You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crowdsec-docs/docs/appsec/intro.md
+14-9Lines changed: 14 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,28 +23,33 @@ This component capitalizes on existing remediation functions in web servers (suc
23
23
24
24

25
25
26
-
## Request inspection
26
+
1) The Web Server receives the HTTP request
27
+
2) The HTTP Request is intercepted and passed to the Crowdsec Security Engine via [the HTTP API](/appsec/protocol.md)
28
+
3) The Security Engine answers to the Web Server once the Appsec inband rules have been processed.
29
+
4) Based on the [Security Engine answer](/appsec/protocol#response-code), the Web Server either blocks the HTTP Request or processes it as usual
27
30
28
-
Examining Three Key Layers of the AppSec Component's Request Inspection
31
+
## Inband Rules and Out-Of-Band Rules
29
32
30
-
### 1 Remediation component: request relaying
33
+
The AppSec component relies on rules to inspect HTTP Requests:
34
+
- Inband rules are meant to interrupt request processing
35
+
- Out-Of-Band rules are non-blocking and are evaluated asynchronously
31
36
32
-
If the AppSec capability is activated on the remediation component, the incoming requests will be channeled to the CrowdSec Security engine.
33
-
34
-
### 2 Security Engine: inband rule processing
37
+
### Inband rule processing
35
38
36
39
The security engine first evaluates the inband rules, designed to identify and block specific requests.
37
40
Once these rules are evaluated, a response is relayed to the remediation component.
38
41
39
42
This leads to two possible outcomes:
40
43
41
-
1.If no inband rule is triggered, the processing of the request will continue on the web-server side as usual
42
-
2. If an inband rule is triggered, the remediation component will answer with a 403 or a captcha request to the user of the incriminated request, stopping the request processing.
44
+
1. If an inband rule is triggered, the remediation component will answer with a 403 or a captcha request to the user of the incriminated request, stopping the request processing.
45
+
2.Otherwise, the request will be normally processed
In the background, the security engine will then evaluate the out-of-band rules. These rules do not impact performance or response time, as they are evaluated after the AppSec Component instructs the webserver to continue or stop processing the request.
47
50
51
+
They are usually meant to detect unwanted behaviors that exhibit a repetitive aspect (ie. Applicative Spam, Resource enumeration, Scalping etc.). When those rules trigger, they emit an event is processed by the Security Engine in the same way a log line is.
52
+
48
53
## Post processing
49
54
50
55
When a request triggers one or more rules, either in the inband section (blocking) or out-of-band (non-blocking), several things happen:
0 commit comments