mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-18 03:46:03 +00:00
…
|
||
---|---|---|
.. | ||
280_mod_security.conf.sample.in | ||
mod_security2.conf.in | ||
pkg-message.in | ||
README.in |
Configuring ModSecurity on FreeBSD ---------------------------------- To enable ModSecurity in Apache, follow the instructions in %%PREFIX%%/%%APACHEETCDIR%%/modules.d/%%APMOD_FILE%% ModSecurity has various configuration options. To change them, edit the following file: %%ETCDIR%%/modsecurity.conf Getting the Core Rule Set ------------------------- ModSecurity requires firewall rule definitions. Most people use the OWASP ModSecurity Core Rule Set (CRS). The easiest way to track the OWASP CRS repository right now is to use Git. Let's make a directory for all our ModSecurity related stuff, and clone the CRS repository under it. pkg install git cd %%ETCDIR%% git clone https://github.com/SpiderLabs/owasp-modsecurity-crs cp owasp-modsecurity-crs/modsecurity_crs_10_setup.conf.example \ crs.conf The CRS has various config options. To change them, edit crs.conf. To activate the CRS base rules, add the following to your httpd.conf: Include etc/modsecurity/owasp-modsecurity-crs/base_rules/*.conf You can also add custom configuration and CRS exceptions here. For instance, you might want to disable rules that generate false positives. Example: SecRuleRemoveById 960015 Starting ModSecurity -------------------- When the configuration is all set, simply restart Apache and confirm that ModSecurity is loaded by checking Apache's log file: apachectl restart tail /var/log/httpd-error.log Configuring blocking mode ------------------------- Now that ModSecurity is active, try making a suspicious request to your web server, for instance browse to a URL: http://www.example.com/?foo=/etc/passwd. The CRS has a rule against this type of request. After browsing to the URL, you should now see the request logged in /var/log/modsec_audit.log. You'll notice that the request succeeds, and the response is sent to the browser normally. The reason is that ModSecurity runs in "DetectionOnly" mode by default, in order to prevent downtime from misconfiguration or heavy-handed blocking. You can enable blocking mode simply by editing modsecurity.conf and changing the following line: SecRuleEngine On Again, restart Apache. Now, make the same suspicious request to your web server. You should now see a "403 Forbidden" error! In practice, it's probably best to keep SecRuleEngine DetectionOnly for some time, while your users exercise the web applications. Meanwhile, you should keep an eye on /var/log/modsec_audit.log to see what is being blocked. If there are any false positives, you need to mitigate this by writing custom exceptions. Maintenance ----------- An essential resource for working with ModSecurity is the ModSecurity Handbook by Ivan Ristic. ModSecurity exposes quite some internals, and it's good to scan this book before you start writing custom rules and exceptions. You probably want to keep the CRS updated from time to time. You can do this with Git: cd %%ETCDIR%%/owasp-modsecurity-crs git pull apachectl restart