fix(rate-limit): only trust X-Forwarded-For from known reverse proxies

Without this guard any client could send X-Forwarded-For: <spoofed-ip>
and bypass per-IP rate limiting entirely.

Also switches expireAfterWrite → expireAfterAccess so the 1-minute
window starts at first request, not last, and fixes the .gitignore
entry that accidentally merged **/test-results/ and .worktrees/ into
one broken pattern.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
This commit is contained in:
Marcel
2026-04-19 01:20:11 +02:00
parent daea748a20
commit 103d454e14
3 changed files with 109 additions and 7 deletions

3
.gitignore vendored
View File

@@ -11,4 +11,5 @@ gitea/
scripts/large-data.sql
.vitest-attachments
**/test-results/.worktrees/
**/test-results/
.worktrees/

View File

@@ -14,10 +14,10 @@ public class RateLimitInterceptor implements HandlerInterceptor {
private static final int MAX_REQUESTS_PER_MINUTE = 10;
// Caffeine cache: per-IP counter that auto-expires after 1 minute of inactivity.
// Caffeine cache: per-IP counter that expires 1 minute after first access.
// Bounded to 10_000 entries to prevent OOM from IP exhaustion.
private final Cache<String, AtomicInteger> requestCounts = Caffeine.newBuilder()
.expireAfterWrite(1, TimeUnit.MINUTES)
.expireAfterAccess(1, TimeUnit.MINUTES)
.maximumSize(10_000)
.build();
@@ -35,10 +35,23 @@ public class RateLimitInterceptor implements HandlerInterceptor {
}
private String resolveClientIp(HttpServletRequest request) {
String forwarded = request.getHeader("X-Forwarded-For");
if (forwarded != null && !forwarded.isBlank()) {
return forwarded.split(",")[0].trim();
// Only trust X-Forwarded-For when the direct connection comes from a known
// reverse proxy (loopback or Docker private network). Trusting it unconditionally
// allows any client to spoof a different IP and bypass per-IP rate limiting.
String remoteAddr = request.getRemoteAddr();
if (isTrustedProxy(remoteAddr)) {
String forwarded = request.getHeader("X-Forwarded-For");
if (forwarded != null && !forwarded.isBlank()) {
return forwarded.split(",")[0].trim();
}
}
return request.getRemoteAddr();
return remoteAddr;
}
private boolean isTrustedProxy(String ip) {
return ip.equals("127.0.0.1") || ip.equals("::1")
|| ip.startsWith("10.")
|| ip.startsWith("172.")
|| ip.startsWith("192.168.");
}
}

View File

@@ -0,0 +1,88 @@
package org.raddatz.familienarchiv.config;
import jakarta.servlet.http.HttpServletRequest;
import jakarta.servlet.http.HttpServletResponse;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.springframework.http.HttpStatus;
import java.io.PrintWriter;
import java.io.StringWriter;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.Mockito.*;
class RateLimitInterceptorTest {
private RateLimitInterceptor interceptor;
private HttpServletRequest request;
private HttpServletResponse response;
private PrintWriter writer;
@BeforeEach
void setUp() throws Exception {
interceptor = new RateLimitInterceptor();
request = mock(HttpServletRequest.class);
response = mock(HttpServletResponse.class);
writer = new PrintWriter(new StringWriter());
when(response.getWriter()).thenReturn(writer);
when(request.getRemoteAddr()).thenReturn("1.2.3.4");
}
@Test
void allows_requests_below_limit() throws Exception {
for (int i = 0; i < 10; i++) {
assertThat(interceptor.preHandle(request, response, null)).isTrue();
}
}
@Test
void blocks_request_when_limit_exceeded() throws Exception {
for (int i = 0; i < 10; i++) {
interceptor.preHandle(request, response, null);
}
assertThat(interceptor.preHandle(request, response, null)).isFalse();
verify(response).setStatus(HttpStatus.TOO_MANY_REQUESTS.value());
}
@Test
void different_ips_have_independent_limits() throws Exception {
HttpServletRequest other = mock(HttpServletRequest.class);
when(other.getRemoteAddr()).thenReturn("9.9.9.9");
for (int i = 0; i < 10; i++) {
interceptor.preHandle(request, response, null);
}
// first IP is at limit — second IP is not
assertThat(interceptor.preHandle(other, response, null)).isTrue();
}
@Test
void ignores_x_forwarded_for_from_untrusted_remote_addr() throws Exception {
when(request.getRemoteAddr()).thenReturn("5.5.5.5"); // not a trusted proxy
when(request.getHeader("X-Forwarded-For")).thenReturn("99.99.99.99");
// exhaust the limit for the real remote IP (5.5.5.5), not the spoofed one
for (int i = 0; i < 10; i++) {
interceptor.preHandle(request, response, null);
}
assertThat(interceptor.preHandle(request, response, null)).isFalse();
// spoofed IP (99.99.99.99) should not have been rate-limited
HttpServletRequest clean = mock(HttpServletRequest.class);
when(clean.getRemoteAddr()).thenReturn("99.99.99.99");
assertThat(interceptor.preHandle(clean, response, null)).isTrue();
}
@Test
void trusts_x_forwarded_for_from_localhost() throws Exception {
when(request.getRemoteAddr()).thenReturn("127.0.0.1"); // trusted proxy
when(request.getHeader("X-Forwarded-For")).thenReturn("20.20.20.20");
for (int i = 0; i < 10; i++) {
interceptor.preHandle(request, response, null);
}
// the rate-limited IP should be 20.20.20.20 (from header), not 127.0.0.1
assertThat(interceptor.preHandle(request, response, null)).isFalse();
}
}