• Request获取客户端IP


    获取客户端的IP地址的方法是:request.getRemoteAddr() ,这种方法在大部分情况下都是有效的。但是在通过了Apache,Squid等反向代理软件就不能获取到客户端的真实IP地址了。

    正向代理是客户端(google.com),反向代理是服务器(baidu.com)。


    如果使用了反向代理软件,将http://192.168.1.110:2046/ 的URL反向代理为http://www.xxx.com/ 的URL时,用request.getRemoteAddr() 方法获取的IP地址是:127.0.0.1 或 192.168.1.110 ,而并不是客户端的真实IP。
    经过代理以后,由于在客户端和服务之间增加了中间层,因此服务器无法直接拿到客户端的IP,服务器端应用也无法直接通过转发请求的地址返回给客户端。但是在转发请求的HTTP头信息中,增加了X-FORWARDED-FOR信息。用以跟踪原有的客户端IP地址和原来客户端请求的服务器地址。当我们访问http://www.xxx.com/index.jsp/ 时,其实并不是我们浏览器真正访问到了服务器上的index.jsp文件,而是先由代理服务器去访问http://192.168.1.110:2046/index.jsp ,代理服务器再将访问到的结果返回给我们的浏览器,因为是代理服务器去访问index.jsp的,所以index.jsp中通过request.getRemoteAddr() 的方法获取的IP实际上是代理服务器的地址,并不是客户端的IP地址。
    于是可得出获得客户端真实IP地址的方法一:

    public String getRemortIP(HttpServletRequest request) {
      if (request.getHeader("x-forwarded-for") == null) {
       return request.getRemoteAddr();
      }
      return request.getHeader("x-forwarded-for");
    }

    可是当我访问http://www.xxx.com/index.jsp/ 时,返回的IP地址始终是unknown,也并不是如上所示的127.0.0.1 或 192.168.1.110 了,而我访问http://192.168.1.110:2046/index.jsp 时,则能返回客户端的真实IP地址,写了个方法去验证。原因出在了Squid上。squid.conf 的配制文件 forwarded_for 项默认是为on,如果 forwarded_for 设成了 off  则:X-Forwarded-For: unknown
    于是可得出获得客户端真实IP地址的方法二:

    public String getRemoteHost(javax.servlet.http.HttpServletRequest request){
        if(request == null) {
    return "unknown";
    }
    String ip = request.getHeader("x-forwarded-for"); if(ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip)){ ip = request.getHeader("Proxy-Client-IP"); } if(ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip)){ ip = request.getHeader("WL-Proxy-Client-IP"); } if(ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip)){ ip = request.getRemoteAddr(); } return ip.equals("0:0:0:0:0:0:0:1")?"127.0.0.1":ip; }

     或

     1 public static String getIpAddr(HttpServletRequest request)
     2     {
     3         if (request == null)
     4         {
     5             return "unknown";
     6         }
     7         String ip = request.getHeader("x-forwarded-for");
     8         if (ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip))
     9         {
    10             ip = request.getHeader("Proxy-Client-IP");
    11         }
    12         if (ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip))
    13         {
    14             ip = request.getHeader("X-Forwarded-For");
    15         }
    16         if (ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip))
    17         {
    18             ip = request.getHeader("WL-Proxy-Client-IP");
    19         }
    20         if (ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip))
    21         {
    22             ip = request.getHeader("X-Real-IP");
    23         }
    24 
    25         if (ip == null || ip.length() == 0 || "unknown".equalsIgnoreCase(ip))
    26         {
    27             ip = request.getRemoteAddr();
    28         }
    29 
    30         return "0:0:0:0:0:0:0:1".equals(ip) ? "127.0.0.1" : ip;
    31     }
  • 相关阅读:
    这两天又是一次巨大的飞跃
    防范式编程:
    泛型那点儿事儿 泛型概述 简单样例代码
    FindPrivateKey X509
    Remoting Generic Async Queue (Release 3) 不受 Remoting 对象生存期过期约束
    AntiXSS Library v3.0
    X509 static RSACryptoServiceProvider 高并发加解密
    EncodingHelper Identify Encoding by BOM
    NetStatTool
    EditPlus 于 20090602 升级到 v3.11(340)
  • 原文地址:https://www.cnblogs.com/scmath/p/9668446.html
Copyright © 2020-2023  润新知