File: control

package info (click to toggle)
modsecurity-apache 2.9.12-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 10,444 kB
  • sloc: ansic: 53,551; sh: 5,249; perl: 2,341; cpp: 1,930; makefile: 618; xml: 6
file content (29 lines) | stat: -rw-r--r-- 1,472 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Source: modsecurity-apache
Section: httpd
Priority: optional
Maintainer: Ervin Hegedus <airween@gmail.com>
Build-Depends: debhelper (>> 13), apache2-dev, libxml2-dev (>= 2.9.14), liblua5.1-0-dev, libcurl4-gnutls-dev, libpcre2-dev, pkgconf, libyajl-dev, debhelper-compat (= 13)
Rules-Requires-Root: binary-targets
Standards-Version: 4.6.1
Homepage: https://github.com/SpiderLabs/ModSecurity
Uploaders: Alberto Gonzalez Iniesta <agi@inittab.org>
Vcs-Browser: https://salsa.debian.org/modsecurity-packaging-team/modsecurity-apache
Vcs-Git: https://salsa.debian.org/modsecurity-packaging-team/modsecurity-apache.git

Package: libapache2-mod-security2
Architecture: any
Recommends: modsecurity-crs
Depends: ${shlibs:Depends}, ${misc:Depends}
Description: Tighten web applications security for Apache
 Modsecurity is an Apache module whose purpose is to tighten the Web
 application security. Effectively, it is an intrusion detection and prevention
 system for the web server.
 .
 At the moment its main features are:
   * Audit log; store full request details in a separate file, including POST
     payloads.
   * Request filtering; incoming requests can be analysed and offensive requests
     can be rejected (or simply logged, if that is what you want). This feature
     can be used to prevent many types of attacks (e.g. XSS attacks, SQL
     injection, ...) and even allow you to run insecure applications on your
     servers (if you have no other choice, of course).