Hello Jacob sorry for the slow response, Based on your log file it seems clear that you are using an out dated version of CRS. Updating may fix *some* of the false positives you are facing. Upon inspecting your log the following rules are being triggered: Detects concatenated basic SQL Injection and SQLLFI attempts Request from Known SPAM Source Restricted SQL Character anomaly detection alert SQL Injection Attack: SQL Operator Detected Request content type is not allowed by policy It is possible that some or all of these are false positives based on how the application is functioning. I suggest you follow the guidance set forth in the following blog post (http://blog.spiderlabs.com/2011/08/modsecurity-advanced-topic-of-the-week-exception-handling.html) in order to analyze these events. If you are having additional issues please be sure to reach out and we will try to address them as best as possible. Thanks!
Chaim Sanders Security Researcher, SpiderLabs Trustwave | SMART SECURITY ON DEMAND www.trustwave.com -----Original Message----- From: Ryan Barnett Sent: Tuesday, January 27, 2015 10:04 AM To: Chaim Sanders Subject: FW: [Owasp-modsecurity-core-rule-set] Legitimate traffic being blocked On 1/23/15, 6:20 PM, "Jacob Lear" <ja...@fosterclub.com> wrote: >Hello, > >I am working on setting up better security for my Debian 6 server. I am >new to ModSecurity and OWASP Core Rules. The problem that I'm having is >that it is blocking legitimate traffic and I don't understand why or >how to fix it. Can somebody help me? Here is some pretty detailed >information about my environment and my problem. > >Apache2 is my webserver and it is installed from the Debian package. >The version is 2.2.16-6+squeeze14. I'm using the Worker MPM. >I installed ModSecurity from the Debian package. The version is: >2.5.12-1+squeeze4 >Per the recommendation of an article I found online, I installed OWASP >2.2.5-0. I had initially tried the most recent version of OWASP but >this gave me errors (due to my version of ModSecurity). >I'm using PHP compiled from source, version 5.4.24. >I'm using PHP-FPM FastCGI. >I'm using MySQL 5.1.73-1+deb6u1. >I'm using Memcached 2.1.0. >ZendOpcode Cache 7.0.3 is installed. >Website is built using the Drupal CMS, version 7.28. >All non-SSL traffic is redirected to SSL. > >I had some troubles getting Apache2 to pass the configtest but I was >able to find the proper configuration changes needed via Google >searching. I enabled all of the rules as per the INSTALL instructions >included in OWASP CRS. I also enabled the experimental Brute Force, >DOS, and Slow DOS rules (these don't appear to be causing any issues.) > >I set ModSecurity to "On" mode but quickly got complaints from our >staff being blocked by it. So now it is in "DetectionOnly" mode. I >looked in the AuditLog but didn't see anything helpful in there (just a >bunch of stuff about cookies -- perhaps because things in the 10 setup >file are set to nolog?). However, the Apache2 SSL Error log shows a lot >of information about the block attempts. > >Our staff users are connecting from the IP address 63.227.218.204, so I >filtered the SSL Error Log to dump all entries with that IP address to >a separate file. All of the warnings/errors in this log are legitimate >traffic. So I need help tuning ModSecurity and OWASP to permit this >traffic. I've attached the log file to this post. >http://scanmail.trustwave.com/?c=4062&d=rNzC1FWzzHEEgobdigSUf2LNp5DNTN- >GhD >Vv7Jp46g&s=5&u=https%3a%2f%2fwww%2efosterclub%2ecom%2fsites%2fdefault%2 >ffi >les%2ffile%2foutput%2elog > >I have also attached my modsecurity.conf file and my >modsecurity_crs_10_setup.conf file. >http://scanmail.trustwave.com/?c=4062&d=rNzC1FWzzHEEgobdigSUf2LNp5DNTN- >GhD >Ns5sp46Q&s=5&u=https%3a%2f%2fwww%2efosterclub%2ecom%2fsites%2fdefault%2 >ffi >les%2ffile%2fmodsecurity%2econf >http://scanmail.trustwave.com/?c=4062&d=rNzC1FWzzHEEgobdigSUf2LNp5DNTN- >GhG >Vrusp95w&s=5&u=https%3a%2f%2fwww%2efosterclub%2ecom%2fsites%2fdefault%2 >ffi les%2ffile%2fmodsecurity%5fcrs%5f10%5fsetup%2econf > >I would very much appreciate any help anyone can offer. Please let me >know if you need any additional information. Thanks! > > >-- > >Jacob Lear >Web Administrator >FosterClub, Inc. > > >--- >This email has been checked for viruses by Avast antivirus software. >http://scanmail.trustwave.com/?c=4062&d=rNzC1FWzzHEEgobdigSUf2LNp5DNTN- >GhG Ey688p7w&s=5&u=http%3a%2f%2fwww%2eavast%2ecom > >_______________________________________________ >Owasp-modsecurity-core-rule-set mailing list >Owasp-modsecurity-core-rule-set@lists.owasp.org >http://scanmail.trustwave.com/?c=4062&d=rNzC1FWzzHEEgobdigSUf2LNp5DNTN- >GhG >Q65sp85w&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2 >fow >asp-modsecurity-core-rule-set ________________________________ This transmission may contain information that is privileged, confidential, and/or exempt from disclosure under applicable law. If you are not the intended recipient, you are hereby notified that any disclosure, copying, distribution, or use of the information contained herein (including any reliance thereon) is strictly prohibited. If you received this transmission in error, please immediately contact the sender and destroy the material in its entirety, whether in electronic or hard copy format. _______________________________________________ Owasp-modsecurity-core-rule-set mailing list Owasp-modsecurity-core-rule-set@lists.owasp.org https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set