{1,3}| * 0:0:0:0:0:0:0:1|::1 <br> * By default, 10/8, 192.168/16, 169.254/16, 127/8, 100.64/10, 172.16/12, and ::1 are allowed.</td> * </tr> * <tr> * <td>proxiesHeader</td> * <td>Name of the http header created by this valve to hold the list of proxies that have been processed in the * incoming <code>remoteIpHeader</code></td> * <td>proxiesHeader</td> * <td>Compliant http header name</td> * <td>x-forwarded-by</td> * </tr> * <tr> * <td>trustedProxies</td> * <td>Regular expression that matches the IP addresses of trusted proxies. If they appear in the * <code>remoteIpHeader</code> value, they will be trusted and will appear in the <code>proxiesHeader</code> value</td> * <td>RemoteIPTrustedProxy</td> * <td>Regular expression (in the syntax supported by {@link java.util.regex.Pattern java.util.regex})</td> * <td> </td> * </tr> * <tr> * <td>protocolHeader</td> * <td>Name of the http header read by this valve that holds the flag that this request</td> * <td>N/A</td> * <td>Compliant http header name like <code>X-Forwarded-Proto</code>, <code>X-Forwarded-Ssl</code> or * <code>Front-End-Https</code></td> * <td><code>X-Forwarded-Proto</code></td> * </tr> * <tr> * <td>protocolHeaderHttpsValue</td> * <td>Value of the <code>protocolHeader</code> to indicate that it is an Https request</td> * <td>N/A</td> * <td>String like <code>https</code> or <code>ON</code></td> * <td><code>https</code></td> * </tr> * <tr> * <td>httpServerPort</td> * <td>Value returned by {@link jakarta.servlet.ServletRequest#getServerPort()} when the <code>protocolHeader</code> * indicates <code>http</code> protocol</td> * <td>N/A</td> * <td>integer</td> * <td>80</td> * </tr> * <tr> * <td>httpsServerPort</td> * <td>Value returned by {@link jakarta.servlet.ServletRequest#getServerPort()} when the <code>protocolHeader</code> * indicates <code>https</code> protocol</td> * <td>N/A</td> * <td>integer</td> * <td>443</td> * </tr> * </table> * <p> * This Valve may be attached to any Container, depending on the granularity of the filtering you wish to perform. * </p> * <p> * <strong>Regular expression vs. IP address blocks:</strong> <code>mod_remoteip</code> allows to use address blocks * (e.g. <code>192.168/16</code>) to configure <code>RemoteIPInternalProxy</code> and <code>RemoteIPTrustedProxy</code> * ; as Tomcat doesn't have a library similar to <a href= * "https://apr.apache.org/docs/apr/1.3/group__apr__network__io.html#gb74d21b8898b7c40bf7fd07ad3eb993d">apr_ipsubnet_test</a>, * <code>RemoteIpValve</code> uses regular expression to configure <code>internalProxies</code> and * <code>trustedProxies</code> in the same fashion as {@link RequestFilterValve} does. * </p> * <hr> * <p> * <strong>Sample with internal proxies</strong> * </p> * <p> * RemoteIpValve configuration: * </p> * <code> * <Valve * className="org.apache.catalina.valves.RemoteIpValve" * internalProxies="192\.168\.0\.10|192\.168\.0\.11" * remoteIpHeader="x-forwarded-for" * proxiesHeader="x-forwarded-by" * protocolHeader="x-forwarded-proto" * /></code> * <table border="1"> * <caption>Request Values</caption> * <tr> * <th>property</th> * <th>Value Before RemoteIpValve</th> * <th>Value After RemoteIpValve</th> * </tr> * <tr> * <td>request.remoteAddr</td> * <td>192.168.0.10</td> * <td>140.211.11.130</td> * </tr> * <tr> * <td>request.header['x-forwarded-for']</td> * <td>140.211.11.130, 192.168.0.10</td> * <td>null</td> * </tr> * <tr> * <td>request.header['x-forwarded-by']</td> * <td>null</td> * <td>null</td> * </tr> * <tr> * <td>request.header['x-forwarded-proto']</td> * <td>https</td> * <td>https</td> * </tr> * <tr> * <td>request.scheme</td> * <td>http</td> * <td>https</td> * </tr> * <tr> * <td>request.secure</td> * <td>false</td> * <td>true</td> * </tr> * <tr> * <td>request.serverPort</td> * <td>80</td> * <td>443</td> * </tr> * </table> * <p> * Note : <code>x-forwarded-by</code> header is null because only internal proxies as been traversed by the request. * <code>x-forwarded-by</code> is null because all the proxies are trusted or internal. * </p> * <hr> * <p> * <strong>Sample with trusted proxies</strong> * </p> * <p> * RemoteIpValve configuration: * </p> * <code> * <Valve * className="org.apache.catalina.valves.RemoteIpValve" * internalProxies="192\.168\.0\.10|192\.168\.0\.11" * remoteIpHeader="x-forwarded-for" * proxiesHeader="x-forwarded-by" * trustedProxies="proxy1|proxy2" * /></code> * <table border="1"> * <caption>Request Values</caption> * <tr> * <th>property</th> * <th>Value Before RemoteIpValve</th> * <th>Value After RemoteIpValve</th> * </tr> * <tr> * <td>request.remoteAddr</td> * <td>192.168.0.10</td> * <td>140.211.11.130</td> * </tr> * <tr> * <td>request.header['x-forwarded-for']</td> * <td>140.211.11.130, proxy1, proxy2</td> * <td>null</td> * </tr> * <tr> * <td>request.header['x-forwarded-by']</td> * <td>null</td> * <td>proxy1, proxy2</td> * </tr> * </table> * <p> * Note : <code>proxy1</code> and <code>proxy2</code> are both trusted proxies that come in <code>x-forwarded-for</code> * header, they both are migrated in <code>x-forwarded-by</code> header. <code>x-forwarded-by</code> is null because all * the proxies are trusted or internal. * </p> * <hr> * <p> * <strong>Sample with internal and trusted proxies</strong> * </p> * <p> * RemoteIpValve configuration: * </p> * <code> * <Valve * className="org.apache.catalina.valves.RemoteIpValve" * internalProxies="192\.168\.0\.10|192\.168\.0\.11" * remoteIpHeader="x-forwarded-for" * proxiesHeader="x-forwarded-by" * trustedProxies="proxy1|proxy2" * /></code> * <table border="1"> * <caption>Request Values</caption> * <tr> * <th>property</th> * <th>Value Before RemoteIpValve</th> * <th>Value After RemoteIpValve</th> * </tr> * <tr> * <td>request.remoteAddr</td> * <td>192.168.0.10</td> * <td>140.211.11.130</td> * </tr> * <tr> * <td>request.header['x-forwarded-for']</td> * <td>140.211.11.130, proxy1, proxy2, 192.168.0.10</td> * <td>null</td> * </tr> * <tr> * <td>request.header['x-forwarded-by']</td> * <td>null</td> * <td>proxy1, proxy2</td> * </tr> * </table> * <p> * Note : <code>proxy1</code> and <code>proxy2</code> are both trusted proxies that come in <code>x-forwarded-for</code> * header, they both are migrated in <code>x-forwarded-by</code> header. As <code>192.168.0.10</code> is an internal * proxy, it does not appear in <code>x-forwarded-by</code>. <code>x-forwarded-by</code> is null because all the proxies * are trusted or internal. * </p> * <hr> * <p> * <strong>Sample with an untrusted proxy</strong> * </p> * <p> * RemoteIpValve configuration: * </p> * <code> * <Valve * className="org.apache.catalina.valves.RemoteIpValve" * internalProxies="192\.168\.0\.10|192\.168\.0\.11" * remoteIpHeader="x-forwarded-for" * proxiesHeader="x-forwarded-by" * trustedProxies="proxy1|proxy2" * /></code> * <table border="1"> * <caption>Request Values</caption> * <tr> * <th>property</th> * <th>Value Before RemoteIpValve</th> * <th>Value After RemoteIpValve</th> * </tr> * <tr> * <td>request.remoteAddr</td> * <td>192.168.0.10</td> * <td>untrusted-proxy</td> * </tr> * <tr> * <td>request.header['x-forwarded-for']</td> * <td>140.211.11.130, untrusted-proxy, proxy1</td> * <td>140.211.11.130</td> * </tr> * <tr> * <td>request.header['x-forwarded-by']</td> * <td>null</td> * <td>proxy1</td> * </tr> * </table> * <p> * Note : <code>x-forwarded-by</code> holds the trusted proxy <code>proxy1</code>. <code>x-forwarded-by</code> holds * <code>140.211.11.130</code> because <code>untrusted-proxy</code> is not trusted and thus, we cannot trust that * <code>untrusted-proxy</code> is the actual remote ip. <code>request.remoteAddr</code> is <code>untrusted-proxy</code> * that is an IP verified by <code>proxy1</code>. * </p>
*/ publicclass RemoteIpValve extends ValveBase {
/** * {@link Pattern} for a comma delimited string that support whitespace characters
*/ privatestaticfinal Pattern commaSeparatedValuesPattern = Pattern.compile("\\s*,\\s*");
/** * Default constructor that ensures {@link ValveBase#ValveBase(boolean)} is called with <code>true</code>.
*/ public RemoteIpValve() { // Async requests are supported with this valve super(true);
}
/** * Obtain the name of the HTTP header used to override the value returned by {@link Request#getServerName()} and * (optionally depending on {link {@link #isChangeLocalName()} {@link Request#getLocalName()}. * * @return The HTTP header name
*/ public String getHostHeader() { return hostHeader;
}
/** * Set the name of the HTTP header used to override the value returned by {@link Request#getServerName()} and * (optionally depending on {link {@link #isChangeLocalName()} {@link Request#getLocalName()}. * * @param hostHeader The HTTP header name
*/ publicvoid setHostHeader(String hostHeader) { this.hostHeader = hostHeader;
}
/** * Obtain the name of the HTTP header used to override the value returned by {@link Request#getServerPort()} and * (optionally depending on {link {@link #isChangeLocalPort()} {@link Request#getLocalPort()}. * * @return The HTTP header name
*/ public String getPortHeader() { return portHeader;
}
/** * Set the name of the HTTP header used to override the value returned by {@link Request#getServerPort()} and * (optionally depending on {link {@link #isChangeLocalPort()} {@link Request#getLocalPort()}. * * @param portHeader The HTTP header name
*/ publicvoid setPortHeader(String portHeader) { this.portHeader = portHeader;
}
/** * @see #setInternalProxies(String) * * @return Regular expression that defines the internal proxies
*/ public String getInternalProxies() { if (internalProxies == null) { returnnull;
} return internalProxies.toString();
}
/** * @see #setProtocolHeader(String) * * @return the protocol header (e.g. "X-Forwarded-Proto")
*/ public String getProtocolHeader() { return protocolHeader;
}
/** * @see RemoteIpValve#setProtocolHeaderHttpsValue(String) * * @return the value of the protocol header for incoming https request (e.g. "https")
*/ public String getProtocolHeaderHttpsValue() { return protocolHeaderHttpsValue;
}
/** * @see #setProxiesHeader(String) * * @return the proxies header name (e.g. "X-Forwarded-By")
*/ public String getProxiesHeader() { return proxiesHeader;
}
/** * @see #setRemoteIpHeader(String) * * @return the remote IP header name (e.g. "X-Forwarded-For")
*/ public String getRemoteIpHeader() { return remoteIpHeader;
}
/** * @see #setRequestAttributesEnabled(boolean) * * @return <code>true</code> if the attributes will be logged, otherwise <code>false</code>
*/ publicboolean getRequestAttributesEnabled() { return requestAttributesEnabled;
}
/** * @see #setTrustedProxies(String) * * @return Regular expression that defines the trusted proxies
*/ public String getTrustedProxies() { if (trustedProxies == null) { returnnull;
} return trustedProxies.toString();
}
@Override publicvoid invoke(Request request, Response response) throws IOException, ServletException { final String originalRemoteAddr = request.getRemoteAddr(); final String originalRemoteHost = request.getRemoteHost(); final String originalScheme = request.getScheme(); finalboolean originalSecure = request.isSecure(); final String originalServerName = request.getServerName(); final String originalLocalName = isChangeLocalName() ? request.getLocalName() : null; finalint originalServerPort = request.getServerPort(); finalint originalLocalPort = request.getLocalPort(); final String originalProxiesHeader = request.getHeader(proxiesHeader); final String originalRemoteIpHeader = request.getHeader(remoteIpHeader); boolean isInternal = internalProxies != null && internalProxies.matcher(originalRemoteAddr).matches();
if (isInternal || (trustedProxies != null && trustedProxies.matcher(originalRemoteAddr).matches())) {
String remoteIp = null;
Deque<String> proxiesHeaderValue = new ArrayDeque<>();
StringBuilder concatRemoteIpHeaderValue = new StringBuilder();
for (Enumeration<String> e = request.getHeaders(remoteIpHeader); e.hasMoreElements();) { if (concatRemoteIpHeaderValue.length() > 0) {
concatRemoteIpHeaderValue.append(", ");
}
String[] remoteIpHeaderValue = commaDelimitedListToStringArray(concatRemoteIpHeaderValue.toString()); int idx; if (!isInternal) {
proxiesHeaderValue.addFirst(originalRemoteAddr);
} // loop on remoteIpHeaderValue to find the first trusted remote ip and to build the proxies chain for (idx = remoteIpHeaderValue.length - 1; idx >= 0; idx--) {
String currentRemoteIp = remoteIpHeaderValue[idx];
remoteIp = currentRemoteIp; if (internalProxies != null && internalProxies.matcher(currentRemoteIp).matches()) { // do nothing, internalProxies IPs are not appended to the
} elseif (trustedProxies != null && trustedProxies.matcher(currentRemoteIp).matches()) {
proxiesHeaderValue.addFirst(currentRemoteIp);
} else {
idx--; // decrement idx because break statement doesn't do it break;
}
} // continue to loop on remoteIpHeaderValue to build the new value of the remoteIpHeader
Deque<String> newRemoteIpHeaderValue = new ArrayDeque<>(); for (; idx >= 0; idx--) {
String currentRemoteIp = remoteIpHeaderValue[idx];
newRemoteIpHeaderValue.addFirst(currentRemoteIp);
} if (remoteIp != null) {
request.setRemoteAddr(remoteIp); if (request.getConnector().getEnableLookups()) { // This isn't a lazy lookup but that would be a little more // invasive - mainly in Request.getRemoteHost() - and if // enableLookups is true it seems reasonable that the // hotsname will be required so look it up here. try {
InetAddress inetAddress = InetAddress.getByName(remoteIp); // We know we need a DNS look up so use getCanonicalHostName()
request.setRemoteHost(inetAddress.getCanonicalHostName());
} catch (UnknownHostException e) {
log.debug(sm.getString("remoteIpValve.invalidRemoteAddress", remoteIp), e);
request.setRemoteHost(remoteIp);
}
} else {
request.setRemoteHost(remoteIp);
}
/* * Considers the value to be secure if it exclusively holds forwards for {@link #protocolHeaderHttpsValue}.
*/ privateboolean isForwardedProtoHeaderValueSecure(String protocolHeaderValue) { if (!protocolHeaderValue.contains(",")) { return protocolHeaderHttpsValue.equalsIgnoreCase(protocolHeaderValue);
}
String[] forwardedProtocols = commaDelimitedListToStringArray(protocolHeaderValue); if (forwardedProtocols.length == 0) { returnfalse;
} for (String forwardedProtocol : forwardedProtocols) { if (!protocolHeaderHttpsValue.equalsIgnoreCase(forwardedProtocol)) { returnfalse;
}
} returntrue;
}
privatevoid setPorts(Request request, int defaultPort) { int port = defaultPort; if (portHeader != null) {
String portHeaderValue = request.getHeader(portHeader); if (portHeaderValue != null) { try {
port = Integer.parseInt(portHeaderValue);
} catch (NumberFormatException nfe) { if (log.isDebugEnabled()) {
log.debug(sm.getString("remoteIpValve.invalidPortHeader", portHeaderValue, portHeader), nfe);
}
}
}
}
request.setServerPort(port); if (changeLocalPort) {
request.setLocalPort(port);
}
}
/** * <p> * Server Port value if the {@link #protocolHeader} is not <code>null</code> and does not indicate HTTP * </p> * <p> * Default value : 80 * </p> * * @param httpServerPort The server port
*/ publicvoid setHttpServerPort(int httpServerPort) { this.httpServerPort = httpServerPort;
}
/** * <p> * Server Port value if the {@link #protocolHeader} indicates HTTPS * </p> * <p> * Default value : 443 * </p> * * @param httpsServerPort The server port
*/ publicvoid setHttpsServerPort(int httpsServerPort) { this.httpsServerPort = httpsServerPort;
}
/** * <p> * Header that holds the incoming protocol, usually named <code>X-Forwarded-Proto</code>. If <code>null</code>, * request.scheme and request.secure will not be modified. * </p> * <p> * Default value : <code>X-Forwarded-Proto</code> * </p> * * @param protocolHeader The header name
*/ publicvoid setProtocolHeader(String protocolHeader) { this.protocolHeader = protocolHeader;
}
/** * <p> * Case insensitive value of the protocol header to indicate that the incoming http request uses SSL. * </p> * <p> * Default value : <code>https</code> * </p> * * @param protocolHeaderHttpsValue The header name
*/ publicvoid setProtocolHeaderHttpsValue(String protocolHeaderHttpsValue) { this.protocolHeaderHttpsValue = protocolHeaderHttpsValue;
}
/** * <p> * The proxiesHeader directive specifies a header into which mod_remoteip will collect a list of all of the * intermediate client IP addresses trusted to resolve the actual remote IP. Note that intermediate * RemoteIPTrustedProxy addresses are recorded in this header, while any intermediate RemoteIPInternalProxy * addresses are discarded. * </p> * <p> * Name of the http header that holds the list of trusted proxies that has been traversed by the http request. * </p> * <p> * The value of this header can be comma delimited. * </p> * <p> * Default value : <code>X-Forwarded-By</code> * </p> * * @param proxiesHeader The header name
*/ publicvoid setProxiesHeader(String proxiesHeader) { this.proxiesHeader = proxiesHeader;
}
/** * <p> * Name of the http header from which the remote ip is extracted. * </p> * <p> * The value of this header can be comma delimited. * </p> * <p> * Default value : <code>X-Forwarded-For</code> * </p> * * @param remoteIpHeader The header name
*/ publicvoid setRemoteIpHeader(String remoteIpHeader) { this.remoteIpHeader = remoteIpHeader;
}
/** * Should this valve set request attributes for IP address, Hostname, protocol and port used for the request? This * are typically used in conjunction with the {@link AccessLog} which will otherwise log the original values. * Default is <code>true</code>. The attributes set are: * <ul> * <li>org.apache.catalina.AccessLog.RemoteAddr</li> * <li>org.apache.catalina.AccessLog.RemoteHost</li> * <li>org.apache.catalina.AccessLog.Protocol</li> * <li>org.apache.catalina.AccessLog.ServerPort</li> * <li>org.apache.tomcat.remoteAddr</li> * </ul> * * @param requestAttributesEnabled <code>true</code> causes the attributes to be set, <code>false</code> disables * the setting of the attributes.
*/ publicvoid setRequestAttributesEnabled(boolean requestAttributesEnabled) { this.requestAttributesEnabled = requestAttributesEnabled;
}
/** * <p> * Regular expression defining proxies that are trusted when they appear in the {@link #remoteIpHeader} header. * </p> * <p> * Default value : empty list, no external proxy is trusted. * </p> * * @param trustedProxies The regular expression
*/ publicvoid setTrustedProxies(String trustedProxies) { if (trustedProxies == null || trustedProxies.length() == 0) { this.trustedProxies = null;
} else { this.trustedProxies = Pattern.compile(trustedProxies);
}
}
}
¤ Dauer der Verarbeitung: 0.24 Sekunden
(vorverarbeitet)
¤
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.