Keep in mind you can also use the TX:REAL_IP collection. This will either
contain the direct IP of the node connecting to your server, or the value
of x-forwarded-for if that header is present and contains an IP address:

https://github.com/SpiderLabs/owasp-modsecurity-crs/blob/master/modsecurity_crs_10_setup.conf.example#L407

On Fri, Mar 4, 2016 at 7:21 AM, Leos Rivas Manuel <
manuel.leosri...@gemalto.com> wrote:

> Hi David,
>
>
>
> Yes you can, you used modsec documentation example I supposed as it is it
> explain the rule not the directive itself:
>
> SecRule REMOTE_ADDR "@ipMatchFromFile ips.txt" "id:163"
>
>
>
> This is the modified rule that will match the X-Forwarded-for header
>
> SecRule REQUEST_HEADERS:X-Forwarded-for "@ipMatchFromFile ips.txt" "id:163"
>
>
>
> I don’t know what use you will give it but headers just like any other
> element on the request is *user modifiable* so unless you are the one
> setting that up and you established a trusted connection to the other end
> don’t use it for security but should be good for marketing or log purposes.
>
>
>
> Also notice that the header if you are chaining multiple proxies along the
> way is supposed to include more than one value like ip1,ip2,ip3.
>
>
>
> Regards,
>
> Manuel
>
>
>
> *From:* Brian Davis (bridavis) [mailto:brida...@cisco.com]
> *Sent:* vendredi 4 mars 2016 09:37
> *To:* Leos Rivas Manuel; owasp-modsecurity-core-rule-set@lists.owasp.org
> *Subject:* Re: ipMatch and X-Forwarded-For
>
>
>
> Can I use "@ipMatchFromFile <file>" against
> REQUEST_HEADER:X-Forwarded-For? I didn’t think this was possible.
>
>
>
> *From: *Leos Rivas Manuel <manuel.leosri...@gemalto.com>
> *Date: *Friday, March 4, 2016 at 12:33 AM
> *To: *"Brian A. Davis" <brida...@cisco.com>, "
> owasp-modsecurity-core-rule-set@lists.owasp.org" <
> owasp-modsecurity-core-rule-set@lists.owasp.org>
> *Subject: *RE: ipMatch and X-Forwarded-For
>
>
>
> You don’t need to modify the remote_address, simply use
> header:x-forwarded-for instead and deny if it matches.
>
>
>
> *From:* owasp-modsecurity-core-rule-set-boun...@lists.owasp.org [
> mailto:owasp-modsecurity-core-rule-set-boun...@lists.owasp.org
> <owasp-modsecurity-core-rule-set-boun...@lists.owasp.org>] *On Behalf Of 
> *Brian
> Davis (bridavis)
> *Sent:* vendredi 4 mars 2016 08:55
> *To:* owasp-modsecurity-core-rule-set@lists.owasp.org
> *Subject:* [Owasp-modsecurity-core-rule-set] ipMatch and X-Forwarded-For
>
>
>
> Hello,
>
>
>
> I have ModSecurity running as a reverse proxy behind an haproxy LB.
> Because we’re behind HAProxy, we’re getting LB IP addresses for REMOTE_ADDR.
>
>
>
> I have a large number of IPs that I have to whitelist, and would therefore
> really take advantage of the ipMatch and ipMatchFromFile functions.
> However, those can only be used on REMOTE_ADDR.
>
>
>
> Does anyone have a creative way of taking the X-Forwarded-For value and
> somehow setting REMOTE_ADDR to that, and then using ipMatch on the result?
>
>
>
> Thanks,
>
> Brian
>
>
> ------------------------------
>
>
>
> *This message and any attachments are intended solely for the addressees
> and may contain confidential information. Any unauthorized use or
> disclosure, either whole or partial, is prohibited. E-mails are susceptible
> to alteration. Our company shall not be liable for the message if altered,
> changed or falsified. If you are not the intended recipient of this
> message, please delete it and notify the sender. Although all reasonable
> efforts have been made to keep this transmission free from viruses, the
> sender will not be liable for damages caused by a transmitted virus.*
> ------------------------------
> This message and any attachments are intended solely for the addressees
> and may contain confidential information. Any unauthorized use or
> disclosure, either whole or partial, is prohibited.
> E-mails are susceptible to alteration. Our company shall not be liable for
> the message if altered, changed or falsified. If you are not the intended
> recipient of this message, please delete it and notify the sender.
> Although all reasonable efforts have been made to keep this transmission
> free from viruses, the sender will not be liable for damages caused by a
> transmitted virus.
>
> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set
>
>


-- 

Ted Wells
Nexcess - Beyond Hosting
21700 Melrose Ave.
Southfield, MI  48075
Phone: +1.866.639.2377
Fax:   +1.248.281.0473http://twitter.com/nexcess
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to