• I see that in 3 different sites on the same machine all the brute force request are done by the host 127.0.0.1.
    I don’t understand why not show the real IP address and also how they try to login after the enabling of the hide backend feature with a new url.
    Any suggestions?

Viewing 9 replies - 1 through 9 (of 9 total)
  • Thread Starter Daniele Scasciafratte

    (@mte90)

    Seembs in my case that there is a cache webserver in the middle so the ip is this but in the header the real ip is available on X-FORWARDED-FOR but is ignored by the plugin.

    pronl

    (@pronl)

    @mte90

    Make sure the Override Proxy Detection setting is not enabled in the Global Settings module.

    • This reply was modified 8 years ago by pronl.
    • This reply was modified 8 years ago by pronl.
    Thread Starter Daniele Scasciafratte

    (@mte90)

    That option is already disabled.

    Thread Starter Daniele Scasciafratte

    (@mte90)

    As I can see in the code there is no reference for that header so I think that is a bug or a missing feature on the plugin.

    pronl

    (@pronl)

    @mte90

    Look for HTTP_X_FORWARDED_FOR

    Even if a certain HTTP header is not included in the plugin code, the plugin offers a filter to add any missing HTTP header(s) …

    Thread Starter Daniele Scasciafratte

    (@mte90)

    You are right, I was looking for the wrong header.
    The filter is itsec_filter_remote_addr_headers, I have to check for the right header name.

    Thread Starter Daniele Scasciafratte

    (@mte90)

    I resolved with this:

    add_filter('itsec_filter_remote_addr_headers', function($headers) {
        $headers[] = 'X-Forwarded-For';
        return $headers;
    });
    
    pronl

    (@pronl)

    @mte90

    Thanks for sharing that.
    Looks like a custom HTTP header. Usually it would look like ‘HTTP_X_FORWARDED_FOR’.
    But that is already included in the get_ip() method.

    Where did you put that piece of code anyway ? In the active theme functions.php file ?

    You probably got lucky because according to the 5.7.1 Changelog:

    Bug Fix: Remote IP is now correctly identified if the server is behind a reverse proxy that sends requests with more than one IP listed in a single header.

    and

    Enhancement: Improved the logic for determing the requesting IP address to better handle situations where the site is behind a reverse proxy.

    The 5.7.1 plugin was released yesterday ??

    Thread Starter Daniele Scasciafratte

    (@mte90)

    I created a little plugin for that ??

Viewing 9 replies - 1 through 9 (of 9 total)
  • The topic ‘127.0.0.1 as host of brute force’ is closed to new replies.