Skip to content

Commit c6c9df5

Browse files
Update asp.net breaking change (#9934)
* Update asp.net breaking change * Update known-issues.md * Update known-issues.md * Update known-issues.md * Update known-issues.md --------- Co-authored-by: Brennan <[email protected]>
1 parent b6a5711 commit c6c9df5

File tree

2 files changed

+16
-0
lines changed

2 files changed

+16
-0
lines changed

release-notes/8.0/known-issues.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,14 @@
22

33
You may encounter the following known issues, which may include workarounds, mitigations, or expected resolution timeframes.
44

5+
## ASP.NET
6+
7+
### [8.0.17] Breaking Change: UseForwardedHeaders middleware now always checks ForwardedHeadersOptions.KnownNetworks and ForwardedHeadersOptions.KnownProxies
8+
9+
`UseForwardedHeaders` middleware now always checks `ForwardedHeadersOptions.KnownNetworks` and `ForwardedHeadersOptions.KnownProxies`. Because both `KnownNetworks` and `KnownProxies` default to Loopback this means deployed applications may fail to apply `X-Forwarded-*` headers resulting in properties like scheme and host not being updated which can have side-effects e.g. `UseHttpsRedirection()` might always see http and always redirecting the request.
10+
11+
The recommended fix is to set the `KnownNetworks` and `KnownProxies` values to the appropriate values. See https://learn.microsoft.com/aspnet/core/host-and-deploy/proxy-load-balancer for more details on using proxies and `UseForwardedHeaders()`. Alternatively, if you are fine accepting `X-Forwarded-*` headers from any source, which introduces security vulnerabilities, you can clear the `KnownNetworks` and `KnownProxies` properties.
12+
513
## .NET SDK
614

715
### [8.0.4xx] `dotnet workload restore` with a workload set configured in the global.json will not work

release-notes/9.0/known-issues.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,14 @@
22

33
You may encounter the following known issues, which may include workarounds, mitigations, or expected resolution timeframes.
44

5+
## ASP.NET
6+
7+
### [9.0.6] Breaking Change: UseForwardedHeaders middleware now always checks ForwardedHeadersOptions.KnownNetworks and ForwardedHeadersOptions.KnownProxies
8+
9+
`UseForwardedHeaders` middleware now always checks `ForwardedHeadersOptions.KnownNetworks` and `ForwardedHeadersOptions.KnownProxies`. Because both `KnownNetworks` and `KnownProxies` default to Loopback this means deployed applications may fail to apply `X-Forwarded-*` headers resulting in properties like scheme and host not being updated which can have side-effects e.g. `UseHttpsRedirection()` might always see http and always redirecting the request.
10+
11+
The recommended fix is to set the `KnownNetworks` and `KnownProxies` values to the appropriate values. See https://learn.microsoft.com/aspnet/core/host-and-deploy/proxy-load-balancer for more details on using proxies and `UseForwardedHeaders()`. Alternatively, if you are fine accepting `X-Forwarded-*` headers from any source, which introduces security vulnerabilities, you can clear the `KnownNetworks` and `KnownProxies` properties.
12+
513
## .NET WPF
614

715
### 1. Usage of incorrect types as DynamicResource

0 commit comments

Comments
 (0)