Never mind, so far so good, actually. I'm still learning my way around. I
needed to run that script on the base_rules directory (which does undergo
some changes from the script). After that, Apache starts.

Sorry about that.

Jamie


On Wed, Mar 19, 2014 at 2:05 PM, Jamie Jackson <jamieja...@gmail.com> wrote:

> Hi Ryan, I think our emails crossed. I tried the script, but it didn't
> seem to modify any files.
>
> Did I make a mistake as far as my usage?
>
> Thanks,
> Jamie
>
>
> On Wed, Mar 19, 2014 at 1:22 PM, Ryan Barnett <ryan.barn...@owasp.org>wrote:
>
>> Yes probably the best option if you can't upgrade.
>>
>> *Ryan Barnett*
>>
>> OWASP ModSecurity CRS Project Leader
>>
>> On Mar 19, 2014, at 1:12 PM, Jamie Jackson <jamieja...@gmail.com> wrote:
>>
>> [I neglected to Reply-All. I accidentally sent the following to just
>> Ryan. Oldest to newest:]
>>
>> Thanks, Ryan.
>>
>> I'll ask on the ModSecurity mailing list about a
>> package-management-friendly way to upgrade ModSecurity
>>
>> -----
>>
>> Actually, Ryan, I just came across the 2.7 rule-removing script in your
>> Git repo:
>> https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/master/util/rule-management/remove-2.7-actions.pl
>>
>> If it proves too much of a pain (I think it will) to upgrade the distro's
>> (Ubuntu 12.04 and CentOS 6.4) ModSecurity, is that removal script the next
>> best thing?
>>
>> -----
>>
>> Unless I'm doing something wrong, the script doesn't seem to do anything:
>>
>> # perl /tmp/remove-2.7-actions.pl -t 2.6 -f
>> /etc/modsecurity/optional_rules/ -n -v
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_16_authentication_tracking.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_49_header_tagging.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_42_comment_spam.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_55_marketing.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_11_avs_traffic.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_13_xml_enabler.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_47_skip_outbound_checks.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_16_username_tracking.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_55_application_defects.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_16_session_hijacking.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_43_csrf_protection.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_25_cc_known.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_10_ignore_static.conf
>> Processing
>> /etc/modsecurity/optional_rules/modsecurity_crs_46_av_scanning.conf
>>
>> I diffed a before and after copy of the directory, and they're the same.
>>
>>
>>
>>
>> On Wed, Mar 19, 2014 at 10:01 AM, Ryan Barnett <rbarn...@trustwave.com>wrote:
>>
>>>  The "ver" action (
>>> https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual#ver) is
>>> only available in ModSecurity v2.7.x <.  You need to upgrade.
>>>
>>>  *Ryan Barnett*
>>>
>>> Lead Security Researcher, SpiderLabs
>>>
>>>
>>>
>>> *Trustwave* | SMART SECURITY ON DEMAND
>>>
>>> www.trustwave.com
>>>
>>>
>>>   From: Jamie Jackson <jamieja...@gmail.com>
>>> Date: Wednesday, March 19, 2014 9:39 AM
>>> Cc: "owasp-modsecurity-core-rule-set@lists.owasp.org" <
>>> owasp-modsecurity-core-rule-set@lists.owasp.org>
>>> Subject: Re: [Owasp-modsecurity-core-rule-set] Syntax error on line 51
>>> of
>>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf
>>>
>>>   Thanks, Ramy.
>>>
>>>  Now I'm past that, and onto the next syntax error:
>>>
>>>  $ sudo service apache2 restart
>>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>>> skipping
>>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>>> skipping
>>> [Wed Mar 19 09:37:10 2014] [warn] module jrun_module is already loaded,
>>> skipping
>>> Syntax error on line 52 of
>>> /etc/modsecurity/activated_rules/modsecurity_crs_20_protocol_violations.conf:
>>> Error parsing actions: Unknown action: ver
>>> Action 'configtest' failed.
>>> The Apache error log may have more information.
>>>    ...fail!
>>>
>>>  Line 52 is the last of this block:
>>>
>>>  SecRule REQUEST_LINE
>>> "!^(?i:(?:[a-z]{3,10}\s+(?:\w{3,7}?://[\w\-\./]*(?::\d+)?)?/[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?|connect
>>> (?:\d{1,3}\.){3}\d{1,3}\.?(?::\d+)?|options \*)\s+[\w\./]+|get
>>> /[^?#]*(?:\?[^#\s]*)?(?:#[\S]*)?)$"\
>>>   "msg:'Invalid HTTP Request Line',\
>>>   severity:'4',\
>>>   id:'960911',\
>>>   ver:'OWASP_CRS/2.2.9',\
>>>   rev:'2',\
>>>   maturity:'9',\
>>>   accuracy:'9',\
>>>   logdata:'%{request_line}',\
>>>   phase:1,\
>>>   block,\
>>>   t:none,\
>>>   tag:'OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ',\
>>>   tag:'CAPEC-272',\
>>>   setvar:'tx.msg=%{rule.msg}',\
>>>   setvar:tx.anomaly_score=+%{tx.notice_anomaly_score},\
>>>   setvar:'tx.%{rule.id
>>> }-OWASP_CRS/PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{matched_var}'"
>>>
>>>
>>>
>>> On Wed, Mar 19, 2014 at 9:31 AM, Ramy Darwish <jackbro.pluc...@gmail.com
>>> > wrote:
>>>
>>>>  Woops, that's actually a new contribution by me. My bad.
>>>> I guess a newbie like me needs more supervision on Pull requests =S
>>>>
>>>> The problem is actually on line 49, which specifies a "chain" where it
>>>> should not.
>>>> On line 49, replace:
>>>>
>>>> SecRule TX:1 ".*"
>>>> "chain,t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>>>
>>>> with:
>>>>
>>>> SecRule TX:1 ".*"
>>>> "t:sha1,t:hexEncode,setvar:session.ip_hash=%{matched_var}"
>>>>
>>>> Issuing a pull request right now.
>>>>
>>>> So sorry, everyone.
>>>>
>>>> Ramy Darwish
>>>>
>>>>
>>>>
>>>> On 19/03/2014 13:58, Jamie Jackson wrote:
>>>>
>>>>  Hi Folks,
>>>>
>>>>  [Server version: Apache/2.2.22 (Ubuntu)]
>>>>
>>>>  I'm following along with this guide (
>>>> http://www.thefanclub.co.za/how-to/how-install-apache2-modsecurity-and-modevasive-ubuntu-1204-lts-server),
>>>> and I got to the apache restart command just before section 5.
>>>>
>>>>  However, I'm getting a rule error:
>>>>
>>>>  $ sudo service apache2 restart
>>>> [sudo] password for jamie:
>>>> Syntax error on line 51 of
>>>> /etc/modsecurity/activated_rules/modsecurity_crs_16_session_hijacking.conf:
>>>> ModSecurity: Disruptive actions can only be specified by chain starter
>>>> rules.
>>>> Action 'configtest' failed.
>>>> The Apache error log may have more information.
>>>>    ...fail!
>>>>
>>>>  The line referenced is the last line of the file (the second of the
>>>> following):
>>>>
>>>>  SecRule &SESSION:SESSIONID "@eq 1"
>>>> "chain,phase:5,id:'981064',nolog,pass,t:none"
>>>>         SecRule REQUEST_HEADERS:User-Agent ".*"
>>>> "t:none,t:sha1,t:hexEncode,nolog,setvar:session.ua_hash=%{matched_var}"
>>>>
>>>>  I have zero experience with ModSecurity yet, so I can't troubleshoot.
>>>>
>>>>  Please help me get past this.
>>>>
>>>>  Thanks,
>>>> Jamie
>>>>
>>>>
>>>>  _______________________________________________
>>>> Owasp-modsecurity-core-rule-set mailing 
>>>> listOwasp-modsecurity-core-rule-set@lists.owasp.orghttps://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>>>>
>>>>
>>>>
>>>
>>> ------------------------------
>>>
>>> This transmission may contain information that is privileged,
>>> confidential, and/or exempt from disclosure under applicable law. If you
>>> are not the intended recipient, you are hereby notified that any
>>> disclosure, copying, distribution, or use of the information contained
>>> herein (including any reliance thereon) is strictly prohibited. If you
>>> received this transmission in error, please immediately contact the sender
>>> and destroy the material in its entirety, whether in electronic or hard
>>> copy format.
>>>
>>
>> _______________________________________________
>> Owasp-modsecurity-core-rule-set mailing list
>> Owasp-modsecurity-core-rule-set@lists.owasp.org
>> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>>
>>
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to