mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-26 01:45:54 +03:00
[GH-ISSUE #1044] is nginx build with modsecurity? #874
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#874
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @gent99 on GitHub (Apr 28, 2021).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/1044
I'd like to ask, if nginx modsecurity is included in this project?
Kind regards
@jc21 commented on GitHub (Apr 28, 2021):
This is using a custom built OpenResty instance.
The parameters of the build can be found here.
Though I don't see mod security listed, I'm not sure if it's an internal module or not.
@gent99 commented on GitHub (Apr 29, 2021):
as far as i know, modsecurity has to be build for the nginx version you are using. See here: https://www.nginx.com/blog/compiling-and-installing-modsecurity-for-open-source-nginx/
The goal behind my question actually is: What's behind the setting "Block Common Exploits" in an proxy host?
@l4rm4nd commented on GitHub (May 4, 2021):
You can view the content of
block-exploits.confby yourself. Basically some regex stuff to block well known malicious actors, exploit strings, user agents and stuff.Location is:
/etc/nginx/conf.d/include/block-exploit.conf@gent99 commented on GitHub (May 6, 2021):
integrating modsecurity should be considerated for a new major version of npm, if it's possible. Especially with modsecurity it's kind of easy to include OWASP CRS https://owasp.org/www-project-modsecurity-core-rule-set/ wich could make npm to a fairly robust WAF
@chaptergy commented on GitHub (May 12, 2021):
Feature request: https://github.com/jc21/nginx-proxy-manager/issues/847