File: README.Debian

package info (click to toggle)
libnginx-mod-http-modsecurity 1.0.3-2
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 428 kB
  • sloc: perl: 1,819; ansic: 1,515; sh: 26; makefile: 3
file content (127 lines) | stat: -rw-r--r-- 4,178 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
Debian nginx ModSecurity HOWTO
2022 - Ervin Hegedus <airween@digitalwave.hu>, <airween@gmail.com>

This module provides the WAF (Web Application Firewall) feature for nginx.

Copy these files from the /usr/share/nginx/modsecurity to the destination:

cp /usr/share/nginx/modsecurity/default-modsecurity.conf /etc/nginx/sites-available/
cp /usr/share/nginx/modsecurity/modsecurity.conf /etc/nginx/
cp /usr/share/nginx/modsecurity/modsecurity_includes.conf /etc/nginx/
cp /usr/share/nginx/modsecurity/unicode.mapping /etc/nginx

Normally, the libnginx-mod-http-security package configuration step makes it,
except 'default' site config - there will be there with another name:
default-modsecurity. You should replace it by hand, or make the modifications
based on that file.

To activate the module, find the line with word "modsecurity" in file
/etc/nginx/sites-available/default, and remove the comment:

    # Enable ModSecurity WAF, if need
    modsecurity on;

To load the OWASP's Core Rule Set (from package modsecurity-crs), find
the line with "modsecurity_rules_file", and remove the comment:

    # Load ModSecurity CRS, if need
    modsecurity_rules_file /etc/nginx/modsecurity_includes.conf;

This file contains a commented line:
#include /usr/share/modsecurity-crs/owasp-crs.load

If you want to use OWASP CoreRuleSet rules, you have to install the
modsecurity-crs package:

sudo apt install modsecurity-crs.

After the installation, please REPLACE the "IncludeOptional" directives
by "Include", because ModSecurity will fail - it does not support this.

Now you can remove the comment from the beginning of that line.

Restart nginx - now your nginx instance is ready.

Log in to your system, and start to read the log file with tail command
as root:

sudo tail -f /var/log/nginx/modsec_audit.log

Note, that this logfile configured in /etc/nginx/modsecurity.conf:

# Use a single file for logging. This is much easier to look at, but
# assumes that you will use the audit log only ocassionally.
#
SecAuditLogType Serial
SecAuditLog /var/log/nginx/modsec_audit.log

Note, that the original location is /var/log/modsec_audit.log.

You can modify it if need, but please check the permissions (and your
security modules config, eg. Apparmor or SELinux).

Try to load this page:

lynx "http://127.0.0.1/index.nginx-debian.html?a=%3Cscript%3Ealert(%27Foo%27);%3C/srcipt%3E"

The default nginx index page showed.

In the modsec_audit.log, you can see that ModSecurity catches the XSS attack,
but only detects it, not denies. The relevant lines are these:

---fXnEy53n---F--
HTTP/1.0 200
Server: nginx/1.22.0
...

---fXnEy53n---H--
ModSecurity: Warning....
ModSecurity: Warning. detected XSS using libinjection. [file "/usr/share/modsecurity-crs/rules/REQUEST-941-APPLICATION-ATTACK-XSS.conf"]

The first block shows that nginx replies the HTTP 200, the seconds
shows it detects the attack.

Now if everything is right, you can turn on the engine. Find the "SecRuleEngine"
word in /etc/nginx/modsecurity.conf. There are two lines:

# Enable ModSecurity, attaching it to every transaction. Use detection
# only to start with, because that minimises the chances of post-installation
# disruption.
#
SecRuleEngine DetectionOnly
#SecRuleEngine On

Remove the comment from the second place, put one to the first, and restart
your nginx. Then load the index page again:

lynx "http://127.0.0.1/index.nginx-debian.html?a=%3Cscript%3Ealert(%27Foo%27);%3C/srcipt%3E"

Now you got an HTTP 403 error, and in modsec_audit.log:

---HsR8PRsN---F--
HTTP/1.0 403
Server: nginx/1.22.0
...

---HsR8PRsN---H--
ModSecurity: Warning....
ModSecurity: Warning. detected XSS using libinjection....

If you want to see the reports in Nginx's error.log, you have to add a level
to your error.log:

    error_log /var/log/nginx/error.log info;

Now your set up is complete.

For more information, check the ModSecurity sites:

https://github.com/SpiderLabs/ModSecurity-nginx
https://github.com/SpiderLabs/ModSecurity
https://github.com/SpiderLabs/ModSecurity/wiki
https://github.com/SpiderLabs/ModSecurity/wiki/Reference-Manual-%28v2.x%29#OWASP_ModSecurity_Core_Rule_Set_CRS_Project


Regards,
Ervin