Fixed
Details
Assignee
Guus der KinderenGuus der KinderenReporter
Guus der KinderenGuus der KinderenIgnite Forum URL
Fix versions
Priority
Medium
Details
Details
Assignee
Guus der Kinderen
Guus der KinderenReporter
Guus der Kinderen
Guus der KinderenIgnite Forum URL
Fix versions
Priority
Created October 27, 2023 at 9:04 AM
Updated November 30, 2023 at 9:36 AM
Resolved November 30, 2023 at 9:36 AM
A community member reports in the Ignite forums that, when using Openfire’s admin console through a reverse proxy, the X-Forwarded-For header content is not used for when recording messages in the security audit logs. They contain messages like these:
The logs from the reverse proxy show:
The desired behavior is that the IP address as recorded in the reverse proxy log (192.168.2.192 in the example above) is used in Openfire’s security log.
It is assumed (but not verified by me) that the expected IP address is indeed added to a X-Forwarded-For HTTP header. The community member reports that the Openfire system property
adminConsole.forwarded.enabled
is set totrue
.The version of Openfire that was used is 4.7.6. I have not tried to reproduce this problem.