From 8d4667e562d1f03b2923b5488b4763f1f2bf97d8 Mon Sep 17 00:00:00 2001 From: Ryan Barnett Date: Tue, 16 Apr 2013 16:53:54 -0400 Subject: [PATCH] Updated references to modsecurity_crs_10_setup.conf --- INSTALL | 16 ++++++++-------- activated_rules/README | 10 +++++----- util/regression-tests/INSTALL | 2 +- .../modsecurity_crs_59_header_tagging.conf | 2 +- 4 files changed, 15 insertions(+), 15 deletions(-) diff --git a/INSTALL b/INSTALL index e562bf92e..0dc3a9297 100644 --- a/INSTALL +++ b/INSTALL @@ -3,10 +3,10 @@ Core Rule Set Quick Setup To activate the rules for your web server installation: - 1) Copy the modsecurity_crs_10_config.conf.example file to modsecurity_crs_10_config.conf + 1) Copy the modsecurity_crs_10_setup.conf.example file to modsecurity_crs_10_setup.conf and customize the settings for your local environment. - The modsecurity_crs_10_config.conf file includes management rules and directives + The modsecurity_crs_10_setup.conf file includes management rules and directives that can control important CRS functions. Pay attention to the SecRuleEngine setting (On by default) and that the SecDefaultAction directive is set to "pass". The 49 inbound blocking and 59 outbound blocking @@ -27,18 +27,18 @@ To activate the rules for your web server installation: "activated_rules" directory location. You will want to create symlinks for the following: - 1) The main modsecurity_crs_10_config.conf file + 1) The main modsecurity_crs_10_setup.conf file 2) Any rules from the base_rules directory 3) Any remaining rules from the optional_rules, slr_rules or experimental_rules directories $ pwd /usr/local/apache/conf/crs $ ls - CHANGELOG app_sensor modsecurity_crs_10_config.conf slr_rules - LICENSE base_rules modsecurity_crs_10_config.conf.example util + CHANGELOG app_sensor modsecurity_crs_10_setup.conf slr_rules + LICENSE base_rules modsecurity_crs_10_setup.conf.example util README experimental_rules modsecurity_crs_15_customrules.conf activated_rules lua optional_rules - $ sudo ln -s /usr/local/apache/conf/crs/modsecurity_crs_10_config.conf activated_rules/modsecurity_crs_10_config.conf + $ sudo ln -s /usr/local/apache/conf/crs/modsecurity_crs_10_setup.conf activated_rules/modsecurity_crs_10_setup.conf $ for f in `ls base_rules/` ; do sudo ln -s /usr/local/apache/conf/crs/base_rules/$f activated_rules/$f ; done $ for f in `ls optional_rules/ | grep comment_spam` ; do sudo ln -s /usr/local/apache/conf/crs/optional_rules/$f activated_rules/$f ; done $ ls -l activated_rules @@ -52,7 +52,7 @@ To activate the rules for your web server installation: lrwxr-xr-x 1 root wheel 66 May 17 14:01 modsecurity_50_outbound.data -> /usr/local/apache/conf/crs/base_rules/modsecurity_50_outbound.data lrwxr-xr-x 1 root wheel 74 May 17 14:01 modsecurity_50_outbound_malware.data -> /usr/local/apache/conf/crs/base_rules/modsecurity_50_outbound_malware.data lrwxr-xr-x 1 root wheel 73 May 17 14:01 modsecurity_crs_14_customrules.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_14_customrules.conf - lrwxr-xr-x 1 root wheel 57 May 17 14:22 modsecurity_crs_10_config.conf -> /usr/local/apache/conf/crs/modsecurity_crs_10_config.conf + lrwxr-xr-x 1 root wheel 57 May 17 14:22 modsecurity_crs_10_setup.conf -> /usr/local/apache/conf/crs/modsecurity_crs_10_setup.conf lrwxr-xr-x 1 root wheel 81 May 17 14:01 modsecurity_crs_20_protocol_violations.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_20_protocol_violations.conf lrwxr-xr-x 1 root wheel 80 May 17 14:01 modsecurity_crs_21_protocol_anomalies.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_21_protocol_anomalies.conf lrwxr-xr-x 1 root wheel 76 May 17 14:01 modsecurity_crs_23_request_limits.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_23_request_limits.conf @@ -77,7 +77,7 @@ To activate the rules for your web server installation: you've placed the rule files into conf/crs/): - Include conf/crs/modsecurity_crs_10_config.conf + Include conf/crs/modsecurity_crs_10_setup.conf Include conf/crs/activated_rules/*.conf diff --git a/activated_rules/README b/activated_rules/README index 758f8db51..486ebd7fc 100644 --- a/activated_rules/README +++ b/activated_rules/README @@ -2,18 +2,18 @@ "activated_rules" directory location. You will want to create symlinks for the following: - 1) The main modsecurity_crs_10_config.conf file + 1) The main modsecurity_crs_10_setup.conf file 2) Any rules from the base_rules directory 3) Any remaining rules from the optional_rules, slr_rules or experimental_rules directories. $ pwd /usr/local/apache/conf/crs $ ls - CHANGELOG app_sensor modsecurity_crs_10_config.conf slr_rules - LICENSE base_rules modsecurity_crs_10_config.conf.example util + CHANGELOG app_sensor modsecurity_crs_10_setup.conf slr_rules + LICENSE base_rules modsecurity_crs_10_setup.conf.example util README experimental_rules modsecurity_crs_15_customrules.conf activated_rules lua optional_rules - $ sudo ln -s /usr/local/apache/conf/crs/modsecurity_crs_10_config.conf activated_rules/modsecurity_crs_10_config.conf + $ sudo ln -s /usr/local/apache/conf/crs/modsecurity_crs_10_setup.conf activated_rules/modsecurity_crs_10_setup.conf $ for f in `ls base_rules/` ; do sudo ln -s /usr/local/apache/conf/crs/base_rules/$f activated_rules/$f ; done $ for f in `ls optional_rules/ | grep comment_spam` ; do sudo ln -s /usr/local/apache/conf/crs/optional_rules/$f activated_rules/$f ; done $ ls -l activated_rules @@ -27,7 +27,7 @@ lrwxr-xr-x 1 root wheel 66 May 17 14:01 modsecurity_50_outbound.data -> /usr/local/apache/conf/crs/base_rules/modsecurity_50_outbound.data lrwxr-xr-x 1 root wheel 74 May 17 14:01 modsecurity_50_outbound_malware.data -> /usr/local/apache/conf/crs/base_rules/modsecurity_50_outbound_malware.data lrwxr-xr-x 1 root wheel 73 May 17 14:01 modsecurity_crs_14_customrules.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_14_customrules.conf - lrwxr-xr-x 1 root wheel 57 May 17 14:22 modsecurity_crs_10_config.conf -> /usr/local/apache/conf/crs/modsecurity_crs_10_config.conf + lrwxr-xr-x 1 root wheel 57 May 17 14:22 modsecurity_crs_10_setup.conf -> /usr/local/apache/conf/crs/modsecurity_crs_10_setup.conf lrwxr-xr-x 1 root wheel 81 May 17 14:01 modsecurity_crs_20_protocol_violations.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_20_protocol_violations.conf lrwxr-xr-x 1 root wheel 80 May 17 14:01 modsecurity_crs_21_protocol_anomalies.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_21_protocol_anomalies.conf lrwxr-xr-x 1 root wheel 76 May 17 14:01 modsecurity_crs_23_request_limits.conf -> /usr/local/apache/conf/crs/base_rules/modsecurity_crs_23_request_limits.conf diff --git a/util/regression-tests/INSTALL b/util/regression-tests/INSTALL index e72223618..5312a326d 100644 --- a/util/regression-tests/INSTALL +++ b/util/regression-tests/INSTALL @@ -9,7 +9,7 @@ INSTALLATION STEPS: 3) Copy the testserver.cgi script to the /cgi-bin directory if you wish to test the outbound/response rules. -4) Edit the modsecurity_crs_10_config.conf file and update/enable the +4) Edit the modsecurity_crs_10_setup.conf file and update/enable the Regression Testing variable settings. 5) Copy/Symlink the modsecurity_crs_59_header_tagging.conf file to the diff --git a/util/regression-tests/modsecurity_crs_59_header_tagging.conf b/util/regression-tests/modsecurity_crs_59_header_tagging.conf index 0fcdcf842..6400ca499 100644 --- a/util/regression-tests/modsecurity_crs_59_header_tagging.conf +++ b/util/regression-tests/modsecurity_crs_59_header_tagging.conf @@ -7,7 +7,7 @@ # the inner workings of your ModSecurity configurations. # # Must enable/configure the TX:REGRESSION_TESTING variable in the -# modsecurity_crs_10_config.conf file. +# modsecurity_crs_10_setup.conf file. # SecRule &TX:REGRESSION_TESTING|TX:REGRESSION_TESTING "@eq 0" "phase:4,t:none,nolog,id:'981228',pass,skipAfter:END_RESPONSE_HEADER_TAGGING" SecRule TX:ANOMALY_SCORE "@eq 0" "phase:4,id:'981229',t:none,nolog,pass,skipAfter:END_RESPONSE_HEADER_TAGGING"