I'm looking at using modsecurity_crs_11_brute_force as a way of mitigating
a 
short list of urls that are vulnerable to enumeration attacks.

My UX designers are not happy about the fact that the block, when it goes
into 
effect, restricts all requests from the attacking IP address.

So I'm considering adding an entry to skip the brute force checks if 
REQUEST_FILENAME does not match a protected URL.

The current implementation looks like


   Include conf/modsecurity_crs/*.conf

   SecRule REQUEST_FILENAME "!@within %{tx.brute_force_protected_urls}" 
"phase:1,id:'88888',t:none,nolog,pass,skipAfter:END_BRUTE_FORCE_PROTECTION_C
HECK
S"

   Include 
conf/modsecurity_crs/experimental_rules/modsecurity_crs_11_brute_force.conf

Have I introduced a new weakness by doing this?

Thank you,
Danil



--------------------------------------------------------------------
mail2web LIVE – Free email based on Microsoft® Exchange technology -
http://link.mail2web.com/LIVE


_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to