Thanks Tom. I actually used this tool when we originally added the ModSecurity 
defenses.  ModSecurity blocked it as the tool opens many concurrent connections 
and then sends the data slowly.  This triggered the ModSec thresholds for the # 
of threads in either the READ/WRITE bucket states.

Ryan Barnett
Lead Security Researcher, SpiderLabs

Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com<http://www.trustwave.com/>

From: Tom Brennan - proactiveRISK 
<t...@proactiverisk.com<mailto:t...@proactiverisk.com>>
Date: Thursday, May 8, 2014 6:49 PM
To: Rogerio Brito 
<rogerio.br...@intercode.com.br<mailto:rogerio.br...@intercode.com.br>>
Cc: Ryan Barnett <rbarn...@trustwave.com<mailto:rbarn...@trustwave.com>>, 
"owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>"
 
<owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>>
Subject: Re: [Owasp-modsecurity-core-rule-set] RES: Need help with Joomla 
websites rules and SlowHttp Attacks

Check it with this owasp tool

https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool

4.0 in development too blog post about it here 
http://proactiverisk.blogspot.com/2014/05/blog-post.html

---
Tom Brennan | 973-298-1160 x799 | 
t...@proactiverisk.com<mailto:t...@proactiverisk.com>


On May 8, 2014, at 4:48 PM, "Rogerio Brito" 
<rogerio.br...@intercode.com.br<mailto:rogerio.br...@intercode.com.br>> wrote:

Hi Ryan,

Ok, I’ll open tickets on github.

To fix the Slow DoS Attacks I’ve changed the rule as indicated on Acunetix 
website, as follows:

<IfModule reqtimeout_module>
RequestReadTimeout header=20-40,MinRate=500 body=30,MinRate=500
</IfModule>

After that they reported it as secure.

Thank you
[]s
<image001.gif>

De: Ryan Barnett [mailto:rbarn...@trustwave.com]
Enviada em: terça-feira, 6 de maio de 2014 18:28
Para: Rogerio Brito
Cc: 
owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:owasp-modsecurity-core-rule-set@lists.owasp.org>
Assunto: Re: [Owasp-modsecurity-core-rule-set] Need help with Joomla websites 
rules and SlowHttp Attacks

Rogerio,
A couple of comments -

1) Please open GitHub Issue tickets for your false positives so that we can fix 
them.

2) How is Acunetix actually testing the vuln?

Keep in mind that the ModSecurity defenses for slow DoS attacks (headers vs 
post body) is really based on a scenario where a client has too many 
connections open vs actually doing any per-thread timing. If the scanner is 
only opening a single/small # it connections to test then the 
SecConnReadStateLimit/SecConnWriteStateLimit directives won't trigger.
Ryan Barnett
Lead Security Researcher, SpiderLabs

Trustwave | SMART SECURITY ON DEMAND
www.trustwave.com<http://www.trustwave.com/>

On May 6, 2014, at 5:12 PM, "Rogerio Brito" 
<rogerio.br...@intercode.com.br<mailto:rogerio.br...@intercode.com.br>> wrote:
Hello all,

I have lots of Joomla websites and I’ve just installed mod_security with 
Owasp-modsecurity-core-rule-set.  I had to disable the 
modsecurity_crs_41_xss_attacks.conf and 
modsecurity_crs_41_sql_injection_attacks.conf rules because I could not edit 
any article. Whenever I tried to save the article I would get a 403 forbidden.  
I watched the audit log file and I’ve tried to comment out rule by rule that 
fails, but as we are editing HTML  content there are so many rules to comment 
that I believe there must some way else to do it.
On another case, I’ve enabled the modsecurity_crs_11_slow_dos_protection.conf 
rules, but I’ve tested the site with http://www.acunetix.com/ and it still 
reports the site as vulnerable to “Slow HTTP Denial of Service Attack”.

Can someone please help?

Thank you
Rogerio Brito

_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

________________________________

This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org<mailto:Owasp-modsecurity-core-rule-set@lists.owasp.org>
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

WARNING: E-mail transmission cannot be guaranteed to be secure or error-free as 
information could be intercepted, corrupted, lost, destroyed, arrive late or 
incomplete, or contain viruses. The sender therefore does not accept liability 
for any errors or omissions in the contents of this message, which arise as a 
result of e-mail transmission. No employee or agent is authorized to conclude 
any binding agreement on behalf of proactiveRISK with another party by email.


________________________________

This transmission may contain information that is privileged, confidential, 
and/or exempt from disclosure under applicable law. If you are not the intended 
recipient, you are hereby notified that any disclosure, copying, distribution, 
or use of the information contained herein (including any reliance thereon) is 
strictly prohibited. If you received this transmission in error, please 
immediately contact the sender and destroy the material in its entirety, 
whether in electronic or hard copy format.
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to