Support for X-Forwarded-For?
-
I’m using Login Lockdown on a WP server that’s in use as our primary CMS. It sits behind a web application firewall, and so every request to my web server has the
$_SERVER['REMOTE_ADDR']
set to the firewall’s IP address (call it1.2.3.4
). The firewall sets theX-Forwarded-For
header, so that’s available both as$_SERVER['HTTP_X_FORWARDED_FOR']
and in the returned array fromapache_request_headers()
.Where I’m running into problems is if several people fat-finger the wrong password in a short span of time (eg, first thing in the morning, when everyone arrives at work). Because they’re all passing through the firewall, Login Lockdown sees them all coming from
1.2.3.4
, and decides that it’s lockdown time.Is there a way for someone in my situation to filter the IP address that is assigned to a failed login? I don’t see anything in the code as it stands, and I’m loath to make changes to someone else’s plugin — especially if there are updates forthcoming.
- The topic ‘Support for X-Forwarded-For?’ is closed to new replies.