Re: [mp2.0] Input Filter virus scan (more info)

2003-01-06 Thread Stas Bekman
Issac Goldstand wrote:

[snip]


. Notice that you may need 
to have to store the context data between filter calls, which currently 
is not supported, but I'm working on adding this feature asap.

If you need to store something in between the filter calls (filter may 
get the data in chunks, every time it's called it may only gets a chunk 
of data), the context is the way to store such data (e.g. partial bucket 
brigades, counters, etc.).

Just give me some time and I'll commit the implementation and the 
updated doc with examples. I'm experiencing some problems with not 
seeing EOS, which prevents me from completing it. Stay tuned.


__
Stas BekmanJAm_pH -- Just Another mod_perl Hacker
http://stason.org/ mod_perl Guide --- http://perl.apache.org
mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com
http://modperlbook.org http://apache.org   http://ticketmaster.com



Re: [mp2.0] Input Filter virus scan (more info)

2003-01-05 Thread Stas Bekman
Chris Hoffmann wrote:
[...]

My need is to scan incoming data.

If anyone has used mod_vscan on incoming data or know if the All-in-One Filter example located at;
http://perl.apache.org/docs/2.0/user/handlers/filters.html#All_in_One_Filter
can do this please contact me.


I'm not familiar with mod_vscan and you don't specify how the scan 
filter works, but I see no reason why it shouldn't work, as long as all 
you need is an access to the request's headers. Notice that you may need 
to have to store the context data between filter calls, which currently 
is not supported, but I'm working on adding this feature asap.

Also all-in-one filter is an example of how to snoop on the data going 
through the filter, since you don't need the output filter, you can use 
a simpler only-input connection filter:
http://perl.apache.org/docs/2.0/user/handlers/filters.html#Connection_Output_Filters

One more thing that needs to be figured out is how to make the filter 
abort the normal request processing if the virus is discovered and 
return a 40x response.

__
Stas BekmanJAm_pH -- Just Another mod_perl Hacker
http://stason.org/ mod_perl Guide --- http://perl.apache.org
mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com
http://modperlbook.org http://apache.org   http://ticketmaster.com



[mp2.0] Input Filter virus scan (more info)

2003-01-04 Thread Chris Hoffmann


Me again,

I have been asked to supply more details of what I am trying to achieve with the Input 
Filter.  The following is an attempt to clearly define more requirements.

I have an Apache/2.0.43 + mod_perl/1.99_08-dev + Perl/5.8.0 server that hosts simple 
static html and dynamic perl generated pages.  I am unable to modify perl scripts 
without voiding my warranty.  I therefore require a PerlInputFilterHandler to process 
the Apache request object and then pass it onto
the default handler.

The PerlInputFilterHandler is to scan the request object with an Anti Virus program 
(such as Sophos).  If a virus is located the request should be blocked and a response 
displayed on the clients browser.  If clean the request will be allowed to pass to the 
default handler.

All this is to happen in the background and without the users' knowledge.

I have found a module called mod_vscan by Kazutoshi Kubota [EMAIL PROTECTED] at
http://www.willbe6.org/security/mod_vscan/
But this C code appears to only handle output from the server.

My need is to scan incoming data.

If anyone has used mod_vscan on incoming data or know if the All-in-One Filter 
example located at;
http://perl.apache.org/docs/2.0/user/handlers/filters.html#All_in_One_Filter
can do this please contact me.



Chris.
[EMAIL PROTECTED]