Support Real Client IP Logging via X-Forwarded-For Header
#3873
conquestace
started this conversation in
Ideas
Replies: 1 comment
-
|
I actually just fixed a bug where the security middleware was not using the forwarding header. I'll have to check about this real-ip header. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Idea Description
Is your feature request related to a problem? Please describe.
I'm self-hosting Kavita behind a reverse proxy (nginx), and I'm using fail2ban to secure against brute-force login attempts. Currently, Kavita logs authentication attempts with the IP of the internal Docker network (e.g.,
172.18.0.1), not the real client IP. This makes it impossible to apply meaningful bans per external user, and only allows banning the proxy/Docker bridge IP.Describe the solution you'd like
Kavita should support parsing and logging the real client IP from the
X-Forwarded-Forand/orX-Real-IPheaders, if present. This is a common practice for applications behind a reverse proxy, and allows accurate client identification and security integrations (such as fail2ban or other ban/alert systems).Describe alternatives you've considered
Additional context
Other apps (e.g., Gitea, Jellyfin, Nextcloud) offer options to trust reverse proxy headers for client IP logging.
Implementing this feature would benefit all users running Kavita behind a reverse proxy and improve integration with existing security tooling.
Thank you for your hard work on Kavita!
Idea Category
Performance Improvement
Duration of Using Kavita
over a year now
Before submitting
Beta Was this translation helpful? Give feedback.
All reactions