Skip to content

Commit 3a025f3

Browse files
committed
Reword
1 parent 75cf3ed commit 3a025f3

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

deployment/proxies.rst

+7-5
Original file line numberDiff line numberDiff line change
@@ -76,11 +76,12 @@ That's it! It's critical that you prevent traffic from all non-trusted sources.
7676
If you allow outside traffic, they could "spoof" their true IP address and
7777
other information.
7878

79-
.. caution::
80-
81-
In case you are also using `CloudFront`_ or another reverse proxy on top of your load balancer, calling ``$request->server->get('REMOTE_ADDR')`` as in the above example won't be enough, as it will only whitelist the node sitting directly above your application (in this case your load balancer). You need to make sure you also append the IP addresses or ranges of any additional proxy to the array of trusted proxies.
82-
83-
In the case of `CloudFront`_, you can find the list of IP ranges `at this address <https://ip-ranges.amazonaws.com/ip-ranges.json>`_.
79+
If you are also using a reverse proxy on top of your load balancer (e.g.
80+
`CloudFront`_), calling ``$request->server->get('REMOTE_ADDR')`` won't be
81+
enough, as it will only trust the node sitting directly above your application
82+
(in this case your load balancer). You also need to append the IP addresses or
83+
ranges of any additional proxy (e.g. `CloudFront IP ranges`_) to the array of
84+
trusted proxies.
8485

8586
Custom Headers When Using a Reverse Proxy
8687
-----------------------------------------
@@ -100,3 +101,4 @@ In this case, you'll need to set the header ``X-Forwarded-Proto`` with the value
100101

101102
.. _`security groups`: http://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-security-groups.html
102103
.. _`CloudFront`: https://en.wikipedia.org/wiki/Amazon_CloudFront
104+
.. _`CloudFront IP ranges`: https://ip-ranges.amazonaws.com/ip-ranges.json

0 commit comments

Comments
 (0)