mod-security-users Mailing List for ModSecurity (Page 35)
Brought to you by:
victorhora,
zimmerletw
You can subscribe to this list here.
| 2003 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
(17) |
Aug
(7) |
Sep
(8) |
Oct
(11) |
Nov
(14) |
Dec
(19) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
(46) |
Feb
(14) |
Mar
(20) |
Apr
(48) |
May
(15) |
Jun
(20) |
Jul
(36) |
Aug
(24) |
Sep
(31) |
Oct
(28) |
Nov
(23) |
Dec
(12) |
| 2005 |
Jan
(69) |
Feb
(61) |
Mar
(82) |
Apr
(53) |
May
(26) |
Jun
(71) |
Jul
(27) |
Aug
(52) |
Sep
(28) |
Oct
(49) |
Nov
(104) |
Dec
(74) |
| 2006 |
Jan
(61) |
Feb
(148) |
Mar
(82) |
Apr
(139) |
May
(65) |
Jun
(116) |
Jul
(92) |
Aug
(101) |
Sep
(84) |
Oct
(103) |
Nov
(174) |
Dec
(102) |
| 2007 |
Jan
(166) |
Feb
(161) |
Mar
(181) |
Apr
(152) |
May
(192) |
Jun
(250) |
Jul
(127) |
Aug
(165) |
Sep
(97) |
Oct
(135) |
Nov
(206) |
Dec
(56) |
| 2008 |
Jan
(160) |
Feb
(135) |
Mar
(98) |
Apr
(89) |
May
(115) |
Jun
(95) |
Jul
(188) |
Aug
(167) |
Sep
(153) |
Oct
(84) |
Nov
(82) |
Dec
(85) |
| 2009 |
Jan
(139) |
Feb
(133) |
Mar
(128) |
Apr
(105) |
May
(135) |
Jun
(79) |
Jul
(92) |
Aug
(134) |
Sep
(73) |
Oct
(112) |
Nov
(159) |
Dec
(80) |
| 2010 |
Jan
(100) |
Feb
(116) |
Mar
(130) |
Apr
(59) |
May
(88) |
Jun
(59) |
Jul
(69) |
Aug
(67) |
Sep
(82) |
Oct
(76) |
Nov
(59) |
Dec
(34) |
| 2011 |
Jan
(84) |
Feb
(74) |
Mar
(81) |
Apr
(94) |
May
(188) |
Jun
(72) |
Jul
(118) |
Aug
(109) |
Sep
(111) |
Oct
(80) |
Nov
(51) |
Dec
(44) |
| 2012 |
Jan
(80) |
Feb
(123) |
Mar
(46) |
Apr
(12) |
May
(40) |
Jun
(62) |
Jul
(95) |
Aug
(66) |
Sep
(65) |
Oct
(53) |
Nov
(42) |
Dec
(60) |
| 2013 |
Jan
(96) |
Feb
(96) |
Mar
(108) |
Apr
(72) |
May
(115) |
Jun
(111) |
Jul
(114) |
Aug
(87) |
Sep
(93) |
Oct
(97) |
Nov
(104) |
Dec
(82) |
| 2014 |
Jan
(96) |
Feb
(77) |
Mar
(71) |
Apr
(40) |
May
(48) |
Jun
(78) |
Jul
(54) |
Aug
(44) |
Sep
(58) |
Oct
(79) |
Nov
(51) |
Dec
(52) |
| 2015 |
Jan
(55) |
Feb
(59) |
Mar
(48) |
Apr
(40) |
May
(45) |
Jun
(63) |
Jul
(36) |
Aug
(49) |
Sep
(35) |
Oct
(58) |
Nov
(21) |
Dec
(47) |
| 2016 |
Jan
(35) |
Feb
(81) |
Mar
(43) |
Apr
(41) |
May
(77) |
Jun
(52) |
Jul
(39) |
Aug
(34) |
Sep
(107) |
Oct
(67) |
Nov
(54) |
Dec
(20) |
| 2017 |
Jan
(99) |
Feb
(37) |
Mar
(86) |
Apr
(47) |
May
(57) |
Jun
(55) |
Jul
(34) |
Aug
(31) |
Sep
(16) |
Oct
(49) |
Nov
(53) |
Dec
(33) |
| 2018 |
Jan
(25) |
Feb
(11) |
Mar
(79) |
Apr
(77) |
May
(5) |
Jun
(19) |
Jul
(17) |
Aug
(7) |
Sep
(13) |
Oct
(22) |
Nov
(13) |
Dec
(68) |
| 2019 |
Jan
(44) |
Feb
(17) |
Mar
(40) |
Apr
(39) |
May
(18) |
Jun
(14) |
Jul
(20) |
Aug
(31) |
Sep
(11) |
Oct
(35) |
Nov
(3) |
Dec
(10) |
| 2020 |
Jan
(32) |
Feb
(16) |
Mar
(10) |
Apr
(22) |
May
(2) |
Jun
(34) |
Jul
(1) |
Aug
(8) |
Sep
(36) |
Oct
(16) |
Nov
(13) |
Dec
(10) |
| 2021 |
Jan
(16) |
Feb
(23) |
Mar
(45) |
Apr
(28) |
May
(6) |
Jun
(17) |
Jul
(8) |
Aug
(1) |
Sep
(2) |
Oct
(35) |
Nov
|
Dec
(5) |
| 2022 |
Jan
|
Feb
(17) |
Mar
(23) |
Apr
(23) |
May
(9) |
Jun
(8) |
Jul
|
Aug
|
Sep
(7) |
Oct
(5) |
Nov
(16) |
Dec
(4) |
| 2023 |
Jan
|
Feb
|
Mar
(3) |
Apr
|
May
(1) |
Jun
(4) |
Jul
(1) |
Aug
|
Sep
(2) |
Oct
(1) |
Nov
|
Dec
|
| 2024 |
Jan
(7) |
Feb
(13) |
Mar
(18) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
(1) |
Nov
(5) |
Dec
(3) |
| 2025 |
Jan
|
Feb
|
Mar
|
Apr
(12) |
May
(12) |
Jun
(2) |
Jul
(3) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: Christian F. <chr...@ne...> - 2019-01-22 13:42:57
|
Hi Peter, On Tue, Jan 22, 2019 at 02:07:28PM +0100, Peter Bittner wrote: > I'm looking for documentation (or a source file) listing the configurable > folders of the WAF and their meaning. Good plan. > When I look at a host we run, there are the following folders and files in > `/modsecurity`: > > - apache/ > - audit/ > - data/ > - tmp/ > - upload/ > - modsec_audit.log > - virus-check.log The ModSecurity Handbook is covering this in sufficient detail. Nicolas / Bigli is supposed to have a copy AFAICT. If not, let me know and I'll send you one. Please make sure you get the partition restriction between /tmp and /upload right (need to be on the same partition). Other than that, I suggest to keep modsec_audit.log and audit/ together. They former references files in the latter. Best, Christian -- Besides, Emacs would be a far better OS if it shipped with a halfway-decent text editor - like vi for example. |
|
From: Peter B. <pet...@vs...> - 2019-01-22 13:21:41
|
I'm looking for documentation (or a source file) listing the configurable folders of the WAF and their meaning. When I look at a host we run, there are the following folders and files in `/modsecurity`: - apache/ - audit/ - data/ - tmp/ - upload/ - modsec_audit.log - virus-check.log I need to know which folders (and files) are meant to contain data that is persisted (such as, probably, "audit" and "*.log") and which ones contain ephemeral data that we may mount somewhere where the OS throws the content away on, say, reboots (such as, probably, "tmp" and "upload"). Is there a specific documentation on this? Any hints that help me better understand are appreciated! Peter |
|
From: Christian F. <chr...@ne...> - 2019-01-20 05:54:10
|
Davy, This is a very old recipe dating back to ModSecurity 1.0. You will have to transpose it to ModSec 2.0 / 3.0 syntax with the SecRule directive and all the mandatory actions that come with it. Best, Christian On Fri, Jan 18, 2019 at 02:58:55PM +0000, Davy Gunarso via mod-security-users wrote: > Hello, > I already understand about the ModSecurity CRS. I am trying to understand Ivan Ristic presentation - https://docs.huihoo.com/modsecurity/Web_Intruction_Detection_with_ModSecurity.pdf > I wonder when I should write this: > SecFilter "DELETE[[:space:]]+FROM" > Thanks in advance. > Davy > > > Dikirim dari Yahoo Mail di Android > > Pada Rab, 16 Jan 2019 pada 19:36, Manuel Spartan<spa...@gm...> menulis: _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ |
|
From: Davy G. <da...@ya...> - 2019-01-18 14:59:08
|
Hello, I already understand about the ModSecurity CRS. I am trying to understand Ivan Ristic presentation - https://docs.huihoo.com/modsecurity/Web_Intruction_Detection_with_ModSecurity.pdf I wonder when I should write this: SecFilter "DELETE[[:space:]]+FROM" Thanks in advance. Davy Dikirim dari Yahoo Mail di Android Pada Rab, 16 Jan 2019 pada 19:36, Manuel Spartan<spa...@gm...> menulis: _______________________________________________ mod-security-users mailing list mod...@li... https://lists.sourceforge.net/lists/listinfo/mod-security-users Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: http://www.modsecurity.org/projects/commercial/rules/ http://www.modsecurity.org/projects/commercial/support/ |
|
From: Robert P. <rpa...@fe...> - 2019-01-16 15:50:14
|
You may want to have a look at client9’s libinjection library. Sent from my iPhone > On Jan 16, 2019, at 06:41, Davy Gunarso via mod-security-users <mod...@li...> wrote: > > Yes, I have but it is not for specific sqlia type it is a general or perhaps for all type. Since this is for my thesis I wonder if there is a specific sqlia type? > > Davy > > Dikirim dari Yahoo Mail di Android > > Pada Rab, 16 Jan 2019 pada 19:36, Manuel Spartan > <spa...@gm...> menulis: > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > <Untitled> > <Untitled> > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ |
|
From: Davy G. <da...@ya...> - 2019-01-16 14:41:17
|
Yes, I have but it is not for specific sqlia type it is a general or perhaps for all type. Since this is for my thesis I wonder if there is a specific sqlia type? Davy Dikirim dari Yahoo Mail di Android Pada Rab, 16 Jan 2019 pada 19:36, Manuel Spartan<spa...@gm...> menulis: _______________________________________________ mod-security-users mailing list mod...@li... https://lists.sourceforge.net/lists/listinfo/mod-security-users Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: http://www.modsecurity.org/projects/commercial/rules/ http://www.modsecurity.org/projects/commercial/support/ |
|
From: Manuel S. <spa...@gm...> - 2019-01-16 12:33:46
|
Hi Davy, Have you reviewed the owasp modsecurity core rule set project? https://github.com/SpiderLabs/owasp-modsecurity-crs Cheers! Sent from my iPhone > On 16 Jan 2019, at 02:51, Davy Gunarso via mod-security-users <mod...@li...> wrote: > > > Hello, > > Regarding Mod Security, I wonder if it is possible to write custom rule in mod security special for SQLIA attacked? > > For example: custom rule special for SQLIA Piggy backed tailed or custom rule special for SQLIA tautologies. > > Is that possible? > > Thanks in advance, > Davy > > On Thursday, January 3, 2019, 4:43:36 AM GMT+7, Manuel Spartan <spa...@gm...> wrote: > > > The content of the request body is parsed f there is a body processor enabled, which only happens by default in two cases (https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#ctl) > ``` > The requestBodyProcessor option allows you to configure the request body processor. By default, ModSecurity will use the URLENCODED and MULTIPART processors to process an application/x-www-form-urlencoded and a multipart/form-data body, respectively. Other two processors are also supported: JSON and XML, but they are never used implicitly. Instead, you must tell ModSecurity to use it by placing a few rules in the REQUEST_HEADERS processing phase. > ``` > This means that if your content is XML you must have a rule in phase 1 that forces the engine to parse it, same applies to JSON and any other content-type https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#REQBODY_PROCESSOR > > This also means that if the content-type is something else than `application/x-www-form-urlencoded` it will not populate the ARGS collection! That is the default in most cases. > > Now XML use its own collection while json will populate the same collection as urlencoded. > You may also want to read https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#SecRequestBodyAccess > > Happy new year! > > El mié., 2 ene. 2019 a las 13:50, Robert Paprocki (<rpa...@fe...>) escribió: > Hey Jai, > > I believe ARGS is only filled with the request body with the request is a urlencoded. Because ARGS and friends are treated as tabular variables, ModSecurity won't attempt to parse an XML body and at it into the ARGS or ARGS_POST variables, because there's no sane way to interpolate the document into key-value paired data. > > On Wed, Jan 2, 2019 at 10:21 AM Jai Harpalani via mod-security-developers <mod...@li...> wrote: > User-documentation states: > > "ARGS is a collection and can be used on its own (means all arguments including the POST Payload)..." > > Based on my testing, it does not appear that ARGS is including the POST payload. I am sending a POST request with the body shown below. I expect it to trigger Rule 930120, but it does not. > > Request Body: > > <?xml version='1.0' encoding='UTF-8'?> > <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> > <soapenv:Body> > <ns1:echo xmlns:ns1="http://example1.org/example1"> > <Text>hello .bashrc</Text> > </ns1:echo> > </soapenv:Body> > </soapenv:Envelope> > > _______________________________________________ > mod-security-developers mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-developers > ModSecurity Services from Trustwave's SpiderLabs: > https://www.trustwave.com/spiderLabs.php > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ |
|
From: Davy G. <da...@ya...> - 2019-01-16 07:51:38
|
Hello,
Regarding Mod Security, I wonder if it is possible to write custom rule in mod security special for SQLIA attacked?
For example: custom rule special for SQLIA Piggy backed tailed or custom rule special for SQLIA tautologies.
Is that possible?
Thanks in advance,Davy
On Thursday, January 3, 2019, 4:43:36 AM GMT+7, Manuel Spartan <spa...@gm...> wrote:
The content of the request body is parsed f there is a body processor enabled, which only happens by default in two cases (https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#ctl) ```The requestBodyProcessor option allows you to configure the request body processor. By default, ModSecurity will use the URLENCODED and MULTIPART processors to process an application/x-www-form-urlencoded and a multipart/form-data body, respectively. Other two processors are also supported: JSON and XML, but they are never used implicitly. Instead, you must tell ModSecurity to use it by placing a few rules in the REQUEST_HEADERS processing phase.```This means that if your content is XML you must have a rule in phase 1 that forces the engine to parse it, same applies to JSON and any other content-type https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#REQBODY_PROCESSOR
This also means that if the content-type is something else than `application/x-www-form-urlencoded` it will not populate the ARGS collection! That is the default in most cases.
Now XML use its own collection while json will populate the same collection as urlencoded.You may also want to read https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#SecRequestBodyAccess
Happy new year!
El mié., 2 ene. 2019 a las 13:50, Robert Paprocki (<rpa...@fe...>) escribió:
Hey Jai,
I believe ARGS is only filled with the request body with the request is a urlencoded. Because ARGS and friends are treated as tabular variables, ModSecurity won't attempt to parse an XML body and at it into the ARGS or ARGS_POST variables, because there's no sane way to interpolate the document into key-value paired data.
On Wed, Jan 2, 2019 at 10:21 AM Jai Harpalani via mod-security-developers <mod...@li...> wrote:
User-documentation states:
"ARGS is a collection and can be used on its own (means all arguments including the POST Payload)..."
Based on my testing, it does not appear that ARGS is including the POST payload. I am sending a POST request with the body shown below. I expect it to trigger Rule 930120, but it does not.
Request Body:
<?xml version='1.0' encoding='UTF-8'?><soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns1:echo xmlns:ns1="http://example1.org/example1"> <Text>hello .bashrc</Text> </ns1:echo> </soapenv:Body></soapenv:Envelope>
_______________________________________________
mod-security-developers mailing list
mod...@li...
https://lists.sourceforge.net/lists/listinfo/mod-security-developers
ModSecurity Services from Trustwave's SpiderLabs:
https://www.trustwave.com/spiderLabs.php
_______________________________________________
mod-security-users mailing list
mod...@li...
https://lists.sourceforge.net/lists/listinfo/mod-security-users
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
http://www.modsecurity.org/projects/commercial/rules/
http://www.modsecurity.org/projects/commercial/support/
_______________________________________________
mod-security-users mailing list
mod...@li...
https://lists.sourceforge.net/lists/listinfo/mod-security-users
Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
http://www.modsecurity.org/projects/commercial/rules/
http://www.modsecurity.org/projects/commercial/support/
|
|
From: Manuel S. <spa...@gm...> - 2019-01-02 21:42:02
|
The content of the request body is parsed f there is a body processor enabled, which only happens by default in two cases ( https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#ctl ) ``` The requestBodyProcessor option allows you to configure the request body processor. By default, ModSecurity will use the URLENCODED and MULTIPART processors to process an application/x-www-form-urlencoded and a multipart/form-data body, respectively. Other two processors are also supported: JSON and XML, but they are never used implicitly. Instead, *you must* tell ModSecurity to use it by placing a few rules in the REQUEST_HEADERS processing phase. ``` This means that if your content is XML you must have a rule in phase 1 that forces the engine to parse it, same applies to JSON and any other content-type https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#REQBODY_PROCESSOR This also means that if the content-type is something else than ` application/x-www-form-urlencoded` it will not populate the ARGS collection! That is the default in most cases. Now XML use its own collection while json will populate the same collection as urlencoded. You may also want to read https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#SecRequestBodyAccess Happy new year! El mié., 2 ene. 2019 a las 13:50, Robert Paprocki (< rpa...@fe...>) escribió: > Hey Jai, > > I believe ARGS is only filled with the request body with the request is a > urlencoded. Because ARGS and friends are treated as tabular variables, > ModSecurity won't attempt to parse an XML body and at it into the ARGS or > ARGS_POST variables, because there's no sane way to interpolate the > document into key-value paired data. > > On Wed, Jan 2, 2019 at 10:21 AM Jai Harpalani via mod-security-developers < > mod...@li...> wrote: > >> User-documentation states: >> >> "ARGS is a collection and can be used on its own (means all arguments >> including the POST Payload)..." >> >> Based on my testing, it does not appear that ARGS is including the POST >> payload. I am sending a POST request with the body shown below. I expect it >> to trigger Rule 930120, but it does not. >> >> Request Body: >> >> <?xml version='1.0' encoding='UTF-8'?> >> <soapenv:Envelope xmlns:soapenv=" >> http://schemas.xmlsoap.org/soap/envelope/"> >> <soapenv:Body> >> <ns1:echo xmlns:ns1="http://example1.org/example1"> >> <Text>hello .bashrc</Text> >> </ns1:echo> >> </soapenv:Body> >> </soapenv:Envelope> >> >> _______________________________________________ >> mod-security-developers mailing list >> mod...@li... >> https://lists.sourceforge.net/lists/listinfo/mod-security-developers >> ModSecurity Services from Trustwave's SpiderLabs: >> https://www.trustwave.com/spiderLabs.php > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |
|
From: Luciano G. F. <luc...@gm...> - 2019-01-02 20:51:22
|
I'm also using Cloudflare for all my sites, but I have this extension enabled in Apache (on Linux): https://github.com/cloudflare/mod_cloudflare So my apps and all mods (including modsec) see the real IP as it should be. I don't know how the things work in Windows, but maybe you can fix it at app level like they suggest here: https://support.cloudflare.com/hc/en-us/articles/200170666-How-do-I-correct-visitor-IP-with-Microsoft-IIS- El mié., 2 de ene. de 2019 a la(s) 15:32, Eero Volotinen ( eer...@ik...) escribió: > Hi. > > Take look of REQUEST-901-INITIALIZATION.con > > I think this line takes care of ip address pickup: > > SecAction \ > > "id:901321, \ > > phase:1, \ > > t:none, \ > > initcol:global=global, \ > > initcol:ip=%{remote_addr}_%{tx.ua_hash}, \ > > setvar:tx.real_ip=%{remote_addr}, \ > > nolog, \ > > You need to replace it with correct variable? > > Eero > > On Wed, Jan 2, 2019 at 7:30 PM Alexandros Kyrlis <ale...@me...> > wrote: > >> I have already replaced the REMOTE_ADDR var with {HTTP_CF_Connecting_IP} >> using IIS rewrite. >> It works. >> >> using PHP: >> >> echo ($_SERVER['REMOTE_ADDR']); >> >> Returns the real client IP address. >> >> But mod_security still uses the ip of the proxy. I do not know why. >> >> >> On 2 Ιαν 2019, at 19:03, Eero Volotinen <eer...@ik...> wrote: >> >> how about this: >> http://www.loadbalancer.org/blog/iis-and-x-forwarded-for-header/ >> >> Eero >> >> Alexandros Kyrlis via mod-security-users < >> mod...@li...> kirjoitti ke 2. tammik. 2019 >> klo 19.00: >> >>> Hello, >>> I'm using Mod Security with IIS 10. >>> When a rule is triggered, mod security creates an event log on event >>> viewer on Windows. >>> This log contais the REMOTE_ADDR value, but since we are behind a proxy >>> (Cloudflare) i would like it to log a custom header (CF_Connecting_IP) so >>> we get the real client IP. >>> Is it possible to do that? >>> Thanks >>> Alex >>> >>> >>> >>> _______________________________________________ >>> mod-security-users mailing list >>> mod...@li... >>> https://lists.sourceforge.net/lists/listinfo/mod-security-users >>> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: >>> http://www.modsecurity.org/projects/commercial/rules/ >>> http://www.modsecurity.org/projects/commercial/support/ >>> >> >> _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |
|
From: Jai H. <jai...@mu...> - 2019-01-02 19:14:51
|
Okay, here's a different question. This may not be the appropriate place to
ask, but I'll give it a shot.
There are many OWASP CRS rules which have XML in the list of operators, but
not REQUEST_BODY. An example of one is below.
SecRule
REQUEST_COOKIES|!REQUEST_COOKIES:/__utm/|REQUEST_COOKIES_NAMES|ARGS_NAMES|ARGS|XML:/*
"@pmf lfi-os-files.data" \
"phase:request,\
msg:'OS File Access Attempt',\
rev:'4',\
ver:'OWASP_CRS/3.0.0',\
maturity:'9',\
accuracy:'9',\
capture,\
t:none,t:utf8toUnicode,t:urlDecodeUni,t:normalizePathWin,t:lowercase,\
block,\
id:930120,\
. . .
This rule is searching for patterns specified in lfi-os-files.data. It is
not using Xpath expressions. The XML operator will be empty for non-xml
requests or when the xml parser is disabled. In these cases, wouldn't we
still want to search the request body for patterns specified in
lfi-os-files.data? Is there a reason that the patterns are only searched
for in the request body for XML requests?
On Wed, Jan 2, 2019 at 12:58 PM Reindl Harald <h.r...@th...>
wrote:
>
>
> Am 02.01.19 um 19:54 schrieb Jai Harpalani via mod-security-users:
> > Isn't the "POST Payload" equivalent to the body? If not, what exactly is
> > the "POST Payload"?
>
> hell how can any random XML stuff be a ARGUMENT and how do you imagine
> this to handeled performance wise?
>
> is it a post-param like <input type="text" anme"=arg" value"=whatever">
> no, it is not
>
> > On Wed, Jan 2, 2019 at 12:29 PM Reindl Harald <h.r...@th...
> > <mailto:h.r...@th...>> wrote:
> >
> >
> >
> > Am 02.01.19 um 18:55 schrieb Jai Harpalani via mod-security-users:
> > > User-documentation states:
> > >
> > > "ARGS is a collection and can be used on its own (means all
> arguments
> > > including the POST Payload)..."
> > >
> > > Based on my testing, it does not appear that ARGS is including the
> > POST
> > > payload. I am sending a POST request with the body shown below. I
> > expect
> > > it to trigger Rule 930120, but it does not.
> >
> > args and body are different worlds by definition
> >
> >
> > > Request Body:
> > >
> > > <?xml version='1.0' encoding='UTF-8'?>
> > > <soapenv:Envelope
> > xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
> > > <soapenv:Body>
> > > <ns1:echo xmlns:ns1="http://example1.org/example1">
> > > <Text>hello .bashrc</Text>
> > > </ns1:echo>
> > > </soapenv:Body>
> > > </soapenv:Envelope>
>
>
> _______________________________________________
> mod-security-users mailing list
> mod...@li...
> https://lists.sourceforge.net/lists/listinfo/mod-security-users
> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
> http://www.modsecurity.org/projects/commercial/rules/
> http://www.modsecurity.org/projects/commercial/support/
>
|
|
From: Reindl H. <h.r...@th...> - 2019-01-02 18:58:15
|
Am 02.01.19 um 19:54 schrieb Jai Harpalani via mod-security-users: > Isn't the "POST Payload" equivalent to the body? If not, what exactly is > the "POST Payload"? hell how can any random XML stuff be a ARGUMENT and how do you imagine this to handeled performance wise? is it a post-param like <input type="text" anme"=arg" value"=whatever"> no, it is not > On Wed, Jan 2, 2019 at 12:29 PM Reindl Harald <h.r...@th... > <mailto:h.r...@th...>> wrote: > > > > Am 02.01.19 um 18:55 schrieb Jai Harpalani via mod-security-users: > > User-documentation states: > > > > "ARGS is a collection and can be used on its own (means all arguments > > including the POST Payload)..." > > > > Based on my testing, it does not appear that ARGS is including the > POST > > payload. I am sending a POST request with the body shown below. I > expect > > it to trigger Rule 930120, but it does not. > > args and body are different worlds by definition > > > > Request Body: > > > > <?xml version='1.0' encoding='UTF-8'?> > > <soapenv:Envelope > xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> > > <soapenv:Body> > > <ns1:echo xmlns:ns1="http://example1.org/example1"> > > <Text>hello .bashrc</Text> > > </ns1:echo> > > </soapenv:Body> > > </soapenv:Envelope> |
|
From: Jai H. <jai...@mu...> - 2019-01-02 18:54:10
|
Isn't the "POST Payload" equivalent to the body? If not, what exactly is the "POST Payload"? On Wed, Jan 2, 2019 at 12:29 PM Reindl Harald <h.r...@th...> wrote: > > > Am 02.01.19 um 18:55 schrieb Jai Harpalani via mod-security-users: > > User-documentation states: > > > > "ARGS is a collection and can be used on its own (means all arguments > > including the POST Payload)..." > > > > Based on my testing, it does not appear that ARGS is including the POST > > payload. I am sending a POST request with the body shown below. I expect > > it to trigger Rule 930120, but it does not. > > args and body are different worlds by definition > > > > Request Body: > > > > <?xml version='1.0' encoding='UTF-8'?> > > <soapenv:Envelope xmlns:soapenv=" > http://schemas.xmlsoap.org/soap/envelope/"> > > <soapenv:Body> > > <ns1:echo xmlns:ns1="http://example1.org/example1"> > > <Text>hello .bashrc</Text> > > </ns1:echo> > > </soapenv:Body> > > </soapenv:Envelope> > > > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |
|
From: Robert P. <rpa...@fe...> - 2019-01-02 18:47:34
|
Hey Jai, I believe ARGS is only filled with the request body with the request is a urlencoded. Because ARGS and friends are treated as tabular variables, ModSecurity won't attempt to parse an XML body and at it into the ARGS or ARGS_POST variables, because there's no sane way to interpolate the document into key-value paired data. On Wed, Jan 2, 2019 at 10:21 AM Jai Harpalani via mod-security-developers < mod...@li...> wrote: > User-documentation states: > > "ARGS is a collection and can be used on its own (means all arguments > including the POST Payload)..." > > Based on my testing, it does not appear that ARGS is including the POST > payload. I am sending a POST request with the body shown below. I expect it > to trigger Rule 930120, but it does not. > > Request Body: > > <?xml version='1.0' encoding='UTF-8'?> > <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/ > "> > <soapenv:Body> > <ns1:echo xmlns:ns1="http://example1.org/example1"> > <Text>hello .bashrc</Text> > </ns1:echo> > </soapenv:Body> > </soapenv:Envelope> > > _______________________________________________ > mod-security-developers mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-developers > ModSecurity Services from Trustwave's SpiderLabs: > https://www.trustwave.com/spiderLabs.php |
|
From: Eero V. <eer...@ik...> - 2019-01-02 18:31:12
|
Hi.
Take look of REQUEST-901-INITIALIZATION.con
I think this line takes care of ip address pickup:
SecAction \
"id:901321, \
phase:1, \
t:none, \
initcol:global=global, \
initcol:ip=%{remote_addr}_%{tx.ua_hash}, \
setvar:tx.real_ip=%{remote_addr}, \
nolog, \
You need to replace it with correct variable?
Eero
On Wed, Jan 2, 2019 at 7:30 PM Alexandros Kyrlis <ale...@me...> wrote:
> I have already replaced the REMOTE_ADDR var with {HTTP_CF_Connecting_IP}
> using IIS rewrite.
> It works.
>
> using PHP:
>
> echo ($_SERVER['REMOTE_ADDR']);
>
> Returns the real client IP address.
>
> But mod_security still uses the ip of the proxy. I do not know why.
>
>
> On 2 Ιαν 2019, at 19:03, Eero Volotinen <eer...@ik...> wrote:
>
> how about this:
> http://www.loadbalancer.org/blog/iis-and-x-forwarded-for-header/
>
> Eero
>
> Alexandros Kyrlis via mod-security-users <
> mod...@li...> kirjoitti ke 2. tammik. 2019
> klo 19.00:
>
>> Hello,
>> I'm using Mod Security with IIS 10.
>> When a rule is triggered, mod security creates an event log on event
>> viewer on Windows.
>> This log contais the REMOTE_ADDR value, but since we are behind a proxy
>> (Cloudflare) i would like it to log a custom header (CF_Connecting_IP) so
>> we get the real client IP.
>> Is it possible to do that?
>> Thanks
>> Alex
>>
>>
>>
>> _______________________________________________
>> mod-security-users mailing list
>> mod...@li...
>> https://lists.sourceforge.net/lists/listinfo/mod-security-users
>> Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs:
>> http://www.modsecurity.org/projects/commercial/rules/
>> http://www.modsecurity.org/projects/commercial/support/
>>
>
>
|
|
From: Reindl H. <h.r...@th...> - 2019-01-02 18:28:47
|
Am 02.01.19 um 18:55 schrieb Jai Harpalani via mod-security-users: > User-documentation states: > > "ARGS is a collection and can be used on its own (means all arguments > including the POST Payload)..." > > Based on my testing, it does not appear that ARGS is including the POST > payload. I am sending a POST request with the body shown below. I expect > it to trigger Rule 930120, but it does not. args and body are different worlds by definition > Request Body: > > <?xml version='1.0' encoding='UTF-8'?> > <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> > <soapenv:Body> > <ns1:echo xmlns:ns1="http://example1.org/example1"> > <Text>hello .bashrc</Text> > </ns1:echo> > </soapenv:Body> > </soapenv:Envelope> |
|
From: Jai H. <jai...@mu...> - 2019-01-02 18:25:21
|
User-documentation states: "ARGS is a collection and can be used on its own (means all arguments including the POST Payload)..." Based on my testing, it does not appear that ARGS is including the POST payload. I am sending a POST request with the body shown below. I expect it to trigger Rule 930120, but it does not. Request Body: <?xml version='1.0' encoding='UTF-8'?> <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Body> <ns1:echo xmlns:ns1="http://example1.org/example1"> <Text>hello .bashrc</Text> </ns1:echo> </soapenv:Body> </soapenv:Envelope> |
|
From: Eero V. <eer...@ik...> - 2019-01-02 17:03:55
|
how about this: http://www.loadbalancer.org/blog/iis-and-x-forwarded-for-header/ Eero Alexandros Kyrlis via mod-security-users < mod...@li...> kirjoitti ke 2. tammik. 2019 klo 19.00: > Hello, > I'm using Mod Security with IIS 10. > When a rule is triggered, mod security creates an event log on event > viewer on Windows. > This log contais the REMOTE_ADDR value, but since we are behind a proxy > (Cloudflare) i would like it to log a custom header (CF_Connecting_IP) so > we get the real client IP. > Is it possible to do that? > Thanks > Alex > > > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |
|
From: Reindl H. <h.r...@th...> - 2019-01-02 16:53:31
|
Am 02.01.19 um 17:34 schrieb Alexandros Kyrlis via mod-security-users: > I'm using Mod Security with IIS 10. > When a rule is triggered, mod security creates an event log on event viewer on Windows. > This log contais the REMOTE_ADDR value, but since we are behind a proxy (Cloudflare) i would like it to log a custom header (CF_Connecting_IP) so we get the real client IP. > Is it possible to do that? you need something like that for MS IIS or use a better webserver and be it as proxy in front of the application itself https://httpd.apache.org/docs/2.4/mod/mod_remoteip.html |
|
From: Alexandros K. <ale...@me...> - 2019-01-02 16:34:55
|
Hello, I'm using Mod Security with IIS 10. When a rule is triggered, mod security creates an event log on event viewer on Windows. This log contais the REMOTE_ADDR value, but since we are behind a proxy (Cloudflare) i would like it to log a custom header (CF_Connecting_IP) so we get the real client IP. Is it possible to do that? Thanks Alex |
|
From: Christian F. <chr...@ne...> - 2018-12-27 13:06:13
|
Hello everybody, I just published the news of the OWASP ModSecurity Core Rule Set project for the month of November: https://coreruleset.org/20181226/crs-project-news-december-2018/ It includes the CRS 3.1 release, updates to the docker container, an interesting success story and the first CRS 3.2 pull requests. Best, Christian -- History repeats itself, first as tragedy, second as XML. --- Comment found on slashdot |
|
From: Don C. <don...@gm...> - 2018-12-18 07:10:50
|
|
From: Eero V. <eer...@ik...> - 2018-12-17 15:09:01
|
Well, there are instructions in this repo: https://github.com/git001/haproxy-waf You just need to rip off settings from docker file Eero Parrish, Kyle <Kyl...@th...> kirjoitti ma 17. jouluk. 2018 klo 15.19: > I have seen references to that feature using SPOA but have yet to find > instructions on how to configure it. > > > > Has anyone attempted setting this up? > > > > *B. Kyle Parrish* > > Cyber Security Engineer | The Villages® Technology Solutions Group > > Direct: 352.674.1508 | Support: 352.674.1530 > > > > *From:* Eero Volotinen <eer...@ik...> > *Sent:* Saturday, December 15, 2018 15:33 > *To:* mod...@li... > *Subject:* Re: [mod-security-users] Deployment Options > > > > Anyway, looking at ha proxy git source there is support for modsecurity > 2.9.x via spoa protocol? it is something like modsecurity standalone > binary. > > > > Eero > > > > Christian Folini <chr...@ne...> kirjoitti la 15. jouluk. > 2018 klo 11.17: > > Thanks Eero. Never came across this. Do you have contact? > > On Fri, Dec 14, 2018 at 05:50:30PM +0200, Eero Volotinen wrote: > > or.. Haproxy enteprise that supports modsecurity waf internally. (this > > costs something like 1700€/haproxy/year) > > > > Eero > > > > Christian Folini <chr...@ne...> kirjoitti pe 14. jouluk. > > 2018 klo 17.41: > > > > > Oh, I see. Makes sense. > > > > > > Then your best option is > > > > > > Net -> HAProxy -> Apache(s) + ModSec 2.9.x -> Backend Application > > > > > > It's a proven and stable setup. Alternatively > > > > > > Net -> HAProxy -> NGINX(s) + ModSec 3.0.x -> Backend Application > > > > > > but I think it still has too many rough edges for my taste. And the > > > performance is not yet on-par with the traditional Apache setup. > > > (But that's a wild field and not everybody agrees with me.) > > > > > > Either way, you may find my tutorials for Apache + ModSec and NGINX + > > > ModSec > > > on netnea.com helpful. > > > > > > Ahoj, > > > > > > Christian > > > > > > On Fri, Dec 14, 2018 at 03:34:16PM +0000, Parrish, Kyle wrote: > > > > Thank you for your prompt response. > > > > > > > > We currently have HAProxy serving our sites as a reverse proxy which > > > doesn't nativily support modsecurity. > > > > > > > > What would you recommend in this scenario? > > > > > > > > -----Original Message----- > > > > From: Christian Folini <chr...@ne...> > > > > Sent: Friday, December 14, 2018 10:24 > > > > To: mod...@li... > > > > Subject: Re: [mod-security-users] Deployment Options > > > > > > > > Good evening to you, Kyle, > > > > > > > > ModSecurity is usually sitting inline on the proxy. But it's > perfectly > > > OK to > > > > have the proxy serve several if not hundreds of backends. The > problem is > > > much > > > > more a problem of overall throughput (expect ModSec to eat 10% of > > > throughput > > > > for an average internet site, but your mileage may vary greatly) and > in > > > > some cases a RAM problem with rule set duplication in memory. > > > > > > > > Generally: ModSec should not have any problem serving your scenario > (if > > > you > > > > change it to "the proxy is the WAF") > > > > > > > > Cheers, > > > > > > > > Christian > > > > > > > > On Fri, Dec 14, 2018 at 02:50:27PM +0000, Parrish, Kyle wrote: > > > > > Good morning all, > > > > > > > > > > Seeking advice on deploying a Web Application Firewall. > > > > > > > > > > I'm pretty familiar with WAFs and what they will do but stuck on an > > > ideal deployment structure. > > > > > > > > > > Lets say there are 20 websites sitting behind a reverse proxy. > > > > > My idea would be to have: > > > > > > > > > > 1. Request hits proxy > > > > > 2. Checks to see if it has been WAF'ed or not > > > > > 3. Sends to WAF > > > > > 4. If approved goes back to be proxied to correct backend > > > > > > > > > > Now, would it be okay to have 20 sites sent through a single WAF or > > > should each site be configured for its own? > > > > > > > > > > I am looking to use OWASP ModSecurity for the WAF ruleset but not > > > familiar with its scalability yet. > > > > > > > > > > Hoping someone else has already gone down this path and could shed > > > some light on it. > > > > > > > > > > B. Kyle Parrish > > > > > > > > > > > > > > > > > > > > > > > _______________________________________________ > > > > > mod-security-users mailing list > > > > > mod...@li... > > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > > Commercial ModSecurity Rules and Support from Trustwave's > SpiderLabs: > > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > > > > > > > > _______________________________________________ > > > > mod-security-users mailing list > > > > mod...@li... > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > > > > _______________________________________________ > > > > mod-security-users mailing list > > > > mod...@li... > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > _______________________________________________ > > > mod-security-users mailing list > > > mod...@li... > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > http://www.modsecurity.org/projects/commercial/rules/ > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > _______________________________________________ > > mod-security-users mailing list > > mod...@li... > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > http://www.modsecurity.org/projects/commercial/rules/ > > http://www.modsecurity.org/projects/commercial/support/ > > > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |
|
From: Parrish, K. <Kyl...@Th...> - 2018-12-17 13:16:50
|
I have seen references to that feature using SPOA but have yet to find instructions on how to configure it. Has anyone attempted setting this up? B. Kyle Parrish Cyber Security Engineer | The Villages® Technology Solutions Group Direct: 352.674.1508 | Support: 352.674.1530 From: Eero Volotinen <eer...@ik...> Sent: Saturday, December 15, 2018 15:33 To: mod...@li... Subject: Re: [mod-security-users] Deployment Options Anyway, looking at ha proxy git source there is support for modsecurity 2.9.x via spoa protocol? it is something like modsecurity standalone binary. Eero Christian Folini <chr...@ne...<mailto:chr...@ne...>> kirjoitti la 15. jouluk. 2018 klo 11.17: Thanks Eero. Never came across this. Do you have contact? On Fri, Dec 14, 2018 at 05:50:30PM +0200, Eero Volotinen wrote: > or.. Haproxy enteprise that supports modsecurity waf internally. (this > costs something like 1700€/haproxy/year) > > Eero > > Christian Folini <chr...@ne...<mailto:chr...@ne...>> kirjoitti pe 14. jouluk. > 2018 klo 17.41: > > > Oh, I see. Makes sense. > > > > Then your best option is > > > > Net -> HAProxy -> Apache(s) + ModSec 2.9.x -> Backend Application > > > > It's a proven and stable setup. Alternatively > > > > Net -> HAProxy -> NGINX(s) + ModSec 3.0.x -> Backend Application > > > > but I think it still has too many rough edges for my taste. And the > > performance is not yet on-par with the traditional Apache setup. > > (But that's a wild field and not everybody agrees with me.) > > > > Either way, you may find my tutorials for Apache + ModSec and NGINX + > > ModSec > > on netnea.com<http://netnea.com> helpful. > > > > Ahoj, > > > > Christian > > > > On Fri, Dec 14, 2018 at 03:34:16PM +0000, Parrish, Kyle wrote: > > > Thank you for your prompt response. > > > > > > We currently have HAProxy serving our sites as a reverse proxy which > > doesn't nativily support modsecurity. > > > > > > What would you recommend in this scenario? > > > > > > -----Original Message----- > > > From: Christian Folini <chr...@ne...<mailto:chr...@ne...>> > > > Sent: Friday, December 14, 2018 10:24 > > > To: mod...@li...<mailto:mod...@li...> > > > Subject: Re: [mod-security-users] Deployment Options > > > > > > Good evening to you, Kyle, > > > > > > ModSecurity is usually sitting inline on the proxy. But it's perfectly > > OK to > > > have the proxy serve several if not hundreds of backends. The problem is > > much > > > more a problem of overall throughput (expect ModSec to eat 10% of > > throughput > > > for an average internet site, but your mileage may vary greatly) and in > > > some cases a RAM problem with rule set duplication in memory. > > > > > > Generally: ModSec should not have any problem serving your scenario (if > > you > > > change it to "the proxy is the WAF") > > > > > > Cheers, > > > > > > Christian > > > > > > On Fri, Dec 14, 2018 at 02:50:27PM +0000, Parrish, Kyle wrote: > > > > Good morning all, > > > > > > > > Seeking advice on deploying a Web Application Firewall. > > > > > > > > I'm pretty familiar with WAFs and what they will do but stuck on an > > ideal deployment structure. > > > > > > > > Lets say there are 20 websites sitting behind a reverse proxy. > > > > My idea would be to have: > > > > > > > > 1. Request hits proxy > > > > 2. Checks to see if it has been WAF'ed or not > > > > 3. Sends to WAF > > > > 4. If approved goes back to be proxied to correct backend > > > > > > > > Now, would it be okay to have 20 sites sent through a single WAF or > > should each site be configured for its own? > > > > > > > > I am looking to use OWASP ModSecurity for the WAF ruleset but not > > familiar with its scalability yet. > > > > > > > > Hoping someone else has already gone down this path and could shed > > some light on it. > > > > > > > > B. Kyle Parrish > > > > > > > > > > > > > > > > > > _______________________________________________ > > > > mod-security-users mailing list > > > > mod...@li...<mailto:mod...@li...> > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > > > > _______________________________________________ > > > mod-security-users mailing list > > > mod...@li...<mailto:mod...@li...> > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > http://www.modsecurity.org/projects/commercial/rules/ > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > _______________________________________________ > > > mod-security-users mailing list > > > mod...@li...<mailto:mod...@li...> > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > http://www.modsecurity.org/projects/commercial/rules/ > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > _______________________________________________ > > mod-security-users mailing list > > mod...@li...<mailto:mod...@li...> > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > http://www.modsecurity.org/projects/commercial/rules/ > > http://www.modsecurity.org/projects/commercial/support/ > > > _______________________________________________ > mod-security-users mailing list > mod...@li...<mailto:mod...@li...> > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ _______________________________________________ mod-security-users mailing list mod...@li...<mailto:mod...@li...> https://lists.sourceforge.net/lists/listinfo/mod-security-users Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: http://www.modsecurity.org/projects/commercial/rules/ http://www.modsecurity.org/projects/commercial/support/ |
|
From: Eero V. <eer...@ik...> - 2018-12-15 20:33:40
|
Anyway, looking at ha proxy git source there is support for modsecurity 2.9.x via spoa protocol? it is something like modsecurity standalone binary. Eero Christian Folini <chr...@ne...> kirjoitti la 15. jouluk. 2018 klo 11.17: > Thanks Eero. Never came across this. Do you have contact? > > On Fri, Dec 14, 2018 at 05:50:30PM +0200, Eero Volotinen wrote: > > or.. Haproxy enteprise that supports modsecurity waf internally. (this > > costs something like 1700€/haproxy/year) > > > > Eero > > > > Christian Folini <chr...@ne...> kirjoitti pe 14. jouluk. > > 2018 klo 17.41: > > > > > Oh, I see. Makes sense. > > > > > > Then your best option is > > > > > > Net -> HAProxy -> Apache(s) + ModSec 2.9.x -> Backend Application > > > > > > It's a proven and stable setup. Alternatively > > > > > > Net -> HAProxy -> NGINX(s) + ModSec 3.0.x -> Backend Application > > > > > > but I think it still has too many rough edges for my taste. And the > > > performance is not yet on-par with the traditional Apache setup. > > > (But that's a wild field and not everybody agrees with me.) > > > > > > Either way, you may find my tutorials for Apache + ModSec and NGINX + > > > ModSec > > > on netnea.com helpful. > > > > > > Ahoj, > > > > > > Christian > > > > > > On Fri, Dec 14, 2018 at 03:34:16PM +0000, Parrish, Kyle wrote: > > > > Thank you for your prompt response. > > > > > > > > We currently have HAProxy serving our sites as a reverse proxy which > > > doesn't nativily support modsecurity. > > > > > > > > What would you recommend in this scenario? > > > > > > > > -----Original Message----- > > > > From: Christian Folini <chr...@ne...> > > > > Sent: Friday, December 14, 2018 10:24 > > > > To: mod...@li... > > > > Subject: Re: [mod-security-users] Deployment Options > > > > > > > > Good evening to you, Kyle, > > > > > > > > ModSecurity is usually sitting inline on the proxy. But it's > perfectly > > > OK to > > > > have the proxy serve several if not hundreds of backends. The > problem is > > > much > > > > more a problem of overall throughput (expect ModSec to eat 10% of > > > throughput > > > > for an average internet site, but your mileage may vary greatly) and > in > > > > some cases a RAM problem with rule set duplication in memory. > > > > > > > > Generally: ModSec should not have any problem serving your scenario > (if > > > you > > > > change it to "the proxy is the WAF") > > > > > > > > Cheers, > > > > > > > > Christian > > > > > > > > On Fri, Dec 14, 2018 at 02:50:27PM +0000, Parrish, Kyle wrote: > > > > > Good morning all, > > > > > > > > > > Seeking advice on deploying a Web Application Firewall. > > > > > > > > > > I'm pretty familiar with WAFs and what they will do but stuck on an > > > ideal deployment structure. > > > > > > > > > > Lets say there are 20 websites sitting behind a reverse proxy. > > > > > My idea would be to have: > > > > > > > > > > 1. Request hits proxy > > > > > 2. Checks to see if it has been WAF'ed or not > > > > > 3. Sends to WAF > > > > > 4. If approved goes back to be proxied to correct backend > > > > > > > > > > Now, would it be okay to have 20 sites sent through a single WAF or > > > should each site be configured for its own? > > > > > > > > > > I am looking to use OWASP ModSecurity for the WAF ruleset but not > > > familiar with its scalability yet. > > > > > > > > > > Hoping someone else has already gone down this path and could shed > > > some light on it. > > > > > > > > > > B. Kyle Parrish > > > > > > > > > > > > > > > > > > > > > > > _______________________________________________ > > > > > mod-security-users mailing list > > > > > mod...@li... > > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > > Commercial ModSecurity Rules and Support from Trustwave's > SpiderLabs: > > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > > > > > > > > _______________________________________________ > > > > mod-security-users mailing list > > > > mod...@li... > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > > > > _______________________________________________ > > > > mod-security-users mailing list > > > > mod...@li... > > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > > http://www.modsecurity.org/projects/commercial/rules/ > > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > > > _______________________________________________ > > > mod-security-users mailing list > > > mod...@li... > > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > > http://www.modsecurity.org/projects/commercial/rules/ > > > http://www.modsecurity.org/projects/commercial/support/ > > > > > > > _______________________________________________ > > mod-security-users mailing list > > mod...@li... > > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > > http://www.modsecurity.org/projects/commercial/rules/ > > http://www.modsecurity.org/projects/commercial/support/ > > > > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > Commercial ModSecurity Rules and Support from Trustwave's SpiderLabs: > http://www.modsecurity.org/projects/commercial/rules/ > http://www.modsecurity.org/projects/commercial/support/ > |