Patch not useful or wrong way to post it ? Just for info.

Best

On Wed, Jan 30, 2013 at 11:57 AM, Elia Pinto <yersinia.spi...@gmail.com>wrote:

> When the apache HTTP Server manages its child processes, it sends a simple
> HTTP request back to itself.
> This request will appear in the access_log file with the remote address
> set to the loop-back interface
> and if you log the User-Agent string you will see the server signature
> followed by "(internal dummy connection)"
> on non-SSL servers. modsecurity_crs_47_common_exceptions already contain a
> chained rule for skipping
> the apache internal dummy connection if the connection is from the
> lookback address.
>
> But if the administrator has set the directive SecServerSignature
> to one of the ./modsecurity_35_bad_robots.data, for example chinaclaw, the
> skip rule for the internal dummy connection is not used,
> because in that case the User-Agent is defined by the valued of the
> SecServerSignature, and
> not contain the value Apache: in this case the rule 990012 will fire
> wrongly.
> Therefore, because the skip rule it is applied already to connection from
> 127.0.0.1,
> so it is sufficently safe, don't cause any problem to eliminate the
> "Apache" control also on the User-Agent variables.
> It is very similar to a standard iptables setup in which it is common to
> put a catchall ACCEPT rule
> on the loopback interface.
> ---
>  .../modsecurity_crs_47_common_exceptions.conf      |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
>
> diff --git a/base_rules/modsecurity_crs_47_common_exceptions.conf
> b/base_rules/modsecurity_crs_47_common_exceptions.conf
> index c63cabd..eda515b 100644
> --- a/base_rules/modsecurity_crs_47_common_exceptions.conf
> +++ b/base_rules/modsecurity_crs_47_common_exceptions.conf
> @@ -23,7 +23,7 @@ SecRule REQUEST_LINE "^GET /$"
> "chain,phase:2,id:'981020',t:none,pass,nolog"
>  #
>  SecRule REQUEST_LINE "^(GET /|OPTIONS \*) HTTP/1.0$"
> "chain,phase:2,id:'981021',t:none,pass,nolog"
>         SecRule REMOTE_ADDR "^(127\.0\.0\.|\:\:)1$" "chain,t:none"
> -               SecRule REQUEST_HEADERS:User-Agent "^Apache.*\(internal
> dummy connection\)$" "t:none,t:none,chain"
> +               SecRule REQUEST_HEADERS:User-Agent "^.*\(internal dummy
> connection\)$" "t:none,t:none,chain"
>                         SecRule
> TX:'/PROTOCOL_VIOLATION\\\/MISSING_HEADER/' ".*"
> "chain,setvar:tx.missing_header=+1,setvar:tx.missing_header_%{tx.missing_header}=%{matched_var_name}"
>                                 SecRule TX:'/MISSING_HEADER_/' "TX\:(.*)"
> "capture,t:none,setvar:!tx.%{tx.1}"
>
> --
> 1.7.1
>
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to