Skip to content

Commit f0c3fde

Browse files
committed
remove csec agent config, update status log for csec config
1 parent 95d1c78 commit f0c3fde

File tree

2 files changed

+8
-321
lines changed

2 files changed

+8
-321
lines changed

agent/php_minit.c

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -719,11 +719,14 @@ PHP_MINIT_FUNCTION(newrelic) {
719719
nr_wordpress_minit();
720720
nr_php_set_opcode_handlers();
721721

722-
if (!NR_PHP_PROCESS_GLOBALS(nr_security_agent_enabled) || !NR_PHP_PROCESS_GLOBALS(nr_security_enabled) || NR_PHP_PROCESS_GLOBALS(high_security)) {
723-
nrl_info(NRL_INIT, "New Relic Security is completely disabled by one of the user provided config `newrelic.security.enabled`, `newrelic.security.agent.enabled` or `newrelic.high_security`. Not loading security capabilities.");
724-
nrl_debug(NRL_INIT, "newrelic.security.agent.enabled : %s", NR_PHP_PROCESS_GLOBALS(nr_security_enabled) ? "true" : "false");
725-
nrl_debug(NRL_INIT, "newrelic.security.enabled : %s", NR_PHP_PROCESS_GLOBALS(nr_security_agent_enabled) ? "true" : "false");
726-
nrl_debug(NRL_INIT, "newrelic.high_security : %s", NR_PHP_PROCESS_GLOBALS(high_security) ? "true" : "false");
722+
if (NR_PHP_PROCESS_GLOBALS(nr_security_agent_enabled)
723+
&& NR_PHP_PROCESS_GLOBALS(nr_security_enabled)
724+
&& !NR_PHP_PROCESS_GLOBALS(high_security)) {
725+
nrl_info(
726+
NRL_INIT,
727+
"New Relic Security is enabled by the user provided config "
728+
"`newrelic.security.enabled`, `newrelic.security.agent.enabled` and "
729+
"`newrelic.high_security`. Security capabilities will be loaded.");
727730
}
728731

729732
nrl_debug(NRL_INIT, "MINIT processing done");

agent/scripts/newrelic.ini.template

Lines changed: 0 additions & 316 deletions
Original file line numberDiff line numberDiff line change
@@ -1333,319 +1333,3 @@ newrelic.daemon.logfile = "/var/log/newrelic/newrelic-daemon.log"
13331333
; for vulnerability management.
13341334
;
13351335
;newrelic.vulnerability_management.package_detection.enabled = true
1336-
1337-
; Setting: newrelic.security.enabled
1338-
; Type : boolean
1339-
; Scope : system
1340-
; Default: false
1341-
; Info : Indicates if attack detection security module is to be enabled
1342-
;
1343-
;newrelic.security.enabled = true
1344-
1345-
; Setting: newrelic.security.mode
1346-
; Type : string
1347-
; Scope : system
1348-
; Default: "IAST"
1349-
; Info : Security module provides two modes "IAST" or "RASP"
1350-
; See documentation for more details
1351-
;
1352-
;newrelic.security.mode = "IAST"
1353-
1354-
; Setting: newrelic.security.validator_service_endpoint_url
1355-
; Type : string
1356-
; Scope : system
1357-
; Default: "wss://csec.nr-data.net"
1358-
; Info : New Relic<E2><80><99>s security module SaaS connection URLs
1359-
;
1360-
;newrelic.security.validator_service_url = "wss://csec.nr-data.net"
1361-
1362-
; Setting: newrelic.security.agent.enabled
1363-
; Type : boolean
1364-
; Scope : system
1365-
; Default: false
1366-
; Info : Used to enable security module, default false is equivalent to
1367-
; security module not even loaded. If this setting is set to true,
1368-
; then only security module is loaded and to enable it, a restart
1369-
; of application is required. This is different than
1370-
; newrelic.security.enabled, in terms that security.enabled decides
1371-
; runtime behavior of security module but security.agent.enabled
1372-
; would not even load the security module when set to false
1373-
;
1374-
;newrelic.security.agent.enabled = false
1375-
1376-
; Setting: newrelic.security.validator.client_ssl_cert_filepath
1377-
; Type : string
1378-
; Scope : system
1379-
; Default: none
1380-
; Info : Sets the full path of the client certificate in PEM
1381-
; format. When set, this certificate will be used to
1382-
; authenticate the New Relic IAST Security Engine's url. If
1383-
; not set, the default certificate will be used. Make
1384-
; sure the file permissions are correct.
1385-
;
1386-
;newrelic.security.validator.client_ssl_cert_filepath = ""
1387-
1388-
; Setting: newrelic.security.exclude_from_iast_scan.api
1389-
; Type : string
1390-
; Scope : system
1391-
; Default: none
1392-
; Info : A list of valid pcre regex of apis separated by | (pipe) to be
1393-
; excluded for scanning. Make sure each pipe separated regex is correct,
1394-
; otherwise none of the regexes will be applicable.
1395-
;
1396-
;newrelic.security.exclude_from_iast_scan.api = "api1|api2"
1397-
1398-
; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.header
1399-
; Type : string
1400-
; Scope : system
1401-
; Default: none
1402-
; Info : A list of request header keys separated by :: (double colon) to be
1403-
; excluded for scanning
1404-
;
1405-
;newrelic.security.exclude_from_iast_scan.http_request_parameters.header = "X-Forwaded-For"
1406-
1407-
; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.query
1408-
; Type : string
1409-
; Scope : system
1410-
; Default: none
1411-
; Info : A list of request query keys separated by :: (double colon) to be
1412-
; excluded for scanning
1413-
;
1414-
;newrelic.security.exclude_from_iast_scan.http_request_parameters.query = "username::password"
1415-
1416-
; Setting: newrelic.security.exclude_from_iast_scan.http_request_parameters.body
1417-
; Type : string
1418-
; Scope : system
1419-
; Default: none
1420-
; Info : A list of request body keys separated by :: (double colon) to be
1421-
; excluded for scanning
1422-
;
1423-
;newrelic.security.exclude_from_iast_scan.http_request_parameters.body = "account.email::account.contact"
1424-
1425-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings
1426-
; Type : boolean
1427-
; Scope : system
1428-
; Default: false
1429-
; Info : Indicates if insecure settings attack category is to be excluded
1430-
;
1431-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.insecure_settings = false
1432-
1433-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access
1434-
; Type : boolean
1435-
; Scope : system
1436-
; Default: false
1437-
; Info : Indicates if invalid file access attack category is to be excluded
1438-
;
1439-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.invalid_file_access = false
1440-
1441-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection
1442-
; Type : boolean
1443-
; Scope : system
1444-
; Default: false
1445-
; Info : Indicates if sql injection attack category is to be excluded
1446-
;
1447-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.sql_injection = false
1448-
1449-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection
1450-
; Type : boolean
1451-
; Scope : system
1452-
; Default: false
1453-
; Info : Indicates if nosql injection attack category is to be excluded
1454-
;
1455-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.nosql_injection = false
1456-
1457-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection
1458-
; Type : boolean
1459-
; Scope : system
1460-
; Default: false
1461-
; Info : Indicates if ldap injection attack category is to be excluded
1462-
;
1463-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.ldap_injection = false
1464-
1465-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection
1466-
; Type : boolean
1467-
; Scope : system
1468-
; Default: false
1469-
; Info : Indicates if javascript injection attack category is to be excluded
1470-
;
1471-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.javascript_injection = false
1472-
1473-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection
1474-
; Type : boolean
1475-
; Scope : system
1476-
; Default: false
1477-
; Info : Indicates if command injection attack category is to be excluded
1478-
;
1479-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.command_injection = false
1480-
1481-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection
1482-
; Type : boolean
1483-
; Scope : system
1484-
; Default: false
1485-
; Info : Indicates if xpath injection attack category is to be excluded
1486-
;
1487-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.xpath_injection = false
1488-
1489-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf
1490-
; Type : boolean
1491-
; Scope : system
1492-
; Default: false
1493-
; Info : Indicates if ssrf injection attack category is to be excluded
1494-
;
1495-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.ssrf = false
1496-
1497-
; Setting: newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss
1498-
; Type : boolean
1499-
; Scope : system
1500-
; Default: false
1501-
; Info : Indicates if reflected xss attack category is to be excluded
1502-
;
1503-
;newrelic.security.exclude_from_iast_scan.iast_detection_category.rxss = false
1504-
1505-
; Setting: newrelic.security.scan_schedule.delay
1506-
; Type : unsigned integer
1507-
; Scope : system
1508-
; Default: 0
1509-
; Info : Sets the delay in minutes after which IAST scan should start
1510-
;
1511-
;newrelic.security.scan_schedule.delay = 0
1512-
1513-
; Setting: newrelic.security.scan_schedule.duration
1514-
; Type : unsigned integer
1515-
; Scope : system
1516-
; Default: 0
1517-
; Info : Sets the duration in minutes for which IAST scan should running
1518-
; default will be forever
1519-
;
1520-
;newrelic.security.scan_schedule.duration = 0
1521-
1522-
; Setting: newrelic.security.scan_schedule.schedule
1523-
; Type : string
1524-
; Scope : system
1525-
; Default: "0 0 * * * ?"
1526-
; Info : Sets the IAST run schedule in cron format. scan_schedule.delay
1527-
; takes precedence over schedule
1528-
;
1529-
;newrelic.security.scan_schedule.schedule = "0 0 * * * ?"
1530-
1531-
; Setting: newrelic.security.scan_schedule.always_sample_traces
1532-
; Type : boolean
1533-
; Scope : system
1534-
; Default: false
1535-
; Info : Always sample traces regardless of other schedule settings
1536-
;
1537-
;newrelic.security.scan_schedule.always_sample_traces = false
1538-
1539-
; Setting: newrelic.security.iast_test_identifier
1540-
; Type : string
1541-
; Scope : system
1542-
; Default: none
1543-
; Info : Sets the identifier for allowing users to run IAST for CI/CD. Provide
1544-
; a unique identifier (i.e. Build Id) to filter application tests properly.
1545-
; Also, configurable via env variable NEW_RELIC_SECURITY_IAST_TEST_IDENTIFIER
1546-
; which takes precedence over this config.
1547-
;
1548-
;newrelic.security.iast_test_identifier = ""
1549-
1550-
; Setting: newrelic.security.scan_controllers.scan_instance_count
1551-
; Type : unsigned integer
1552-
; Scope : system
1553-
; Default: 0
1554-
; Info : Sets the number of application instances where IAST analysis should be performed
1555-
; for a specific entity. Allowed values are 0 or 1, where 0 signifies run on
1556-
; all application instances for that specific entity.
1557-
; If `newrelic.security.iast_test_identifier` is specified, this value is by default 1.
1558-
;
1559-
;newrelic.security.iast_test_identifier = 0
1560-
1561-
; Setting: newrelic.security.scan_controllers.report_http_response_body
1562-
; Type : boolean
1563-
; Scope : system
1564-
; Default: true
1565-
; Info : This configuration allows user to enable / disable sending of HTTP responses body.
1566-
; Disabling reading of http response body will also disable RXSS vulnerability detection.
1567-
;
1568-
;newrelic.security.scan_controllers.report_http_response_body = true
1569-
1570-
; Setting: newrelic.security.restriction_criteria.account_info.account_id_values
1571-
; Type : string
1572-
; Scope : system
1573-
; Default: none
1574-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode`.
1575-
; A list of account id values separated by :: (double colon) to run IAST
1576-
; on specific test accounts only.
1577-
;
1578-
;newrelic.security.restriction_criteria.account_info.account_id_values = "account1::account2"
1579-
1580-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled
1581-
; Type : boolean
1582-
; Scope : system
1583-
; Default: false
1584-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1585-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1586-
; Indicates if account id value is to be looked up in the header on which to run IAST.
1587-
;
1588-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.enabled = false
1589-
1590-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location
1591-
; Type : string
1592-
; Scope : system
1593-
; Default: none
1594-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1595-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1596-
; A list of header keys separated by :: (double colon) to lookup account id values to
1597-
; run IAST on specific test accounts only.
1598-
;
1599-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.header.location = "X-Account::X-Nr-Account"
1600-
1601-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled
1602-
; Type : boolean
1603-
; Scope : system
1604-
; Default: false
1605-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1606-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1607-
; Indicates if account id value is to be looked up in the body on which to run IAST.
1608-
;
1609-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.enabled = false
1610-
1611-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location
1612-
; Type : string
1613-
; Scope : system
1614-
; Default: none
1615-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1616-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1617-
; A list of body keys separated by :: (double colon) to lookup account id values to
1618-
; run IAST on specific test accounts only.
1619-
;
1620-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.body.location = "account.id::account.test.id"
1621-
1622-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled
1623-
; Type : boolean
1624-
; Scope : system
1625-
; Default: false
1626-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1627-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1628-
; Indicates if account id value is to be looked up in the query on which to run IAST.
1629-
;
1630-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.enabled = false
1631-
1632-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location
1633-
; Type : string
1634-
; Scope : system
1635-
; Default: none
1636-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1637-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1638-
; A list of query keys separated by :: (double colon) to lookup account id values to
1639-
; run IAST on specific test accounts only.
1640-
;
1641-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.query.location = "id::user"
1642-
1643-
; Setting: newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled
1644-
; Type : boolean
1645-
; Scope : system
1646-
; Default: false
1647-
; Info : Applicable only with IAST_RESTRICTION as `newrelic.security.mode` and
1648-
; `newrelic.security.restriction_criteria.account_info.account_id_values`.
1649-
; Indicates if account id value is to be looked up in the path on which to run IAST.
1650-
;
1651-
;newrelic.security.restriction_criteria.account_info.mapping_parameters.path.enabled = false

0 commit comments

Comments
 (0)