Skip to content

fix request.ip and request.remote_ip in rails when using cloudflare

License

Notifications You must be signed in to change notification settings

wrapbook/cloudflare-rails

 
 

Repository files navigation

Cloudflare::Rails Gem Version CircleCI

This gem correctly configures Rails for CloudFlare so that request.remote_ip / request.ip both work correctly.

Rails Compatibility

This gem requires railties, activesupport, and actionpack >= 6.1. For older rails versions see the chart below:

rails version cloudflare-rails version
6.0 3.0.0
5.2 2.4.0
5.1 2.0.0
5.0 2.0.0
4.2 0.1.0
----- -------

Installation

Add this line to your application's Gemfile:

group :production do
  # or :staging or :beta or whatever environments you are using cloudflare in.
  # you probably don't want this for :test or :development
  gem 'cloudflare-rails'
end

And then execute:

$ bundle

Problem

Using Cloudflare means it's hard to identify the IP address of incoming requests since all requests are proxied through Cloudflare's infrastructure. Cloudflare provides a CF-Connecting-IP header which can be used to identify the originating IP address of a request. However, this header alone doesn't verify a request is legitimate. If an attacker has found the actual IP address of your server they could spoof this header and masquerade as legitimate traffic.

cloudflare-rails mitigates this attack by checking that the originating ip address of any incoming connection is from one of Cloudflare's ip address ranges. If so, the incoming X-Forwarded-For header is trusted and used as the ip address provided to rack and rails (via request.ip and request.remote_ip). If the incoming connection does not originate from a Cloudflare server then the X-Forwarded-For header is ignored and the actual remote ip address is used.

Usage

This code will fetch CloudFlare's current IPv4 and IPv6 lists, store them in Rails.cache, and add them to config.cloudflare.ips. The X-Forwarded-For header will then be trusted only from those ip addresses.

You can configure the HTTP timeout and expires_in cache parameters inside of your rails config:

config.cloudflare.expires_in = 12.hours # default value
config.cloudflare.timeout = 5.seconds # default value

Alternatives

actionpack-cloudflare simpler approach using the CF-Connecting-IP header.

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake spec to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and tags, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/modosc/cloudflare-rails.

About

fix request.ip and request.remote_ip in rails when using cloudflare

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Ruby 99.4%
  • Shell 0.6%