Hey Brent,

There is the sanitize group of actions that applies to the Audit log and will
replace certain parameter values with asterisks.

However, the alert message written to the Apache Error-Log and the Debug-Log
(Level 3) are unaffected by this.

It's one of the major issues I have with ModSecurity.

The following issue described this shortcoming:
https://github.com/SpiderLabs/ModSecurity/issues/1132

Ahoj,

Christian

On Tue, Nov 07, 2017 at 05:30:43PM +0200, Brent Clark wrote:
> Good day Guys
> I'm in bit of a pickle, in that, I've received a request that no modsecurity 
> log
> s may contains passwords or attempted passwords etc in the log.
> This is for if we get audited.
> 
> I can set:
> SecDefaultAction "phase:1,deny,nolog,auditlog"
> SecDefaultAction "phase:2,deny,nolog,auditlog"
> 
> But then I would loose visibility of other issues.
> 
> This is mostly for the SQLi rules that I am trying to tackle.
> 
> Does anyone know of a way of disabling logging, without having to search and 
> rep
> lace the rules provided by Owasp.
> 
> If anyone can assist, it would be greatly appreciated.
> 
> Regards
> Brent Clark

> _______________________________________________
> Owasp-modsecurity-core-rule-set mailing list
> Owasp-modsecurity-core-rule-set@lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set


-- 
https://www.feistyduck.com/training/modsecurity-training-course
https://www.feistyduck.com/books/modsecurity-handbook/
mailto:christian.fol...@netnea.com
twitter: @ChrFolini
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
Owasp-modsecurity-core-rule-set@lists.owasp.org
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to