ne20002
ne20002
If I may sum up what we expect and see: 1. In CRS 3.3.5 the blocking rule has been logged to Nginx error.log with loglevel error and with severity =...
I have changed my Nginx error_log setting to level info. Now I get the detection rule logged in the error.log: ``` 2024/03/12 11:00:08 [info] 91#91: *59 ModSecurity: Warning. Matched "Operator...
The log spam is more other info messages printed by Nginx, not Modsecurity related. From Modsecurity I only see the detection rule with level info. I agree that if the...
Sorry. I'm still fiddling with the 3.3.5 and can't get my exclusion for local ips get to work. Also, it seems as if there is no version 4 docker image...
Hi @theseion I'm currently a bit busy. I got my Friendica setup working so far (still a few things to opimize) and will continue to update my Nextcloud setup (which...
> To solve it, I just removed the host from "Client Certificates" on cloudflare. With what you disabled check of client certificates all together? So just set support for client...
Hi @mmetc I can confirm the problem with the current 0.0.29-rc3 on OpenWrt. If I use the set-only mode where I create the nftables rules with the scripts of OpenWrt...
This is my setup on OpenWrt with bouncer 0.0.29-rc3 for comparison: With the OpenWrt scripts creating the rules and the bouncer running set-only: ``` table ip crowdsec { set crowdsec-blacklists...
By using a set-only configuration you can create your own firewall rules including filtering of outbound connections.
How do I define that I want input and forward hook?