|
1 | 1 | ### SecRemoteRules
|
2 |
| - |
3 |
| -{ |
4 |
| - type => "misc", |
5 |
| - comment => "SecRemoteRules load", |
6 |
| - conf => qq( |
7 |
| - SecRuleEngine On |
8 |
| - SecDebugLog $ENV{DEBUG_LOG} |
9 |
| - SecDebugLogLevel 9 |
10 |
| - SecRequestBodyAccess On |
11 |
| - SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
12 |
| - ), |
13 |
| - match_log => { |
14 |
| - error => [ qr/ModSecurity: Loaded 1 rule/, 1], |
15 |
| - }, |
16 |
| -}, |
17 |
| -{ |
18 |
| - type => "misc", |
19 |
| - comment => "SecRemoteRules apply some remote rules", |
20 |
| - conf => qq( |
21 |
| - SecRuleEngine On |
22 |
| - SecDebugLog $ENV{DEBUG_LOG} |
23 |
| - SecDebugLogLevel 9 |
24 |
| - SecRequestBodyAccess On |
25 |
| - SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
26 |
| - ), |
27 |
| - match_log => { |
28 |
| - error => [ qr/ModSecurity: Warning. Matched phrase \"127.0.0.1\" at REQUEST_FILENAME./, 1], |
29 |
| - debug => [ qr/Matched phrase \"127.0.0.1\" at REQUEST_FILENAME/, 1 ], |
30 |
| - }, |
31 |
| - match_response => { |
32 |
| - status => qr/^404$/, |
33 |
| - }, |
34 |
| - request => new HTTP::Request( |
35 |
| - POST => "http://$ENV{SERVER_NAME}:$ENV{SERVER_PORT}/127.0.0.1.html", |
36 |
| - [ |
37 |
| - "Content-Type" => "application/x-www-form-urlencoded", |
38 |
| - ], |
39 |
| - # Args |
40 |
| - "some_variable=-1' and 1=1 union/* foo */select load_file('/etc/passwd')--" |
41 |
| - ), |
42 |
| -}, |
| 2 | +# probably no need these anymore |
| 3 | +# plus it's hard to set up an infrastucture |
| 4 | +# |
| 5 | +#{ |
| 6 | +# type => "misc", |
| 7 | +# comment => "SecRemoteRules load", |
| 8 | +# conf => qq( |
| 9 | +# SecRuleEngine On |
| 10 | +# SecDebugLog $ENV{DEBUG_LOG} |
| 11 | +# SecDebugLogLevel 9 |
| 12 | +# SecRequestBodyAccess On |
| 13 | +# SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
| 14 | +# ), |
| 15 | +# match_log => { |
| 16 | +# error => [ qr/ModSecurity: Loaded 1 rule/, 1], |
| 17 | +# }, |
| 18 | +#}, |
| 19 | +#{ |
| 20 | +# type => "misc", |
| 21 | +# comment => "SecRemoteRules apply some remote rules", |
| 22 | +# conf => qq( |
| 23 | +# SecRuleEngine On |
| 24 | +# SecDebugLog $ENV{DEBUG_LOG} |
| 25 | +# SecDebugLogLevel 9 |
| 26 | +# SecRequestBodyAccess On |
| 27 | +# SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
| 28 | +# ), |
| 29 | +# match_log => { |
| 30 | +# error => [ qr/ModSecurity: Warning. Matched phrase \"127.0.0.1\" at REQUEST_FILENAME./, 1], |
| 31 | +# debug => [ qr/Matched phrase \"127.0.0.1\" at REQUEST_FILENAME/, 1 ], |
| 32 | +# }, |
| 33 | +# match_response => { |
| 34 | +# status => qr/^404$/, |
| 35 | +# }, |
| 36 | +# request => new HTTP::Request( |
| 37 | +# POST => "http://$ENV{SERVER_NAME}:$ENV{SERVER_PORT}/127.0.0.1.html", |
| 38 | +# [ |
| 39 | +# "Content-Type" => "application/x-www-form-urlencoded", |
| 40 | +# ], |
| 41 | +# # Args |
| 42 | +# "some_variable=-1' and 1=1 union/* foo */select load_file('/etc/passwd')--" |
| 43 | +# ), |
| 44 | +#}, |
43 | 45 |
|
0 commit comments