IP Banlist behind Cloudflare #1552
Replies: 3 comments
-
|
We also had to figure this out, but turns it is pretty simple. To maybe/hopefully help some others: I don't know whether these configuration options existed at the time this question asked, but now it is possible now to specify which header SFTPGo should look at to retrieve the original client IP and from which source IP(s) this header should be trusted using the options In the case of Cloudflare, it passes on the |
Beta Was this translation helpful? Give feedback.
-
|
Thanks but if i get you right, this is not really what i want to do. Your answer relates to allowing certain IPs as allowed for the originating proxy and disallowing all others. What i want to achieve is to get the originating client IP passed through to my SFTPGO so i can use it for a dynamic banning (e.g. 3x times wrong password). |
Beta Was this translation helpful? Give feedback.
-
|
@tomwiggers answer is what you're looking for. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I wonder if anyone managed to get the IP banlist to work correctly behind cloudflare as proxy (zero trust).
The problem is that cloudflare will only pass on the cloudflare proxy IP to SFTPGO but not the originating visitors IP.
That makes IP banning pretty much unusable.
Here is a cloudflare documentation that explains how to pass on the originating visitors IP to an application: https://developers.cloudflare.com/support/troubleshooting/restoring-visitor-ips/restoring-original-visitor-ips/
I have honestly no big clue if there is any way to integrate this into SFTPGO.
Beta Was this translation helpful? Give feedback.
All reactions