One of our common customers has been complaining about increased error rates and we’ve tracked the cause to the fact that some of your proxy nodes are sending out conflicting information.
It’s… acceptable… if the only supported header is x-nf-client-connection-ip
, but can you fix your setup to not send garbage in the other headers?
Looking back into application error logs, there was a period between Mar 16 and Mar 23 when we would occasionally see 127.0.0.1
in client-ip
, an instance on Apr 14 when we saw two different globally routable IPs:
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="80.7.…" HTTP_X_FORWARDED_FOR="85.115.…")
(note that in these errors, x-forwarded-for
comes from x-nf-client-connection-ip
; we normalise it elsewhere)
But as of Jun 25 we’ve been seeing internally reserved IPs show up very frequently:
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.114" HTTP_X_FORWARDED_FOR="2600:1700:…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.114" HTTP_X_FORWARDED_FOR="199.59.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.17" HTTP_X_FORWARDED_FOR="54.221.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.106" HTTP_X_FORWARDED_FOR="3.238.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.17" HTTP_X_FORWARDED_FOR="50.229.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.124" HTTP_X_FORWARDED_FOR="2003:e9:…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.106" HTTP_X_FORWARDED_FOR="68.132.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.88" HTTP_X_FORWARDED_FOR="2603:7000:…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.17" HTTP_X_FORWARDED_FOR="107.150.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.17" HTTP_X_FORWARDED_FOR="107.150.…")
ActionDispatch::RemoteIp::IpSpoofAttackError (IP spoofing attack?! HTTP_CLIENT_IP="100.64.0.114" HTTP_X_FORWARDED_FOR="24.108.…")
And the customer’s users have started to complain about increased error rates as a result.