|
1 | 1 | ### SecRemoteRules |
2 | | - |
3 | | -{ |
4 | | - type => "misc", |
5 | | - comment => "SecRemoteRules load", |
6 | | - conf => qq( |
7 | | - SecRuleEngine On |
8 | | - SecDebugLog $ENV{DEBUG_LOG} |
9 | | - SecDebugLogLevel 9 |
10 | | - SecRequestBodyAccess On |
11 | | - SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
12 | | - ), |
13 | | - match_log => { |
14 | | - error => [ qr/ModSecurity: Loaded 1 rule/, 1], |
15 | | - }, |
16 | | -}, |
17 | | -{ |
18 | | - type => "misc", |
19 | | - comment => "SecRemoteRules apply some remote rules", |
20 | | - conf => qq( |
21 | | - SecRuleEngine On |
22 | | - SecDebugLog $ENV{DEBUG_LOG} |
23 | | - SecDebugLogLevel 9 |
24 | | - SecRequestBodyAccess On |
25 | | - SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
26 | | - ), |
27 | | - match_log => { |
28 | | - error => [ qr/ModSecurity: Warning. Matched phrase \"127.0.0.1\" at REQUEST_FILENAME./, 1], |
29 | | - debug => [ qr/Matched phrase \"127.0.0.1\" at REQUEST_FILENAME/, 1 ], |
30 | | - }, |
31 | | - match_response => { |
32 | | - status => qr/^404$/, |
33 | | - }, |
34 | | - request => new HTTP::Request( |
35 | | - POST => "http://$ENV{SERVER_NAME}:$ENV{SERVER_PORT}/127.0.0.1.html", |
36 | | - [ |
37 | | - "Content-Type" => "application/x-www-form-urlencoded", |
38 | | - ], |
39 | | - # Args |
40 | | - "some_variable=-1' and 1=1 union/* foo */select load_file('/etc/passwd')--" |
41 | | - ), |
42 | | -}, |
| 2 | +# probably no need these anymore |
| 3 | +# plus it's hard to set up an infrastucture |
| 4 | +# |
| 5 | +#{ |
| 6 | +# type => "misc", |
| 7 | +# comment => "SecRemoteRules load", |
| 8 | +# conf => qq( |
| 9 | +# SecRuleEngine On |
| 10 | +# SecDebugLog $ENV{DEBUG_LOG} |
| 11 | +# SecDebugLogLevel 9 |
| 12 | +# SecRequestBodyAccess On |
| 13 | +# SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
| 14 | +# ), |
| 15 | +# match_log => { |
| 16 | +# error => [ qr/ModSecurity: Loaded 1 rule/, 1], |
| 17 | +# }, |
| 18 | +#}, |
| 19 | +#{ |
| 20 | +# type => "misc", |
| 21 | +# comment => "SecRemoteRules apply some remote rules", |
| 22 | +# conf => qq( |
| 23 | +# SecRuleEngine On |
| 24 | +# SecDebugLog $ENV{DEBUG_LOG} |
| 25 | +# SecDebugLogLevel 9 |
| 26 | +# SecRequestBodyAccess On |
| 27 | +# SecRemoteRules 123 "https://www.modsecurity.org/modsecurity-regression-test-secremoterules.txt" |
| 28 | +# ), |
| 29 | +# match_log => { |
| 30 | +# error => [ qr/ModSecurity: Warning. Matched phrase \"127.0.0.1\" at REQUEST_FILENAME./, 1], |
| 31 | +# debug => [ qr/Matched phrase \"127.0.0.1\" at REQUEST_FILENAME/, 1 ], |
| 32 | +# }, |
| 33 | +# match_response => { |
| 34 | +# status => qr/^404$/, |
| 35 | +# }, |
| 36 | +# request => new HTTP::Request( |
| 37 | +# POST => "http://$ENV{SERVER_NAME}:$ENV{SERVER_PORT}/127.0.0.1.html", |
| 38 | +# [ |
| 39 | +# "Content-Type" => "application/x-www-form-urlencoded", |
| 40 | +# ], |
| 41 | +# # Args |
| 42 | +# "some_variable=-1' and 1=1 union/* foo */select load_file('/etc/passwd')--" |
| 43 | +# ), |
| 44 | +#}, |
43 | 45 |
|
0 commit comments