-
Notifications
You must be signed in to change notification settings - Fork 29
Use X-Forwarded-For header as ip if set #242
Comments
We source the We may consider adding support for this to the library, but an immediate solution would be to use a secondary package intended for this purpose. At this time, it seems like |
Another thing related to IPs would be an option anonymize the IP in the context plug. Most tools just seem to strip the last part of the ip. |
Would it be preferable to just have it removed completely? I'm thinking about this from a service standpoint. If we only send part of the IP, that's not useful for reading or querying the logs, so it ends up being extra data that will never be useful. Meanwhile, not sending the IP at all frees up (very little) space but also means that potentially identifiable data is never sent to a third-party (Timber). Also, depending on the IP block, only removing the last part of the IP doesn't result in anonymity. |
German data security laws are a pain, but basically you could still run things like geo location on a trimmed ip, but it's no longer identifing the user close enough so you're not violating the law, while it's still a gray area for not trimming ips. Maybe the plug could just allow for a mfa option, so people can implement their own trimming. |
I used the |
Using nginx in front of phoenix will result in logs all coming from the same
http.remote_addr
. It would be nice if this ip could also be supplied by anX-Forwarded-For
header set by nginx.The text was updated successfully, but these errors were encountered: