Hi Ryan, I think our emails crossed. I tried the script, but it didn't seem
to modify any files.

Did I make a mistake as far as my usage?

Thanks,
Jamie


On Wed, Mar 19, 2014 at 1:22 PM, Ryan Barnett <ryan.barn...@owasp.org>wrote:

> Yes probably the best option if you can't upgrade.
>
> *Ryan Barnett*
>
> OWASP ModSecurity CRS Project Leader
>
> On Mar 19, 2014, at 1:12 PM, Jamie Jackson <jamieja...@gmail.com> wrote:
>
> [I neglected to Reply-All. I accidentally sent the following to just Ryan.
> Oldest to newest:]
>
> Thanks, Ryan.
>
> I'll ask on the ModSecurity mailing list about a
> package-management-friendly way to upgrade ModSecurity
>
> -----
>
> Actually, Ryan, I just came across the 2.7 rule-removing script in your
> Git repo:
> https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/master/util/rule-management/remove-2.7-actions.pl
>
> If it proves too much of a pain (I think it will) to upgrade the distro's
> (Ubuntu 12.04 and CentOS 6.4) ModSecurity, is that removal script the next
> best thing?
>
> -----
>
> Unless I'm doing something wrong, the script doesn't seem to do anything:
>
> # perl /tmp/remove-2.7-actions.pl -t 2.6 -f
> /etc/modsecurity/optional_rules/ -n -v
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_16_authentication_tracking.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_49_header_tagging.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_42_comment_spam.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_55_marketing.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_11_avs_traffic.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_13_xml_enabler.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_47_skip_outbound_checks.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_16_username_tracking.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_55_application_defects.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_16_session_hijacking.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_43_csrf_protection.conf
> Processing /etc/modsecurity/optional_rules/modsecurity_crs_25_cc_known.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_10_ignore_static.conf
> Processing
> /etc/modsecurity/optional_rules/modsecurity_crs_46_av_scanning.conf
>
> I diffed a before and after copy of the directory, and they're the same.
>
>
>
>
> On Wed, Mar 19, 2014 at 10:01 AM, Ryan Barnett <rbarn...@trustwave.com>wrote:
>
>>  The "ver" action (
>> https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#ver) is
>> only available in ModSecurity v2.7.x <.  You need to upgrade.
>>
>>  *Ryan Barnett*
>>
>> Lead Security Researcher, SpiderLabs
>>
>>
>>
>> *Trustwave* | SMART SECURITY ON DEMAND
>>
>> www.trustwave.com
>>
>>
>>   From: Jamie Jackson <jamieja...@gmail.com>
>> Date: Wednesday, March 19, 2014 9:39 AM
>> Cc: "owasp-modsecurity-core-rule-set@lists.owasp.org" <
>> owasp-modsecurity-core-rule-set@lists.owasp.org>
>> Subject: Re: [Owasp-modsecurity-core-rule-set] Syntax error on line 51
>> of
>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf
>>
>>   Thanks, Ramy.
>>
>>  Now I'm past that, and onto the next syntax error:
>>
>>  $ sudo service apache2 restart
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>> skipping
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>> skipping
>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>> skipping
>> Syntax error on line 52 of
>> /etc/modsecurity/activated_rules/modsecurity_crs_20_protocol_violations.conf:
>> Error parsing actions: Unknown action: ver
>> Action 'configtest' failed.
>> The Apache error log may have more information.
>>    ...fail!
>>
>>  Line 52 is the last of this block:
>>
>>  SecRule REQUEST_LINE
>> "!^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect
>> (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get
>> /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$"\
>>   "msg:'Invalid HTTP Request Line',\
>>   severity:'4',\
>>   id:'960911',\
>>   ver:'OWASP_CRS/2.2.9',\
>>   rev:'2',\
>>   maturity:'9',\
>>   accuracy:'9',\
>>   logdata:'%{request_line}',\
>>   phase:1,\
>>   block,\
>>   t:none,\
>>   tag:'OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ',\
>>   tag:'CAPEC-272',\
>>   setvar:'tx.msg=%{rule.msg}',\
>>   setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},\
>>   setvar:'tx.%{rule.id
>> }-OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{matched_var}'"
>>
>>
>>
>> On Wed, Mar 19, 2014 at 9:31 AM, Ramy Darwish 
>> <jackbro.pluc...@gmail.com>wrote:
>>
>>>  Woops, that's actually a new contribution by me. My bad.
>>> I guess a newbie like me needs more supervision on Pull requests =S
>>>
>>> The problem is actually on line 49, which specifies a "chain" where it
>>> should not.
>>> On line 49, replace:
>>>
>>> SecRule TX:1 ".*"
>>> "chain,t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>>
>>> with:
>>>
>>> SecRule TX:1 ".*"
>>> "t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>>
>>> Issuing a pull request right now.
>>>
>>> So sorry, everyone.
>>>
>>> Ramy Darwish
>>>
>>>
>>>
>>> On 19/03/2014 13:58, Jamie Jackson wrote:
>>>
>>>  Hi Folks,
>>>
>>>  [Server version: Apache/2.2.22 (Ubuntu)]
>>>
>>>  I'm following along with this guide (
>>> http://www.thefanclub.co.za/how-to/how-install-apache2-modsecurity-and-modevasive-ubuntu-1204-lts-server),
>>> and I got to the apache restart command just before section 5.
>>>
>>>  However, I'm getting a rule error:
>>>
>>>  $ sudo service apache2 restart
>>> [sudo] password for jamie:
>>> Syntax error on line 51 of
>>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf:
>>> ModSecurity: Disruptive actions can only be specified by chain starter
>>> rules.
>>> Action 'configtest' failed.
>>> The Apache error log may have more information.
>>>    ...fail!
>>>
>>>  The line referenced is the last line of the file (the second of the
>>> following):
>>>
>>>  SecRule &SESSION:SESSIONID "@eq 1"
>>> "chain,phase:5,id:'981064',nolog,pass,t:none"
>>>         SecRule REQUEST_HEADERS:User-Agent ".*"
>>> "t:none,t:sha1,t:hexEncode,nolog,setvar:session.ua_hash=%{matched_var}"
>>>
>>>  I have zero experience with ModSecurity yet, so I can't troubleshoot.
>>>
>>>  Please help me get past this.
>>>
>>>  Thanks,
>>> Jamie
>>>
>>>
>>>  _______________________________________________
>>> Owasp-modsecurity-core-rule-set mailing 
>>> listOwasp-modsecurity-core-rule-set@lists.owasp.orghttps://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>>>
>>>
>>>
>>
>> ------------------------------
>>
>> This transmission may contain information that is privileged,
>> confidential, and/or exempt from disclosure under applicable law. If you
>> are not the intended recipient, you are hereby notified that any
>> disclosure, copying, distribution, or use of the information contained
>> herein (including any reliance thereon) is strictly prohibited. If you
>> received this transmission in error, please immediately contact the sender
>> and destroy the material in its entirety, whether in electronic or hard
>> copy format.
>>
>
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to