Yes probably the best option if you can't upgrade. 

Ryan Barnett
OWASP ModSecurity CRS Project Leader

> On Mar 19, 2014, at 1:12 PM, Jamie Jackson <jamieja...@gmail.com> wrote:
> 
> [I neglected to Reply-All. I accidentally sent the following to just Ryan. 
> Oldest to newest:]
> 
> Thanks, Ryan.
> 
> I'll ask on the ModSecurity mailing list about a package-management-friendly 
> way to upgrade ModSecurity
> 
> -----
> 
> Actually, Ryan, I just came across the 2.7 rule-removing script in your Git 
> repo: 
> https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/master/util/rule-management/remove-2.7-actions.pl
> 
> If it proves too much of a pain (I think it will) to upgrade the distro's 
> (Ubuntu 12.04 and CentOS 6.4) ModSecurity, is that removal script the next 
> best thing?
> 
> -----
> 
> Unless I'm doing something wrong, the script doesn't seem to do anything:
> 
> # perl /tmp/remove-2.7-actions.pl -t 2.6 -f /etc/modsecurity/optional_rules/ 
> -n -v
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_16_authentication_tracking.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_49_header_tagging.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_42_comment_spam.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_55_marketing.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_11_avs_traffic.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_13_xml_enabler.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_47_skip_outbound_checks.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_16_username_tracking.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_55_application_defects.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_16_session_hijacking.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_43_csrf_protection.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_25_cc_known.conf
> Processing 
> /etc/modsecurity/optional_rules/modsecurity_crs_10_ignore_static.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_46_av_scanning.conf
> 
> I diffed a before and after copy of the directory, and they're the same.
> 
> 
> 
> 
>> On Wed, Mar 19, 2014 at 10:01 AM, Ryan Barnett <rbarn...@trustwave.com> 
>> wrote:
>> The "ver" action 
>> (https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#ver) is 
>> only available in ModSecurity v2.7.x <.  You need to upgrade.
>> 
>> Ryan Barnett
>> Lead Security Researcher, SpiderLabs
>>  
>> Trustwave | SMART SECURITY ON DEMAND
>> www.trustwave.com
>> 
>> From: Jamie Jackson <jamieja...@gmail.com>
>> Date: Wednesday, March 19, 2014 9:39 AM
>> Cc: "owasp-modsecurity-core-rule-set@lists.owasp.org" 
>> <owasp-modsecurity-core-rule-set@lists.owasp.org>
>> Subject: Re: [Owasp-modsecurity-core-rule-set] Syntax error on line 51 of 
>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf
>> 
>> Thanks, Ramy.
>> 
>> Now I'm past that, and onto the next syntax error:
>> 
>> $ sudo service apache2 restart
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded, 
>> skipping
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded, 
>> skipping
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded, 
>> skipping
>> Syntax error on line 52 of 
>> /etc/modsecurity/activated_rules/modsecurity_crs_20_protocol_violations.conf:
>> Error parsing actions: Unknown action: ver
>> Action 'configtest' failed.
>> The Apache error log may have more information.
>>    ...fail!
>> 
>> Line 52 is the last of this block:
>> 
>> SecRule REQUEST_LINE 
>> "!^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect
>>  (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get 
>> /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$"\
>>   "msg:'Invalid HTTP Request Line',\
>>   severity:'4',\
>>   id:'960911',\
>>   ver:'OWASP_CRS/2.2.9',\
>>   rev:'2',\
>>   maturity:'9',\
>>   accuracy:'9',\
>>   logdata:'%{request_line}',\
>>   phase:1,\
>>   block,\
>>   t:none,\
>>   tag:'OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ',\
>>   tag:'CAPEC-272',\
>>   setvar:'tx.msg=%{rule.msg}',\
>>   setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},\
>>   
>> setvar:'tx.%{rule.id}-OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{matched_var}'"
>> 
>> 
>> 
>>> On Wed, Mar 19, 2014 at 9:31 AM, Ramy Darwish <jackbro.pluc...@gmail.com> 
>>> wrote:
>>> Woops, that's actually a new contribution by me. My bad.
>>> I guess a newbie like me needs more supervision on Pull requests =S
>>> 
>>> The problem is actually on line 49, which specifies a "chain" where it 
>>> should not.
>>> On line 49, replace:
>>> 
>>> SecRule TX:1 ".*" 
>>> "chain,t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>> 
>>> with:
>>> 
>>> SecRule TX:1 ".*" "t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>> 
>>> Issuing a pull request right now.
>>> 
>>> So sorry, everyone.
>>> 
>>> Ramy Darwish
>>> 
>>> 
>>> 
>>> On 19/03/2014 13:58, Jamie Jackson wrote:
>>>> Hi Folks,
>>>> 
>>>> [Server version: Apache/2.2.22 (Ubuntu)]
>>>> 
>>>> I'm following along with this guide 
>>>> (http://www.thefanclub.co.za/how-to/how-install-apache2-modsecurity-and-modevasive-ubuntu-1204-lts-server),
>>>>  and I got to the apache restart command just before section 5.
>>>> 
>>>> However, I'm getting a rule error:
>>>> 
>>>> $ sudo service apache2 restart
>>>> [sudo] password for jamie: 
>>>> Syntax error on line 51 of 
>>>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf:
>>>> ModSecurity: Disruptive actions can only be specified by chain starter 
>>>> rules.
>>>> Action 'configtest' failed.
>>>> The Apache error log may have more information.
>>>>    ...fail!
>>>> 
>>>> The line referenced is the last line of the file (the second of the 
>>>> following):
>>>> 
>>>> SecRule &SESSION:SESSIONID "@eq 1" 
>>>> "chain,phase:5,id:'981064',nolog,pass,t:none"
>>>>         SecRule REQUEST_HEADERS:User-Agent ".*" 
>>>> "t:none,t:sha1,t:hexEncode,nolog,setvar:session.ua_hash=%{matched_var}"
>>>> 
>>>> I have zero experience with ModSecurity yet, so I can't troubleshoot.
>>>> 
>>>> Please help me get past this.
>>>> 
>>>> Thanks,
>>>> Jamie
>>>> 
>>>> 
>>>> _______________________________________________
>>>> Owasp-modsecurity-core-rule-set mailing list
>>>> Owasp-modsecurity-core-rule-set@lists.owasp.orghttps://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>> 
>> 
>> 
>> This transmission may contain information that is privileged, confidential, 
>> and/or exempt from disclosure under applicable law. If you are not the 
>> intended recipient, you are hereby notified that any disclosure, copying, 
>> distribution, or use of the information contained herein (including any 
>> reliance thereon) is strictly prohibited. If you received this transmission 
>> in error, please immediately contact the sender and destroy the material in 
>> its entirety, whether in electronic or hard copy format.
> 
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to