1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
|
Source: modsecurity-apache
Section: httpd
Priority: optional
Maintainer: Ervin Hegedus <airween@gmail.com>
Build-Depends: debhelper (>> 13), apache2-dev, libxml2-dev (>= 2.9.14), liblua5.1-0-dev, libcurl4-gnutls-dev, libpcre2-dev, pkgconf, libyajl-dev, debhelper-compat (= 13)
Rules-Requires-Root: binary-targets
Standards-Version: 4.6.1
Homepage: https://github.com/SpiderLabs/ModSecurity
Uploaders: Alberto Gonzalez Iniesta <agi@inittab.org>
Vcs-Browser: https://salsa.debian.org/modsecurity-packaging-team/modsecurity-apache
Vcs-Git: https://salsa.debian.org/modsecurity-packaging-team/modsecurity-apache.git
Package: libapache2-mod-security2
Architecture: any
Recommends: modsecurity-crs
Depends: ${shlibs:Depends}, ${misc:Depends}
Description: Tighten web applications security for Apache
Modsecurity is an Apache module whose purpose is to tighten the Web
application security. Effectively, it is an intrusion detection and prevention
system for the web server.
.
At the moment its main features are:
* Audit log; store full request details in a separate file, including POST
payloads.
* Request filtering; incoming requests can be analysed and offensive requests
can be rejected (or simply logged, if that is what you want). This feature
can be used to prevent many types of attacks (e.g. XSS attacks, SQL
injection, ...) and even allow you to run insecure applications on your
servers (if you have no other choice, of course).
|