rbustos
rbustos
can you share : modsecurity.conf and debug?
I did a test with same config as you and looks there is an error in your add_ruleset: Acordding to "https://github.com/p0pr0ck5/lua-resty-waf#lua-resty-wafload_secrules" _Note that this still requires the ruleset to be...
some extra tests: 1) to make it work path *must* be: ``` ` local ok, errs = pcall(function() lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-901-INITIALIZATION.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/crs-setup.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/modsecurity.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-903.9001-DRUPAL-EXCLUSION-RULES.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-903.9002-WORDPRESS-EXCLUSION-RULES.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-903.9003-NEXTCLOUD-EXCLUSION-RULES.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-903.9004-DOKUWIKI-EXCLUSION-RULES.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-903.9005-CPANEL-EXCLUSION-RULES.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-905-COMMON-EXCEPTIONS.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-910-IP-REPUTATION.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-911-METHOD-ENFORCEMENT.conf") lua_resty_waf.load_secrules("/usr/local/openresty/site/lualib/rules/REQUEST-912-DOS-PROTECTION.conf")...
I've continue testing your config and it complains on debug for crs-setup.conf as shown below `{"timestamp":1540258888,"request_headers":{"host":"myhost.tld","connection":"keep-alive","cache-control":"no-cache","referer":"http:\/\/myhost.tld\/customer\/%27%20UNION%20ALL%20SELECT%20NULL","pragma":"no-cache","user-agent":"Mozilla\/5.0 (X11; Fedora; Linux x86_64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/69.0.3497.100 Safari\/537.36","cookie":"mwsid=2744d562255d8abc9f597572257fd9e9; csrf_token=9a3fe57137a292eaca1e0825a1294b524ffd8af7s%3A88%3A%22elZDc29JNkNFZ3pfZzM2R2l1SH5wVlM2UEY1YWZPREShbFnoXvLrgiyswd3S42mmV3_KLfBd3WKbWIc8e5VH2Q%3D%3D%22%3B","accept-language":"en-US,en;q=0.9","accept-encoding":"gzip, deflate","accept":"image\/webp,image\/apng,image\/*,*\/*;q=0.8"},"id":"e9cea3b9c25237f68e4b","method":"GET","uri":"\/static\/images\/bg.jpg","client":"172.16.100.50","alerts":[{"msg":"ModSecurity Core Rule...
try with this: local deny_override = function(waf, ctx) ngx.log(ngx.INFO, "Overriding DENY action") waf:write_log_events(true, ctx) ngx.exit(ngx.HTTP_FORBIDDEN) end waf:set_option("hook_action", "DENY", deny_override)
Hi! Existing one PG_VERSION=12.16-1.pgdg110+1 No changes on PgSQL since last 0.4.0-beta install
Hello! Yes, the prior version was "reacherhq/backend:v0.4.0-beta31" Regarding the DB I already did that. I mean create a brand new DB set but the error continue with same message (using...
It worked for me: stable-8252
@saghul : ``` sh-4.2# docker-compose -v docker-compose version 1.18.0, build 8dd22a9 sh-4.2# docker -v Docker version 1.13.1, build 7d71120/1.13.1 ```
@saghul Certainly is related to docker version. Below both tests: EL 8: docker ver: 24.0.2 ``` sh-4.4# cat /etc/redhat-release Rocky Linux release 8.8 (Green Obsidian) sh-4.4# docker -v Docker version...