Page MenuHomePhabricator

Allow global blocks based on X-Forwarded-For header (XFF)
Closed, ResolvedPublic

Description

http://www.mediawiki.org/wiki/Talk:Admin_tools_development#Ability_to_block_referring_IP_on_XFF

In addition to what Billinghurst has requested, it might be nice if in the future, an abuser uses carrier-grade NAT, we can block something like "103.6.23.5/24/xff:10.0.0.0/16" as well.


Version: unspecified
Severity: enhancement
See Also:
https://bugzilla.wikimedia.org/show_bug.cgi?id=23343

Details

Reference
bz42438

Event Timeline

bzimport raised the priority of this task from to Low.Nov 22 2014, 12:58 AM
bzimport added a project: GlobalBlocking.
bzimport set Reference to bz42438.
bzimport added a subscriber: Unknown Object (MLST).
  • This bug has been marked as a duplicate of bug 23343 ***

(not entirely a duplicate of the other bug)

Global blocking is Gerrit change 42884 which was merged

The "normal" blocking (not global) is at bug 23343, which wasn't needed to fix this bug, so removing it as dependency of this one.