I love OpenBSD focused security in many areas, and in the ones not included in base there are always options in packages.
However specifically speaking about the options to complement as an application level firewall seems it is truly underestimated the way I see it: What is the option for a web based IDS/IPS in OBSD? ModSecurity dated 2006 What rules could be applied for this? Same year outdated rules from gotroot (not supported) because modsecurity.org doesnt even have an old copy. Could I install from source the newest ModSecurity 2.5 with the ModSecurity Core Rules v2.0 ? No, because its not compatible with apache1, unless you want to be more unsecure with apache2 from ports. Reading this thread: http://www.mail-archive.com/[email protected]/msg24615.html It seems the conclusion is "The only way that modsecurity increases security is if your web applications where already insecure so the first step would be to secure the web application then modsecurity would not be needed". Saying that to my opinion is the same as saying "Why configure packet filter to close incoming ports on the firewall if one could just correctly configure the respective daemons to listen to certain ports and only to certain IPs". Scenarios of importance for a WAF: -- 10 programmers 10 modules --- a.) Why assume that the sysadmin is the programmer, and why assume there is just one knowledgeable programmer when there might be 10 programmers each coding a seperate module of a project which will get uploaded? A code audit can only conclude (best effort) that the code is secure in a specific time in history. --- statistics of alerts ---- b.) Why assume that a thread is just one threat part of a massive effort for million of IPs, a thread can have a hacker behind it who if he did not succeed one way will continue to work in other methods. Having statistical information per day of threats categorized by a level of risk will give a sysadmin leads to who he is, what he is after, and any other pattern that will give time to act accordingly for a future event targeted differently. The newest modsecurity does this. -- DoS to an application -- c.) Even if I trust every day the programmers, there is still the risk of a application level DoS. PF can put a limit of maximum requests per minute for an IP... but a DoS these days can be done with dozens of thousands of different IPs each doing making a single burst POST to a search form that will hog down the database. A WAF can examine the payload of that and a custom rule can be set if one regex a pattern. -- Information Leakage--- Lets just assume that a user is able to exploit a script... sure I can block all ports on the server so he cannot scp or transfer data out, but what if he tried to request the data from port 80... old mod-security does inspect outgoing data for credit card information but why stay there when the new modsecurity uses improved methods block this? I also tried looking at SNORT, but i dont think a sniffer would be oriented in looking specifically at payloads of web requests based on what I see, or one would have to be very creative of signatures. Also: creating a reverse proxy in OBSD with Apache2 would be similar to running windows virtually on top of OpenBSD. Apache2 port patches are non priority and may take a while to be pushed. Forcing me to compile from source and thus be on top of bleeding edge versions. Do I have an alternative? --David P.D Iam not running a shared webhosting service.

