Thanks for your responses!
I tried updating to CRS 3.1.0 and modsecurity 3.0.3. Unfortunately, I get
the same behavior. I see a log entry for rule 949110 in the nginx
error.log file. But I do not see any other log entries that tell me which
rules led to the high anomaly score in either the nginx error.log nor in
the modescurity audit log. The modsecurity debug log is more helpful, but
I can't run with debugging turned on in production. This context is needed
for us to understand why traffic was blocked so that we have information
required to address an attack or exclude a rule. At this point, I think I
need to switch from anomaly scoring mode to self contained mode. It looks
like anomaly scoring mode with nginx does not provide enough context in the
logs to be usable. As a future request, it would be good to have rule
949110 provide a list of rule ids which led to the high anomaly score.
Thanks,
Dan
On Fri, Jan 25, 2019 at 3:13 PM Gregory LeFevre <gr...@cl...> wrote:
>
> Hi Dan,
>
> Just a guess, but what happens if you change the nginx *error_log* severity
> level to *info* and restart (rather than reload) nginx?
>
> Granted that I don't know what you may already have the nginx log level
> set to and whether the fact that you already see the "Anomaly Score
> Exceeded" message disrupts my theory, but, again, just a guess.
>
> Gregory
>
> On Fri, Jan 25, 2019 at 8:45 AM Dan Oppenheimer <
> dan...@po...> wrote:
>
>> Hi all,
>>
>> We have modsecurity 3.0.2 being used by nginx 1.14.0 via the
>> modsecurity/nginx connector. We are using the core rule set 3.0.2
>> configured for anomaly scoring. The following is being blocked by
>> modsecurity:
>>
>> 2019/01/24 10:17:52 [warn] 22326#0: *120 [client 172.16.17.54]
>> ModSecurity: Warning. Matched "Operator `Ge' with parameter `5' against
>> variable `TX:ANOMALY_SCORE' (Value: `10' ) [file
>> "/etc/nginx/modsec/owasp-modsecurity-crs-3.0.2/rules/REQUEST-949-BLOCKING-EVALUATION.conf"]
>> [line "36"] [id "949110"] [rev ""] [msg "Inbound Anomaly Score Exceeded
>> (Total Score: 10)"] [data ""] [severity "2"] [ver ""] [maturity "0"]
>> [accuracy "0"] [hostname "172.16.17.54"] [uri
>> "/api/auto-engagement/list/b107e2c8-b4e4-470a-b10d-025b11b376cd"]
>> [unique_id "154834307287.337943"] [ref ""], client: 172.16.17.54, server:
>> stress-secure-pointillist.altidev.net, request: "DELETE
>> /api/auto-engagement/list/b107e2c8-b4e4-470a-b10d-025b11b376cd HTTP/1.1",
>> host: "stress-secure-pointillist.altidev.net", referrer: "
>> https://test.pointillist.com/studio/story/d5fac22e-e0eb-49ea-8297-a0ec11ce1149
>> "
>>
>> But I do not see any other log message in either the nginx error.log or
>> the modsecurity audit log. As rule 949110 is the rule which determines
>> whether or not the anomaly score is high enough to be blocked, I would
>> expect to see more context in one or both of those files. That is, I would
>> expect to see one or more log message for the rules that triggered the high
>> anomaly score. I have set DELETE to an allowed header in the
>> crs-setup.conf file:
>>
>> SecAction \
>> "id:900200,\
>> phase:1,\
>> nolog,\
>> pass,\
>> t:none,\
>> setvar:'tx.allowed_methods=GET HEAD POST OPTIONS PUT PATCH DELETE'"
>>
>> I have also enabled audit logging in the modsecurity.conf file:
>>
>> SecAuditEngine On
>>
>> SecAuditLogRelevantStatus "^(?:5|4(?!04))"
>>
>> # Log everything we know about a transaction.
>> SecAuditLogParts ABIJDEFHKZ
>>
>> SecAuditLogType Serial
>> SecAuditLog /var/log/nginx/modsec_audit.log
>>
>> Thanks,
>>
>> Dan
>> --
>> DevOps Engineer
>> Pointillist, Inc
>> _______________________________________________
>> mod-security-users mailing list
>> mod...@li...
>> https://lists.sourceforge.net/lists/listinfo/mod-security-users
>> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
>> http://www.modsecurity.org/projects/commercial/rules/
>> http://www.modsecurity.org/projects/commercial/support/
>>
> _______________________________________________
> mod-security-users mailing list
> mod...@li...
> https://lists.sourceforge.net/lists/listinfo/mod-security-users
> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
> http://www.modsecurity.org/projects/commercial/rules/
> http://www.modsecurity.org/projects/commercial/support/
>
--
DevOps Engineer
Pointillist, Inc
|