[Bug 1931815] [NEW] the %{remote_ip} output format is broken on proxied connections
Bill Yikes
1931815 at bugs.launchpad.net
Sun Jun 13 20:15:37 UTC 2021
Public bug reported:
This is how a Tor user would use cURL to grab a header, and also expect
to be told which IP address was contacted:
curl --ssl --socks4a 127.0.0.1:9050 -L --head -w '(effective URL =>
"%{url_effective} @ %{remote_ip}")' "$target_url"
It's broken because the "remote_ip" is actually just printed as the
127.0.0.1 (likely that of the proxy server not the remote target host).
tested on curl ver 7.52.1
** Affects: curl (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/1931815
Title:
the %{remote_ip} output format is broken on proxied connections
Status in curl package in Ubuntu:
New
Bug description:
This is how a Tor user would use cURL to grab a header, and also
expect to be told which IP address was contacted:
curl --ssl --socks4a 127.0.0.1:9050 -L --head -w '(effective URL =>
"%{url_effective} @ %{remote_ip}")' "$target_url"
It's broken because the "remote_ip" is actually just printed as the
127.0.0.1 (likely that of the proxy server not the remote target
host).
tested on curl ver 7.52.1
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/curl/+bug/1931815/+subscriptions
More information about the foundations-bugs
mailing list