Felipe,

Thank you for the quick response. Glad this is fixed.

A glitch in my lab setup made me believe a new apache showed the
same behaviour. But that was a false alarm. Thank you for pointing this
out.

Cheers,

Christian




On Tue, May 31, 2016 at 12:34:32AM +0000, Felipe Costa wrote:
> Hi Christian,
> 
> It seems to me that this problem is associated with an known Apache issue.
> It is related to the utilization of the continuation lines “\\” .
> 
> For further details: https://bz.apache.org/bugzilla/show_bug.cgi?id=55910
> 
> I made the comment #4 back on 2014: 
> https://bz.apache.org/bugzilla/show_bug.cgi?id=55910#c4
> 
> I think it is fixed on Apache 2.4.11+.
> 
> Br.,
> Felipe “Zimmerle” Costa
> Security Researcher, Lead Developer ModSecurity.
> 
> Trustwave | SMART SECURITY ON DEMAND
> www.trustwave.com <http://www.trustwave.com/>
> 
> 
> 
> 
> 
> 
> 
> 
> On 5/30/16, 5:34 PM, "Christian Folini" <christian.fol...@netnea.com> wrote:
> 
> >David,
> >
> >Thanks for writing in. I am X-posting this to modsec-dev as well.
> >
> >Yours is a very strange problem indeed. I am running the 3.0rc1
> >ruleset in production and have been running dozens of tests without
> >any issue.
> >
> >Here is the minimal configuration, which triggered the bug in my
> >environment (Ubunt 14.04, apache 2.4.7, modsec 2.9.1)
> >
> >ServerName              localhost
> >ServerAdmin             root@localhost
> >ServerRoot              /opt/apache-2.4.18
> >User                    www-data
> >Group                   www-data
> >PidFile                        logs/httpd.pid
> >
> >ServerTokens            Prod
> >UseCanonicalName        On
> >TraceEnable             Off
> >
> >Timeout                 300
> >MaxClients              100
> >
> >KeepAlive               On
> >KeepAliveTimeout        100ms
> >
> >Listen                  127.0.0.1:80
> >
> >LoadModule              mpm_prefork_module      modules/mod_mpm_prefork.so
> >LoadModule              unixd_module            modules/mod_unixd.so
> >LoadModule              authz_host_module       modules/mod_authz_host.so
> >LoadModule              log_config_module       modules/mod_log_config.so
> >LoadModule              logio_module            modules/mod_logio.so
> >
> >LoadModule              headers_module          modules/mod_headers.so
> >LoadModule              unique_id_module        modules/mod_unique_id.so
> >LoadModule              security2_module        modules/mod_security2.so
> >
> >LoadModule              mime_module             modules/mod_mime.so
> >LoadModule              status_module           modules/mod_status.so
> >
> >LoadModule              lbmethod_byrequests_module 
> >modules/mod_lbmethod_byrequests.so
> >
> >LogLevel                        debug core:notice
> >
> >ErrorLogFormat "[%{cu}t] [%-m:%-l] %-a %-L %M"
> >
> >
> >ErrorLog                logs/error.log
> >
> >DocumentRoot            /apache/htdocs
> >
> ># === Start ModSec Configuration
> >
> >SecRuleEngine                 On
> >
> >SecRequestBodyAccess          On
> >SecRequestBodyLimit           10000000
> >SecRequestBodyNoFilesLimit    64000
> >
> >SecResponseBodyAccess         On
> >SecResponseBodyLimit          10000000
> >
> >SecTmpDir                     /tmp/
> >SecDataDir                    /tmp/
> >SecUploadDir                  /tmp/
> >
> >SecDebugLog                   /apache/logs/modsec_debug.log
> >SecDebugLogLevel              9
> >
> >SecAuditEngine                RelevantOnly
> >SecAuditLogRelevantStatus     "^(?:5|4(?!04))"
> >SecAuditLogParts              ABEFHIJZ
> >
> >SecAuditLogType               Concurrent
> >SecAuditLog                   /apache/logs/modsec_audit.log
> >SecAuditLogStorageDir         /apache/logs/audit/
> >
> >SecPcreMatchLimit             500000
> >SecPcreMatchLimitRecursion    500000
> >
> >SecDefaultAction              "phase:2,pass,log"
> >
> >
> >SecRule RESPONSE_BODY "(?:<(?:TITLE>Index of.*?<H|title>Index 
> >of.*?<h)1>Index of|>\[To Parent Directory\]<\/[Aa]><br>)" \
> >       "phase:response,\
> >       rev:'2',\
> >       ver:'OWASP_CRS/3.0.0',\
> >       maturity:'9',\
> >       accuracy:'9',\
> >       t:none,\
> >       block,\
> >       id:'950110'"
> >
> >
> ><Directory />
> >        Options SymLinksIfOwnerMatch
> >        AllowOverride None
> ></Directory>
> >
> ><VirtualHost *:80>
> >        ServerName localhost
> >
> >        <Directory /apache/htdocs>
> >
> >        </Directory>
> >
> ></VirtualHost>
> >
> >
> >$> ./bin/httpd -X -f conf/httpd.conf_problem_of_the_day
> >AH00526: Syntax error on line 82 of 
> >/opt/apache-2.4.18/conf/httpd.conf_problem_of_the_day
> >Error parsing actions: Unknown action: \\
> >
> >I tried this with 2.4.7 as well.
> >
> >If I take a single character out of the regex or out of the version
> >string (OWASP_CRS...), then the bug disappears.
> >
> >If I add a space in front of the backslash: bug disappears.
> >
> >Given the config above, I am quite sure there is a bug hidden somewhere.
> >Maybe I am overlooking something and somebody can point me to an
> >error. If that is not the case, then I think it is a bug.
> >
> >David: I suggest you open a bug report. Please open it against
> >ModSecurity and not against the Core Rules.
> >
> >Ahoj,
> >
> >Christian
> >
> >
> >
> >
> >
> >On Fri, May 27, 2016 at 08:48:31PM -0500, David Angel wrote:
> >> Good evening,
> >>
> >> I originally posted this at
> >> http://scanmail.trustwave.com/?c=4062&d=9qPM115iL1ynPbZVTXRAV5XeKfPloSkwS5l7QuIfKA&s=5&u=http%3a%2f%2fstackoverflow%2ecom%2fquestions%2f37369990%2fmodsecurity-error-parsing-actions-unknown-action
> >> and it was suggested to send to this listserv as well.
> >>
> >> I'm trying to get CRS 3.0.0.-rc1 working with ModSecurity 2.9.1 and Apache
> >> 2.4.7 on an Ubuntu 14.04 machine.
> >>
> >> I'm using all the rules in the /rules directory, and when trying to start
> >> Apache I receive the following error. (Note: There is no entry in the
> >> Apache error.log file for this.)
> >>
> >> AH00526: Syntax error on line 35 of
> >> /etc/apache2/conf/crs/rules/RESPONSE-50-DATA-LEAKAGES-PHP.conf:
> >> Error parsing actions: Unknown action: \\
> >> Action 'configtest' failed.
> >>
> >> In my troubleshooting of the *RESPONSE-50-DATA-LEAKAGES-PHP.conf
> >> *file, I combined line 35 with 34
> >>
> >> capture,ctl:auditLogParts=+E,\
> >>
> >> just to see if the line error would change (and make sure I was indeed
> >> troubleshooting the correct file) and suddenly this error is gone, and
> >> is replaced with another.
> >>
> >> AH00526: Syntax error on line 31 of
> >> /etc/apache2/conf/crs/rules/RESPONSE-50-DATA-LEAKAGES.conf:
> >> Error parsing actions: Unknown action: \\
> >>
> >> which again is solved by combining with the line above it.
> >>
> >> accuracy:'9',t:none,\
> >>
> >>
> >> Now it starts correctly with no error.  Needless to say I'm pretty
> >> confused about this error, and more confused about the "fix" since I
> >> don't understand why removing a single line continuation would matter.
> >>
> >> Any thoughts on this?  Or any suggestions to increase 
> >> debug\troubleshooting?
> >>
> >> Thanks,
> >> David Angel
> >
> >> _______________________________________________
> >> Owasp-modsecurity-core-rule-set mailing list
> >> Owasp-modsecurity-core-rule-set@lists.owasp.org
> >> http://scanmail.trustwave.com/?c=4062&d=9qPM115iL1ynPbZVTXRAV5XeKfPloSkwS50vHuBKKQ&s=5&u=https%3a%2f%2flists%2eowasp%2eorg%2fmailman%2flistinfo%2fowasp-modsecurity-core-rule-set
> >
> >
> >--
> >mailto:christian.fol...@netnea.com
> >http://scanmail.trustwave.com/?c=4062&d=9qPM115iL1ynPbZVTXRAV5XeKfPloSkwS5h6QuYRJA&s=5&u=http%3a%2f%2fwww%2echristian-folini%2ech
> >twitter: @ChrFolini
> >
> >------------------------------------------------------------------------------
> >What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
> >patterns at an interface-level. Reveals which users, apps, and protocols are
> >consuming the most bandwidth. Provides multi-vendor support for NetFlow,
> >J-Flow, sFlow and other flows. Make informed decisions using capacity
> >planning reports. 
> >http://scanmail.trustwave.com/?c=4062&d=9qPM115iL1ynPbZVTXRAV5XeKfPloSkwS5svEuhJKA&s=5&u=https%3a%2f%2fad%2edoubleclick%2enet%2fddm%2fclk%2f305295220%3b132659582%3be
> >_______________________________________________
> >mod-security-developers mailing list
> >mod-security-develop...@lists.sourceforge.net
> >http://scanmail.trustwave.com/?c=4062&d=9qPM115iL1ynPbZVTXRAV5XeKfPloSkwS5ksH-UfdQ&s=5&u=https%3a%2f%2flists%2esourceforge%2enet%2flists%2flistinfo%2fmod-security-developers
> >ModSecurity Services from Trustwave's SpiderLabs:
> >https://www.trustwave.com/spiderLabs.php
> 
> ________________________________
> 
> This transmission may contain information that is privileged, confidential, 
> and/or exempt from disclosure under applicable law. If you are not the 
> intended recipient, you are hereby notified that any disclosure, copying, 
> distribution, or use of the information contained herein (including any 
> reliance thereon) is strictly prohibited. If you received this transmission 
> in error, please immediately contact the sender and destroy the material in 
> its entirety, whether in electronic or hard copy format.
> ------------------------------------------------------------------------------
> What NetFlow Analyzer can do for you? Monitors network bandwidth and traffic
> patterns at an interface-level. Reveals which users, apps, and protocols are 
> consuming the most bandwidth. Provides multi-vendor support for NetFlow, 
> J-Flow, sFlow and other flows. Make informed decisions using capacity 
> planning reports. https://ad.doubleclick.net/ddm/clk/305295220;132659582;e
> _______________________________________________
> mod-security-developers mailing list
> mod-security-develop...@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/mod-security-developers
> ModSecurity Services from Trustwave's SpiderLabs:
> https://www.trustwave.com/spiderLabs.php

-- 
mailto:christian.fol...@netnea.com
http://www.christian-folini.ch
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to