My test team is reporting unfortunate results with the brute force rules.

CentOS release 5.7 (Final)

Server version: Apache/2.2.21 (Unix)
Server built:   Sep 22 2011 17:34:16

ModSecurity 2.5.9
SecComponentSignature "core ruleset/2.2.2"

The symptom that we are seeing is that 981042 doesn't seem to be picking up
the 
value of tx.brute_force_counter_threshold.  If I enable logging on that
rule, 
the entry in the mod security log reads

Message: Warning. Operator GT matched 0 at IP:brute_force_counter. [file 
"/etc/httpd/conf.d/modsecurity_crs/experimental_rules/modsecurity_crs_11_bru
te_f
orce.conf"] [line "53"] [id "981042"]

Our configuration of rule 981214 is almost right out of the box

SecAction "phase:1,id:'981214',t:none,nolog,pass, \
setvar:'tx.brute_force_protected_urls=/protectThisUrl', \
setvar:'tx.brute_force_burst_time_slice=60', \
setvar:'tx.brute_force_counter_threshold=10', \
setvar:'tx.brute_force_block_timeout=60'"

My development sandbox behaves as I would expect:

Message: Warning. Operator GT matched 10 at IP:brute_force_counter. [file 
"C:/Program Files (x86)/Apache Software 
Foundation/Apache2.2/conf/modsecurity_crs/experimental_rules/modsecurity_crs
_11_
brute_force.conf"] [line "53"] [id "981042"]

However, the development sandbox is running windows, and is using the
binaries I 
downloaded for ModSecurity 2.6.2

Have I simply loaded the experimental rules into a version of modsecurity
that 
doesn't support them, or is something more sinister going on?  I'm running
out 
of ideas on how to trouble shoot this.

Thanks,
Danil



--------------------------------------------------------------------
mail2web - Check your email from the web at
http://link.mail2web.com/mail2web


_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to