Got your GitHub Pull request, thanks. Just for some background on my request to use github. Using GitHub for CRS Dev is critical for collaboration and community involvement. I realize this was a minor change and *easy* to do however I want to encourage use of GitHub for all updates.
Thanks for your contribution! -- Ryan Barnett Lead Security Researcher Trustwave - SpiderLabs On Jan 31, 2013, at 5:15 PM, "Ryan Barnett" <rbarn...@trustwave.com<mailto:rbarn...@trustwave.com>> wrote: Please use GitHub and issue a Pull request. Thanks. -- Ryan Barnett Trustwave SpiderLabs ModSecurity Project Leader OWASP ModSecurity CRS Project Leader From: yersinia <yersinia.spi...@gmail.com<mailto:yersinia.spi...@gmail.com>> Date: Thursday, January 31, 2013 12:33 PM To: "owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>" <owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>> Subject: Re: [Owasp-modsecurity-core-rule-set] [PATCH] modsecurity_crs_47_common_exceptions.conf: drop apache User-Agent signature for dummy connection Patch not useful or wrong way to post it ? Just for info. Best On Wed, Jan 30, 2013 at 11:57 AM, Elia Pinto <yersinia.spi...@gmail.com<mailto:yersinia.spi...@gmail.com>> wrote: When the apache HTTP Server manages its child processes, it sends a simple HTTP request back to itself. This request will appear in the access_log file with the remote address set to the loop-back interface and if you log the User-Agent string you will see the server signature followed by "(internal dummy connection)" on non-SSL servers. modsecurity_crs_47_common_exceptions already contain a chained rule for skipping the apache internal dummy connection if the connection is from the lookback address. But if the administrator has set the directive SecServerSignature to one of the ./modsecurity_35_bad_robots.data, for example chinaclaw, the skip rule for the internal dummy connection is not used, because in that case the User-Agent is defined by the valued of the SecServerSignature, and not contain the value Apache: in this case the rule 990012 will fire wrongly. Therefore, because the skip rule it is applied already to connection from 127.0.0.1, so it is sufficently safe, don't cause any problem to eliminate the "Apache" control also on the User-Agent variables. It is very similar to a standard iptables setup in which it is common to put a catchall ACCEPT rule on the loopback interface. --- .../modsecurity_crs_47_common_exceptions.conf | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/base_rules/modsecurity_crs_47_common_exceptions.conf b/base_rules/modsecurity_crs_47_common_exceptions.conf index c63cabd..eda515b 100644 --- a/base_rules/modsecurity_crs_47_common_exceptions.conf +++ b/base_rules/modsecurity_crs_47_common_exceptions.conf @@ -23,7 +23,7 @@ SecRule REQUEST_LINE "^GET /$" "chain,phase:2,id:'981020',t:none,pass,nolog" # SecRule REQUEST_LINE "^(GET /|OPTIONS \*) HTTP/1.0$" "chain,phase:2,id:'981021',t:none,pass,nolog" SecRule REMOTE_ADDR "^(127\.0\.0\.|\:\:)1$" "chain,t:none" - SecRule REQUEST_HEADERS:User-Agent "^Apache.*\(internal dummy connection\)$" "t:none,t:none,chain" + SecRule REQUEST_HEADERS:User-Agent "^.*\(internal dummy connection\)$" "t:none,t:none,chain" SecRule TX:'/PROTOCOL_VIOLATION\\\/MISSING_HEADER/' ".*" "chain,setvar:tx.missing_header=+1,setvar:tx.missing_header_%{tx.missing_header}=%{matched_var_name}" SecRule TX:'/MISSING_HEADER_/' "TX\:(.*)" "capture,t:none,setvar:!tx.%{tx.1}" -- 1.7.1 ________________________________ This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is STRICTLY PROHIBITED. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format.
_______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set