On 12/30/10 2:43 PM, "Dimitri Yioulos" <[email protected]> wrote:

>All,
>
>With the installation of the latest rulesit, I'm
>now getting the following alerts:
>
>Warning - Sticky SessionID Data Changed -
>User-Agent Mismatch.    Access denied with code
>403 (phase 2). Match of "streq %{SESSION.UA}"
>against "TX:ua_hash" required.
>
>Hope I'm not being too stupid here, but what does
>that mean?  Am I blocking legitimate traffic?
>
>Better still, is there a place (documents, etc.)
>that describes various alerts?

This ruleset will track the IP Address Block Range and User-Agent string
hash for each user and tie it to a SessionID.  If those values change
during the course of a session, it will trigger.  The goal is to identify
possible session hijacking attacks.

Dimitri - please download the latest release (CRS v2.1.1) that I just
released today.  I made a change to the Session Hijacking conf file -
CHANGES file -

- Updated the session hijacking conf file to only enforce rules if a
SessionID Cookie was submitted


http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/trunk/optio
nal_rules/modsecurity_crs_16_session_hijacking.conf?revision=1576

I added this line which will skip the check if the client doesn't submit a
SessionID Cookie -

SecRule 
&REQUEST_COOKIES:'/(j?sessionid|(php)?sessid|(asp|jserv|jw)?session[-_]?(id
)?|cf(id|token)|sid)/' "@eq 0"
"phase:1,t:none,nolog,pass,skipAfter:END_SESSION_STARTUP"

Hope this helps,
Ryan


_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to